Symantec 10490452 Administration Guide - Page 64

Table 4-2, Action, Description, Verdict

Page 64 highlights

64 Configuring email filtering About email filtering Action The following table shows the filtering actions available for each verdict. Note: See "Notes on filtering actions" on page 66 for additional limitations. Table 4-2 Description Filtering actions by verdict Verdict Directory harvest attack Spam attack Virus attack Virus Spam, Suspected Spam Content Compliance Add a header Add an X-header to the message. Add annotation Insert predefined text into the message (a disclaimer, for example). Add BCC recipients Blind carbon copy the message to the designated SMTP address(es). Archive the message Deliver the original message and forward a copy to the designated SMTP address, and, optionally, host. Bounce the message Return the message to its From: address with a custom response, and deliver it to the recipient. Optionally, the original message can be included. Clean the message Delete unrepairable virus infections and repair repairable ● virus infections. Defer SMTP connection Using a 4xx SMTP response code, tell the sending MTA to ● ● ● try again later. Delay message delivery Hold the message in the Suspect Virus Quarantine for a ● configured number of hours (default is six hours), then refilter, using new virus definitions, if available. Only available for the suspicious attachment verdict. Delete the message Delete the message. Deliver the message normally Deliver the message. Viruses and mass-mailing worms are neither cleaned nor deleted.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

64
Configuring email filtering
About email filtering
The following table shows the filtering actions available for each verdict.
Note:
See
“Notes on filtering actions”
on page 66 for additional limitations.
Table 4-2
Filtering actions by verdict
Action
Description
Verdict
Directory harvest attack
Spam attack
Virus attack
Virus
Spam, Suspected Spam
Content Compliance
Add a header
Add an X-header to the message.
Add annotation
Insert predefined text into the message (a disclaimer, for
example).
Add BCC recipients
Blind carbon copy the message to the designated SMTP
address(es).
Archive the message
Deliver the original message and forward a copy to the
designated SMTP address, and, optionally, host.
Bounce the message
Return the message to its
From:
address with a custom
response, and deliver it to the recipient. Optionally, the
original message can be included.
Clean the message
Delete unrepairable virus infections and repair repairable
virus infections.
Defer SMTP
connection
Using a 4xx SMTP response code, tell the sending MTA to
try again later.
Delay message delivery
Hold the message in the Suspect Virus Quarantine for a
configured number of hours (default is six hours), then
refilter, using new virus definitions, if available. Only
available for the suspicious attachment verdict.
Delete the message
Delete the message.
Deliver the message
normally
Deliver the message. Viruses and mass-mailing worms
are neither cleaned nor deleted.