0% found this document useful (0 votes)
60 views2 pages

Cisco Advanced Phishing Protection: Implementation Process (Hosted)

Deploying Cisco Advanced Phishing Protection involves three main elements: 1) Cisco Email Security Gateway, 2) Hosted Cisco Advanced Phishing Protection Sensors, and 3) Cisco Advanced Phishing Protection. The process includes understanding the messaging architecture, deploying sensors, verifying message scoring, and enforcing one phishing protection policy. Key steps are configuring the gateway for dual delivery, deploying sensors, tuning the policy and data model, and enabling policy enforcement.

Uploaded by

fregolikventin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views2 pages

Cisco Advanced Phishing Protection: Implementation Process (Hosted)

Deploying Cisco Advanced Phishing Protection involves three main elements: 1) Cisco Email Security Gateway, 2) Hosted Cisco Advanced Phishing Protection Sensors, and 3) Cisco Advanced Phishing Protection. The process includes understanding the messaging architecture, deploying sensors, verifying message scoring, and enforcing one phishing protection policy. Key steps are configuring the gateway for dual delivery, deploying sensors, tuning the policy and data model, and enabling policy enforcement.

Uploaded by

fregolikventin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cisco Advanced Phishing Protection:

Implementation Process (Hosted)

Published: June 22, 2018

Deploying Cisco Advanced Phishing Protection is a straightforward, well-defined process. The process
has been refined based on years of experience supporting large organizations with their email security
initiatives. Three primary project elements include: 1) Cisco Email Security Gateway 2) Hosted Cisco
Advanced Phishing Protection Sensors and 3) Cisco Advanced Phishing Protection
These goals will be achieved:
• Understand the Messaging Architecture
• Deployment of Cisco Advanced Phishing Protection Sensors
• Confirmation of Message Traffic
• Verification of Accurate Message Scoring
• One Cisco Advanced Phishing Protection Policy in enforcement mode
Additional discrete steps are detailed.

Primary Project Tasks


The primary Onboarding tasks consist of:
• Configuring Cisco Email Security Appliance for Dual Delivery of all messages to the Cisco
Advanced Phishing Protection Sensor. Enabling full visibility to the organization's inbound mail
stream.
• Deployment of Hosted Cisco Advanced Phishing Protection Sensor. Providing the Cisco Advanced
Phishing Protection Email Trust platform with the required message details (i.e. Authentication
headers).
• Tune Policy & Data Model. Tuning to accurately identify your organizations valid messages.
Adjusting policies to effectively identify malicious messages i.e. BEC.
• Enable Policy Enforcement.

Cisco Systems, Inc.


www.cisco.com
Primary Project Tasks

• Enforcing policy to block malicious messages i.e. Friendly name spoofs.

Cisco Advanced Phishing Protection: Implementation Process (Hosted)


2

You might also like