9
If desired, add more actions.
See
Table 4-3
on page 79.
10
Click Save.
Creating compliance policies
Using the Content Compliance Policies page, you can add, edit, copy, delete, and
enable or disable compliance policies. You can also change the precedence of
compliance policies by changing their location in the list on this page.
You can create compliance policies based on key words and regular expressions
found in specific areas of a message. Based on policies you set up, you can perform
a wide variety of actions on messages that match against your compliance policies.
Compliance policies can be used to:
■
Block email from marketing lists that generate user complaints or use up
excessive bandwidth.
■
Eliminate messages or attachments with specific content, or specific file
attachment types or filenames.
■
Control message volume and preserve disk space by filtering out oversized
messages.
■
Block messages containing certain keywords that match regular expressions
in their headers, bodies, or attachments.
Actions specified for custom filter matches will not override actions resulting
from matches in your Blocked Senders Lists or Allowed Senders Lists. In other
words, if a message's sender matches an entry in your Blocked Senders Lists or
Allowed Senders Lists, compliance policies will have no effect on the message.
See
“About precedence”
on page 83.
Monitor compliance policies
You can use a compliance folder to monitor violations of a policy. Monitoring
enables you to understand, prevent, respond to, and audit regulatory compliance
and internal governance policy breaches. For example, you can use a compliance
folder to monitor the scale of compliance violations at your company before
adopting a more permanent compliance policy.
When you use the Create an incident action, you can specify the compliance folder
to which violations of the policy should be routed. You can grant or deny
administrators and compliance officers access to the compliance folder.
Configuring email filtering
Creating virus, spam, and compliance filter policies
98
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...