This article is a continuation from part 1 of the IronPort ‘best practices’ series.
Here I will discuss:
- Implementing DNS blacklists
- DLP
- Bounce profiles
- LDAP queries
This article is a continuation from part 1 of the IronPort ‘best practices’ series.
Here I will discuss:
I’ve cheekily phrased this blog article as a best practice guide to setting up/configuring your Cisco IronPort email security appliance. However I must make clear that the below is what I deem to be best practices/configuration. Every environment is unique so please make sure you understand what you are doing before attempting to implement any of my suggestions below. So, let’s get started! The suggestions below are in no particular order.