You can do this by creating an incoming content filter and applying it to your incoming mail policy. You would most likely want this to be ordered '1', to avoid processing the email through other filters before the attaclment if stripped.
First, create a template under 'Mail Policies -> Text Resources' of type 'Notification Template'. This will be the message sent to the sender and recipient explaining why the attachment was stripped.
Then, create the Incoming Content Filter. A Condition is not needed if you want this filter to check all messages for their size. If you wish to restrict the filter to certain other conditions (sender, subject, etc..) , then you can add a Condition as needed.
Add the first Action: 'Strip Attachment by File Info -> File Size if Greater than '. Keep in mind that the file size it is asking for is in *bytes*, so convert the size accordingly.
Add a second Action: 'Notify'. There are two checkboxes on the Notify screen, 'Sender' and 'Recipient'; check both. Select your template you created earlier in the drop-down box labeled 'Use Template'.
Submit and commit your changes.
Browse to 'Mail Policies -> Incoming Mail Policies', and apply the new content filter to your Incoming Mail Policy.
Why not taking message filters? Maybe i am a bit slow witted but wouldn't it be better stripping off the attachments that are too large as early as possible. So they won't run through the AV and stuff and would boost the performance a little. Or am i off the track?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :