3
In the Policy name box, type a name for the compliance policy.
This name appears on the Content Compliance Policies page, and in the
Compliance tab when configuring a Group Policy. Compliance, spam, and
virus policy names must be unique. For example, if you have a compliance
policy called XYZ, you can't have a spam or virus policy called XYZ.
4
Under Apply to, choose where this compliance policy should be available:
■
Inbound messages
■
Outbound messages
■
Inbound and Outbound messages
5
Under Groups, check one or more groups to which this policy should apply.
You can also add a compliance policy to a group on the Compliance tab of
the Edit Group page.
6
Under Conditions, click a condition. For some conditions you need to specify
additional information in fields that appear below the condition.
7
Click Add Condition and add additional conditions if desired.
8
Under Perform the following action, click an action.
For some actions you need to specify additional information in fields that
appear below the action.
When using the Save to disk action on Solaris, Linux, or Windows, you must
specify a writeable directory.
9
Click Add Action. Add additional actions if desired.
10
Click Save.
Note:
You can use keywords or a regular expression in a compliance policy to strip
attachments. However, you cannot specify that only attachments containing the
keyword or regular expression are stripped if any of the attachments contain the
keyword or regular expression.
Determining compliance policy order
You can change the order in which compliance policies are checked against
messages.
Configuring email filtering
Creating virus, spam, and compliance filter policies
106
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...