Enable user quarantine access to allow your users to access quarantined spam items that InterScan™ Messaging Security Appliance (IMSA) might have misidentified as spam. The clients use LDAP authentication to access the IMSA EUQ service.
To enable and configure user quarantine access:
Choose Administration > End-User Quarantine from the menu. The EUQ Management tab displays by default.
Click the User Quarantine Access tab.
Select Enable access.
Select the number of days to keep quarantined spam.
Select the maximum number of senders each end-user can approve when sifting through the quarantined email messages.
Type a login page message that appears on your user's browser when he/she starts to access the quarantined email messages.
Under Select LDAP groups, select the check box next to Enable all to allow all LDAP group users to access quarantined spam.
To add individual LDAP groups, clear the Enable all check box and do either of the following:
Search for groups:
From the drop down list, select Search LDAP groups.
Type the group name.
Click Search. The groups appear in the table below.
Click the LDAP groups to add.
Click >>. The groups appear in the Selected Groups table.
Browse existing groups:
From the drop down list, select Browse LDAP groups. The groups appear in the table below.
Click the LDAP groups to add.
Click >>. The groups appear in the Selected Groups table.
Click Save.
|
When enabling user quarantine access for an LDAP group, you can use wildcards in the beginning and/or at the end of the LDAP group if you have specified Microsoft Active Directory or Sun iPlanet Directory as the LDAP server. For example, A*, *A, *A* are all allowed. If you have selected Domino as the LDAP server, you can only use wildcards at the end. For example, *A, *A* are not allowed. |
See also: