Symantec 10744983 Administration Guide - Page 238

Reputation Service: Open Proxy Senders, Safe Senders, and Suspected Spammers.

Page 238 highlights

238 Glossary Sender Reputation Service server session signature site SMTP (Simple Mail Transfer Protocol) spam spam attack Spam Quarantine Symantec Mail Security allows you to specify an action for messages that fail Sender ID authentication. A service that provides comprehensive reputation tracking, as part of Symantec Mail Security. Symantec manages the following three lists as part of the Sender Reputation Service: Open Proxy Senders, Safe Senders, and Suspected Spammers. Each operates automatically and filters your messages using the same technology as Symantec's other filters. A computer or software that provides services to other computers (known as clients) that request specific services. Common examples are Web servers and mail servers. In communications, the time during which two computers maintain a connection and, usually, are engaged in transferring information. 1. A state or pattern of activity that indicates a violation of policy, a vulnerable state, or an activity that may relate to an intrusion. 2. Logic in a product that detects a violation of policy, a vulnerable state, or an activity that may relate to an intrusion. This can also be referred to as a signature definition, an expression, a rule, a trigger, or signature logic. 3. Information about a signature including attributes and descriptive text. This is more precisely referred to as signature data. A collection of one or more computers hosting Symantec Mail Security, in which exactly one computer hosts a Control Center, and one or more computers host Scanners. If the site consists of one computer, that computer will include the Control Center and a Scanner. The protocol that allows email messages to be exchanged between mail servers. Then, clients retrieve email, typically via the POP or IMAP protocol. 1. Unsolicited commercial bulk email. 2. An email message identified as spam by Symantec Mail Security, using its filters. A series of spam messages from a specific domain. Symantec Mail Security allows you to choose an action to perform on these messages; by default, messages received from violating senders are deferred. A database that stores email messages separately from the normal message flow, and allows access to those messages. In Symantec Mail Security, Spam Quarantine is located on the Control Center computer, and provides users with Web access to their spam messages. Users can browse, search, and delete their spam messages and can also redeliver misidentified messages to their inbox. An administrator account provides access to all quarantined messages. Spam Quarantine can also be configured for administrator-only access.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

Symantec Mail Security allows you to specify an action for messages that fail
Sender ID authentication.
Sender Reputation
Service
A service that provides comprehensive reputation tracking, as part of Symantec
Mail Security. Symantec manages the following three lists as part of the Sender
Reputation Service: Open Proxy Senders, Safe Senders, and Suspected Spammers.
Each operates automatically and filters your messages using the same technology
as Symantec's other filters.
server
A computer or software that provides services to other computers (known as
clients) that request specific services. Common examples are Web servers and
mail servers.
session
In communications, the time during which two computers maintain a connection
and, usually, are engaged in transferring information.
signature
1. A state or pattern of activity that indicates a violation of policy, a vulnerable
state, or an activity that may relate to an intrusion. 2. Logic in a product that
detects a violation of policy, a vulnerable state, or an activity that may relate to
an intrusion. This can also be referred to as a signature definition, an expression,
a rule, a trigger, or signature logic. 3. Information about a signature including
attributes and descriptive text. This is more precisely referred to as signature
data.
site
A collection of one or more computers hosting Symantec Mail Security, in which
exactly one computer hosts a Control Center, and one or more computers host
Scanners. If the site consists of one computer, that computer will include the
Control Center and a Scanner.
SMTP (Simple Mail
Transfer Protocol)
The protocol that allows email messages to be exchanged between mail servers.
Then, clients retrieve email, typically via the POP or IMAP protocol.
spam
1. Unsolicited commercial bulk email. 2. An email message identified as spam by
Symantec Mail Security, using its filters.
spam attack
A series of spam messages from a specific domain. Symantec Mail Security allows
you to choose an action to perform on these messages; by default, messages
received from violating senders are deferred.
Spam Quarantine
A database that stores email messages separately from the normal message flow,
and allows access to those messages. In Symantec Mail Security, Spam Quarantine
is located on the Control Center computer, and provides users with Web access
to their spam messages. Users can browse, search, and delete their spam messages
and can also redeliver misidentified messages to their inbox. An administrator
account provides access to all quarantined messages. Spam Quarantine can also
be configured for administrator-only access.
Glossary
238