Symantec 10490452 Administration Guide - Page 86

Creating compliance policies, Guidelines for creating compliance policy conditions

Page 86 highlights

86 Configuring email filtering Creating virus, spam, and compliance filter policies 7 Select the desired action. See Table 4-2, "Filtering actions by verdict," on page 64. For some actions you need to specify additional information in fields that appear below the action. 8 Click Add Action. 9 If desired, add more actions. See Table 4-3, "Compatibility of filtering actions by verdict," on page 68. 10 Click Save. Creating compliance policies Using the Content Compliance Policies page, you can add, edit, copy, delete, and enable or disable compliance policies. You can also change the precedence of compliance policies by changing their location in the list on this page. You can create compliance policies based on key words and regular expressions found in specific areas of a message. Based on policies you set up, you can perform a wide variety of actions on messages that match against your compliance policies. Compliance policies can be used to: ■ Eliminate messages with specific content, or specific file attachment types or filenames. ■ Control message volume and preserve disk space by filtering out oversized messages. ■ Block email from marketing lists that generate user complaints or use up excessive bandwidth. ■ Block messages containing certain keywords or regular expressions in their headers, bodies, or attachments. Actions specified for custom filter matches will not override actions resulting from matches in your Blocked Senders Lists or Allowed Senders Lists. In other words, if a message's sender matches an entry in your Blocked Senders Lists or Allowed Senders Lists, compliance policies will have no effect on the message. See "About precedence" on page 71 for more information. Guidelines for creating compliance policy conditions Keep these suggestions and requirements in mind as you create the conditions that make up a filter. ■ To start out, you may want to set your policies so that messages that are match by compliance policies are quarantined, forwarded, or modified

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

86
Configuring email filtering
Creating virus, spam, and compliance filter policies
7
Select the desired action.
See
Table 4-2, “Filtering actions by verdict,”
on page 64.
For some actions
you need to specify additional information in fields that appear below the
action.
8
Click
Add Action
.
9
If desired, add more actions.
See
Table 4-3, “Compatibility of filtering actions by verdict,”
on page 68.
10
Click
Save
.
Creating compliance policies
Using the Content Compliance Policies page, you can add, edit, copy, delete, and
enable or disable compliance policies. You can also change the precedence of
compliance policies by changing their location in the list on this page.
You can create compliance policies based on key words and regular expressions
found in specific areas of a message. Based on policies you set up, you can
perform a wide variety of actions on messages that match against your
compliance policies. Compliance policies can be used to:
Eliminate messages with specific content, or specific file attachment types
or filenames.
Control message volume and preserve disk space by filtering out oversized
messages.
Block email from marketing lists that generate user complaints or use up
excessive bandwidth.
Block messages containing certain keywords or regular expressions in their
headers, bodies, or attachments.
Actions specified for custom filter matches will not override actions resulting
from matches in your Blocked Senders Lists or Allowed Senders Lists. In other
words, if a message’s sender matches an entry in your Blocked Senders Lists or
Allowed Senders Lists, compliance policies will have no effect on the message.
See
“About precedence”
on page 71 for more information.
Guidelines for creating compliance policy conditions
Keep these suggestions and requirements in mind as you create the conditions
that make up a filter.
To start out, you may want to set your policies so that messages that are
match by compliance policies are quarantined, forwarded, or modified