Table 4-2
Filtering actions by verdict
(continued)
Verdict
Description
Action
Content
Compliance
Spam,
Suspected
Spam
Virus
Virus
attack
Directory
harvest
attack
x
Process the
message using the
action(s) specified
in the associated
spam policy. The
message is
delivered normally
if the spam policy is
disabled or does not
apply because of
message direction.
Treat as spam
x
Process the
message using the
action(s) specified
in the associated
suspected spam
policy. The message
is delivered
normally if the
suspected spam
policy is disabled or
does not apply
because of message
direction.
Treat as suspected
spam
Notes on filtering actions
When using
Table 4-2
consider the following limitations:
■
All Virus verdicts except suspicious attachments share the same available
actions. Two additional actions, Hold message in Suspect Virus Quarantine
and Strip and hold in Suspect Virus Quarantine, are available only for the
suspicious attachment verdict.
■
All Spam verdicts share the same available actions.
■
All Content Compliance verdicts share the same available actions.
■
Messages from senders in the Allowed Senders Lists bypass spam filtering.
Configuring email filtering
About email filtering
78
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...