This submenu is called up from Mail Processing by clicking on Edit policy table....
Column |
Description |
---|---|
The order of the ENCRYPTION POLICIES can be set by entering the corresponding desired number. |
|
Displays the individual name of the rule that was assigned when the rule was created. Clicking on the name opens the submenu , via which you can edit the rule. |
|
Shows whether the rule is active or not
|
|
Displays the Managed domain to which this rule applies. |
|
If applicable, this shows the trigger flag for the policy (see Policy flag). |
|
Shows (if and when) the type of encryption with which the target domain(s) of this rule is/are to be encrypted. |
|
Shows (if and when) with which hash procedure the S/MIME signature is created. |
|
Shows the bounce template used for this policy (see Bounce behaviour). |
|
Shows the GINA Domain used for this policy (see GINA options). |
Clicking on Create new encryption policy... opens the submenu , via which a new rule can be created.
In client-capable systems, a correspondingly named section appears for each client with the above content.
Encryption policies generally take priority over the settings of the global ruleset (see Mail Processing Ruleset generator). Exceptions are the Custom commands, which are processed before the encryption policies. If one of the rules has become active due to the configured triggers, no other rule will be processed. |