IBM AH0QXML User Guide - Page 83

Developing anti-spam mail file rules, Denying e-mail from certain domains

Page 83 highlights

procedures. In this way spam can be dealt with quickly without losing control of your e-mail. 5.2.2 Developing anti-spam mail file rules In order to develop rules for your e-mail, you should first determine what type of rules you want to create and how restrictive you want to be. By creating rules that eliminate e-mail from known spamming sources and rules that file suspicious e-mail based on content, you can start to rid your inbox of most of the unwanted mail. You can also set up rules for acceptable mail from known acceptable addresses and domains that can be sequenced before any content checking takes place. This will ensure that e-mail from those sources will not be filed in your suspicious folder as a false-positive. As an administrator, you should also look to incorporate rules that users may have in their individual mail files that would eliminate spam for the whole organization if implemented as server mail rules. Since some users want to receive mail that other users don't, however, the mail file rules are an effective way to alleviate conflicts over which domains and addresses to block at an organizational level. In our examples we include several types of rules, in the following order: Denying e-mail from certain addresses Denying e-mail from certain domains Denying self-mail (spoofed "from" your own address) Filing e-mail with unacceptable subject content Filing e-mail with unacceptable body content Filing acceptable addresses and domains Table 5-1 shows the different types of rules, listed with the relative effectiveness of each as an anti-spam method and the general performance cost. This may help you in deciding which types of rules to create and how many of each type: Chapter 5. Using mail file rules to prevent spam 71

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Chapter 5. Using mail file rules to prevent spam
71
procedures. In this way spam can be dealt with quickly without losing control of
your e-mail.
5.2.2
Developing anti-spam mail file rules
In order to develop rules for your e-mail, you should first determine what type of
rules you want to create and how restrictive you want to be. By creating rules that
eliminate e-mail from known spamming sources and rules that file suspicious
e-mail based on content, you can start to rid your inbox of most of the unwanted
mail. You can also set up rules for acceptable mail from known acceptable
addresses and domains that can be sequenced before any content checking
takes place. This will ensure that e-mail from those sources will not be filed in
your suspicious folder as a false-positive.
As an administrator, you should also look to incorporate rules that users may
have in their individual mail files that would eliminate spam for the whole
organization if implemented as server mail rules. Since some users want to
receive mail that other users don
t, however, the mail file rules are an effective
way to alleviate conflicts over which domains and addresses to block at an
organizational level.
In our examples we include several types of rules, in the following order:
±
Denying e-mail from certain addresses
±
Denying e-mail from certain domains
±
Denying self-mail (spoofed
from
your own address)
±
Filing e-mail with unacceptable subject content
±
Filing e-mail with unacceptable body content
±
Filing acceptable addresses and domains
Table 5-1 shows the different types of rules, listed with the relative effectiveness
of each as an anti-spam method and the general performance cost. This may
help you in deciding which types of rules to create and how many of each type: