47
Configuring email settings
Configuring aliases
To import a list of masqueraded entries
1
In the Control Center, click
Settings
>
Address Masquerading
.
2
Click
Import
.
3
On the Import Masqueraded Entry page, enter or browse to the filename
containing the list of masqueraded entries.
4
Click
Import
.
Note:
If entries in the import file are not specified correctly, do not match
the required file format, or are duplicates, a message is displayed. You can
click a link to download a file containing the unprocessed entries. Click
Cancel
to return to the main Address Masquerading page to review the valid
imported entries.
Configuring aliases
An alias is an email address that translates to one or more other email
addresses. Windows users may understand this concept as a “distribution list.”
You can add an alias as a convenient shortcut for typing a long list of recipients.
An alias can also translate addresses from one top-level domain to another, such
as from example.com to example-internetsecurity.com. Email addressed to
[email protected], for example, would be delivered to kyi@example-
internetsecurity.com.
Note:
The alias functionality available on the Settings > Aliases page is separate
from LDAP aliases.
Note the following additional information about aliases:
■
Aliases are recursive. This means that an alias specified in the destination
email address list is expanded as defined in the list of aliases. For example,
with the aliases specified in
Table 3-1
, a message addressed to
[email protected] would be delivered to the destination addresses for both
[email protected] and [email protected], because [email protected] includes
[email protected].
Table 3-1
Example of recursive aliases
Alias
Destination addresses
Summary of Contents for Mail Security
Page 1: ...Symantec Mail Security for SMTP Administration Guide ...
Page 16: ...16 About Symantec Mail Security for SMTP Where to get more information ...
Page 60: ...60 Configuring email settings Configuring scanning settings ...
Page 116: ...116 Configuring email filtering Managing policy resources ...
Page 142: ...142 Working with Spam Quarantine Configuring Spam Quarantine ...
Page 150: ...150 Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine ...
Page 162: ...162 Configuring alerts and logs Configuring logs ...
Page 208: ...208 Feature Cross Reference About email filtering and message handling options ...