ENTERPRISE

Using Exchange Server 2010 Antispam Tools (part 5) - Sender Filtering, Sender ID

10/18/2014 9:07:04 PM

8. Sender Filtering

Sender filtering is one of the oldest antispam features in Exchange; it is probably also the least effective. The premise is that you provide a list of SMTP addresses or domains that should not be able to send your users email. The problem is that most spammers don't use the same email address twice, so this is less than completely effective. Figure 8 shows the Blocked Senders tab of the Sender Filtering object's properties.

Figure 8. Configuring sender filtering

You can block individual senders and you can block all senders in a specific domain. One interesting antispam technique that some organizations employ is to put their own domain in this list. This prevents those spam messages that claim to be from one of your own recipients. However, if you do that on an internal Hub Transport server, make sure that it is not being used for POP3, IMAP4, or other clients that use SMTP to send mail internally.

Another interesting antispam technique that blocks a few pieces of mail is selecting the check box Block Messages That Don't Have Sender Information. If a message does not have a sender (and it should), then this rejects the message.

The interface is a little different than in previous versions of Exchange Server. When you add or edit blocked senders, you have the option of adding an individual user or an entire domain and subdomains.

On the Action tab of the Sender Filtering object's properties, you can specify what action to take. You can either reject the message entirely or stamp the message with a blocked sender and allow it through. If you stamp the message as being from a blocked sender, the content filter will rank it as spam.

9. Sender ID

We talked a bit about sender protection framework records and DNS and how to make sure that yours are registered properly. Contrary to popular misconception, Sender ID is not an antispam technology but an antispoofing technology. Quite simply, each organization on the Internet that sends email should register a sender protection framework (SPF) record in their public DNS server. This SPF record contains a list of the servers authorized to send mail on behalf of their domain.

When an STMP server receives a message from a particular domain, it analyzes the message to determine the actual sender and determines which server sent it. If the message originated from an authorized server, it is probably not being spoofed. If it is accepted from a server that is not in the DNS SPF record, the message might be from a spoofed sender.

On the Action tab of the Sender ID object's properties, you can specify which action to take. Figure 9 shows the Action tab. You can reject the message, delete the message, or accept it for further processing by the content filter.

Figure 9. Configuring a Sender ID action

The problem with Sender ID is that fewer than 15 percent of all domains on the Internet have an SPF record, at least by some estimates. And frequently an organization's SPF records get out of date and are therefore wrong. The only thing worse than not having an SPF record is having one that is wrong. Therefore, it is impractical to reject or delete messages that fail the Sender ID test. You should keep this setting configured to Stamp Message With Sender ID Result And Continue Processing.

Other  
  •  Exchange Server 2007 Management and Maintenance Practices : Postmaintenance Procedures, Reducing Management and Maintenance Efforts
  •  Exchange Server 2007 Management and Maintenance Practices : Prioritizing and Scheduling Maintenance Best Practices (part 2) - Weekly Maintenance
  •  Exchange Server 2007 Management and Maintenance Practices : Prioritizing and Scheduling Maintenance Best Practices (part 1) - Daily Maintenance
  •  Exchange Server 2007 Management and Maintenance Practices : Best Practices for Performiming Database Maintenance (part 2) - Offline Database Maintenance
  •  Exchange Server 2007 Management and Maintenance Practices : Best Practices for Performiming Database Maintenanceng (part 1) - Automatic Database Maintenance
  •  Exchange Server 2007 Management and Maintenance Practices : Auditing the Environment (part 3) - Message Tracking
  •  Exchange Server 2007 Management and Maintenance Practices : Auditing the Environment (part 2) - SMTP Logging
  •  Exchange Server 2007 Management and Maintenance Practices : Auditing the Environment (part 1) - Audit Logging - Enabling Event Auditing , Viewing the Security Logs
  •  Qnap TS-251Turbo NAS Review
  •  Edmail See Without A Camera
  •  
    Video
    Video tutorials
    - How To Install Windows 8

    - How To Install Windows Server 2012

    - How To Install Windows Server 2012 On VirtualBox

    - How To Disable Windows 8 Metro UI

    - How To Install Windows Store Apps From Windows 8 Classic Desktop

    - How To Disable Windows Update in Windows 8

    - How To Disable Windows 8 Metro UI

    - How To Add Widgets To Windows 8 Lock Screen

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010
    programming4us programming4us
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    Popular Tags
    Video Tutorail Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Exchange Server Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe Photoshop CorelDRAW X5 CorelDraw 10 windows Phone 7 windows Phone 8 Iphone