Kaspersky Lab kaspersky anti-spam 2.0 Manual
32
Kaspersky Anti-Spam 2.0 Enterprise Edition / ISP Edition
one of them can be enabled at the same time. Other profile rules are not
executed.
executed.
Selection of the personal profile, which executes at stage 3, is more
complicated. This is done separately for each virtual copy (for each recipient, to
be more exact).
complicated. This is done separately for each virtual copy (for each recipient, to
be more exact).
Using WebConfigurator the system administrator can create and enable any
number of personal profiles in any order. The administrator defines the user list
for each personal profile (this list can be empty). The administrator can extract
the user list to one of the available e-mail addresses directly or via a link (see
para 5.2.2.1, page 52).
number of personal profiles in any order. The administrator defines the user list
for each personal profile (this list can be empty). The administrator can extract
the user list to one of the available e-mail addresses directly or via a link (see
para 5.2.2.1, page 52).
For each virtual copy the first personal profile in the list, which contains this
virtual copy recipient, will be selected. (If the message recipient is specified in the
lists of several profiles, only the first one will work).
virtual copy recipient, will be selected. (If the message recipient is specified in the
lists of several profiles, only the first one will work).
If such profile is missing, i.e. the recipient is missing in all lists, the first profile
with the empty list of recipients will be executed. Thus, this profile will be applied
by default to all message recipients not specified in other personal profiles
with the empty list of recipients will be executed. Thus, this profile will be applied
by default to all message recipients not specified in other personal profiles
5
.
And finally, if such profile does not exist either, the accept action will be applied
to this virtual copy by default. Then the execution of stage 3 completes.
to this virtual copy by default. Then the execution of stage 3 completes.
Thus, one common (active) profile is applied to each message, then, if the
message processing is not complete in the common profile, one of the personal
profiles will be applied to each recipient (or none of them will be used if the "right"
profile has not been found for a particular recipient).
message processing is not complete in the common profile, one of the personal
profiles will be applied to each recipient (or none of them will be used if the "right"
profile has not been found for a particular recipient).
If the list of recipients has been modified as a result of the use of a
common profile, then personal profiles will be applied to the modified list
of recipients. Modification of the list of recipients in a personal profile
does not affect the use of personal profiles – no other personal profiles
will be applied to a new recipient.
common profile, then personal profiles will be applied to the modified list
of recipients. Modification of the list of recipients in a personal profile
does not affect the use of personal profiles – no other personal profiles
will be applied to a new recipient.
The rules are applied in accordance with their order in the profile, either until all
the rules have been executed in the current profile or until a severe or a
moderately severe action is executed in one of the rules.
the rules have been executed in the current profile or until a severe or a
moderately severe action is executed in one of the rules.
4.3.4.2. Message modification during processing
There are two types of actions that modify messages. The Change recipient
action changes the list of the message recipients, and the change header action
changes one or some of its headers.
action changes the list of the message recipients, and the change header action
changes one or some of its headers.
5
Other personal profiles with the empty list of users will never be used.