Symantec 10744983 Administration Guide - Page 110

About Allowed and Blocked Senders Lists, Duplicate entries, Similar entries

Page 110 highlights

110 Configuring email filtering Managing Email Firewall policies Incorporate lists managed by other parties Third parties compile and manage lists of desirable or undesirable IP addresses. These lists are queried using DNS lookups. When you configure Symantec Mail Security to use a third-party sender list, Symantec Mail Security checks whether the sending mail server is on the list. If so, Symantec Mail Security performs a configured action, based on the policies in place. About Allowed and Blocked Senders Lists The following sections provide important information about the Allowed Senders Lists and Blocked Senders Lists. Duplicate entries You cannot have the exact same entry in both a Blocked Senders List and an Allowed Senders List. If an entry already exists in one list, you will receive the message "Duplicate sender - not added" when you try to add the same entry to the other list. If you'd prefer to have this entry in the other list, first delete the entry from the list that now contains it, then add it to the other list. Similar entries If you have two entries such as [email protected] and *@b.com in the two different lists, the list with higher precedence "wins." See "About precedence" on page 83. Performance impact of third party DNS lists Incorporating third party lists adds additional steps to the filtering process. For example, in a DNS list scenario, for each incoming message, the IP address of the sending mail server is queried against the list, similar to a DNS query. If the sending mail server is on the list, the mail is flagged as spam. If your mail volume is sufficiently high, running incoming mail through a third party database could hamper performance because of the requisite DNS lookups. Symantec recommends that you use the Sender Reputation Service lists instead of enabling third party lists. Reasons to allow or block senders Table 4-11 describes why you would employ lists of allowed or blocked senders and lists an example of a pattern that you as the system administrator might use to match the sender:

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

Third parties compile and manage lists of desirable or undesirable
IP addresses. These lists are queried using DNS lookups. When you
configure Symantec Mail Security to use a third-party sender list,
Symantec Mail Security checks whether the sending mail server is
on the list. If so, Symantec Mail Security performs a configured
action, based on the policies in place.
Incorporate lists
managed by other
parties
About Allowed and Blocked Senders Lists
The following sections provide important information about the Allowed Senders
Lists and Blocked Senders Lists.
Duplicate entries
You cannot have the exact same entry in both a Blocked Senders List and an
Allowed Senders List. If an entry already exists in one list, you will receive the
message “Duplicate sender - not added” when you try to add the same entry to
the other list. If you'd prefer to have this entry in the other list, first delete the
entry from the list that now contains it, then add it to the other list.
Similar entries
If you have two entries such as [email protected] and *@b.com in the two different lists,
the list with higher precedence “wins.”
See
“About precedence”
on page 83.
Performance impact of third party DNS lists
Incorporating third party lists adds additional steps to the filtering process. For
example, in a DNS list scenario, for each incoming message, the IP address of the
sending mail server is queried against the list, similar to a DNS query. If the
sending mail server is on the list, the mail is flagged as spam. If your mail volume
is sufficiently high, running incoming mail through a third party database could
hamper performance because of the requisite DNS lookups. Symantec recommends
that you use the Sender Reputation Service lists instead of enabling third party
lists.
Reasons to allow or block senders
Table 4-11
describes why you would employ lists of allowed or blocked senders
and lists an example of a pattern that you as the system administrator might use
to match the sender:
Configuring email filtering
Managing Email Firewall policies
110