Symantec 10744983 Administration Guide - Page 99
Guidelines for creating compliance policy conditions, compliance policies
UPC - 037648279321
View all Symantec 10744983 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 99 highlights
Configuring email filtering 99 Creating virus, spam, and compliance filter policies When creating a compliance policy that you want to monitor, in addition to choosing a compliance folder and specifying the action Create an incident, you can also include at least one of the following actions: ■ Deliver message normally ■ Deliver message with TLS encryption ■ Delete the message ■ Forward the message ■ Archive the message You can add other actions to the policy provided they are compatible. If you only specify the Create an incident action, the message will be copied to the compliance folder you chose and also delivered normally. You should create a specific compliance folder for the type of policy you are creating. If a compliance folder for an incident is deleted or has not been created yet, and the incident occurs, the incident goes to the default folder. Guidelines for creating compliance policy conditions Keep the following suggestions and requirements in mind as you create the conditions that make up a filter. ■ To start out, you may want to set your policies so that messages that are matched by compliance policies are quarantined or modified instead of deleted. When you are sure the compliance policies are working correctly, you can adjust the action. ■ Sieve scripts cannot be imported, including those created in previous versions of Symantec or Brightmail software. ■ There is no limit to the number of conditions per compliance policy. ■ Conditions can't be nested. ■ You can create compliance policies that block or allow email based upon the sender information but usually it is best to use the Allowed Senders Lists and Blocked Senders Lists. However, it is appropriate to create compliance policies if you need to quarantine or keep email based on a combination of the sender and other criteria, such as the subject or recipient. ■ For outbound compliance policies, if you use Allowed Senders Lists or Blocked Senders Lists, you will be exempting your employees from your other outbound compliance policies, because Allowed Senders Lists and Blocked Senders Lists have higher precedence than compliance policies.