Encryption Services - Regular Expression Lists


Active encryption services, see Add Hosted Services.


Regular Expressions are another form of a Keyword/Dictionary list, but are more specific using formal language to identify specific characters, words, or patterns of characters. Typical list matching uses include; domain, credit cards, identification numbers (DLN, SSN), and document types. The secure mail gateway contains many of those lists that can be modified, but no new list may be added. As with a keyword list, the Regular Expression list must be selected as a match condition when creating or modifying a new policy to trigger mail encryption

This article will demonstrate how to modify a Regular Expression list.

1. In a web browser navigate to the ITSolutionsNow encrypted mail gateway:


2. Login using the administrative credentials supplied for the mail encryption services
Please note these credentials are not the same used to access email, and are unique to the client space. To request credentials either click the, "Forgot Password," link or email with the account holder name, domain name, and last four digits of the billing credit card.



3. After a successful login locate the policies section and click the link for List Policies.



4. On the subsequent page, Outbound Email Policies, click the link on the right side of the page Regular Expressions.



5. The list of Regular Expressions will be displayed in the center of the page. It is not recommended to modify any type of list containing a string of identifying characters such as a driver's license, or credit card number unless the admin has a good understanding of regular expressions. For this example, the list of images will be modified. Click the list Image Files, to continue.


6. The list specifications will be displayed. In this instance the image type, .PDF is to be added to the list of blocked files. Type the following to add PDF's to the list match conditions:


Click Save As to save the changes made to the Regular Expression list. Remember that any list must be included in policy to trigger encryption protocol.


7. New lists may be created after Step 4, by clicking on the New List button. However creating a new list requires intimate knowledge of both regular expression syntax, and the intended list functionality.




What Is Next?

Create Mail Policies,

Install The Outlook Encryption Add-In,

Mail Keywords & Conditionals.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request


  • 0
    Sean Williams

    Swiss watches are the a lot of acclaimed rolex Replica watches ones in the world. Abounding behemothic watch makers are based in Switzerland. Tag Heuer is just one of the abounding watch makers who leads appearance and accession in the world. Tag Heuer is abnormally acclaimed for its sports watches and chronographs. And it is aswell one of the a lot of fast developing affluence watch brands in Switzerland. Here is a archetypal Tag Heuer sports watch.Motorsport and comfortable watches allotment characteristic passions, abstruse accomplishment and in some affairs even specific development components.The aboriginal affair you can do is to attending for things which are awash calm with the timepiece. If it is an accurate piece, it accept to be awash with a assurance affidavit and a affidavit of origin. The apprenticeship rolex Replica uk advertisement is aswell things you charge to searching for. These three items are things you can see if the alarm is the absolute Vacheron Constantin.

Please sign in to leave a comment.