SECURITY

Implementing Security in Windows 7 : Set the Junk E-mail Protection Level

9/28/2012 2:57:56 AM
You can make junk messages easier to manage by setting the Windows Live Mail junk e-mail protection level. You can set a higher level if you receive many junk messages each day, or you can set a lower level if you receive very few junk messages.

The higher the protection level, the more aggressively Windows Live Mail checks for junk e-mail. All suspected junk messages get moved to the Junk E-mail folder. If a legitimate message is moved to Junk E-mail by accident, you can mark the message as not junk.

Set the Junk E-mail Protection Level

SET THE JUNK E-MAIL PROTECTION LEVEL

1 Click Menus ().

2 Click Safety options.

The Safety Options dialog box appears.

3 Click the Options tab.



9 Click the protection level you want ( changes to ):

Click No Automatic Filtering if you receive very few junk messages each day.

Click Low if you receive a moderate number of junk messages.

Click High if you receive many junk messages each day.

5 Click OK.

Windows Live Mail puts the new protection level into effect.

MARK A MESSAGE AS NOT JUNK

1 Click the Junk E-mail folder.

2 Click the message.

3 Click Not junk.

Windows Mail returns the message to the Inbox folder.



Simplify It

What is a false positive?

A false positive is a legitimate message that Windows Live Mail has mistakenly marked as spam and moved to the Junk E-mail folder. If you select the High protection level, you run a greater risk of false positives, so you should check your Junk E-mail folder more often to look for legitimate messages.

How does the Safe List Only protection level work?

Safe List Only means that Windows Live Mail treats every message as junk, unless the sender's e-mail address is on your Safe Senders list. To populate this list, follow Steps 1 and 2, click the Safe Senders tab, click Add, type an address, click OK, and repeat as necessary. Alternatively, right-click a legitimate message, click Junk e-mail, and then click Add sender to safe senders list.

Other  
  •  Implementing Security in Windows 7 : Delete Your Browsing History
  •  Web Security : Attacking AJAX - Checking for Cross-Domain Access, Reading Private Data via JSON Hijacking
  •  Web Security : Attacking AJAX - Subverting AJAX with Injected XML, Subverting AJAX with Injected JSON
  •  .NET Security : Programming the Event Log Service (part 3) - Using Custom Event Logs, Monitoring Event Logs
  •  .NET Security : Programming the Event Log Service (part 2) - Reading Event Logs, Writing Events
  •  .NET Security : Programming the Event Log Service (part 1) - Querying the Event Log System, Using Event Sources
  •  .NET Security : The Event Log Service Explained
  •  Web Security : Attacking AJAX - Intercepting and Modifying Server Responses, Subverting AJAX with Injected Data
  •  Web Security : Attacking AJAX - Intercepting and Modifying AJAX Requests
  •  Hacker Zone (Part 2) - Take photos with your Bluetooth headset, Jargon Buster
  •  
    Top 10
    Review : Sigma 24mm f/1.4 DG HSM Art
    Review : Canon EF11-24mm f/4L USM
    Review : Creative Sound Blaster Roar 2
    Review : Philips Fidelio M2L
    Review : Alienware 17 - Dell's Alienware laptops
    Review Smartwatch : Wellograph
    Review : Xiaomi Redmi 2
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8