Symantec 10490452 Administration Guide - Page 66

Notes on filtering actions, actions. Two additional actions, Delay message delivery and Strip and hold

Page 66 highlights

66 Configuring email filtering About email filtering Action Table 4-2 Description Filtering actions by verdict (Continued) Verdict Directory harvest attack Spam attack Virus attack Virus Spam, Suspected Spam Content Compliance Treat as a blocked Process the message using the action(s) specified in the ● sender domain-based Blocked Senders List. Applies even if the domain-based Blocked Senders List is disabled, and applies to inbound messages only. Treat as a mass- Process the message using the action(s) specified in the ● mailing worm associated worm policy. The message is delivered normally if the worm policy is disabled or does not apply because of message direction. Treat as an allowed Process the message using the action(s) specified in the ● sender domain-based Allowed Senders List. Applies even if the domain-based Allowed Senders List is disabled, and applies to inbound messages only. Treat as a virus Process the message using the action(s) specified in the ● associated virus policy. The message is delivered normally if the virus policy is disabled or does not apply because of message direction. Treat as spam Process the message using the action(s) specified in the ● associated spam policy. The message is delivered normally if the spam policy is disabled or does not apply because of message direction. Treat as suspected Process the message using the action(s) specified in the ● spam associated suspected spam policy. The message is delivered normally if the suspected spam policy is disabled or does not apply because of message direction. Notes on filtering actions When using Table 4-2 consider the following limitations: ■ All Virus verdicts except suspicious attachments share the same available actions. Two additional actions, Delay message delivery and Strip and hold

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

66
Configuring email filtering
About email filtering
Notes on filtering actions
When using
Table 4-2
consider the following limitations:
All Virus verdicts except suspicious attachments share the same available
actions. Two additional actions, Delay message delivery and Strip and hold
Treat as a blocked
sender
Process the message using the action(s) specified in the
domain-based Blocked Senders List. Applies even if the
domain-based Blocked Senders List is disabled, and
applies to inbound messages only.
Treat as a mass-
mailing worm
Process the message using the action(s) specified in the
associated worm policy. The message is delivered
normally if the worm policy is disabled or does not apply
because of message direction.
Treat as an allowed
sender
Process the message using the action(s) specified in the
domain-based Allowed Senders List. Applies even if the
domain-based Allowed Senders List is disabled, and
applies to inbound messages only.
Treat as a virus
Process the message using the action(s) specified in the
associated virus policy. The message is delivered
normally if the virus policy is disabled or does not apply
because of message direction.
Treat as spam
Process the message using the action(s) specified in the
associated spam policy. The message is delivered
normally if the spam policy is disabled or does not apply
because of message direction.
Treat as suspected
spam
Process the message using the action(s) specified in the
associated suspected spam policy. The message is
delivered normally if the suspected spam policy is
disabled or does not apply because of message direction.
Table 4-2
Filtering actions by verdict (Continued)
Action
Description
Verdict
Directory harvest attack
Spam attack
Virus attack
Virus
Spam, Suspected Spam
Content Compliance