To import sender information from a text file
1
In the Control Center, click Policies > Sender Groups.
2
Click any of the Blocked Senders or Allowed Senders Lists.
You can import entries for all of the Blocked Senders and Allowed Senders
Lists in one import action, no matter which list you open.
3
Click Import.
4
In the Import dialog box, specify the location of the your text file with the
sender information, and then click Import.
Ensure that the sender information is formatted correctly.
See
“How Symantec Mail Security identifies senders and connections”
on page 111.
Symantec Mail Security merges data from the imported list with the existing
sender information.
5
Click Save.
To export sender information from your Blocked Senders Lists or Allowed
Senders Lists
1
In the Control Center, click Policies > Sender Groups.
2
Click any of the Blocked Senders or Allowed Senders Lists.
The entries for all Blocked Senders and Allowed Senders Lists are exported
no matter which list you open.
3
Click Export.
Your browser will prompt you to open the file from its current location or
save it to disk.
Enabling Open Proxy Senders, Safe Senders, and Suspected
Spammers lists
Symantec continuously compiles and updates the follwoing three Sender
Reputation Service lists:
IP addresses that are either open proxies used by spammers or
“zombie” computers that have been co-opted by spammers.
Open Proxy Senders
IP addresses from which virtually no outgoing email is spam.
Safe Senders
IP addresses from which virtually all of the outgoing email is spam.
Suspected Spammers
Configuring email filtering
Managing Email Firewall policies
118
Содержание 10744983 - Mail Security 8320
Страница 1: ...Symantec Mail Security Administration Guide...
Страница 8: ......
Страница 14: ...Glossary Index Contents 14...
Страница 22: ...About Symantec Mail Security Where to get more information 22...
Страница 68: ...Configuring email settings Configuring scanning settings 68...
Страница 130: ...Configuring email filtering Managing policy resources 130...
Страница 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Страница 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Страница 176: ...Configuring alerts and logs About logs 176...
Страница 220: ...Administering the system Periodic system maintenance 220...