Symantec 10490452 Administration Guide - Page 93

Determining compliance policy order, Enabling and disabling compliance policies

Page 93 highlights

Configuring email filtering 93 Managing Email Firewall policies 9 Click Add Action. Add additional actions if desired. See Table 4-3, "Compatibility of filtering actions by verdict," on page 68. 10 Click Save. Note: You can use keywords or a regular expression in a compliance policy to strip attachments. However, you cannot specify that only attachments containing the keyword or regular expression are stripped. All attachments to the message will be stripped if any of the attachments contain the keyword or regular expression. Determining compliance policy order You can change the order in which compliance policies are checked against messages. To set compliance policy order 1 In the Control Center, click Policies > Compliance. 2 Check the box next to a compliance policy. 3 Click Move Up or Move Down. Enabling and disabling compliance policies After you create compliance policies, they are automatically enabled and put to use. For testing or other administrative purposes, you may need to enable or disable one or more filters without having to delete them. By disabling filters, filters become inactive but are displayed in the Content Compliance Policies list. To enable or disable a compliance policy 1 In the Control Center, click Policies > Compliance. 2 Check the box next to a compliance policy. 3 Click Enable or Disable. Managing Email Firewall policies Symantec Mail Security for SMTP can detect patterns in incoming messages to thwart certain types of spam and virus attacks. You can block and allow messages based on email addresses, domains, or IP address. Messages can be checked against Open Proxy Senders, Suspected Spammers, and Safe Senders

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

93
Configuring email filtering
Managing Email Firewall policies
9
Click
Add Action
.
Add additional actions if desired. See
Table 4-3, “Compatibility of filtering
actions by verdict,”
on page 68.
10
Click
Save
.
Note:
You can use keywords or a regular expression in a compliance policy
to strip attachments. However, you cannot specify that only attachments
containing the keyword or regular expression are stripped. All attachments
to the message will be stripped if any of the attachments contain the
keyword or regular expression.
Determining compliance policy order
You can change the order in which compliance policies are checked against
messages.
To set compliance policy order
1
In the Control Center, click
Policies
>
Compliance
.
2
Check the box next to a compliance policy.
3
Click
Move Up
or
Move Down
.
Enabling and disabling compliance policies
After you create compliance policies, they are automatically enabled and put to
use. For testing or other administrative purposes, you may need to enable or
disable one or more filters without having to delete them. By disabling filters,
filters become inactive but are displayed in the Content Compliance Policies list.
To enable or disable a compliance policy
1
In the Control Center, click
Policies
>
Compliance
.
2
Check the box next to a compliance policy.
3
Click
Enable
or
Disable
.
Managing Email Firewall policies
Symantec Mail Security for SMTP can detect patterns in incoming messages to
thwart certain types of spam and virus attacks. You can block and allow
messages based on email addresses, domains, or IP address. Messages can be
checked against Open Proxy Senders, Suspected Spammers, and Safe Senders