Your
In this example, Fred Jones and Ann Brown belong to the company domain (the ‘My Company’ address list). In addition, both users are members of the address list defined as Technical Support. With this scenario, and because routes are checked from the top of the table to the bottom, the following is true:
You should remember that when a route has been satisfied the remaining routes are ignored. For example, when considering the route list as described in the above section, email sent to Ann Brown will be subject to content rules for the route Anyone to Technical Support because she is a member of the Technical Support address list and this list is above her in the table, The route Anyone to Ann Brown will not be reached.
If you plan to develop a policy for individuals and groups within your organisation, you need to ensure that the route Anyone to/from your organisation contains the most stringent set of content rules. You can then create routes for individuals and groups that exempt them from certain rules, and place these routes higher in the policy table than the generic Anyone to/from the organisation routes.