EN 
06.12.2025 Mikuláš WELCOME IN MY WORLD

This website is originally written in the Czech language. Most content is machine (AI) translated into English. The translation may not be exact and may contain errors.

Tento článek si můžete zobrazit v originální české verzi. You can view this article in the original Czech version.
Cisco Email Security - provozní správa a činnosti

Cisco Email Security - Operational Management and Activities

Edited 14.01.2020 12:20 | created | Petr Bouška - Samuraj |
Using Cisco Email Security (formerly Ironport) to filter spam. The article describes some of the activities and settings from normal operational management, i.e. what we do on an ongoing basis after the initial implementation. Primarily, it's about how to identify blocked messages and setting exceptions so that some messages are delivered even if they are identified as Spam.
displayed: 8 900x (7 462 CZ, 1 438 EN) | Comments [0]

Verifications

Checking definitions and availability of online services

  • Security Services - IronPort Anti-Spam
  • Security Services - Services Overview
  • Security Services - IMS and Graymail
  • Security Services - Sophos
  • Security Services - Outbreak Filters
  • Security Services - SenderBase

Reports

  • Monitor

The ESA contains a large number of reports. Some can be scheduled and emailed to us in Monitor - Scheduled Reports. The basic view is on the Dashboard. In the Monitor menu, there are reports from various areas, often with links to more detailed reports, or with tabs to switch between them.

Adding an accepted domain

  • Mail Policies - Recipient Access Table (RAT)

If we have a new domain for which we want to receive mail, we need to add it to the Recipient Access Table (RAT).

  • Network - SMTP Routes

If we have defined routing of individual domains to an internal mail server (perhaps not using the general All Other Domains), we also need to create a record in the SMTP Routes.

Message queue and forced delivery

  • Monitor - Delivery status

The item Active recipients means that messages for this domain are in the queue. We can expand the domain and choose Retry Delivery.

Resolving undelivered messages

The most common area from practice is finding out why a message was not delivered, and possibly setting up some exception on the AntiSpam. The ESA can reject or block a message at various services, and the response varies accordingly.

  • IP Reputation - Host Access Table (HAT) - when establishing a connection to the Listener, the source address is checked using the HAT
  • Recipient Access Table (RAT) - check of the recipient address (I didn't find when it's performed)
  • Incoming Mail Policies - a number of checks are performed within the policy (if enabled for the given recipient/sender)
    • Message Filters
    • Anti-Spam
    • Content Filters

In some cases, for example IP reputation, the incoming connection is rejected and the sending server is normally given information that is delivered to the sender in the email. When a message is identified as Spam, it is deleted or placed in quarantine according to the policy. The sender doesn't receive any information, the recipient only if we use quarantine and send a report.

As an administrator, we have several options to search for an undelivered message. The information is in the following chapters.

Tracking messages - Message Tracking

  • Monitor - Message Tracking

We need to have this feature enabled. Then we can enter some parameters of the message we are looking for, primarily the sender's email address and time interval. The found items are displayed, where we see the LAST STATE, which usually says whether the message was delivered to the target mail server, or placed in quarantine. We can also click on Show Details and a window with detailed logs will be displayed.

Cisco Email Security - Message Tracking

If the message is not found, it is likely that the connection from the source IP address was already blocked, and therefore we don't have information about the message details.

Checking reputation - sender receives an error

On the https://www.talosintelligence.com/ website, we can find the reputation of a domain or IP address.

If the incoming connection (source IP address) has a poor reputation, the connection is normally rejected. The message the sender wanted to send does not then reach the recipient's quarantine, nor can we easily find it in the log. The sending mail server receives an error, which is usually delivered as a response to the sender.

mail.company.com: 554-mail.company.com 554 Your access to this mail system has been rejected due to the sending MTA's poor
 reputation. If you believe that this failure is in error, please con tact the intended recipient via alternate means.

In such a case, we can verify that the sending address/domain has a poor reputation on the Talos website. The problem is how to determine the IP address from which the message was sent. For the sender's domain, we can look up the MX record in DNS, but that is primarily the address for receiving mail for that domain, the sending address may be different. If there is a textual SPF record in DNS, we can find the address from which the mail should be sent.

If we enter the domain on the https://www.talosintelligence.com website, the mail server according to the MX record will also be found. If we enter the IP address, the IP addresses that send mail for that subnet are listed.

Message Tracking - searching for a rejected connection from a given IP address

If we have enabled logging of rejected connections (Save tracking information for rejected connections) when Enabling message tracking, we can use Message Tracking.

  • Monitor - Message Tracking
  • expand Advanced
  • enter the IP address in Sender IP Address/Domain/Network Owner
  • and select Search rejected connections only
  • select the required time interval and run Search

If we don't save rejected connections, we can still look in the log, see the next chapter.

