IBM AH0QXML User Guide - Page 90

Monitoring mail file rules, Don't accept message

Page 90 highlights

Attention: All rules are always evaluated with every message. This means that the rule execution is not stopped if one or more rules are applied to a message. Consider an example where a message is received from an acceptable address and a rule files it to a folder. Another rule with the action Don't accept message, which is later in the evaluation sequence, then finds unacceptable words in the subject. The message is deleted. Plan your rules appropriately and use the Don't accept message action very carefully. 5.2.4 Monitoring mail file rules Depending on the type of mail rules you set up, monitoring their success and effectiveness can be as simple as looking at what is in your different folders, or as difficult as searching the notes logs and interpreting whether or not a spammer tried to send you something. If you are using a mail file rule that doesn't accept mail from a certain address or domain, then to tell if it is working, you would need to search the Domino Server Log database on your mail server in the view Mail Routing Events. To make your search easier, you may want to Full-Text Index the database. From the View menu, select Search This View to access the search bar and enter the address you want to search for. Figure 5-10 Searching the Domino Server Log - Mail Routing Events In Figure 5-10 we are searching for an address that we are denying mail from in a mail file rule. Since we have not received mail from this address since setting up the rule, we are searching to see if the spammer has tried to send us any e-mail since that time. The log entry itself is show in Figure 5-11. Figure 5-11 Mail Routing Events log entry 78 Lotus Domino 6 spam Survival Guide for IBM eServer

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

78
Lotus Domino 6 spam Survival Guide for IBM eServer
5.2.4
Monitoring mail file rules
Depending on the type of mail rules you set up, monitoring their success and
effectiveness can be as simple as looking at what is in your different folders, or as
difficult as searching the notes logs and interpreting whether or not a spammer
tried to send you something.
If you are using a mail file rule that doesn
t accept mail from a certain address or
domain, then to tell if it is working, you would need to search the Domino Server
Log database on your mail server in the view Mail Routing Events. To make your
search easier, you may want to Full-Text Index the database. From the View
menu, select Search This View to access the search bar and enter the address
you want to search for.
Figure 5-10
Searching the Domino Server Log - Mail Routing Events
In Figure 5-10 we are searching for an address that we are denying mail from in
a mail file rule. Since we have not received mail from this address since setting
up the rule, we are searching to see if the spammer has tried to send us any
e-mail since that time. The log entry itself is show in Figure 5-11.
Figure 5-11
Mail Routing Events log entry
Attention:
All rules are always evaluated with every message. This means
that the rule execution is not stopped if one or more rules are applied to a
message. Consider an example where a message is received from an
acceptable address and a rule files it to a folder. Another rule with the action
Don’t accept message
, which is later in the evaluation sequence, then finds
unacceptable words in the subject. The message is deleted.
Plan your rules appropriately and use the
Don't accept message
action very
carefully.