Chapter 3 Configuring email settings
Configuring address masquerading ................................................. 53
Importing masqueraded entries ................................................ 54
Configuring aliases ...................................................................... 55
Managing aliases ................................................................... 56
Importing aliases ................................................................... 57
Configuring local domains ............................................................. 58
Importing local domains and email addresses .............................. 59
Understanding spam settings ........................................................ 60
Configuring suspected spam .................................................... 61
Choosing language identification type ....................................... 61
Software acceleration .............................................................. 62
Configuring spam settings ....................................................... 62
Configuring virus settings .............................................................. 62
Configuring LiveUpdate .......................................................... 63
Excluding files from virus scanning ........................................... 64
Configuring Bloodhound settings .............................................. 64
Configuring invalid recipient handling ............................................. 65
Configuring scanning settings ........................................................ 66
Configuring container settings .................................................. 66
Configuring content filtering settings ........................................ 67
Chapter 4 Configuring email filtering
About email filtering ..................................................................... 69
Notes on filtering actions ......................................................... 78
Multiple actions per verdict ...................................................... 79
Multiple group policies ............................................................ 81
Security risks ........................................................................ 81
About precedence ................................................................... 83
Creating groups and adding members .............................................. 84
Add or remove members from a group ........................................ 84
Assigning filter policies to a group ................................................... 87
Selecting virus policies for a group ............................................ 87
Selecting spam policies for a group ............................................ 89
Selecting compliance policies for a group .................................... 89
Enabling and disabling end user settings .................................... 90
Allowing or blocking email based on language ............................. 92
Managing Group Policies ............................................................... 92
Manage Group Policies ............................................................ 93
Creating virus, spam, and compliance filter policies ............................ 94
Creating virus policies ............................................................. 94
Creating spam policies ............................................................ 96
Contents10