All triggers in the user policy can use lists of included, excluded, or ignored items. You specify which list is checked for matching items. Examples include lists of matching URLs, file names, email addresses, search text, and so on.
Included items are forbidden items. If a trigger uses an Included list, any single item in the list can activate the trigger. If a trigger fails to detect any items in the Included list, the trigger does not activate. For example, if a Web page capture trigger uses an Included URL list, any URL on this list triggers a capture when the user browses to it.
Included Addresses lists also affect data lookup commands that use %sender%, %recipient%, %senderalias% or %recipientalias% variables. If a trigger uses an Included list, these data lookup commands only evaluate included email addresses.
Excluded items are allowed items. If a trigger uses an Excluded list, any items can activate the trigger except items in this list. If a trigger fails to detect any items in the Excluded list, the trigger activates.
For example, a control trigger for incoming emails uses an Excluded Addresses list. The trigger always activates when it detects an incoming email unless the email is from a sender on the Excluded list. If it is from an Excluded sender, the trigger does not activate.
Excluded Addresses lists also affect data lookup commands that use %sender%, %recipient%, %senderalias% or %recipientalias% variables. If a trigger uses an Excluded list, these data lookup commands do not evaluate excluded email addresses.
Note: Excluded lists containing multiple items require special attention. For these lists, Web pages, files, or emails are only exempted if all listed items are detected. For example:
Available only for file and email address lists.
If a trigger has email addresses or top level file names in an Ignored list, these addresses and files are ignored by the trigger and cannot cause the trigger to activate. In effect, ignored item lists enable you to exempt specific files and email addresses from normal control trigger operations.
For example, a control trigger for outgoing emails blocks emails sent between the Research and Sales teams, but the Research manager is exempted from this rule and so added to the Ignored Addresses list. When the trigger detects emails sent by the Research manager to any member of the Sales team, the trigger infers that it must ignore the email and does not activate.
Ignored Addresses lists also affect data lookup commands that use %sender%, %recipient%, %senderalias% or %recipientalias% variables. If a trigger uses an Ignored list, these data lookup commands do not evaluate ignored email addresses.
Note: CA Data Protection disregards the Ignored list if the Included list is set to '*' (the * wildcard equates to 'include everything').
Copyright © 2015 CA Technologies.
All rights reserved.
|
|