Fortinet Document Library

Version:


Table of Contents

Cookbook

6.4.0
Download PDF
Copy Link

Configuring policies

Depending on whose email you want to encrypt, you can use either the IP-based or recipient-based policies. For example, if you want to apply encryption to everyone’s outbound email in the whole company, go to Policy > Recipient Policy > Outbound and create a recipient-based policy that uses a Sender Pattern of *@example.com.

Configuring policies

Depending on whose email you want to encrypt, you can use either the IP-based or recipient-based policies. For example, if you want to apply encryption to everyone’s outbound email in the whole company, go to Policy > Recipient Policy > Outbound and create a recipient-based policy that uses a Sender Pattern of *@example.com.