
62
C
HAPTER
4: A
NTI
-S
PAM
C
ONFIGURATION
Notifications
Notifications for inbound and outbound messages can be enabled for all
recipients, the sender, and the administrator. The content for the
Inbound
and
Outbound
notification can be customized.
See
Appendix A
“Customizing System Messages”
on
page 125
for a full
list of variables that can be used.
Upload and Download
Filter List
A predefined list of objectionable words is included with the 3Com Email
Firewall. To customize the list and to add or remove words, click
Download File to download the list to a local system.
Use a text editor to edit the file using one word or phrase per line. When
finished, upload the file by clicking the Upload File button.
Trusted Senders List
The Trusted Senders List allows users to define specific email addresses
that are considered “trusted” and bypass the 3Com Email Firewall’s
Anti-Spam controls (DCC, STA, RBL, and PBMF “Spam”).
If the action for an Anti-Spam feature is set to “Reject”, it cannot be
bypassed by the Trusted Senders List. Additionally, the Trusted Senders
List only applies to PBMF “Spam” messages with a low priority.
Local 3Com Email Firewall users can log in and create their own list of
Trusted Senders.
The Trusted Senders List must first be enabled globally by the
administrator by clicking on Trusted Senders List in the Mail Delivery ->
Anti-Spam menu.
■
Enable Trusted Senders List — The Trusted Senders List must be
enabled by the administrator before individual users can add
addresses to their list.
■
Domain Part of Email Address — Enter the mail domain part of the
local user’s email address for the domain you are receiving mail for.
Summary of Contents for 3CR3MFA-92
Page 8: ......
Page 12: ...12 ABOUT THIS GUIDE ...
Page 30: ...30 CHAPTER 2 CONFIGURING MAIL DELIVERY ...
Page 46: ...46 CHAPTER 3 CONFIGURING MAIL SECURITY ...
Page 98: ...98 CHAPTER 6 SYSTEM CONFIGURATION ...
Page 114: ...114 CHAPTER 7 SYSTEM MANAGEMENT ...
Page 144: ...144 APPENDIX C THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS ...