- About the Kaspersky Secure Mail Gateway
- Application licensing
- About the End User License Agreement
- About the license
- About the license certificate
- About the key
- About the key file
- About the activation code
- About the subscription
- About data provision
- KSMG modes based on the license
- Adding an activation code
- Adding a key file
- Removing a key
- Monitoring license key status
- Configuring warnings about upcoming license key expiration
- Purchasing a license
- Renewing a license
- Scaling KSMG
- Application installation and setup
- Creating a virtual machine
- Starting the Setup Wizard
- Step 1. Selecting the language to display the End User License Agreement and the Privacy Policy in
- Step 2. Reviewing the License Agreement
- Step 3. Viewing the Privacy Policy
- Step 4. Transferring data to the hard drive
- Step 5. Configuring the domain name of the virtual machine
- Step 6. Beginning the configuration of network adapters
- Step 7. Configuring the receipt of network settings via DHCP
- Step 8. Configuring static network settings
- Step 9. Completing the configuration of network adapters
- Step 10. Editing the network settings of a cluster node
- Step 11. Setting the administrator password
- Step 12. Finishing the Setup Wizard
- Removing the application
- KSMG interface
- Getting started with the application
- Integration of KSMG into the corporate mail infrastructure
- Monitoring of application operation
- General protection settings
- About computer protection against certain legitimate applications
- Configuring the Anti-Virus module
- Configuring link scanning
- Configuring the Anti-Spam module
- Configuring the Anti-Phishing module
- Configuring Content Filtering
- Configuring external services
- Preparing to configure SPF and DMARC Mail Sender Authentication for outgoing messages
- Configuring the addition of X-headers to messages
- Using message processing rules
- Viewing the rule table
- Configuring rule table display
- Message processing rule configuration scenario
- Creating message processing rules
- Configuring Anti-Virus protection
- Configuring link scanning
- Configuring Anti-Spam protection
- Configuring Anti-Phishing protection
- Configuring Content Filtering
- Enabling or disabling Content Filtering in rule settings
- Configuring Content Filtering
- Creating a Content Filtering expression
- Creating a Content Filtering condition
- Enabling, disabling, or deleting expressions
- Enabling, disabling, or deleting conditions
- Configuring the final action to take on a message
- Mail Sender Authentication
- Notification settings for message scan events
- Adding a Warning about insecure message
- Adding email disclaimers
- Configuring KATA protection
- Examples of message processing rule configuration
- Dictionaries
- Viewing rule information
- Enabling and disabling a message processing rule
- Changing rule settings
- Deleting message processing rules
- Allowlists and denylists
- Managing the cluster
- Creating a new cluster
- Viewing the cluster node table
- Configuring the display of the cluster node table
- Viewing information about a cluster node
- Adding a node to the cluster
- Modifying node settings
- Removing a node from a cluster
- Changing the role of a node in a cluster
- Deleting the cluster
- Restarting a cluster node
- Managing the SSL certificate of the cluster node
- Checking data integrity
- Modifying the network settings of a cluster node
- Managing user accounts and roles
- Backup
- Configuring Backup settings
- Configuring personal Backup
- Viewing the table of objects in Backup
- Configuring the display of the table of objects in Backup
- Filtering and finding messages in Backup
- Viewing information about a message in Backup
- Viewing a message in Backup
- Viewing a message in personal Backup
- Viewing the sending history of a message in Backup
- Sending messages from Backup
- Sending messages from personal Backup
- Deleting a message from Backup
- Sending or deleting a group of messages in Backup
- Downloading a message from Backup
- Backup digest
- Event log
- Viewing the event log
- Configuring event table display
- Filtering email traffic processing events
- Filtering application events
- Viewing information about email traffic processing events
- Viewing information about an application event
- Application event types
- Exporting the event log
- Configuring the event log
- Message queue
- Reports
- Configuring date and time
- Configuring the proxy server connection settings
- Updating KSMG
- Upgrading KSMG to version 2.1
- Installing the ksmg_upgrade_2.1.0.7854_openssh_cve_2024_6387
- Updating KSMG databases
- Exporting and importing settings
- Participating in Kaspersky Security Network and using Kaspersky Private Security Network
- Integration with an external directory service
- Creating a keytab file
- Adding a LDAP server connection
- Deleting a LDAP server connection
- Modifying LDAP server connection settings
- Configuring the schedule of synchronization with the Active Directory domain controller
- Manually starting synchronization with the Active Directory domain controller
- Enhancing the security of a LDAP server connection
- KATA protection
- Integration with a single KATA server
- Integration with multiple KATA servers
- Creating a configuration file for the local balancer
- Configuring and running the local balancer on a cluster node
- Adding a KATA server
- Configuring KATA protection settings
- KATA integration dashboard
- Adding, modifying, and deleting IP addresses of KATA servers
- Disabling KATA integration
- Managing the application over SNMP
- Email notifications of the application
- Configuring notifications about application events
- Configuring notifications about bounce messages
- Configuring notifications about message processing rules triggering
- Configuring notification templates
- Using macros in notification templates
- Adding a unique message ID to the notification
- Configuring the address for messages sent by the application
- Authentication using the single sign-on technology
- Connecting to cluster nodes over the SSH protocol
- Configuring MTA settings
- DKIM signature for outgoing messages
- Configuring TLS for KSMG
- Domains and configuration of email routing
- Publishing application events to a SIEM system
- Contacting Technical Support
- Glossary
- Advanced persistent threat (APT)
- Anti-Phishing
- Anti-Spam
- Anti-Spam Quarantine
- Anti-Virus
- Backup
- Backup digest
- BEC attack
- Certificate fingerprint
- Cluster
- Content Filtering
- Content Filtering condition
- Content Filtering dictionary
- Content Filtering expression
- Control node
- Directory service
- DKIM Mail Sender Authentication
- DMARC Mail Sender Authentication
- Email notification
- Heuristic analysis
- Kaspersky Anti Targeted Attack Platform
- Kaspersky Private Security Network
- Kaspersky Security Network (KSN)
- Kerberos authentication
- Key file
- Keytab file
- LDAP
- Malicious links
- Moebius service
- MTA
- NTLM authentication
- Personal user
- Phishing
- Privileged user
- PTR record
- Reputation filtering
- SCL rating
- Secondary node
- Service Principal Name (SPN)
- SIEM system
- SMTP verification
- SNMP agent
- SNMP trap
- Spam
- SPF Mail Sender Authentication
- Spoofing
- TLS encryption
- Update source
- Virtual machine
- Information about third-party code
- Trademark notices
Using message processing rules > Changing rule settings
Changing rule settings
Changing rule settings
To modify rule settings:
- In the application web interface window, select the Rules section.
- Select the rule for which you want to modify settings.
This opens the View rule window.
- In the lower part of the window, click Edit.
This opens the Edit rule window.
- Make the changes you want.
- Click Save.
Rule settings are modified.
See also |
Article ID: 202927, Last review: Jan 24, 2025