![Symantec 10744983 - Mail Security 8320 Administration Manual Download Page 66](http://html1.mh-extra.com/html/symantec/10744983-mail-security-8320/10744983-mail-security-8320_administration-manual_1418785066.webp)
To configure invalid recipient handling
1
In the Control Center, click Settings > Invalid Recipients.
2
Do one of the following:
■
Uncheck Drop messages for invalid recipients to return bounce messages
to the sender for invalid addresses.
■
Check Drop messages for invalid recipients to drop invalid messages
from the mail stream and return no bounce messages to the sender. For
this setting to take effect, a full synchronization and replication cycle
must be completed.
This setting is independent of the Directory Harvest Attack Email Firewall
policy, and can be used in conjunction with it.
3
Click Save.
Configuring scanning settings
Use the Scanning Settings page to configure container settings and content
filtering settings.
Configuring container settings
When Symantec Mail Security processes certain zip files and other types of
compressed files, these files can expand to the point where they deplete system
memory. Such container files are often referred to as “zip bombs.” Symantec Mail
Security can handle such situations by automatically sidelining large attachments
and stripping the attachments. There is a presumption that such a file can be a
zip bomb and should not be allowed to deplete system resources. The file is
sidelined only because of its size, not because of any indication that it contains a
virus.
You can specify this size threshold and the maximum extraction level that
Symantec Mail Security will process in memory, as well as a time limit for scanning
containers. If the configured limits are reached, Symantec Mail Security will
automatically perform the action designated for the “unscannable” category in
the Group Policies settings.
Configuring email settings
Configuring scanning settings
66
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...