|
Email Security Training |
|
Describing the Cisco Email Security Appliance |
Cisco Email Security Appliance Overview |
Technology Use Case |
Cisco Email Security Appliance Data Sheet |
SMTP Overview |
Email Pipeline Overview |
Installation Scenarios |
Initial Cisco Email Security Appliance Configuration |
Centralizing Services on a Cisco Content Security Management Appliance (SMA) |
Release Notes for AsyncOS 11.x |
|
Administering the Cisco Email Security Appliance |
Distributing Administrative Tasks |
System Administration |
Managing and Monitoring Using the Command Line Interface (CLI) |
Other Tasks in the GUI |
Advanced Network Configuration |
Using Email Security Monitor |
Tracking Messages |
Logging |
|
Controlling Sender and Recipient Domains |
Public and Private Listeners |
Configuring the Gateway to Receive Email |
Host Access Table Overview |
Recipient Access Table Overview |
Configuring Routing and Delivery Features |
|
Controlling Spam with Talos SenderBase and Anti-Spam |
SenderBase Overview |
Anti-Spam |
Managing Graymail |
Protecting Against Malicious or Undesirable URLs |
File Reputation Filtering and File Analysis |
Bounce Verification |
|
Using Anti-Virus and Outbreak Filters |
Anti-Virus Scanning Overview |
Sophos Anti-Virus Filtering |
McAfee Anti-Virus Filtering |
Configuring the Appliance to Scan for Viruses |
Outbreak Filters |
How the Outbreak Filters Feature Works |
Managing Outbreak Filters |
|
Using Mail Policies |
Email Security Manager Overview |
Mail Policies Overview |
Handling Incoming and Outgoing Messages Differently |
Matching Users to a Mail Policy |
Message Splintering |
Configuring Mail Policies |
|
Using Content Filters |
Content Filters Overview |
Content Filter Conditions |
Content Filter Actions |
Filter Messages Based on Content |
Text Resources Overview |
Using and Testing the Content Dictionaries Filter Rules |
Understanding Text Resources |
Text Resource Management |
Using Text Resources |
|
Using Message Filters to Enforce Email Policies |
Message Filters Overview |
Components of a Message Filter |
Message Filter Processing |
Message Filter Rules |
Message Filter Actions |
Attachment Scanning |
Examples of Attachment Scanning Message Filters |
Using the CLI to Manage Message Filters |
Message Filter Examples |
Configuring Scan Behavior |
|
Preventing Data Loss |
Overview of the Data Loss Prevention (DLP) Scanning Process |
Setting Up Data Loss Prevention |
Policies for Data Loss Prevention |
Message Actions |
Updating the DLP Engine and Content Matching Classifiers |
|
Using LDAP |
Overview of LDAP |
Working with LDAP |
Using LDAP Queries |
Authenticating End-Users of the Spam Quarantine |
Configuring External LDAP Authentication for Users |
Testing Servers and Queries |
Using LDAP for Directory Harvest Attack Prevention |
Spam Quarantine Alias Consolidation Queries |
Validating Recipients Using an SMTP Server |
|
SMTP Session Authentication |
Configuring AsyncOS for SMTP Authentication |
Authenticating SMTP Sessions Using Client Certificates |
Checking the Validity of a Client Certificate |
Authenticating User Using LDAP Directory |
Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate |
Establishing a TLS Connection from the Appliance |
Updating a List of Revoked Certificates |
|
Email Authentication |
Email Authentication Overview |
Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing |
Verifying Incoming Messages Using DKIM |
Overview of Sender Policy Framework (SPF) and SIDF Verification |
Domain-based Message Authentication Reporting and Conformance (DMARC) Verification |
Forged Email Detection |
|
Email Encryption |
Overview of Cisco Email Encryption |
Encrypting Messages |
Determining Which Messages to Encrypt |
Inserting Encryption Headers into Messages |
Encrypting Communication with Other Message Transfer Agents (MTAs) |
Working with Certificates |
Managing Lists of Certificate Authorities |
Enabling TLS on a Listener’s Host Access Table (HAT) |
Enabling TLS and Certificate Verification on Delivery |
Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services |
|
Using System Quarantines and Delivery Methods |
Describing Quarantines |
Spam Quarantine |
Setting Up the Centralized Spam Quarantine |
Using Safelists and Blocklists to Control Email Delivery Based on Sender |
Configuring Spam Management Features for End Users |
Managing Messages in the Spam Quarantine |
Policy, Virus, and Outbreak Quarantines |
Managing Policy, Virus, and Outbreak Quarantines |
Working with Messages in Policy, Virus, or Outbreak Quarantines |
Delivery Methods |
|
Centralized Management Using Clusters |
Overview of Centralized Management Using Clusters |
Cluster Organization |
Creating and Joining a Cluster |
Managing Clusters |
Cluster Communication |
Loading a Configuration in Clustered Appliances |
Best Practices |
|
Testing and Troubleshooting |
Debugging Mail Flow Using Test Messages: Trace |
Using the Listener to Test the Appliance |
Troubleshooting the Network |
Troubleshooting the Listener |
Troubleshooting Email Delivery |
Troubleshooting Performance |
Web Interface Appearance and Rendering Issues |
Responding to Alerts |
Troubleshooting Hardware Issues |
Working with Technical Support |
|
References |
Model Specifications for Large Enterprises |
Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch Offices |
Cisco Email Security Appliance Model Specifications for Virtual Appliances |
Packages and Licenses |