IBM AH0QXML User Guide - Page 24
How to block spam, address origin when it reaches the organization's entry point.
![]() |
View all IBM AH0QXML manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 24 highlights
Here is an example of a spam information message that you can modify and send to your users: Dear users, The Information Systems department is interested in reducing the amount of unsolicited commercial e-mail (aka spam) delivered to our organization. We would also like to find out whether spam is a concern for you, as this will help us determine the best approach to take when configuring our systems to reject spam. How to Avoid Spam The best way for us not to receive spam is to prevent our e-mail addresses from being gathered by those that send spam. Here are some ways that you can help: - Never respond in any way to unsolicited commercial e-mail. Responding can make your address a target for more spam - this includes any "opt out" links which are often used just to verify that yours is a valid address. - Avoid giving out your e-mail address on Web sites or discussions. Consider using a personal e-mail address or a free e-mail address for non-work-related correspondence. - Disregard chain letters or other spam that encourages you to send messages to others. - If you send mail to several external users, consider putting the addresses in the "bcc" field so that all of the addresses are not visible. If you are careful and avoid having your address get on the spam lists you can avoid having spam delivered to our organization. Sincerely, Your Domino Administrator 2.2 How to block spam If spammers manage to get your users' addresses, you may need to select an approach that configures your systems to block spam. As previously mentioned, there are two major philosophies when it comes to dealing with spam. The "gateway" approach forestalls spam by rejecting it based on either content or address origin when it reaches the organization's entry point. The "user" approach delivers all mail, even spam, and provides tools to the user so that the user can decide what is spam and what is mail. These approaches are not mutually exclusive, and the "right" approach depends entirely on your organization and your users. You will want to engage some server-based spam 12 Lotus Domino 6 spam Survival Guide for IBM eServer
![](/manual_guide/products/ibm-ah0qxml-user-guide-c7a8df4/24.png)