Symantec 10744983 Administration Guide - Page 98

Creating compliance policies

Page 98 highlights

98 Configuring email filtering Creating virus, spam, and compliance filter policies 9 If desired, add more actions. See Table 4-3 on page 79. 10 Click Save. Creating compliance policies Using the Content Compliance Policies page, you can add, edit, copy, delete, and enable or disable compliance policies. You can also change the precedence of compliance policies by changing their location in the list on this page. You can create compliance policies based on key words and regular expressions found in specific areas of a message. Based on policies you set up, you can perform a wide variety of actions on messages that match against your compliance policies. Compliance policies can be used to: ■ Block email from marketing lists that generate user complaints or use up excessive bandwidth. ■ Eliminate messages or attachments with specific content, or specific file attachment types or filenames. ■ Control message volume and preserve disk space by filtering out oversized messages. ■ Block messages containing certain keywords that match regular expressions in their headers, bodies, or attachments. Actions specified for custom filter matches will not override actions resulting from matches in your Blocked Senders Lists or Allowed Senders Lists. In other words, if a message's sender matches an entry in your Blocked Senders Lists or Allowed Senders Lists, compliance policies will have no effect on the message. See "About precedence" on page 83. Monitor compliance policies You can use a compliance folder to monitor violations of a policy. Monitoring enables you to understand, prevent, respond to, and audit regulatory compliance and internal governance policy breaches. For example, you can use a compliance folder to monitor the scale of compliance violations at your company before adopting a more permanent compliance policy. When you use the Create an incident action, you can specify the compliance folder to which violations of the policy should be routed. You can grant or deny administrators and compliance officers access to the compliance folder.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

9
If desired, add more actions.
See
Table 4-3
on page 79.
10
Click
Save
.
Creating compliance policies
Using the Content Compliance Policies page, you can add, edit, copy, delete, and
enable or disable compliance policies. You can also change the precedence of
compliance policies by changing their location in the list on this page.
You can create compliance policies based on key words and regular expressions
found in specific areas of a message. Based on policies you set up, you can perform
a wide variety of actions on messages that match against your compliance policies.
Compliance policies can be used to:
Block email from marketing lists that generate user complaints or use up
excessive bandwidth.
Eliminate messages or attachments with specific content, or specific file
attachment types or filenames.
Control message volume and preserve disk space by filtering out oversized
messages.
Block messages containing certain keywords that match regular expressions
in their headers, bodies, or attachments.
Actions specified for custom filter matches will not override actions resulting
from matches in your Blocked Senders Lists or Allowed Senders Lists. In other
words, if a message's sender matches an entry in your Blocked Senders Lists or
Allowed Senders Lists, compliance policies will have no effect on the message.
See
“About precedence”
on page 83.
Monitor compliance policies
You can use a compliance folder to monitor violations of a policy. Monitoring
enables you to understand, prevent, respond to, and audit regulatory compliance
and internal governance policy breaches. For example, you can use a compliance
folder to monitor the scale of compliance violations at your company before
adopting a more permanent compliance policy.
When you use the Create an incident action, you can specify the compliance folder
to which violations of the policy should be routed. You can grant or deny
administrators and compliance officers access to the compliance folder.
Configuring email filtering
Creating virus, spam, and compliance filter policies
98