Symantec 10744983 Administration Guide - Page 99

Guidelines for creating compliance policy conditions, compliance policies

Page 99 highlights

Configuring email filtering 99 Creating virus, spam, and compliance filter policies When creating a compliance policy that you want to monitor, in addition to choosing a compliance folder and specifying the action Create an incident, you can also include at least one of the following actions: ■ Deliver message normally ■ Deliver message with TLS encryption ■ Delete the message ■ Forward the message ■ Archive the message You can add other actions to the policy provided they are compatible. If you only specify the Create an incident action, the message will be copied to the compliance folder you chose and also delivered normally. You should create a specific compliance folder for the type of policy you are creating. If a compliance folder for an incident is deleted or has not been created yet, and the incident occurs, the incident goes to the default folder. Guidelines for creating compliance policy conditions Keep the following suggestions and requirements in mind as you create the conditions that make up a filter. ■ To start out, you may want to set your policies so that messages that are matched by compliance policies are quarantined or modified instead of deleted. When you are sure the compliance policies are working correctly, you can adjust the action. ■ Sieve scripts cannot be imported, including those created in previous versions of Symantec or Brightmail software. ■ There is no limit to the number of conditions per compliance policy. ■ Conditions can't be nested. ■ You can create compliance policies that block or allow email based upon the sender information but usually it is best to use the Allowed Senders Lists and Blocked Senders Lists. However, it is appropriate to create compliance policies if you need to quarantine or keep email based on a combination of the sender and other criteria, such as the subject or recipient. ■ For outbound compliance policies, if you use Allowed Senders Lists or Blocked Senders Lists, you will be exempting your employees from your other outbound compliance policies, because Allowed Senders Lists and Blocked Senders Lists have higher precedence than compliance policies.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

When creating a compliance policy that you want to monitor, in addition to
choosing a compliance folder and specifying the action Create an incident, you
can also include at least one of the following actions:
Deliver message normally
Deliver message with TLS encryption
Delete the message
Forward the message
Archive the message
You can add other actions to the policy provided they are compatible. If you only
specify the Create an incident action, the message will be copied to the compliance
folder you chose and also delivered normally.
You should create a specific compliance folder for the type of policy you are
creating. If a compliance folder for an incident is deleted or has not been created
yet, and the incident occurs, the incident goes to the default folder.
Guidelines for creating compliance policy conditions
Keep the following suggestions and requirements in mind as you create the
conditions that make up a filter.
To start out, you may want to set your policies so that messages that are
matched by compliance policies are quarantined or modified instead of deleted.
When you are sure the compliance policies are working correctly, you can
adjust the action.
Sieve scripts cannot be imported, including those created in previous versions
of Symantec or Brightmail software.
There is no limit to the number of conditions per compliance policy.
Conditions can't be nested.
You can create compliance policies that block or allow email based upon the
sender information but usually it is best to use the Allowed Senders Lists and
Blocked Senders Lists. However, it is appropriate to create compliance policies
if you need to quarantine or keep email based on a combination of the sender
and other criteria, such as the subject or recipient.
For outbound compliance policies, if you use Allowed Senders Lists or Blocked
Senders Lists, you will be exempting your employees from your other outbound
compliance policies, because Allowed Senders Lists and Blocked Senders Lists
have higher precedence than compliance policies.
99
Configuring email filtering
Creating virus, spam, and compliance filter policies