User Guide

CHAPTER
10-1
AsyncOS 9.1.2 for Cisco Email Security Appliances User Guide
10
Mail Policies
Overview of Mail Policies, page 10-1
How to Enforce Mail Policies on a Per-User Basis, page 10-2
Handling Incoming and Outgoing Messages Differently, page 10-3
Matching Users to a Mail Policy, page 10-3
Message Splintering, page 10-5
Configuring Mail Policies, page 10-7
Overview of Mail Policies
The Email Security appliance enforces your organization’s policies for messages sent to and from your
users through the use of mail policies. These are sets of rules that specify the types of suspect, sensitive,
or malicious content that your organization may not want entering or leaving your network. This content
may include:
spam
legitimate marketing messages
viruses
phishing and other targeted mail attacks
confidential corporate data
personally identifiable information
You can create multiple policies that satisfy the disparate security needs of the different user groups
within your organization. The Email Security appliance uses the rules defined in these policies to scan
each message and, if necessary, perform an action to protect your user. For example, policies can prevent
the delivery of suspected spam messages to executives while allowing their delivery to IT staff but with
a modified subject to warn them of the content, or drop dangerous executable attachments for all users
except those in the System Administrator group.