![Symantec 10744983 - Mail Security 8320 Скачать руководство пользователя страница 83](http://html1.mh-extra.com/html/symantec/10744983-mail-security-8320/10744983-mail-security-8320_administration-manual_1418785083.webp)
Table 4-4
Security risk categories included in spyware or adware verdict
(continued)
Description
Category
Stand-alone programs that can secretly monitor system activity and
detect passwords and other confidential information and then relay the
information back to a remote computer.
Spyware
About precedence
Determining the precedence of different types of filtering for a particular message
rests on many factors.
If more than one verdict matches a message, the following applies:
■
Any matching verdict that calls for an action of defer or reject takes precedence
over verdicts that call for other actions.
■
If multiple matching verdicts call for defer or reject, the one of those verdicts
that appears first in the precedence list (see below) takes precedence.
■
If no matching verdict calls for an action of defer or reject, then the matching
verdict that appears first in the precedence list takes precedence.
■
Although a verdict can call for multiple actions, only one verdict determines
the actions that are taken on a message. Actions called for by lower precedence
verdicts are not applied.
Order of precedence:
■
Virus attack
■
Worm
■
Virus
■
Spyware or adware
■
Suspicious attachment (suspected virus)
■
Unscannable
■
Encrypted attachment
■
End user-defined Allowed Senders List
■
End user-defined Blocked Senders List
■
Administrator-defined, IP-based Allowed Senders List
■
Administrator-defined, IP-based Blocked Senders List
■
Administrator-defined, domain-based Allowed Senders List
83
Configuring email filtering
About email filtering
Содержание 10744983 - Mail Security 8320
Страница 1: ...Symantec Mail Security Administration Guide...
Страница 8: ......
Страница 14: ...Glossary Index Contents 14...
Страница 22: ...About Symantec Mail Security Where to get more information 22...
Страница 68: ...Configuring email settings Configuring scanning settings 68...
Страница 130: ...Configuring email filtering Managing policy resources 130...
Страница 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Страница 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Страница 176: ...Configuring alerts and logs About logs 176...
Страница 220: ...Administering the system Periodic system maintenance 220...