■
Strip and hold message in Suspect Virus Quarantine
Apply the policy to one or more groups. For example, you can create a virus policy
called potential_virus that delays messages containing suspicious attachments
and set it as the inbound and outbound suspicious attachment message policy for
the Default group.
See
“Creating virus policies”
on page 94.
Accessing Suspect Virus Quarantine
Access Suspect Virus Quarantine by logging into the Control Center. All
administrators can work with messages in Suspect Virus Quarantine, but
administrators with full privileges or Manage Quarantine rights (View or Modify)
can make all Quarantine setting changes. Users with only 'view' rights for manage
quarantine will see the 'Settings' tab, but cannot make changes to those settings,
and they cannot release or delete messages.
Checking for new Suspect Virus Quarantine messages
New messages that have arrived since logging in and checking quarantined
messages are not shown in the message list until you do one of the following:
■
Click Quarantine > Suspect Virus Quarantine.
■
Click Display All.
Except for immediately after these two actions, newly arrived messages are not
displayed in Suspect Virus Quarantine.
Suspect Virus Quarantine messages page
The Suspect Virus Quarantine messages page provides a summary of the messages
in Suspect Virus Quarantine.
Working with quarantined virus messages
The following steps describe how to perform some common tasks on the Virus
Message quarantine page.
To get to the virus message quarantine page
◆
From the Control Center, click Quarantine > Suspect Virus Quarantine.
Working with Suspect Virus Quarantine
Accessing Suspect Virus Quarantine
158
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...