The content security policy comprises a number of combined components that determine the email content that is allowed to flow in and out of your organization. You create your policy by adding Content Rules and other Policy References, to Mail Policy Routes. Each Mail policy route references two Email Address Lists. One list supplies the sender addresses, the other supplies the recipient addresses.
When email passes through the
In addition to routes and rules, you can:
You define your content policy from the Policy Center Home Page.
If you have a conjoined policy where you have a Email or Exchange, and Web
Content rules are the email processing rules of your content security policy. Each content rule states that if a message meets a specified set of conditions, the Policy Engine will perform a specified set of actions.
When you configure content rules in your
Policy references are items that can be referenced when you define your security policy. For example, you can add the Informs reference to your policy route to send notifications when specific content rule conditions are met.
If you have a conjoined policy where, for example, a Web and Email
For a list of policy references and what action they perform, see the About Policy Reference topic.
An Email Address List is a grouping of email addresses of one or more users to whom you want to apply a common policy. Such groupings typically represent users who share a common link within your organization, for example:
For more information, see the About Email Address Lists topic.
A mail policy route defines a "From" and "To" list of addresses. You configure these address lists from within your
A policy route must reference two Address Lists to define the mail route on which the policy route will be applied. One Address List supplies the sender address, and the other Address List supplies the recipient address.
Your |
You apply a default decryption, delivery, and disposal action for messages that are matched with the route. You can, if required, apply content rules to the route to provide extra flexibility to the route.
For more information, see the About Policy Routes topic.
You define your global anti-spam defense with the SpamLogic feature. SpamLogic settings determine how your
In addition to using SpamLogic to control spam at the perimeter, you can use the Spam Detection clause in content rules to add an extra level of spam protection. |
Missing Manager can be used to ensure that sent email will always include a specific recipient. For example, for a given policy route, you might want to ensure that a manager or compliance officer is aware certain email leaving your company. For more information, see the About Missing Manager Policy topic.
Your
If the policy outcome for an incoming message is 'deliver', Clearswift
For detailed steps describing the processing of incoming mail, see the How Clearswift
With Adaptive Redaction you can detect and manage sensitive data from information that flows through your
You use Sanitization to detect and remove active content, embedded content, URLs or hyperlinks, scripts or macros and document properties from communications. Sanitization purges potential harmful content from documents, attachments and media types. For more information on using this feature, see Sanitization.