Having received a targeted attack from a spoofed email domain, a company wants to take advantage of DKIM validation for inbound mail. The messaging administrator has enabled sender authentication and DKIM validation and now needs to configure a content filtering policy to quarantine any messages that fail. Which condition should be met for the content filtering policy to fire?
An administrator needs to determine which policies have triggered for a particular message. Which troubleshooting tool will help to identify issues with policy precedence and actions?
An administrator recently investigated the debug logs for Symantec Messaging Gateway 10.5 and resolved an issue. A few days later the administrator discovers that the disk storage is filling up quickly. What is the likely cause?
An employee reports that a message sent to a customer was never received by the customer. The employee provides sufficient information for the administrator to find the message using the Message Audit log. The employee wants to know where that message has gone. Which section of the Message Audit log detail page will provide this information?