Symantec 10490452 Administration Guide - Page 71

About precedence, End user-defined Blocked Senders List

Page 71 highlights

Configuring email filtering 71 About email filtering Table 4-4 Security risk categories included in spyware or adware verdict Category Description Remote access Programs that let a remote user gain access to a computer over the programs Internet to gain information, attack, or alter the host computer. Spyware Stand-alone programs that can secretly monitor system activity and detect passwords and other confidential information and then relay the information back to a remote computer. About precedence Determining the precedence of different types of filtering for a particular message rests on many factors. For more information on the various lists discussed below, see "Configuring sender groups" on page 95. If more than one verdict matches a message, the following applies: ■ Any matching verdict that calls for an action of defer or reject takes precedence over verdicts that call for other actions. ■ If multiple matching verdicts call for defer or reject, the one of those verdicts that appears first in the precedence list (see below) takes precedence. ■ If no matching verdict calls for an action of defer or reject, then the matching verdict that appears first in the precedence list takes precedence. ■ Although a verdict can call for multiple actions, only one verdict determines the actions that are taken on a message. Actions called for by lower precedence verdicts are not applied. Order of precedence: ■ Virus attack ■ Worm ■ Virus ■ Spyware or adware ■ Suspicious attachment (suspected virus) ■ Unscannable ■ Encrypted attachment ■ End user-defined Allowed Senders List ■ End user-defined Blocked Senders List ■ Administrator-defined, IP-based Allowed Senders List

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

71
Configuring email filtering
About email filtering
About precedence
Determining the precedence of different types of filtering for a particular
message rests on many factors. For more information on the various lists
discussed below, see
“Configuring sender groups”
on page 95.
If more than one verdict matches a message, the following applies:
Any matching verdict that calls for an action of defer or reject takes
precedence over verdicts that call for other actions.
If multiple matching verdicts call for defer or reject, the one of those
verdicts that appears first in the precedence list (see below) takes
precedence.
If no matching verdict calls for an action of defer or reject, then the
matching verdict that appears first in the precedence list takes precedence.
Although a verdict can call for multiple actions, only one verdict determines
the actions that are taken on a message. Actions called for by lower
precedence verdicts are not applied.
Order of precedence:
Virus attack
Worm
Virus
Spyware or adware
Suspicious attachment (suspected virus)
Unscannable
Encrypted attachment
End user-defined Allowed Senders List
End user-defined Blocked Senders List
Administrator-defined, IP-based Allowed Senders List
Remote access
programs
Programs that let a remote user gain access to a computer over the
Internet to gain information, attack, or alter the host computer.
Spyware
Stand-alone programs that can secretly monitor system activity and
detect passwords and other confidential information and then relay the
information back to a remote computer.
Table 4-4
Security risk categories included in spyware or adware verdict
Category
Description