Cisco IronPort AsyncOS 7.5 for Email Configuration Guide
Chapter1 Getting Started with the Cisco IronPort Email Security Appliance
Chapter 10, “Outbreak Filters” explains how Outbreak Filters proactively provide
a critical first layer of defense against new virus, scam, and phishing outbreaks.
By detecting new outbreaks in real-time and dynamically responding to prevent
suspicious traffic from entering the network, Outbreak Filters offer protection
until new signature updates are deployed.
Chapter 11, “Data Loss Prevention” describes how to use the data loss prevention
features from RSA Security, Inc. to protect your organization’s information and
intellectual property, as well as enforce regulatory and organizational compliance
by preventing users from unintentionally emailing sensitive data.
Chapter 12, “Cisco IronPortEmail Encryption” describes the process you use to
encrypt email using the Cisco IronPort Encryption appliance or the hosted key
Chapter 13, “SenderBase Network Participation” describes how to share data
from your appliance with the SenderBase Network.
Chapter 14, “Text Resources” details creating text resources such as content
dictionaries, notification templates, and disclaimers for use in various
components of AsyncOS.
Chapter 15, “System Administration” describes typical administration commands
for managing and monitoring the Cisco IronPort appliance, such as working with
feature keys, upgrading AsyncOS, reverting AsyncOS, and performing routine
system maintenance. Maintenance tasks include setting the system time, changing
the administrator password, and taking the system offline. This chapter also
describes how to configure the network operation of the Cisco IronPort appliance,
including DNS, interface, routing, and hostname settings.
Chapter 16, “Enabling Your C350D Appliance” describes the Cisco IronPort
C300D, C350D, and C360D appliances.
Chapter 17, “The Cisco IronPort M-Series Security Management Appliance”
describes the Cisco IronPort M-Series appliance, which is designed to centralize
and consolidate important policy and runtime data, providing administrators and
end users with a single interface for managing reporting and auditing information.
Appendix A, “Accessing the Appliance” describes how to access the Cisco
IronPort appliance for uploading and downloading files.
Appendix B, “Assigning Network and IP Addresses” describes general rules on
networks and IP address assignments and presents strategies for connecting the
Cisco IronPort appliance within an enterprise network infrastructure.