Configuring User Quarantine Access Parent topic

You can grant all or selected end users access to the EUQ management console. This allows them to manage the spam messages addressed to them by visiting https://<target server IP address or hostname>:8447.

Procedure

  1. Go to AdministrationEnd-User Quarantine.
    The End-User Quarantine screen appears.
  2. Select Enable access.
  3. Select Allow end user to deliver quarantined mail in EUQ directly to allow end users to deliver quarantined messages directly to the recipient. The message bypasses all rules except virus scanning rules.
  4. Select Allow end users to retrieve quarantined email messages with alias email addresses to allow end users to retrieve quarantined messages using alias email addresses configured in Microsoft Exchange.
  5. Select the number of days to keep quarantined spam messages.
  6. Select the maximum number of senders each end-user can approve when sifting through the quarantined messages.
  7. Specify a logon notice that appears on the user's browser when he/she starts to access the quarantined messages.
  8. Under Select LDAP groups, select the check box next to Enable all to allow all LDAP group users to access quarantined spam.
  9. To add individual LDAP groups, clear the Enable all check box and do either of the following:
    • Search for groups:
      1. From the drop-down list, select Search LDAP groups.
      2. Specify the group name.
      3. Click Search. The groups appear in the table below.
      4. Click the LDAP groups to add.
      5. Click >>. The groups appear in the Selected Groups table.
    • Browse existing groups:
      1. From the drop-down list, select Browse LDAP groups. The groups appear in the table below.
      2. Click the LDAP groups to add.
      3. Click >>. The groups appear in the Selected Groups table.
  10. Click Save.
    Note
    Note
    When enabling user quarantine access for an LDAP group, you can use wildcards in the beginning and/or at the end of the LDAP group if you have specified Microsoft Active Directory or Sun iPlanet Directory as the LDAP server. For example, A*, *A, *A* are all allowed. If you have selected Domino as the LDAP server, you can only use wildcards at the end. For example, *A, *A* are not allowed.