Symantec 10744983 Administration Guide - Page 83

About precedence, End user-defined Allowed Senders List

Page 83 highlights

Configuring email filtering 83 About email filtering Table 4-4 Category Spyware Security risk categories included in spyware or adware verdict (continued) Description Stand-alone programs that can secretly monitor system activity and detect passwords and other confidential information and then relay the information back to a remote computer. About precedence Determining the precedence of different types of filtering for a particular message rests on many factors. If more than one verdict matches a message, the following applies: ■ Any matching verdict that calls for an action of defer or reject takes precedence over verdicts that call for other actions. ■ If multiple matching verdicts call for defer or reject, the one of those verdicts that appears first in the precedence list (see below) takes precedence. ■ If no matching verdict calls for an action of defer or reject, then the matching verdict that appears first in the precedence list takes precedence. ■ Although a verdict can call for multiple actions, only one verdict determines the actions that are taken on a message. Actions called for by lower precedence verdicts are not applied. Order of precedence: ■ Virus attack ■ Worm ■ Virus ■ Spyware or adware ■ Suspicious attachment (suspected virus) ■ Unscannable ■ Encrypted attachment ■ End user-defined Allowed Senders List ■ End user-defined Blocked Senders List ■ Administrator-defined, IP-based Allowed Senders List ■ Administrator-defined, IP-based Blocked Senders List ■ Administrator-defined, domain-based Allowed Senders List

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

Table 4-4
Security risk categories included in spyware or adware verdict
(continued)
Description
Category
Stand-alone programs that can secretly monitor system activity and
detect passwords and other confidential information and then relay the
information back to a remote computer.
Spyware
About precedence
Determining the precedence of different types of filtering for a particular message
rests on many factors.
If more than one verdict matches a message, the following applies:
Any matching verdict that calls for an action of defer or reject takes precedence
over verdicts that call for other actions.
If multiple matching verdicts call for defer or reject, the one of those verdicts
that appears first in the precedence list (see below) takes precedence.
If no matching verdict calls for an action of defer or reject, then the matching
verdict that appears first in the precedence list takes precedence.
Although a verdict can call for multiple actions, only one verdict determines
the actions that are taken on a message. Actions called for by lower precedence
verdicts are not applied.
Order of precedence:
Virus attack
Worm
Virus
Spyware or adware
Suspicious attachment (suspected virus)
Unscannable
Encrypted attachment
End user-defined Allowed Senders List
End user-defined Blocked Senders List
Administrator-defined, IP-based Allowed Senders List
Administrator-defined, IP-based Blocked Senders List
Administrator-defined, domain-based Allowed Senders List
83
Configuring email filtering
About email filtering