User Guide
7-32
AsyncOS 9.1.2 for Cisco Email Security Appliances User Guide
Chapter 7 Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
Verifying Senders
Related Topics
• Throttling Messages from Unverified Senders Using the SUSPECTLIST Sender Group, page 7-32
• Implementing More Stringent Throttling Settings for Unverified Senders, page 7-33
• Defining Messages to Send to Unverified Senders Using the ACCEPTED Mail Flow Policy,
page 7-34
• Excluding Unverified Senders from Sender Verification Rules Based on Sender’s Email Address,
page 7-35
• Searching for Addresses within the Sender Verification Exception Table, page 7-35
Throttling Messages from Unverified Senders Using the SUSPECTLIST Sender Group
Procedure
Step 1 Select Mail Policies > HAT Overview.
Step 2 Click SUSPECTLIST in the list of sender groups.
Figure 7-5 HAT Overview Page
Step 3
Click Edit Settings.
Figure 7-6 Sender Group: SUSPECTLIST: Edit Settings
Step 4
Select the THROTTLED policy from the list.