IBM AH0QXML User Guide - Page 113

Index

Page 113 highlights

Index Symbols $DNSBLSites field 35 A Active address harvesting attacks 37, 62 ActiveState PureMessage 95 Address harvesting 8 Address munging 10 Address obfuscation 10 Allow connection from a host 41 Allowing connections from a spefici address or domain 43 Allowing mail to recipients 38 Allowing relaying 55 Allowing relaying off your server for authenticated users 59 Altering e-mail addresses 9 Alternate Internet address 38 Anti-spam architecture 17 Anti-spam campaign 15 analyzing existing configuration 15 prioritizing 15 strategy 15 time allocation 15 Anti-spam features 19 configured by the end-user 25 configured on the server 24 employed by the Router 23 employed by the SMTP Listener 21, 32 finding solutions to different problems 25 location to implement 18 Anti-spam mail file rules 71 Anti-spam measures dividing between server tasks 20 dividing between servers 18 dividing control between administrators and end-users 23 Anti-spam products for Notes and Domino 82 Anti-spam server & gateway products & services 94 Anti-spam strategy labor estimates 15 Avoiding harvesting 9 B Blocking spam 12 Bots 8 BrightMail Anti-Spam 94 C Characteristics of a spam e-mail 67 Closing the relay 54 Communicating with users about spam 11 Confusing the harvesters 10 Controlling connections from spammers 32 Controlling delivery of spam 45 Creating a new mail file rule 69 Creating a new server mail rule 47 D Dead mail 30 Defending against active attacks 63 Denial of Service attack 62 Denying connection from a host 41 Denying connections from a spefici address or domain 43 Denying mail to recipients 38 Denying relaying off your server 55 Detecting spam essential fields 30 Detecting spam messages 30 Different categories of spam 2 Direct SMTP RCPT TO harvesting 62 Disable routing mail to groups 39 Disabling routing mail to groups 25 DNS Blacklist 13, 32, 54 DNS Blacklist filters 24, 32 configuring 33 logging 35 rejecting messages 35 settings 34 statistics 35 tagging messages 35 DNSBL 33 DNSBL service providers 33 Domino 6 anti-spam configuration 23 on the server 24 © Copyright IBM Corp. 2003. All rights reserved. 101

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

© Copyright IBM Corp. 2003. All rights reserved.
101
Index
Symbols
$DNSBLSites field
35
A
Active address harvesting attacks
37, 62
ActiveState PureMessage
95
Address harvesting
8
Address munging
10
Address obfuscation
10
Allow connection from a host
41
Allowing connections from a spefici address or do-
main
43
Allowing mail to recipients
38
Allowing relaying
55
Allowing relaying off your server for authenticated
users
59
Altering e-mail addresses
9
Alternate Internet address
38
Anti-spam architecture
17
Anti-spam campaign
15
analyzing existing configuration
15
prioritizing
15
strategy
15
time allocation
15
Anti-spam features
19
configured by the end-user
25
configured on the server
24
employed by the Router
23
employed by the SMTP Listener
21, 32
finding solutions to different problems
25
location to implement
18
Anti-spam mail file rules
71
Anti-spam measures
dividing between server tasks
20
dividing between servers
18
dividing control between administrators and
end-users
23
Anti-spam products for Notes and Domino
82
Anti-spam server & gateway products & services
94
Anti-spam strategy
labor estimates
15
Avoiding harvesting
9
B
Blocking spam
12
Bots
8
BrightMail Anti-Spam
94
C
Characteristics of a spam e-mail
67
Closing the relay
54
Communicating with users about spam
11
Confusing the harvesters
10
Controlling connections from spammers
32
Controlling delivery of spam
45
Creating a new mail file rule
69
Creating a new server mail rule
47
D
Dead mail
30
Defending against active attacks
63
Denial of Service attack
62
Denying connection from a host
41
Denying connections from a spefici address or do-
main
43
Denying mail to recipients
38
Denying relaying off your server
55
Detecting spam
essential fields
30
Detecting spam messages
30
Different categories of spam
2
Direct SMTP RCPT TO harvesting
62
Disable routing mail to groups
39
Disabling routing mail to groups
25
DNS Blacklist
13, 32, 54
DNS Blacklist filters
24, 32
configuring
33
logging
35
rejecting messages
35
settings
34
statistics
35
tagging messages
35
DNSBL
33
DNSBL service providers
33
Domino 6 anti-spam configuration
23
on the server
24