Lumu Email Intelligence and Cisco Email Security

Lumu Email Intelligence and Cisco Email Security

In this document, you will learn how to configure a Cisco Email Security (CES) policy to forward spam emails to Lumu for compromise assessment. Lumu Email Intelligence is a unique threat analysis tool that runs advanced correlations between your spam, known indicators of compromise (IoCs), and network traffic.

Learn more about how Lumu Email Intelligence helps you understand who is targeting your organization, how they are doing it, and how successful they are in our documentation.

Requirements

You must have CES admin permissions to access the Spam Detection Module.

The process documented here was tested with Cisco C300V.

CES Setup

Lumu assigns a unique email address to your organization. You can find the email address assigned to your organization by going to the Lumu Portal and navigating to Email Intelligence > Summary (1). 

1. Sign in to CES admin portal, and then navigate to “Incoming Mail Policies”, then click to access the respective policy you want to edit in the “Anti-Spam” column:


2. In the mail policy settings area, configure the custom headers for Lumu, as shown in the following image.


3. Navigate to the “Incoming Content Filters” and click to add a new one, provide a name and a description.


4. Click to add a condition and select the “Other Header” option and inform the header value you added in step 2.


5. Click to add an “Action” and inform the email address provided by Lumu to your company in the Lumu Portal.


6. Submit the changes and apply the policy.


For further details about CES policies, consult the Cisco documentation.

        • Related Articles

        • Lumu Email Intelligence and Office 365

          In this document, you will learn how to configure a policy in Microsoft Office 365 to forward your emails to Lumu for compromise assessment. Lumu Email Intelligence is a unique threat analysis tool that runs advanced correlations between your inbox, ...
        • Lumu Email Intelligence and Proofpoint

          In this document, you will learn how to configure Proofpoint Enterprise policies to forward your emails to Lumu for compromise assessment. Lumu Email Intelligence is a unique threat analysis tool that runs advanced correlations between your spam, ...
        • Lumu Email Intelligence and G Suite

          In this document, you will learn how to use the G Suite security investigation tool to generate a report on emails and send it to Lumu for compromise assessment. Lumu Email Intelligence is a unique threat analysis tool that runs advanced correlations ...
        • Deploy Lumu Agent using Group Policy (GPO)

          The installation of the Lumu Agent for Windows is simple and straightforward. This article describes how to deploy the Windows Agent quickly to your entire user population through Group Policy Objects (GPO) in a Windows Server. For getting started ...
        • Collect Firewall Metadata with Lumu VA and Cisco Meraki

          Requirements Admin access to configure a syslog server on Cisco Meraki Firewall The most recent version of the Lumu Virtual Appliance installed. These are the general steps you should follow to configure a syslog server on a Cisco Meraki firewall to ...