IBM AH0QXML User Guide - Page 6

SpamEraser for Lotus Notes and Domino 6 .. 85, BrightMail Anti-Spam 4.0 from BrightMail, Inc.94

Page 6 highlights

4.2.2 Inbound Intended Recipients Controls 36 4.2.3 Disable routing mail to groups 39 4.2.4 Inbound connection controls 41 4.2.5 Inbound sender controls 42 4.3 Controlling delivery of spam 45 4.3.1 Server mail rules 45 4.4 Controlling use of your server as a relay 54 4.4.1 Inbound relay controls 54 4.4.2 Inbound relay enforcement 59 4.5 Protecting your Domino server from active address harvesting attacks . . 62 4.5.1 SMTP harvesting attacks 62 4.5.2 Spam mail bombing 62 4.5.3 Direct SMTP RCPT TO harvesting 62 4.5.4 Defending against active attacks 63 Chapter 5. Using mail file rules to prevent spam 65 5.1 Distinguishing between spam and legitimate e-mail 66 5.2 Mail file rules 68 5.2.1 Setting up mail file rules 68 5.2.2 Developing anti-spam mail file rules 71 5.2.3 Viewing mail rules and the evaluation sequence 77 5.2.4 Monitoring mail file rules 78 Chapter 6. Third party anti-spam products 81 6.1 Anti-spam products for Notes and Domino 82 6.1.1 spamJam for Lotus Notes and Domino 82 6.1.2 SpamEraser for Lotus Notes and Domino 6 85 6.1.3 iQ.Suite 88 6.1.4 ScanMail for Lotus Notes with eManager 89 6.1.5 XM SpamStop 92 6.1.6 Other anti-spam products for Notes and Domino 94 6.2 Anti-spam server and gateway products and services 94 6.2.1 BrightMail Anti-Spam 4.0 from BrightMail, Inc 94 6.2.2 ActiveState PureMessage 95 6.2.3 Trend Micro Inc. products 97 6.2.4 Other anti-spam server or gateway products and services 98 Related publications 99 IBM Redbooks 99 Referenced Web sites 99 How to get IBM Redbooks 100 IBM Redbooks collections 100 Index 101 iv Lotus Domino 6 spam Survival Guide for IBM eServer

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

iv
Lotus Domino 6 spam Survival Guide for IBM eServer
4.2.2
Inbound Intended Recipients Controls . . . . . . . . . . . . . . . . . . . . . . . 36
4.2.3
Disable routing mail to groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.2.4
Inbound connection controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.2.5
Inbound sender controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.3
Controlling delivery of spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
4.3.1
Server mail rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
4.4
Controlling use of your server as a relay. . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.4.1
Inbound relay controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.4.2
Inbound relay enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.5
Protecting your Domino server from active address harvesting attacks . . 62
4.5.1
SMTP harvesting attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.5.2
Spam mail bombing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.5.3
Direct SMTP RCPT TO harvesting . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.5.4
Defending against active attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Chapter 5.
Using mail file rules to prevent spam
. . . . . . . . . . . . . . . . . . . . 65
5.1
Distinguishing between spam and legitimate e-mail . . . . . . . . . . . . . . . . . 66
5.2
Mail file rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
5.2.1
Setting up mail file rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
5.2.2
Developing anti-spam mail file rules . . . . . . . . . . . . . . . . . . . . . . . . . 71
5.2.3
Viewing mail rules and the evaluation sequence . . . . . . . . . . . . . . . 77
5.2.4
Monitoring mail file rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Chapter 6.
Third party anti-spam products
. . . . . . . . . . . . . . . . . . . . . . . . . 81
6.1
Anti-spam products for Notes and Domino . . . . . . . . . . . . . . . . . . . . . . . . 82
6.1.1
spamJam for Lotus Notes and Domino. . . . . . . . . . . . . . . . . . . . . . . 82
6.1.2
SpamEraser for Lotus Notes and Domino 6 . . . . . . . . . . . . . . . . . . . 85
6.1.3
iQ.Suite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
6.1.4
ScanMail for Lotus Notes with eManager . . . . . . . . . . . . . . . . . . . . . 89
6.1.5
XM SpamStop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
6.1.6
Other anti-spam products for Notes and Domino . . . . . . . . . . . . . . . 94
6.2
Anti-spam server and gateway products and services . . . . . . . . . . . . . . . 94
6.2.1
BrightMail Anti-Spam 4.0 from BrightMail, Inc. . . . . . . . . . . . . . . . . . 94
6.2.2
ActiveState PureMessage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
6.2.3
Trend Micro Inc. products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
6.2.4
Other anti-spam server or gateway products and services . . . . . . . . 98
Related publications
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Referenced Web sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
IBM Redbooks collections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Index
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101