Fortinet black logo

Cookbook

Configuring policies

Copy Link
Copy Doc ID 76432abd-3ee9-11ea-9384-00505692583a:458674
Download PDF

Configuring policies

Depending on whose email you want to encrypt, you can use either the IP-based or recipient-based policies. For example, if you want to apply encryption to everyone’s outbound email in the whole company, go to Policy > Recipient Policy > Outbound and create a recipient-based policy that uses a Sender Pattern of *@example.com.

Configuring policies

Depending on whose email you want to encrypt, you can use either the IP-based or recipient-based policies. For example, if you want to apply encryption to everyone’s outbound email in the whole company, go to Policy > Recipient Policy > Outbound and create a recipient-based policy that uses a Sender Pattern of *@example.com.