Symantec 10490452 - Mail Security 8220 Administration Manual page 90

Administration guide
Table of Contents

Advertisement

90 Configuring email filtering
Creating virus, spam, and compliance filter policies
Table 4-8
shows the additional fields available when you add a condition.
Table 4-8
Additional fields for adding conditions
Condition
Attachment content, Bcc:
address, Body, Cc: address,
Envelope HELO, Envelope
recipient, Envelope sender,
From: address, From/To/Cc/
Bcc: address, Subject, To:
address, To/Cc/Bcc: address
Any part of the message
Attachment type
For all messages
Message header
Message size
Table 4-9
describes the filter tests available for certain conditions when creating
a compliance policy.
Table 4-9
Filter tests
Test type
Description
Contains/does not
Tests for the supplied text within the component specified.
contain
Sometimes called a substring test. You can also test for frequency -
the number of instances of the supplied text that appear.
Starts with/does not
Equivalent to ^text.* wildcard test using matches exactly.
start with
Information required
Choose one of three options:
Click the first radio button, choose contains or does
not contain, type a frequency and a keyword.
Click the second radio button, choose a test type,
and type a keyword.
Click the third radio button, choose matches or does
not match, and type a regular expression
Choose a dictionary from the drop-down list, and type a
word frequency in the box.
Choose one of three options:
Click the first radio button and choose an
attachment list.
Click the second radio button and type a filename.
Click the third radio button and type a MIME type.
This condition will also flag attachments that are within
container files.
No additional information is needed. This condition flags
all messages not filtered by a higher precedence policy.
Type the header category (From, To, etc), then follow the
instructions in the first row above.
Choose a comparison from the first drop-down list, type a
number, and choose units from the second drop-down
list.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mail security

Table of Contents