Mcafee Anti-Spam - McAfee INTERNET SECURITY SUITE 2008 User Manual

Hide thumbs Also See for INTERNET SECURITY SUITE 2008:
Table of Contents

Advertisement

117
C
2 3
H A P T E R

McAfee Anti-Spam

Anti-Spam (formerly called SpamKiller) stops unsolicited e-mail
from entering you Inbox by examining your incoming e-mail, and
then marking it as spam (e-mail soliciting you to purchase
something) or phishing (e-mail soliciting you to provide personal
information to a potentially fraudulent Web site). Anti-Spam then
filters the spam e-mail and moves it to the McAfee Anti-Spam
folder.
If your friends sometimes send you legitimate e-mail that may
appear as spam, you can ensure that it is not filtered by adding
their e-mail addresses to Anti-Spam's friends list. You can also
customize how spam is detected. For example, you can filter
messages more aggressively, specify what to look for in a
message, and create your own filters.
Anti-Spam also protects you if you try to access a potentially
fraudulent Web site through a link in an e-mail message. When
you click a link to a potentially fraudulent Web site, you are
redirected to the Phishing filter safe page. If there are Web sites
that you do not want filtered, you can add them to the whitelist
(Web sites in this list are not filtered).
Anti-Spam works with various e-mail programs, such as POP3,
POP3 Webmail, Yahoo®, MSN®/Hotmail®, Windows® Live™
Mail, and MAPI (Microsoft Exchange Server) accounts. If you use
a browser to read your e-mail, you must add your Webmail
account to Anti-Spam. All other accounts are configured
automatically and you do not have to add them to Anti-Spam.
Note:
SecurityCenter reports critical and non-critical protection
problems as soon as it detects them. If you need help diagnosing
your protection problems, you can run McAfee Virtual
Technician.
In this chapter
Anti-Spam features .....................................................118
Setting up your Webmail accounts ............................119
Setting up friends ........................................................123
Configuring spam detection.......................................129
Filtering e-mail ............................................................137
Working with filtered e-mail ......................................141
Configuring phishing protection ...............................143

Advertisement

Table of Contents
loading

Table of Contents