This article contains information on configuring a Content Examination Bypass policy, detailing steps to specify bypass conditions for certain users, groups, or domains, and setting policy validity and overrides.
Content Examination Bypass policies allow certain users, groups, or domains to be exempt from Content Examination policies. Adding these senders or recipients to a Permitted Senders Policy does not allow mail to bypass Content Examination. This is because Content Examination policies scan mail for words, phrases, or regular expressions, which are typically applied to all messages—even those to and from trusted addresses.
Usage Examples
Content Examination Bypass policies typically work by:
-
-
- Searching for a specific word or phrase in all mail.
- Specifying that messages from certain users, groups, or domains are bypassed.
-
For example, you may have a Content Examination policy to scan all inbound messages requesting a quote based on certain words like "quote", "discount" or "free". If sent from an existing customer, you can circumvent all messages coming from sales@domain.com by configuring a Content Examination Bypass policy.
Configuring a Content Examination Bypass Policy
To configure a Content Examination Bypass policy:
- Log in to the Mimecast Administration Console.
- Navigate to Policies | Gateway Policies.
- Click on Content Examination Bypass. A list of policies is displayed.
- Either select the:
-
- Policy to be changed.
- New Policy button to create a policy.
- Complete the Options section as required:
| Field/ Option | Description |
|---|---|
| Policy Narrative | Provide a description of the policy to allow you to easily identify it in the future. |
| Select Content Definition to Bypass | Use the Lookup button to select the Content Examination Definition. |
- Complete the Emails From and Emails To sections as required:
| Field/ Option | Description |
| Applies From / To |
Specify the Sender characteristics the policy is based on. For multiple policies, you should apply them from the most to the least specific. The options are:
|
| Address Based On |
Specify the Sender characteristics the policy is based on. For multiple policies, you should apply them from the most to the least specific. The options are:
|
- Complete the Validity section as required:
| Field/ Option | Description |
|---|---|
| Source IP Ranges (n.n.n.n/x) | Enter any required Source IP Ranges for the policy. These only apply if the source IP address used to transmit the message data falls inside or matches the range(s) configured. IP ranges should be entered in CIDR notation. |
| Bi-Directional | If selected, the policy is applied when the policy's recipient is the sender, and the sender is the recipient. |
| Set Policy as Perpetual | If the policy's date range has no end date, this field displays "Always On" meaning that the policy never expires. |
| Policy Override | This overrides the default order in which policies are applied. If there are multiple applicable policies, this policy is applied first unless more specific policies of the same type are configured with an override. |
| Date Range | Use this field to specify a start and/or end date for the policy. If the Eternal option is selected, no date is required. |
| Enable / Disable | Use this to enable (default) or disable a policy. If a date range has been specified, the policy will automatically be disabled when the end of the configured date range is reached. |
- Click on the Save and Exit button.
Comments
Please sign in to leave a comment.