IBM AH0QXML User Guide - Page 95

Dump and log databases, non-spam and provides spam analysis features.

Page 95 highlights

Figure 6-1 Spam destination and logging configuration Figure 6-1 shows a few of the configuration options available to administrators and users. In particular, it shows the Disposition tab from within a spamJam Master Configuration. The Disposition settings allow administrators to configure how spamJam will handle mail that has been determined to be spam. Dump and log databases With spamJam, administrators track and view spam via log and dump databases. The log database contains a listing of all incoming mail (spam and non-spam) and provides spam analysis features. Figure 6-2 A view of a spamJam log database showing rejected messages The log database (see Figure 6-2) contains a listing of the user's spam, from which any rejected e-mail can be recovered to the user's mail file. The spam messages are categorized by the reason they were rejected. Alternatively, spam Chapter 6. Third party anti-spam products 83

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Chapter 6. Third party anti-spam products
83
Figure 6-1
Spam destination and logging configuration
Figure 6-1 shows a few of the configuration options available to administrators
and users. In particular, it shows the Disposition tab from within a spamJam
Master Configuration. The Disposition settings allow administrators to configure
how spamJam will handle mail that has been determined to be spam.
Dump and log databases
With spamJam, administrators track and view spam via log and dump
databases. The log database contains a listing of all incoming mail (spam and
non-spam) and provides spam analysis features.
Figure 6-2
A view of a spamJam log database showing rejected messages
The log database (see Figure 6-2) contains a listing of the user's spam, from
which any rejected e-mail can be recovered to the user's mail file. The spam
messages are categorized by the reason they were rejected. Alternatively, spam