The rule engine of the SEPPmail Secure E-Mail Gateway is similar to a workflow system. These rules determine how each individual email is to be processed.
When receiving emails, it is first checked whether these have been cryptographically treated. Based on the result, the corresponding actions are triggered in the following step, e.g. the decryption and/or verification of an existing electronic signature.
Additionally, other functions are also available for checking incoming emails, e.g. spam and virus protection (see Protection Pack).
Outgoing emails are generally received in a classified manner (see Controlling The Appliance) on the SEPPmail Secure E-Mail Gateway. The SEPPmail Secure E-Mail Gateway checks these criteria and carries out the appropriate actions. However, firmly defined parameters, such as the sender and recipient of an email, can be a trigger for the corresponding actions. Furthermore, criteria from third-party systems, e.g. the group affiliation of a sender in the Microsoft Active Directory (AID), can be used as a trigger via an LDAP connection.
The actions that may be triggered are generally the encryption and signature of emails. Attaching a disclaimer, adding a footer personalised to the sender (see Central Disclaimer Management (CDM)), sending large files (see Large File Transfer (LFT)) and a great number of other actions are also possible.
These central rules can also be configured via the browser-based administration interface. This enables the simple individual implementation of the security policy required in a company, even though the standard ruleset already corresponds to the specifications of the corresponding company in 90% of the cases.
For very specific requirements, there is also an option of modifying the email processing through code. For this purpose, a very simple, proprietary script language is available, which is documented in detail in the manual.