Symantec 10490452 - Mail Security 8220 Administration Manual page 98

Administration guide
Table of Contents

Advertisement

98 Configuring email filtering
Managing Email Firewall policies
Table 4-11
Use cases for lists of allowed and blocked senders (Continued)
Problem
An individual is sending
unwanted mail to people in
your organization.
Numerous people from a
specific range of IP addresses
are sending unsolicited mail to
people in your organization.
Solution
Add the specific email address to the
domain-based Blocked Senders List.
After analyzing the received headers to
determine the sender's network and IP
address, add the IP address and net mask to
the IP-based Blocked Senders List.
How Symantec Mail Security for SMTP identifies senders and
connections
The following sections provide details about the Allowed Senders Lists and
Blocked Senders Lists.
Supported Methods for Identifying Senders
You can use the following methods to identify senders for your Allowed Senders
Lists and Blocked Senders Lists.
Domain-based: specify sender addresses or domain names
Symantec Mail Security for SMTP checks the following characteristics of
incoming mail against those in your lists:
MAIL FROM: address in the SMTP envelope. Specify a pattern that
matches the value for localpart@domain in the address. You can use
the * or ? wildcards in the pattern to match any portion of the address.
address in the message headers. Specify a pattern that matches
From:
the value for localpart@domain in the
wildcards in the pattern to match any portion of this value.
If you choose to identify messages by address or domain name, see
12
for examples.
Table 4-12
Matches for email addresses or domain names
Example
example.com
malcolm@example.net malcolm@example.net
sara*@example.org
jo??@example.corg
Pattern example
Joe.unwanted*@getmail.com
218.187.0.0/255.255.0.0
From:
Sample matches
chang@example.com, marta@example.com,
foo@bar.example.com
sara@example.org, sarahjane@example.org
john@example.org, josh@example.org
header. You can use
Table 4-

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mail security

Table of Contents