Configuring E-mail Monitors

Complete the following procedures to configure E-mail Monitors. Configuration procedures are completed in CSM Administrator.

To configure E-mail Monitors:

  1. Configure E-mail and Event Monitor security rights: Configure who can access E-mail and Event Monitor functionality and data.
  2. Configure E-mail Monitor Behaviors: Configure Monitor Items that define how e-mails are processed (which actions to execute based on specified conditions).
    1. Configure Skip Item Rules: Configure rules for eliminating e-mails that should not be processed by the Monitor. This is always the first item in an E-mail Monitor and cannot be deleted.
    2. Configure Default Actions: Configure actions to execute if no other conditions in the list are found to be true. This is always the last item in an E-mail Monitor and cannot be deleted.
    3. Configure New Monitor Items: Configure additional items for processing e-mails according to organization needs.
© Copyright 2018 Cherwell Software, LLC. All rights reserved.