CHAPTER 8
333
Administering F-Secure Spam Control
When the heuristic spam analysis is disabled,
only the threat detection engine scans inbound
mails for spam.
Heuristic spam analysis slows down the
performance but improves the spam detection
rate.
Spam filtering leve
l
Specify the spam filtering level. Decreasing the
level allows less spam to pass, but more regular
mails may be falsely identified as spam.
Increasing the level allows more spam to pass,
but a smaller number of regular e-mail
messages are falsely identified as spam.
For example, if the spam filtering level is set to 3,
more spam is filtered, but also more regular
mails may be falsely identified as spam. If the
spam filtering level is set to 7, more spam will
pass undetected, but a smaller number of
regular mails will be falsely identified as spam.
The allowed values are from 1 to 9.
The spam levels are determined by calculating
points for each e-mail. The spam scanning
involves a large number of different rules, which
give each e-mail different points depending on
the mail content and header information. These
points are then calculated to a number between
1 and 9, which defines the likelihood of the
message being spam.
Action on spam
message
Specify the action to take with a message
considered spam.
Let message pass through
- The product allows
the message to pass through.
Quarantine message
- The product places the
message into the quarantine folder.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......