All triggers in the user policy can use lists of included, excluded, or ignored items. You specify which list is checked for matching items. Examples include lists of matching URLs, file names, email addresses, search text, and so on.
Included items are forbidden items. If a trigger uses an Included list, any single item in the list can activate the trigger. If a trigger fails to detect any items in the Included list, the trigger does not activate. For example, if a Web page capture trigger uses an Included URL list, any URL on this list triggers a capture when the user browses to it.
Included Addresses lists also affect data lookup commands that use %sender%, %recipient%, %senderalias% or %recipientalias% variables. If a trigger uses an Included list, these data lookup commands only evaluate included email addresses.