![Symantec 10744983 - Mail Security 8320 Administration Manual Download Page 110](http://html1.mh-extra.com/html/symantec/10744983-mail-security-8320/10744983-mail-security-8320_administration-manual_1418785110.webp)
Third parties compile and manage lists of desirable or undesirable
IP addresses. These lists are queried using DNS lookups. When you
configure Symantec Mail Security to use a third-party sender list,
Symantec Mail Security checks whether the sending mail server is
on the list. If so, Symantec Mail Security performs a configured
action, based on the policies in place.
Incorporate lists
managed by other
parties
About Allowed and Blocked Senders Lists
The following sections provide important information about the Allowed Senders
Lists and Blocked Senders Lists.
Duplicate entries
You cannot have the exact same entry in both a Blocked Senders List and an
Allowed Senders List. If an entry already exists in one list, you will receive the
message “Duplicate sender - not added” when you try to add the same entry to
the other list. If you'd prefer to have this entry in the other list, first delete the
entry from the list that now contains it, then add it to the other list.
Similar entries
If you have two entries such as [email protected] and *@b.com in the two different lists,
the list with higher precedence “wins.”
See
“About precedence”
on page 83.
Performance impact of third party DNS lists
Incorporating third party lists adds additional steps to the filtering process. For
example, in a DNS list scenario, for each incoming message, the IP address of the
sending mail server is queried against the list, similar to a DNS query. If the
sending mail server is on the list, the mail is flagged as spam. If your mail volume
is sufficiently high, running incoming mail through a third party database could
hamper performance because of the requisite DNS lookups. Symantec recommends
that you use the Sender Reputation Service lists instead of enabling third party
lists.
Reasons to allow or block senders
Table 4-11
describes why you would employ lists of allowed or blocked senders
and lists an example of a pattern that you as the system administrator might use
to match the sender:
Configuring email filtering
Managing Email Firewall policies
110
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...