05.08.2013 Views

InterScanTM Messaging Security Virtual Appliance - Online Help ...

InterScanTM Messaging Security Virtual Appliance - Online Help ...

InterScanTM Messaging Security Virtual Appliance - Online Help ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

Searching for an LDAP User or Group ............................................... 15-6<br />

Chapter 16: Configuring Policies<br />

Adding Policies .............................................................................................. 16-2<br />

Specifying a Route ........................................................................................ 16-2<br />

Configuring the Route ............................................................................. 16-7<br />

Configuring Exceptions for Routes ...................................................... 16-8<br />

Specifying Scanning Conditions ................................................................. 16-9<br />

Selecting Scanning Conditions for Spam ........................................... 16-15<br />

Configuring Approved and Blocked Sender Lists ....................... 16-17<br />

Configuring Spam Text Exemption Rules .................................... 16-18<br />

Configuring Web Reputation Settings ................................................ 16-19<br />

Selecting Scanning Conditions for Attachments ............................... 16-20<br />

Selecting Scanning Conditions for Message Size .............................. 16-22<br />

Selecting Scanning Conditions for Message Content ....................... 16-23<br />

Specifying Compliance Scanning Conditions .................................... 16-23<br />

Specifying "Other" Scanning Conditions ........................................... 16-24<br />

Selecting Scanning Conditions for Number of Recipients ......... 16-24<br />

Setting Scanning Conditions for Message Arrival Time ............. 16-25<br />

Setting Scanning Conditions for Spoofed Internal Messages .... 16-25<br />

Specifying Actions ...................................................................................... 16-26<br />

Creating a Tag Subject ...................................................................... 16-35<br />

Finalizing a Policy ....................................................................................... 16-35<br />

Chapter 17: Encryption Settings<br />

Configuring Encryption Settings ................................................................ 17-2<br />

Encryption Types ..................................................................................... 17-2<br />

Encrypting Message Traffic ........................................................................ 17-3<br />

Configuring Encryption Policies ................................................................ 17-3<br />

Chapter 18: Scanning Exceptions<br />

Setting Scan Exceptions ............................................................................... 18-2<br />

ix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!