Reviewing the Cisco ESA
- Reviewing the Cisco Security Management Appliance
- Defining an SMTP Conversation
- Identifying Terms and Definitions
- Examining the Pipeline
- Describing Cisco Email Security Appliance Models and Licensing
- Installing and Verifying the Cisco Email Security Appliance
Performing an Evaluation
- Describing Cisco Async OS
- Describing the Listener
Administering the Cisco Email Security Appliance
- Configuring Localized Message Tracking and Reporting
- Configuring Centralized Tracking and Reporting
- Tracking and Reporting Messages
- Administering the Cisco Email Security Appliance
- Managing Log Files
- Creating and Using Administrator Accounts
Controlling Sender and Recipient Domains
- Configure Public and Private Listeners
- Describing the Host Access Table (HAT)
- Describing the Recipient Access Table (RAT)
- Describing Email Authentication Methods
- Defining Domain-Based Message Authentication
- Troubleshooting with Mail Logs
Controlling Spam with Cisco Sensor Base and Antispam
- Describing Sensor Base
- Configure Antispam
- Quarantining Spam on the Cisco Email Security Appliance
- Describing Safelist and Block list
- Quarantining Spam on the Cisco Security Management Appliance
- Configuring Bounce Verification
- Describing Web Reputation Filters
- Defining Outbreak Filters
Using Antivirus, Advanced Malware Protection and Virus Outbreak Filters.
- Enabling Antivirus Engines
- Using Outbreak Filters
- Using Advanced Malware Protection
Using Mail Policies
- Describing Email Security Manager
- Creating User-Based Mail Policies
- Using Message Splintering
Using Content Filters
- Describing Content Filtering
- Configuring Basic Content Filtering
- Applying Content Filter Applications
- Describing and Configuring Message Filtering
Preventing Data Loss
- Identifying the Data Loss Problem
- Choosing a Cisco DLP Solution
- Implementing DLP Configuration
- Describing the RSA Engine
Using LDAP
- Describing LDAP Features
- Describing Query Tokens and Operators
- Configuring LDAP Profiles
- Configuring SMTP Call-Ahead
- Reviewing Case Studies
- Using LDAP Group Queries
Using Authentication and Encryption
- Configuring Cisco Registered Envelope Service
- Describing TLS
- Authenticating Email with SPF
Clustering
- Creating a Clustered Environment
- Joining an Existing Cluster
- Managing a Clustered Environment
- Administering a Cluster from the GUI
Labs
- Hardware Challenge Lab 1: Access the Cisco Remote Lab
- Hardware Challenge Lab 2: Install Your Cisco Email Security Appliance
- Hardware Challenge Lab 3: Plan the Cisco Email Security Appliance
- Hardware Challenge Lab 4: Perform Administration
- Hardware Challenge Lab 5: Test Your Listener Settings
- Hardware Challenge Lab 6: Prevent Domain Spoofing with DMARC
- Hardware Challenge Lab 7: Defend Against Spam with Sensor Base and Antispam
- Hardware Challenge Lab 8: Defend Against Viruses
- Hardware Challenge Lab 9: Prevent Advanced Persistent Threats with Advanced Malware Protection
- Hardware Challenge Lab 10: Customize Mail Policies for Your End Users
- Hardware Challenge Lab 11: Enforce Your Business Policies in Email Delivery
- Hardware Challenge Lab 12: Manage High-Volume Mail Flow
- Hardware Challenge Lab 13: Configure DLP
- Hardware Challenge Lab 14: Configure LDAP Accept
- Hardware Challenge Lab 15: Configure SMTP Call-Ahead
- Hardware Challenge Lab 16: Accommodate Multiple Domains Using LDAP Accept Bypass and Domain Assignments
- Hardware Challenge Lab 17: Control Mail Policies with LDAP Group Queries
- Hardware Challenge Lab 18: Configure Envelope Encryption
- Hardware Challenge Lab 19: Encrypt Email with TLS
- Hardware Challenge Lab 20: Configure Clusters