Symantec 10744983 Administration Guide - Page 78

Notes on filtering actions, actions. Two additional actions, Hold message in Suspect Virus Quarantine

Page 78 highlights

78 Configuring email filtering About email filtering Action Treat as spam Treat as suspected spam Table 4-2 Filtering actions by verdict (continued) Description Verdict Directory harvest attack Virus attack Virus Spam, Content Suspected Compliance Spam Process the message using the action(s) specified in the associated spam policy. The message is x delivered normally if the spam policy is disabled or does not apply because of message direction. Process the message using the action(s) specified in the associated suspected spam policy. The message is delivered x normally if the suspected spam policy is disabled or does not apply because of message direction. Notes on filtering actions When using Table 4-2 consider the following limitations: ■ All Virus verdicts except suspicious attachments share the same available actions. Two additional actions, Hold message in Suspect Virus Quarantine and Strip and hold in Suspect Virus Quarantine, are available only for the suspicious attachment verdict. ■ All Spam verdicts share the same available actions. ■ All Content Compliance verdicts share the same available actions. ■ Messages from senders in the Allowed Senders Lists bypass spam filtering.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

Table 4-2
Filtering actions by verdict
(continued)
Verdict
Description
Action
Content
Compliance
Spam,
Suspected
Spam
Virus
Virus
attack
Directory
harvest
attack
x
Process the
message using the
action(s) specified
in the associated
spam policy. The
message is
delivered normally
if the spam policy is
disabled or does not
apply because of
message direction.
Treat as spam
x
Process the
message using the
action(s) specified
in the associated
suspected spam
policy. The message
is delivered
normally if the
suspected spam
policy is disabled or
does not apply
because of message
direction.
Treat as suspected
spam
Notes on filtering actions
When using
Table 4-2
consider the following limitations:
All Virus verdicts except suspicious attachments share the same available
actions. Two additional actions, Hold message in Suspect Virus Quarantine
and Strip and hold in Suspect Virus Quarantine, are available only for the
suspicious attachment verdict.
All Spam verdicts share the same available actions.
All Content Compliance verdicts share the same available actions.
Messages from senders in the Allowed Senders Lists bypass spam filtering.
Configuring email filtering
About email filtering
78