![Symantec 10744983 - Mail Security 8320 Administration Manual Download Page 118](http://html1.mh-extra.com/html/symantec/10744983-mail-security-8320/10744983-mail-security-8320_administration-manual_1418785118.webp)
To import sender information from a text file
1
In the Control Center, click Policies > Sender Groups.
2
Click any of the Blocked Senders or Allowed Senders Lists.
You can import entries for all of the Blocked Senders and Allowed Senders
Lists in one import action, no matter which list you open.
3
Click Import.
4
In the Import dialog box, specify the location of the your text file with the
sender information, and then click Import.
Ensure that the sender information is formatted correctly.
See
“How Symantec Mail Security identifies senders and connections”
on page 111.
Symantec Mail Security merges data from the imported list with the existing
sender information.
5
Click Save.
To export sender information from your Blocked Senders Lists or Allowed
Senders Lists
1
In the Control Center, click Policies > Sender Groups.
2
Click any of the Blocked Senders or Allowed Senders Lists.
The entries for all Blocked Senders and Allowed Senders Lists are exported
no matter which list you open.
3
Click Export.
Your browser will prompt you to open the file from its current location or
save it to disk.
Enabling Open Proxy Senders, Safe Senders, and Suspected
Spammers lists
Symantec continuously compiles and updates the follwoing three Sender
Reputation Service lists:
IP addresses that are either open proxies used by spammers or
“zombie” computers that have been co-opted by spammers.
Open Proxy Senders
IP addresses from which virtually no outgoing email is spam.
Safe Senders
IP addresses from which virtually all of the outgoing email is spam.
Suspected Spammers
Configuring email filtering
Managing Email Firewall policies
118
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...