Fortinet black logo

Cookbook

Configuring policies

Configuring policies

Depending on whose email you want to encrypt, you can use either the IP-based or recipient-based policies. For example, if you want to apply encryption to everyone’s outbound email in the whole company, go to Policy > Recipient Policy > Outbound and create a recipient-based policy that uses a Sender Pattern of *@example.com.

Configuring policies

Depending on whose email you want to encrypt, you can use either the IP-based or recipient-based policies. For example, if you want to apply encryption to everyone’s outbound email in the whole company, go to Policy > Recipient Policy > Outbound and create a recipient-based policy that uses a Sender Pattern of *@example.com.