IBM AH0QXML User Guide - Page 114

InterScan Messaging Security Suite, Incoming SMTP mail

Page 114 highlights

Domino 6 messaging components 20 Domino messaging environment 18 Domino network 19 Domino Server anti-spam configuration features 24 E End-users 65 Excluding connecting hosts from anti-relay checks 59 Exemplary spam information message to end-users 12 External servers 18 F Fake virus warnings 4 False positives 7 avoiding 66 Fields in a SMTP mail 30 H Harvesting 37 active attacks 62 avoiding 9 defending against attacks 63 Listserv 9 mailto tags 10 passive attacks 8 recommended defensive measures 64 Usenet 8 Web 8 Held mail 30 Hoax 3 Holding undeliverable mail 62 I Inbound Connection Controls fields 42 Inbound connection controls 24, 41 configuration 41 Inbound Intended Recipients Controls 36 Inbound relay configuration example 58 Inbound relay controls 24, 54 configuration 57 configuring 55 managing conflicts 56 settings 55 Inbound relay enforcement 59 configuration 60 excluding hosts from anti-relay checks 59 Inbound sender controls 24, 42 configuration 43 fields 43 Incoming SMTP mail 20 iNotes Web Access 39 Internal servers 18 InterScan Messaging Security Suite 97 J Journaling 50 K Key messaging components in Domino 20 L Legitimate e-mail 66 Limiting number of recipients in a mail 39 Listener 20, 32 Log 15, 78 M Mail file rules 25, 65, 68 acting based on the content 75 actions 70 anti-spam rules 71 conditions 69 deleting mail 70 denying mail from certain addresses 73 denying mail from certain domains 74 denying self-mail 74 evaluation sequence 77 isolating mail 70 logging 78 monitoring 78 multiple actions 70 new rule 69 performance considerations 68 running in the Notes Client 68 running on the Server 68 setting up 68 troubleshooting 79 types 71-72 unacceptable subject content 75 viewing 77 102 Lotus Domino 6 spam Survival Guide for IBM eServer

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

102
Lotus Domino 6 spam Survival Guide for IBM eServer
Domino 6 messaging components
20
Domino messaging environment
18
Domino network
19
Domino Server anti-spam configuration features
24
E
End-users
65
Excluding connecting hosts from anti-relay checks
59
Exemplary spam information message to end-users
12
External servers
18
F
Fake virus warnings
4
False positives
7
avoiding
66
Fields in a SMTP mail
30
H
Harvesting
37
active attacks
62
avoiding
9
defending against attacks
63
Listserv
9
mailto tags
10
passive attacks
8
recommended defensive measures
64
Usenet
8
Web
8
Held mail
30
Hoax
3
Holding undeliverable mail
62
I
Inbound Connection Controls
fields
42
Inbound connection controls
24, 41
configuration
41
Inbound Intended Recipients Controls
36
Inbound relay configuration
example
58
Inbound relay controls
24, 54
configuration
57
configuring
55
managing conflicts
56
settings
55
Inbound relay enforcement
59
configuration
60
excluding hosts from anti-relay checks
59
Inbound sender controls
24, 42
configuration
43
fields
43
Incoming SMTP mail
20
iNotes Web Access
39
Internal servers
18
InterScan Messaging Security Suite
97
J
Journaling
50
K
Key messaging components in Domino
20
L
Legitimate e-mail
66
Limiting number of recipients in a mail
39
Listener
20, 32
Log
15, 78
M
Mail file rules
25, 65, 68
acting based on the content
75
actions
70
anti-spam rules
71
conditions
69
deleting mail
70
denying mail from certain addresses
73
denying mail from certain domains
74
denying self-mail
74
evaluation sequence
77
isolating mail
70
logging
78
monitoring
78
multiple actions
70
new rule
69
performance considerations
68
running in the Notes Client
68
running on the Server
68
setting up
68
troubleshooting
79
types
71
72
unacceptable subject content
75
viewing
77