Views:
You can configure policies to reduce security and productivity threats to your messaging system.
A policy requires the following configuration:
  • General settings: Specifies the policy name and the hosts to apply the policy
  • Policy rule selection:
    • One threat protection rule
    • (Optional) One or more content filtering, data loss prevention (DLP), or antispam rules
Note
Note
  • Before configuring a policy, make sure that you have created the required policy components (internal domains, notifications, and policy rules).
  • You can specify trusted senders/recipients or objects for policy exceptions.
    For more information, see Policy Exceptions.

Procedure

  1. Configure the required policy components:
  2. Go to PoliciesPolicy Management.
    The Policy List screen appears.
  3. Do one of the following:
    • Click Add to create a new policy.
    • Click a policy name to edit the settings.
  4. Select Enabled to activate the policy.
  5. Type a policy name.
  6. Type a number to indicate the priority in which Deep Discovery Email Inspector performs the scan. Deep Discovery Email Inspector applies the policy rules to messages according to the order you specify.
  7. Type a description for the policy.
  8. Select the message direction for the policy.
  9. Specify the senders and recipients. Do one of the following:
    • Select All to apply the policy rules to all senders or recipients
    • Select Specify senders or Specify recipients and complete the following steps to configure the address list.
      Note
      Note
      If the domain of a sender is in the Internal Domains list, Deep Discovery Email Inspector does not apply the inbound policy on messages from the sender.
    1. Select a type and provide the required information
    2. Type the required information.

      Type
      Description
      Email address
      Type a valid email address.
      For example, test@test.com.
      LDAP user or group
      Type a user or group name and press [Enter] to search for matching user accounts or groups.
      Address group
      Type an address group name and press [Enter] to search for matching address groups.
      You can configure address groups to apply the same policies to multiple email addresses.
      For more information, see Configuring an Address Group.
    3. If required, select an address group or an LDAP user or group from the search results.
    4. Click Add.
  10. (Optional) Under Exceptions, you can configure Deep Discovery Email Inspector to bypass policy scanning for messages with the specified sender-recipient address pair. Complete the following steps:
    1. Select Specify exceptions.
    1. From the From (sender) and To (recipient) drop-down lists, select an option and provide the required information.

      Type
      Description
      Any
      Select this option to include all sender or recipient email addresses.
      Email address
      Type a valid email address.
      For example, test@test.com.
      LDAP user or group
      Type a user or group name and press [Enter] to search for matching user accounts or groups.
      Address group
      Type an address group name and press [Enter] to search for matching address groups.
      You can configure address groups to apply the same policies to multiple email addresses.
      For more information, see Configuring an Address Group.
    2. If required, select an address group or an LDAP user or group from the search results.
    3. Click Add.
  11. (Optional) Select an option from the Archive Server drop-down list to archive a copy of the messages that match the policy. The default option (None) disables message archiving.
    Note
    Note
    • If a message matches multiple policies with different archive server settings, Deep Discovery Email Inspector sends a copy of the message to each archive server.
    • If a message matches multiple policies with the same archive server setting, Deep Discovery Email Inspector only sends a copy of the message to the archive server.
    For more information, see Archive Servers.
  12. Specify the threat protection rule.
    1. Click the Threat Protection tab.
    2. Select an option from the Rule drop-down list.
    3. Click Add.
      Note
      Note
      • To view the rule settings, click View.
      • For more information about configuring threat protection rules, see Threat Protection Rules.
  13. (Optional) Specify one or more content filtering rules.
    1. Click the Content Filtering tab.
    2. Select an option from the Rule drop-down list.
    3. Click Add.
      Note
      Note
      • To view the rule settings, click View.
      • For more information about configuring content filtering rules, see Content Filtering Rules.
  14. (Optional) Specify one or more data loss prevention (DLP) rules.
    1. Click the DLP tab.
    2. Select an option from the Rule drop-down list.
    3. Click Add.
      Note
      Note
  15. (Optional) Specify one or more antispam rules.
    1. Click the Antispam tab.
    2. Select an option from the Rule drop-down list.
    3. Click Add.
      Note
      Note
      • To view the rule settings, click View.
      • For more information about configuring antispam rules, see Antispam Rules.
  16. Click Save.