Configuring E-mail Monitors
Complete the following procedures to configure E-mail Monitors. Configuration procedures are completed in CSM Administrator.
To configure E-mail Monitors:
- Configure E-mail and Event Monitor security rights: Configure who can access E-mail and Event Monitor functionality and data.
- Configure E-mail Monitor Behaviors: Configure Monitor Items that define how e-mails are processed (which actions to execute based on specified conditions).
- Configure Skip Item Rules: Configure rules for eliminating e-mails that should not be processed by the Monitor. This is always the first item in an E-mail Monitor and cannot be deleted.
- Configure Default Actions: Configure actions to execute if no other conditions in the list are found to be true. This is always the last item in an E-mail Monitor and cannot be deleted.
- Configure New Monitor Items: Configure additional items for processing e-mails according to organization needs.