IBM AH0QXML User Guide - Page 37

User configuration features, 3.4 Common problems and solutions

Page 37 highlights

this checking by specifying the hostname or IP address in an exclusion list. In previous versions of Domino, when you implemented Relay controls your POP or IMAP users were often prohibited from using Domino as a relay. Enhancements made in this area now allow you to provide your authenticated users with the ability to relay off the Domino server and not require relay control checking. Although not documented to be a spam deterrent, a new notes.ini variable can be used to disable routing internet mail to groups. By enabling RouterDisableMailToGroups=1, Internet messages sent to a group defined in your Domino Directory will be failed. Server Mail Rules are new to Domino 6. Similar to mail file rules implemented with the Notes client for a individual user in Release 5, server mail rules can be configured to act on specific messages upon entry into your Domino environment. You may choose to filter messages based on content, the number of attachments, the type of attachments, the number of recipients, and many other criteria. Messages containing questionable or offensive content can be examined and moved to a quarantine database for further analysis. 3.3.2 User configuration features Mail file rules allow the individual end-user to isolate messages by sender address, domain, subject, or even by message body content. When creating anti-spam mail file rules with the Notes client, end users can be specific and even aggressive when defining the rules. End user can specify which actions are taken on the identified spam messages, whether they want to file the messages for further inspections and actions, or simple get rid of the unwanted messages. Building anti-spam mail file rules should be seen as an additional measure in the overall solution to the spam problem. Although configured by the end users with their Notes client, mail file rules are enforced on the Domino server. Therefore, they do use some server processing power, and having a large number of mail file rules or several rules per user might have a performance impact on the server. Because of this, your anti-spam campaign needs to be well planned, and adequate direction on how to use mail file rules should be provided for the end users. 3.4 Common problems and solutions A numbers of features are available to help you manage common messaging and e-mail problems. Each feature is particularly well suited to one or several specific kinds of problems. The correspondence between some common problems and the most appropriate features for solving them are shown in Table 3-1. Details for the techniques identified are in the following text. Chapter 3. Domino 6 anti-spam architecture 25

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Chapter 3. Domino 6 anti-spam architecture
25
this checking by specifying the hostname or IP address in an exclusion list. In
previous versions of Domino, when you implemented Relay controls your POP or
IMAP users were often prohibited from using Domino as a relay. Enhancements
made in this area now allow you to provide your authenticated users with the
ability to relay off the Domino server and not require relay control checking.
Although not documented to be a spam deterrent, a new notes.ini variable can
be used to disable routing internet mail to groups. By enabling
RouterDisableMailToGroups=1
, Internet messages sent to a group defined in
your Domino Directory will be failed.
Server Mail Rules
are new to Domino 6. Similar to mail file rules implemented
with the Notes client for a individual user in Release 5, server mail rules can be
configured to act on specific messages upon entry into your Domino
environment. You may choose to filter messages based on content, the number
of attachments, the type of attachments, the number of recipients, and many
other criteria. Messages containing questionable or offensive content can be
examined and moved to a quarantine database for further analysis.
3.3.2
User configuration features
Mail file rules allow the individual end-user to isolate messages by sender
address, domain, subject, or even by message body content. When creating
anti-spam mail file rules with the Notes client, end users can be specific and even
aggressive when defining the rules. End user can specify which actions are taken
on the identified spam messages, whether they want to file the messages for
further inspections and actions, or simple get rid of the unwanted messages.
Building anti-spam mail file rules should be seen as an additional measure in the
overall solution to the spam problem. Although configured by the end users with
their Notes client, mail file rules are enforced on the Domino server. Therefore,
they do use some server processing power, and having a large number of mail
file rules or several rules per user might have a performance impact on the
server. Because of this, your anti-spam campaign needs to be well planned, and
adequate direction on how to use mail file rules should be provided for the end
users.
3.4
Common problems and solutions
A numbers of features are available to help you manage common messaging and
e-mail problems. Each feature is particularly well suited to one or several specific
kinds of problems. The correspondence between some common problems and
the most appropriate features for solving them are shown in Table 3-1. Details for
the techniques identified are in the following text.