User Guide
9-105
AsyncOS 9.1.2 for Cisco Email Security Appliances User Guide
Chapter 9 Using Message Filters to Enforce Email Policies
Message Filter Examples
Cisco appliances are not susceptible to these third party relay hacks that are often used to exploit
traditional Sendmail/Qmail systems. As many of these symbols (for example
%) can be part of a perfectly
legal email address, Cisco appliances will accept these as valid addresses, verify them against the
configured recipient lists, and pass them on to the next internal server. Cisco appliances do not relay
these messages to the world.
These filters are put in place to protect users who may have open-source MTAs that are misconfigured
to allow relay of these types of messages.
Note You can also configure a listener to handle these types of addresses. See Listening for Connection
Requests by Creating a Listener via the GUI, page 5-8 for more information.
Policy Enforcement Filters
• Notify Based on Subject Filter, page 9-105
• BCC and Scan Mail Sent to Competitors, page 9-106
• Block Specific User Filter, page 9-106
• Archive and Drop Messages Filter, page 9-106
• Large “To:” Header Filter, page 9-106
• Blank “From:” Filter, page 9-107
• SRBS Filter, page 9-107
• Alter SRBS Filter, page 9-108
• Filename Regex Filter, page 9-108
• Show SenderBase Reputation Score in Header Filter, page 9-108
• Insert Policy into Header Filter, page 9-108
• Too Many Recipients Bounce Filter, page 9-109
Notify Based on Subject Filter
This filter sends notification based on whether the subject contains specific words:
search_for_sensitive_content:
if (Subject == "(?i)plaintiff|lawsuit|judge" ) {
notify ("admin@company.com");
}