Network

Configuring the anti-spam tools in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay. Configure the anti-spam tools in Exchange 2007 with our step-by-step guide.



 

Once you’ve enabled Exchange 2007’s anti-spam features, use the Exchange Management Console’s Anti-spam tab to manage your anti-spam arsenal. You’ll find it in the Hub Transport section of Organization Configuration.
Once you’ve enabled Exchange 2007’s anti-spam features, use the Exchange Management Console’s Anti-spam tab to manage your anti-spam arsenal. You’ll find it in the Hub Transport section of Organization Configuration.

2. Open the Content Filtering Properties dialog to tune your accept/reject/quarantine actions. Set an appropriate SCL score for each action, and remember to fill in the SMTP address of your quarantine mailbox.
2. Open the Content Filtering Properties dialog to tune your accept/reject/quarantine actions. Set an appropriate SCL score for each action, and remember to fill in the SMTP address of your quarantine mailbox.

3. Once you’ve enabled IP Block Lists you can set up a set of block list providers to use Realtime DNS Block Lists. Spamhaus’ Zen list is a powerful tool that blocks mail from known spammers – and from active botnet member PCs.
3. Once you’ve enabled IP Block Lists you can set up a set of block list providers to use Realtime DNS Block Lists. Spamhaus’ Zen list is a powerful tool that blocks mail from known spammers – and from active botnet member PCs.

4. If a message is being sent to an address that’s not in your global address book, then it’s probably a spammer trying a dictionary attack on your mail server. Blocking these messages by default simplifies anti-spam processing.
4. If a message is being sent to an address that’s not in your global address book, then it’s probably a spammer trying a dictionary attack on your mail server. Blocking these messages by default simplifies anti-spam processing.

5. SenderID is a relatively new method of assuring that mail comes from a specific server and domain. It’s not widely in use yet, but it’s worth making it part of your spam detection toolset. Even so, don’t rely on it alone.
5. SenderID is a relatively new method of assuring that mail comes from a specific server and domain. It’s not widely in use yet, but it’s worth making it part of your spam detection toolset. Even so, don’t rely on it alone.

 

 


 
Banner
Share |
Write comment
security image
smaller | bigger

busy

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS