27.11.2012 Views

IronPort - advanced configuration guide

IronPort - advanced configuration guide

IronPort - advanced configuration guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6 Using Message Filters to Enforce Email Policies<br />

Add Log Entry Action<br />

OL-25137-01<br />

The following example inserts a message tag into a message with “[Encrypt]” in the subject. You can<br />

then create a DLP policy that will encrypt messages with this message tag before delivering them if<br />

Cisco <strong>IronPort</strong> Email Encryption is available:<br />

Tag_Message:<br />

Attachment Scanning<br />

if (subject == '^\\[Encrypt\\]')<br />

{<br />

}<br />

tag-message('Encrypt-And-Deliver');<br />

The log-entry action inserts customized text into the <strong>IronPort</strong> Text Mail logs at the INFO level. The text<br />

can include action variables. You can use this action to insert useful text for debugging purposes and<br />

information on why a message filter performed a certain action. The log entry also appears in message<br />

tracking.<br />

The following example inserts a log entry explaining that message was bounced because it possibly<br />

contained confidential company information:<br />

CompanyConfidential:<br />

if (body-contains('Company Confidential'))<br />

{<br />

}<br />

log-entry('Message may have contained confidential information.');<br />

bounce();<br />

AsyncOS can strip attachments from messages that are inconsistent with your corporate policies, while<br />

still retaining the ability to deliver the original message.<br />

You can filter attachments based on their specific file type, fingerprint, or based on the content of the<br />

attachment. Using the fingerprint to determine the exact type of attachment prevents users from<br />

renaming a malicious attachment extension (for example, .exe) to a more commonly used extension (for<br />

example, .doc) in the hope that the renamed file would bypass attachment filters.<br />

When you scan attachments for content, the Stellent attachment scanning engine extracts data from<br />

attachment files to search for the regular expression. It examines both data and metadata in the<br />

attachment file. If you scan an Excel or Word document, the attachment scanning engine can also detect<br />

the following types of embedded files: .exe, .dll, .bmp, .tiff, .pcx, .gif, .jpeg, .png, and Photoshop images.<br />

Cisco <strong>IronPort</strong> AsyncOS 7.6 for Email Advanced Configuration Guide<br />

6-65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!