IBM AH0QXML User Guide - Page 19

Preventing unwanted e-mail and spam

Page 19 highlights

2 Chapter2. Preventing unwanted e-mail and spam Many users and administrators will agree that unwanted e-mail and spam is a problem for them. Where they don't always agree is on what approach to take to circumvent this disruption. One philosophy is to stop spam before it reaches the user; this avoids wasting the user's time dealing with rules or managing it at all. At the extreme end of this spectrum, the risk of having spam arrive in the user's mailbox outweighs the potential for false positives and the undelivered (real) mail associated with that All mail is suspect and scrutinized by the server for point of origin and content. Any messages not measuring up are discarded. Another philosophy is to let everything in and have the user sort out what is spam and what is real. The admin adopts a laissez-faire approach at the server level. Point of origin and content are not scrutinized, but the users are given tools to deal with unwanted mail. Many environments use a blend of the two philosophies to achieve the optimum spam prevention for their organization, and what constitutes the best anti-spam campaign differs from one organization to another. In this chapter we discuss some basic spam avoidance techniques, and how to select the right approach in your environment. One highly effective way for your © Copyright IBM Corp. 2003. All rights reserved. 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

© Copyright IBM Corp. 2003. All rights reserved.
7
Preventing unwanted e-mail
and spam
Many users and administrators will agree that unwanted e-mail and spam is a
problem for them. Where they don't always agree is on what approach to take to
circumvent this disruption.
One philosophy is to stop spam before it reaches the user; this avoids wasting
the user's time dealing with rules or managing it at all. At the extreme end of this
spectrum, the risk of having spam arrive in the user's mailbox outweighs the
potential for false positives and the undelivered (real) mail associated with that -
All mail is suspect and scrutinized by the server for point of origin and content.
Any messages not measuring up are discarded.
Another philosophy is to let everything in and have the user sort out what is spam
and what is real. The admin adopts a laissez-faire approach at the server level.
Point of origin and content are not scrutinized, but the users are given tools to
deal with unwanted mail.
Many environments use a blend of the two philosophies to achieve the optimum
spam prevention for their organization, and what constitutes the best anti-spam
campaign differs from one organization to another.
In this chapter we discuss some basic spam avoidance techniques, and how to
select the right approach in your environment. One highly effective way for your
2