1. Cisco Email Security Appliance Best Practices
Release 14.0: This guide outlines strategies for configuring mail flow policies. It states
"The default mail flow policies are configured with a global perspective in mind. However
every network is different. You may need to adjust the mail flow policies to be more aggressive or more permissive to suit your organization’s tolerance for spam. For example
if your organization only does business within the United States
you can be more aggressive on mail coming from other countries." This directly supports the principle of identifying a trusted region (where you do business) and applying stricter policies elsewhere
as described in option D.
2. Cisco AsyncOS 15.0 for Email Security User Guide - GD (General Deployment): In the "Controlling Sender and Recipient Domains" chapter
the section on "Host Access Table (HAT) Overview" describes how the HAT is the first line of defense
controlling which hosts can connect to the listener. Policies are applied to Sender Groups
which can be defined by geographic location. This mechanism allows for the strategy in option D: creating a sender group for a trusted region with a permissive mail policy (e.g.
ACCEPTED) and placing all others in a more restrictive group (e.g.
SUSPECTLIST or a custom group with aggressive filtering). This demonstrates the technical implementation of the strategy.