Symantec 10744983 Administration Guide - Page 98
Creating compliance policies
UPC - 037648279321
View all Symantec 10744983 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 98 highlights
98 Configuring email filtering Creating virus, spam, and compliance filter policies 9 If desired, add more actions. See Table 4-3 on page 79. 10 Click Save. Creating compliance policies Using the Content Compliance Policies page, you can add, edit, copy, delete, and enable or disable compliance policies. You can also change the precedence of compliance policies by changing their location in the list on this page. You can create compliance policies based on key words and regular expressions found in specific areas of a message. Based on policies you set up, you can perform a wide variety of actions on messages that match against your compliance policies. Compliance policies can be used to: ■ Block email from marketing lists that generate user complaints or use up excessive bandwidth. ■ Eliminate messages or attachments with specific content, or specific file attachment types or filenames. ■ Control message volume and preserve disk space by filtering out oversized messages. ■ Block messages containing certain keywords that match regular expressions in their headers, bodies, or attachments. Actions specified for custom filter matches will not override actions resulting from matches in your Blocked Senders Lists or Allowed Senders Lists. In other words, if a message's sender matches an entry in your Blocked Senders Lists or Allowed Senders Lists, compliance policies will have no effect on the message. See "About precedence" on page 83. Monitor compliance policies You can use a compliance folder to monitor violations of a policy. Monitoring enables you to understand, prevent, respond to, and audit regulatory compliance and internal governance policy breaches. For example, you can use a compliance folder to monitor the scale of compliance violations at your company before adopting a more permanent compliance policy. When you use the Create an incident action, you can specify the compliance folder to which violations of the policy should be routed. You can grant or deny administrators and compliance officers access to the compliance folder.