Email Scanning Policies menu
Use this page to make policies for handling threats in email.
Links under the following headings go to further pages, where you can configure the features of the
appliance.
•
Anti-Virus
•
Spam
•
Compliance
•
Scanner Options
Anti-Virus
Email | Email Policies | Scanning Policies [Anti-Virus]
This column on the page contains the following links, which lead to further pages where you can
control the features of the appliance.
Link
What you can do from this part of the interface
Use this page to specify basic options for anti-virus scanning.
Virus
Spyware Use this page to specify the actions to take against potentially unwanted programs.
Packers Use this page to specify the actions to take against packers.
Packers compress files, which change the binary signature of the executable. Packers can
compress Trojan-horse programs and make them harder to detect.
Spam
Email | Email Policies | Scanning Policies [Spam]
This column on the page contains the following links, which lead to further pages where you can
control the features of the appliance.
Link
What you can do from this part of the interface
Spam
Use these pages to manage spam by specifying thresholds and blacklists.
Use this page to specify how to handle phishing email.
Phish
Phishing is the illegal activity of using spoofed email messages to persuade
unsuspecting users to disclose personal identity and financial information. Criminals
can use the stolen identity to fraudulently obtain goods and services and to steal
directly from bank accounts.
Sender
Use these pages to manage the use of authentication systems such as DKIM and SPF.
Authentication
Compliance
Email | Email Policies | Scanning Policies [Compliance]
McAfee Email and Web Security Appliances 5.6.0 Product Guide
Overview of Email features
Email Policies
103