![Symantec 10744983 - Mail Security 8320 Administration Manual Download Page 105](http://html1.mh-extra.com/html/symantec/10744983-mail-security-8320/10744983-mail-security-8320_administration-manual_1418785105.webp)
For more information about Perl-compatible regular expressions, see:
http://www.perl.com/doc/manual/html/pod/perlre.html
Table 4-10
describes the methods you can use to refine your search.
Table 4-10
Sample Perl-compatible regular expressions
Sample matches
Example
Description
Character
jen, jon, j2n, j$n
j.n
Match any one character
.
john, josh, jo4#
jo..
sara, sarah, sarahjane,
saraabc%123
sara.*
Match zero or more
characters
.*
sm, sam, simone,
s321m$xyz
s.*m.*
sarah, sarahjane,
saraabc%123
sara.+
Match one or more
characters
.+
simone, s321m$xyz
s.+m.+
stop.
stop\.
Match a period
\.
b**
b\*\*
Match an asterisk
\*
18+
18\+
Match a plus character
\+
18/
18\/
Match a forward slash
\/
123-45-6789
[0-9]{3}-[0-9]{2}-[0-9]{4}
Match any numeral n
times, for example, match
a social security number
[0-9]{n}
Note:
Symantec Mail Security uses two different types of analysis in scanning for
messages that match your criteria. If you specify a condition using a regular
expression, a regular expression analysis is performed. If you specify a condition
using a keyword or dictionary, a text search is performed.
Adding compliance policies
Use the following procedure to add compliance policies.
To add a compliance policy
1
In the Control Center, click Policies > Compliance.
2
Click Add.
105
Configuring email filtering
Creating virus, spam, and compliance filter policies
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...