Understanding Policy Enforcement
Applies to: Office 365 for enterprises, Live@edu, Forefront Online Protection for Exchange
Topic Last Modified: 2012-02-27
In addition to spam and virus filtering, Forefront Online Protection for Exchange (FOPE) offers an integrated approach to message security through policy enforcement. This topic gives an overview of policy enforcement in FOPE and provides a checklist to help you think about and plan your own policy rules.
In FOPE, you can create policy rules to enforce company IT policies. FOPE allows companies to automatically monitor outbound and inbound email and stop sensitive or inappropriate messages from entering or leaving your network. FOPE can also allow specific senders to bypass spam filtering completely. For example, if your company IT policy restricts employees from emailing information about products before they are released, you can enforce the policy by establishing a policy rule that diverts all outgoing emails with the name of the product in the Subject or Body field of an email. However, you may wish to exempt some users (Executives, IT Administrators, and so on) from this rule. You can grant unrestricted access by establishing an additional rule to bypass the filters completely. Policy rules also let you add and manage large lists of value (such as lists of IP addresses, domains, email addresses, file names, file extensions and keywords) for multiple policy rules by uploading a file (dictionary) and linking these files in multiple policy rules.
You can use the following checklist to help guide you through the steps for developing IT policies for your organization.
|Identify the Following Criteria||Answer|
1. Filter category (file size, key word, character set, and so on)
2. Domain Scope (Optional)
3. Traffic Scope (Inbound, Outbound)
4. Action (Allow, Encrypt, Reject, Redirect, Quarantine, Test, and so on)
For more information about the different options for Policy Rules, see the Policy Rules topic. For a more in-depth look at the different Policy Rule Settings, see the Understanding Policy Rule Settings topic.