Symantec 10490452 Administration Guide - Page 97

About Allowed and Blocked Senders Lists, Reasons to use Allowed and Blocked Senders

Page 97 highlights

Configuring email filtering 97 Managing Email Firewall policies About Allowed and Blocked Senders Lists Note the following about the Allowed Senders Lists and Blocked Senders Lists: ■ Duplicate entries: You cannot have the exact same entry in both a Blocked Senders List and an Allowed Senders List of the same type. If an entry already exists in one list, you will receive the message "Duplicate sender - not added" when you try to add the same entry to the other list. If you'd prefer to have this entry in the other list, first delete the entry from the list that now contains it, then add it to the other list. ■ Similar entries: If you have two entries such as [email protected] and *@b.com in the two different lists, the list with higher precedence "wins." See "About precedence" on page 71 for the precedence of each list. ■ Performance impact of third party DNS lists: Incorporating third party lists adds additional steps to the filtering process. For example, in a DNS list scenario, for each incoming message, the IP address of the sending mail server is queried against the list, similar to a DNS query. If the sending mail server is on the list, the mail is flagged as spam. If your mail volume is sufficiently high, running incoming mail through a third party database could hamper performance because of the requisite DNS lookups. Symantec recommends that you use the Sender Reputation Service lists instead of enabling third party lists. ■ To understand which list or other verdict has priority in message filtering when more than one applies, see "About precedence" on page 71. Table 4-11 Reasons to use Allowed and Blocked Senders Table 4-11 provides some examples of why you would employ lists of allowed or blocked senders. The table also lists an example of a pattern that you as the system administrator might use to match the sender: Use cases for lists of allowed and blocked senders Problem Solution Pattern example Mail from an end-user's colleague is occasionally flagged as spam. Desired newsletter from a mailing list is occasionally flagged as spam. Add a colleague's email address to the end [email protected] user's Allowed Senders List. Add the domain name used by the newsletter to the domain-based Allowed Senders List. newsletter.com

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

97
Configuring email filtering
Managing Email Firewall policies
About Allowed and Blocked Senders Lists
Note the following about the Allowed Senders Lists and Blocked Senders Lists:
Duplicate entries:
You cannot have the exact same entry in both a Blocked Senders List and an
Allowed Senders List of the same type. If an entry already exists in one list,
you will receive the message “Duplicate sender - not added” when you try to
add the same entry to the other list. If you’d prefer to have this entry in the
other list, first delete the entry from the list that now contains it, then add it
to the other list.
Similar entries:
If you have two entries such as [email protected] and *@b.com in the two different
lists, the list with higher precedence “wins.” See
“About precedence”
on
page 71 for the precedence of each list.
Performance impact of third party DNS lists:
Incorporating third party lists adds additional steps to the filtering process.
For example, in a DNS list scenario, for each incoming message, the IP
address of the sending mail server is queried against the list, similar to a
DNS query. If the sending mail server is on the list, the mail is flagged as
spam. If your mail volume is sufficiently high, running incoming mail
through a third party database could hamper performance because of the
requisite DNS lookups. Symantec recommends that you use the Sender
Reputation Service lists instead of enabling third party lists.
To understand which list or other verdict has priority in message filtering
when more than one applies, see
“About precedence”
on page 71.
Reasons to use Allowed and Blocked Senders
Table 4-11
provides some examples of why you would employ lists of allowed or
blocked senders. The table also lists an example of a pattern that you as the
system administrator might use to match the sender:
Table 4-11
Use cases for lists of allowed and blocked senders
Problem
Solution
Pattern example
Mail from an end-user’s
colleague is occasionally
flagged as spam.
Add a colleague’s email address to the end
user’s Allowed Senders List.
Desired newsletter from a
mailing list is occasionally
flagged as spam.
Add the domain name used by the
newsletter to the domain-based Allowed
Senders List.
newsletter.com