Symantec 10490452 Administration Guide - Page 98

How Symantec Mail Security for SMTP identifies senders and connections

Page 98 highlights

98 Configuring email filtering Managing Email Firewall policies Table 4-11 Use cases for lists of allowed and blocked senders (Continued) Problem Solution Pattern example An individual is sending unwanted mail to people in your organization. Add the specific email address to the domain-based Blocked Senders List. Joe.unwanted*@getmail.com Numerous people from a specific range of IP addresses are sending unsolicited mail to people in your organization. After analyzing the received headers to determine the sender's network and IP address, add the IP address and net mask to the IP-based Blocked Senders List. 218.187.0.0/255.255.0.0 How Symantec Mail Security for SMTP identifies senders and connections The following sections provide details about the Allowed Senders Lists and Blocked Senders Lists. Supported Methods for Identifying Senders You can use the following methods to identify senders for your Allowed Senders Lists and Blocked Senders Lists. ■ Domain-based: specify sender addresses or domain names Symantec Mail Security for SMTP checks the following characteristics of incoming mail against those in your lists: ■ MAIL FROM: address in the SMTP envelope. Specify a pattern that matches the value for localpart@domain in the address. You can use the * or ? wildcards in the pattern to match any portion of the address. ■ From: address in the message headers. Specify a pattern that matches the value for localpart@domain in the From: header. You can use wildcards in the pattern to match any portion of this value. If you choose to identify messages by address or domain name, see Table 412 for examples. Table 4-12 Matches for email addresses or domain names Example Sample matches example.com [email protected], [email protected], [email protected] [email protected] [email protected] sara*@example.org [email protected], [email protected] [email protected] [email protected], [email protected]

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

98
Configuring email filtering
Managing Email Firewall policies
How Symantec Mail Security for SMTP identifies senders and
connections
The following sections provide details about the Allowed Senders Lists and
Blocked Senders Lists.
Supported Methods for Identifying Senders
You can use the following methods to identify senders for your Allowed Senders
Lists and Blocked Senders Lists.
Domain-based: specify sender addresses or domain names
Symantec Mail Security for SMTP checks the following characteristics of
incoming mail against those in your lists:
MAIL FROM: address in the SMTP envelope. Specify a pattern that
matches the value for localpart@domain in the address. You can use
the * or ? wildcards in the pattern to match any portion of the address.
From:
address in the message headers. Specify a pattern that matches
the value for localpart@domain in the
From:
header. You can use
wildcards in the pattern to match any portion of this value.
If you choose to identify messages by address or domain name, see
Table 4-
12
for examples.
An individual is sending
unwanted mail to people in
your organization.
Add the specific email address to the
domain-based Blocked Senders List.
Joe.unwanted*@getmail.com
Numerous people from a
specific range of IP addresses
are sending unsolicited mail to
people in your organization.
After analyzing the received headers to
determine the sender's network and IP
address, add the IP address and net mask to
the IP-based Blocked Senders List.
218.187.0.0/255.255.0.0
Table 4-11
Use cases for lists of allowed and blocked senders (Continued)
Problem
Solution
Pattern example
Table 4-12
Matches for email addresses or domain names
Example
Sample matches
example.com
sara*@example.org