Viewing logs - searching for a rejected connection from a given IP address

If we need to see the logs about mail processing directly, we can either download the text file, or connect to the CLI (usually via SSH) and use commands to display them.

Download log file

  • System Administration - Log Subscriptions
  • select the required log (now mail_logs) and click on the name in the Log Files column
  • click on the file name by date to start the web download

Searching logs in CLI

Display the last ten entries and all current ones.

tail mail_logs

Searching using the grep command itself and a guide or by entering the command with a regular expression for searching. We can simply enter a time (the command above will show how it's stored), e.g. Mon Oct 7 13:15 and any other text.

grep -e "Mon Oct  7 13:15.*" mail_logs

Setting exceptions - Safe Senders, Whitelist

If we have identified where the incoming message is blocked, we can set an exception so that the filtering does not occur and the message is delivered next time. The most common is to add the sending IP address to the HAT or the sending email to the policy that does not perform AntiSpam checks. If we use quarantine, users can set certain exceptions themselves. Alternatively, we can report incorrectly classified messages to Cisco.

Below is just an example of how setting an exception for an email address or IP address can look simple and intuitive in the Symantec Messaging Gateway implementation. A complicated Cisco solution is also briefly described.

Symantec Messaging Gateway - nastavení Safe Senders

Sender IP address

  • Mail Policies - HAT Overview - WHITELIST

For each Listener, we define rules that determine the remote hosts (IP addresses of senders) that are allowed to connect. The Host Access Table (HAT) is used for this. The SenderBase Reputation Service is typically used here, so some IP addresses are blocked based on reputation.

If we have a trusted sender, in the style of a mail server, we can enter its IP address into the WHITELIST group, where the TRUSTED policy is applied. These senders are not checked either by IP reputation or the AntiSpam engine (but the AntiVirus check is performed).

Cisco Email Security - HAT

Sender email address

  • Mail Policies - Incoming Mail Policies

If we want messages from a certain email address not to be marked as Spam (their check not performed), the only solution is to create a special Incoming Mail Policy in the style of Safe Sender Emails or Skip AntiSpam Scan. We create a policy that we place at the beginning of the list. We add users to the policy - Add User, here we can specify the recipient and sender using the exact address or just the domain. On the policy, we disable the Anti-Spam function, and possibly others.

Cisco Email Security - Incoming Mail Policies Whitelist

Note: In the same way, we can define recipients who will receive all messages (AntiSpam check is not performed for them).

Recipient email address

  • Mail Policies - Recipient Access Table (RAT)

The main decision on whether an address will be accepted is made using the Recipient Access Table (RAT). Here we can set entire domains or individual email addresses, and determine whether they are accepted or rejected. Or set Bypass Receiving Control. Even when we set an address to be accepted, the AntiSpam check is still performed.

The domain company.com will cover email addresses on this domain, and we can also define all subdomains .company.com.

Exception from Sender Domain Reputation

  • Security Services - Domain Reputation - Domain Exception List

If we use SDR, we can specify certain domains for which the check should not be performed.

Exceptions from Sender Verification

  • Mail Policies - Exception Table

If we use Sender Verification, we can define exceptions.

Safe senders per user

  • Spam Quarantine - Options - Safelist

In the quarantine, each user can manage their own Safelist and Blocklist. The administrator can edit them for all users.

Reporting incorrectly classified messages to Cisco

In the quarantine settings, we can allow a message to be sent to Cisco for analysis when released from the quarantine (when it is delivered to the user). But the main solution when we want to inform Cisco about the incorrect classification of a message is described in Reporting Incorrectly Classified Messages to Cisco.

This means registering on the Submission and Tracking Portal. We link the account with our appliance in System Administration - Email Submission and Tracking Portal Registration. Then we have to register our domains. After that, we can use the Outlook plugin, the above-mentioned portal, or send messages as attachments to special addresses.

Author:

Related articles:

Electronic mail - email

SMTP protocol and its features. Protection of electronic mail against SPAM and Phishing. Encryption of mail...

Microsoft Exchange

Almost since the beginning of my practice, I have been involved in the administration of the Microsoft mail server, i.e. Exchange Server. I started with the 2003 version and worked my way up to Exchange Online. The articles cover many areas of management. Most since the migration to Exchange Server 2016 and its complete configuration. But also Exchange Hybrid and e-mail security.

If you want write something about this article use comments.

Comments

There are no comments yet.

Add comment

Insert tag: strong em link

Help:
  • maximum length of comment is 2000 characters
  • HTML tags are not allowed (they will be removed), you can use only the special tags listed above the input field
  • new line (ENTER) ends paragraph and start new one
  • when you respond to a comment, put the original comment number in squar brackets at the beginning of the paragraph (line)