Symantec 10490452 - Mail Security 8220 Administration Manual page 92

Administration guide
Table of Contents

Advertisement

92 Configuring email filtering
Creating virus, spam, and compliance filter policies
Table 4-10
Sample Perl-compatible regular expressions (Continued)
Character Description
[0-9]{n}
Match any numeral n
times, for example, match
a social security number
Note: Symantec Mail Security for SMTP uses two different types of analysis in
scanning for messages that match your criteria. If you specify a condition using
a regular expression, a regular expression analysis is performed. If you specify a
condition using a keyword or dictionary, a text search is performed.
To add a compliance policy
1
In the Control Center, click Policies > Compliance.
2
Click Add.
3
In the Policy name box, type a name for the compliance policy.
This name appears on the Content Compliance Policies page, and in the
Compliance tab when configuring a Group Policy. Compliance, spam, and
virus policy names must be unique. For example, if you have a compliance
policy called XYZ, you can't have a spam or virus policy called XYZ.
4
Under Apply to, choose where this compliance policy should be available:
Inbound messages
Outbound messages
Inbound and Outbound messages
5
Under Groups, check one or more groups to which this policy should apply.
You can also add a compliance policy to a group on the Compliance tab of the
Edit Group page.
6
Under Conditions, click a condition. See
on page 88. For some conditions you need to specify additional information
in fields that appear below the condition.
7
Click Add Condition.
See
Table 4-8, "Additional fields for adding conditions,"
additional conditions if desired.
8
Under Perform the following action, click an action.
See
Table 4-2, "Filtering actions by verdict,"
you need to specify additional information in fields that appear below the
action.
Example
[0-9]{3}-[0-9]{2}-[0-9]{4}
Table 4-7, "Compliance conditions,"
on page 64. For some actions
Sample matches
123-45-6789
on page 90. Add

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mail security

Table of Contents