The polices that you define for Email Data Protection assist in monitoring and controlling your company's acceptable use policy. You can use our predefined policy templates as a starting point, to address specific regulatory requirements.
We recommend that initially you set up five policies to log various aspects of content within emails, as follows:
Log inbound emails over 2MB
Log outbound profanities
Block inbound emails over 10MB
Log audio and video files inbound and outbound.
Once you are familiar with the kinds of emails that are detected, you can feel more confident in blocking some, and redirecting others. The following are some common policies. But every organization is different. We recommend that you do not set up these example rules without understanding the requirements of your business. You can then align your email security policy with these requirements.
Table: Common Email Data Protection Policies
Block emails over 25MB
Reduces the size of emails coming into the organization to save bandwidth. All emails over 25MB can be blocked and deleted. You can send notifications to all parties.
Redirect emails to/from suspicious domains
Monitors emails coming from or going out to competitors' domains, restricting the passing on of intellectual property and poaching of employees.
Monitor profanity outbound
Protects the organization's brand and reputation. For example, you can prevent an employee from sending out an email containing slander to a friend.
Redirect encrypted or password-protected mail
Enables you to monitor and control who sends and receives encrypted or password-protected messages.
Compress emails of between 10MB and 25MB
Reduces the bandwidth that is taken up by large messages coming into the organization.