If the FortiMail unit protects many domains, and therefore creating recipient-based policies would be very time-consuming, such as it might be for an Internet service provider (ISP), consider configuring only IP-based policies. For details, see “Controlling email based on IP addresses”. Alternatively, consider configuring recipient-based policies only for exceptions that must be treated differently than indicated by the IP-based policy. |
GUI item | Description |
Move (button) | FortiMail units match the policies for each domain in sequence, from the top of the list downwards. Therefore, you must put the more specific policies on top of the more generic ones. To move a policy in the policy list: 1. Select a domain. Note: if the domain is “All”, the Move button is disabled 2. Click a policy to select it. 3. Click Move, then select either: • the direction in which to move the selected policy (Up or Down), or • After or Before, then in Move right after or Move right before indicate the policy’s new location by entering the ID of another policy. |
Domain (drop-down list) | • All: Select to display all system-level and domain-level policies. • System: Select to display all system-level policies. • <domain>: Select one domain to display this domain’s policies. Use the Show system policy switch to display or hide the system-level policies when you view all policies or domain-level policies. If you are a domain administrator, you can only see the domains that are permitted by your administrator profile. |
Enabled | Select whether or not the policy is currently in effect. |
ID | Displays the number identifying the policy. If a comment is added to this rule when the rule is created, the comment will show up as a mouse-over tool-tip in this column. Note: This may be different from the order in which they appear on the page, which indicates order of evaluation. FortiMail units evaluate policies in sequence. More than one policy may be applied. For details, see “Order of execution of policies” and “Which policy/profile is applied when an email has multiple recipients?”. |
Domain Name (column) | Indicates the domain part of the recipient’s email address in the envelope (RCPT TO:) that an email must match in order to be subject to the policy. • For incoming recipient-based policies, this is the name of a protected domain. • For outgoing recipient-based policies, this is System, indicating that the recipient does not belong to a protected domain. |
Sender Pattern | A sender email address (MAIL FROM:) as it appears in the envelope or a wildcard pattern to match sender email addresses. |
Recipient Pattern | A recipient email address (RCPT TO:) as it appears in the envelope or a wildcard pattern to match recipient email addresses. |
AntiSpam | Displays the antispam profile selected for the matching recipients. To modify or view a profile, click its name. The profile appears in a pop-up window. For details, see “Managing antispam profiles”. |
AntiVirus | Displays the antivirus profile selected for the matching recipients. To modify or view a profile, click its name. The profile appears in a pop-up window. For details, see “Configuring antivirus profiles and antivirus action profiles”. |
Content | Displays the content profile selected for the matching recipients. To modify or view a profile, click its name. The profile appears in a pop-up window. For details, see “Configuring content profiles”. |
DLP | Displays the DLP profile selected for the matching recipients. To modify or view a profile, click its name. The profile appears in a pop-up window. For details, see “Configuring data loss prevention”. |
Resource (server mode only) | Displays the resource profile selected for the matching recipients. To modify or view a profile, click its name. The profile appears in a pop-up window. For details, see “Configuring resource profiles”. |
Authentication (not in server mode) | Displays the authentication profile selected for the matching recipients. To modify or view a profile, click its name.The profile appears in a pop-up window. For details, see “Configuring authentication profiles” or “Configuring LDAP profiles”. |