Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1212
 
C-15
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
 
Appendix C      Example of Mail Policies and Content Filters
  Overview of Incoming Mail Policies
Step 5
Click Submit
The table on the Incoming Mail Policies page shows the names of the filters that have been enabled 
for the default policy. 
Allowing MP3 Attachments for Recipients in Engineering
To disable the “no_mp3s” content filters for the “engineering” policy:
Procedure 
Step 1
Click the link for the Content Filters security service (the Content Filters column) in the engineering 
team policy row. 
Step 2
On the Content Filtering security service page, change the value for Content Filtering for Policy: 
Engineering from “Enable Content Filtering (Inherit default policy settings)” to “Enable Content 
Filtering (Customize settings).”
Because this policy was using the default values, when you change the value from “Use Default 
Settings” to “Yes,” the checkboxes for each filter change from disabled (greyed out) to become 
enabled. 
Step 3
Deselect the checkbox for the “no_mp3s” filter. 
Step 4
Click Submit
The table on the Incoming Mail Policies page shows the names of the filters that have been enabled 
for the engineering policy. 
Step 5
Commit your changes.
At this point, incoming messages that match the user list for the engineering policy will not have MP3 
attachments stripped; however, all other incoming messages will have MP3 attachments stripped. 
Notes on Configuring Content Filters in the GUI
It is not necessary to specify a condition when creating a content filter. When no action is defined, 
any actions defined will always apply in the rule. (Specifying no action is   equivalent to using the 
true()
 message filter rule — all messages will be matched if the content filter is applied to a policy.) 
If you do not assign a custom user role to a content filter, the content filter is public and can be used 
by any delegated administrator for their mail policies. See 
more information on delegated administrators and content filters.
Administrators and operators can view and edit all content filters on an appliance, even when the 
content filters are assigned to custom user roles.
When entering text for filter rules and actions, the following meta characters have special meaning 
in regular expression matching: 
. ^ $ * + ? { [ ] \ | ( )
If you do not wish to use regular expression you should use a '\' (backslash) to escape any of these 
characters. For example: "\*Warning\*"