IBM AH0QXML User Guide - Page 115

Spam Prevention Service software, Redbooks Web site

Page 115 highlights

Mail policy 11 mail.box 20, 45 Mailto tags 10 Monitoring mail file rules 78 Monitoring your mail.box 64 Multiple actions is a single rule 70 munging 10 N Network diagram 19 Network topology example 19 Notes.ini 35 O Open relay 13, 32 P Peformance considerations 32 Personal mail account 9 Preventing spam 17, 19 approach 7 Public e-mail addresses 9 R RCPT TO envelope 36 Redbooks Web site 100 Contact us x Router 13, 20, 23, 45 S ScanMail for Lotus Notes with eManager 89 securiQ.Wall 88 Selecting the spam fighting approach 14 Separating legitimate e-mail from spam based on the content 31 Server mail rules 23, 25, 45 actions 50-52 configuration 46 creating a new rule 47 denying messages 51 enabling 45 examples 53 fields 48 holding messages 51 managing 52 quarantine 51 specifying actions 50 specifying conditions 49 Server side spam prevention features 13 SMTP communication sequence 22 SMTP error message for rejected messages 34 SMTP harvesting attacks 62 SMTP mail handling 20 SMTP mail routing 19 SMTP Server 21 SMTPExpandDNSBLStats variable 35 SMTPRelayAllowHostsandDomains setting 57 Solutions to common problems 26 spam 1 advertising 3 blocking 12 categories 2 characteristics of a spam e-mail 67 defintion 2 detecting 30 distinguishing from legitimate e-mail 66 effects 2 get-rich-quick schemes 3 hoax 3 logging 78 malicious 5 preventing 7 recipients 2 responding 11 using your server as a relay 54 spam avoidance by end user 14 infrom users 10 spam avoidance techniques 8 Spam mail bombing 62 Spam Prevention Service software 97 SpamEraser for Lotus Notes and Domino 6 85 spamJam for Lotus Notes and Domino 82 Specifying multiple DNS Blacklist sites to query 33 Spoofing 74 Stopping spam at gateway 13 at server 13 Stopping spam by the end-user 14 Strategies to fight spam 7, 14 T Tagging messages received from a blacklisted host 35 Third party anti-spam products 81-98 Index 103

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Index
103
Mail policy
11
mail.box
20, 45
Mailto tags
10
Monitoring mail file rules
78
Monitoring your mail.box
64
Multiple actions is a single rule
70
munging
10
N
Network diagram
19
Network topology example
19
Notes.ini
35
O
Open relay
13, 32
P
Peformance considerations
32
Personal mail account
9
Preventing spam
17, 19
approach
7
Public e-mail addresses
9
R
RCPT TO envelope
36
Redbooks Web site
100
Contact us
x
Router
13, 20, 23, 45
S
ScanMail for Lotus Notes with eManager
89
securiQ.Wall
88
Selecting the spam fighting approach
14
Separating legitimate e-mail from spam based on
the content
31
Server mail rules
23, 25, 45
actions
50
52
configuration
46
creating a new rule
47
denying messages
51
enabling
45
examples
53
fields
48
holding messages
51
managing
52
quarantine
51
specifying actions
50
specifying conditions
49
Server side spam prevention features
13
SMTP communication sequence
22
SMTP error message for rejected messages
34
SMTP harvesting attacks
62
SMTP mail handling
20
SMTP mail routing
19
SMTP Server
21
SMTPExpandDNSBLStats variable
35
SMTPRelayAllowHostsandDomains setting
57
Solutions to common problems
26
spam
1
advertising
3
blocking
12
categories
2
characteristics of a spam e-mail
67
defintion
2
detecting
30
distinguishing from legitimate e-mail
66
effects
2
get-rich-quick schemes
3
hoax
3
logging
78
malicious
5
preventing
7
recipients
2
responding
11
using your server as a relay
54
spam avoidance
by end user
14
infrom users
10
spam avoidance techniques
8
Spam mail bombing
62
Spam Prevention Service software
97
SpamEraser for Lotus Notes and Domino 6
85
spamJam for Lotus Notes and Domino
82
Specifying multiple DNS Blacklist sites to query
33
Spoofing
74
Stopping spam
at gateway
13
at server
13
Stopping spam by the end-user
14
Strategies to fight spam
7, 14
T
Tagging messages received from a blacklisted host
35
Third party anti-spam products
81
98