![Symantec 10744983 - Mail Security 8320 Administration Manual Download Page 94](http://html1.mh-extra.com/html/symantec/10744983-mail-security-8320/10744983-mail-security-8320_administration-manual_1418785094.webp)
To view Group Policy information for a particular user or domain
1
On the Members tab of the Edit Group page, click Find User.
2
Type an email address or domain name in the Email address box.
3
Click Find User.
The Control Center lists the first enabled group in which the specified user
exists, searching in the order that groups are listed on the Group Policies
page.
Creating virus, spam, and compliance filter policies
Use filter policy pages to combine a message characteristic, such as virus, with
an action, such as delete. The initial page you see when you click on Spam, Virus,
or Compliance under Policies > Filter Policies contains a table that indicates the
status of defined virus, spam, or compliance policies.
Table 4-6
describes the options available on the Policy status page.
Table 4-6
Policy status page
Description
Column
Name of the policy
Virus/Spam/Content
Compliance Policies
Indicates if the policy is enabled for one or more groups
Enabled
Indicates the directions the policy is applied to: Inbound,
Outbound, or both
Applied to
Number of groups that this policy has been used in
Number of Groups
Creating virus policies
Using the Virus Policies page, you can add, edit, copy, delete, and enable or disable
virus policies.
To add an virus policy
1
In the Control Center, click Policies > Virus.
2
Click Add.
Configuring email filtering
Creating virus, spam, and compliance filter policies
94
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...