Symantec 10490452 Administration Guide - Page 97
About Allowed and Blocked Senders Lists, Reasons to use Allowed and Blocked Senders
UPC - 037648265683
View all Symantec 10490452 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 97 highlights
Configuring email filtering 97 Managing Email Firewall policies About Allowed and Blocked Senders Lists Note the following about the Allowed Senders Lists and Blocked Senders Lists: ■ Duplicate entries: You cannot have the exact same entry in both a Blocked Senders List and an Allowed Senders List of the same type. If an entry already exists in one list, you will receive the message "Duplicate sender - not added" when you try to add the same entry to the other list. If you'd prefer to have this entry in the other list, first delete the entry from the list that now contains it, then add it to the other list. ■ Similar entries: If you have two entries such as [email protected] and *@b.com in the two different lists, the list with higher precedence "wins." See "About precedence" on page 71 for the precedence of each list. ■ Performance impact of third party DNS lists: Incorporating third party lists adds additional steps to the filtering process. For example, in a DNS list scenario, for each incoming message, the IP address of the sending mail server is queried against the list, similar to a DNS query. If the sending mail server is on the list, the mail is flagged as spam. If your mail volume is sufficiently high, running incoming mail through a third party database could hamper performance because of the requisite DNS lookups. Symantec recommends that you use the Sender Reputation Service lists instead of enabling third party lists. ■ To understand which list or other verdict has priority in message filtering when more than one applies, see "About precedence" on page 71. Table 4-11 Reasons to use Allowed and Blocked Senders Table 4-11 provides some examples of why you would employ lists of allowed or blocked senders. The table also lists an example of a pattern that you as the system administrator might use to match the sender: Use cases for lists of allowed and blocked senders Problem Solution Pattern example Mail from an end-user's colleague is occasionally flagged as spam. Desired newsletter from a mailing list is occasionally flagged as spam. Add a colleague's email address to the end [email protected] user's Allowed Senders List. Add the domain name used by the newsletter to the domain-based Allowed Senders List. newsletter.com