Lotus Domino 6 spam Survival Guide for IBM eServer

An IBM Redbooks publication

Published 29 January 2003

cover image

ISBN-10: 0738429457
ISBN-13: 9780738429458
IBM Form #: SG24-6930-00
(114 pages)

View online


Other Language Versions

Note: Other language versions may not be as current as the English edition.

More options

Rating

Authors: Tommi Tulisalo, Ted Chappell, Beth Anne Collopy, Kris Hansen, Mark Ramos, Bruce Walenius

Abstract

In this IBM Redbooks publication we describe how you can use IBM Lotus Domino 6 to prevent and manage “spam.”
We begin by describing and categorizing spam, which is the commonly used term for unsolicited commercial e-mail. We discuss ways to prevent spam, outlining different techniques available to avoid and block spam.
We then explain how anti-spam control and management work can be divided between servers, between server tasks, and between administrators and end users. We also describe the anti-spam architecture of the Domino 6 messaging environment.
Anti-spam features of Domino 6 are presented in detail. They include the ability to control connections from spammers and the delivery of spam, and protecting against the use of your server as an open relay. We also discuss using mail file rules and server mail rules to prevent spam.
Finally, we highlight some of the business partner products available to further address the spam problem. These products fall into two categories: those that run on a Domino server, and those that operate as separate anti-spam servers and gateways. We include a number of examples of each type, along with references to help you obtain more information directly from them.
This book is written primarily for Lotus Domino administrators who want to prevent and manage spam in their environments. It is also useful as a basic introduction to the topic of spam.

Table of contents

Chapter 1. Introduction
Chapter 2. Preventing unwanted e-mail and spam
Chapter 3. Domino 6 anti-spam architecture
Chapter 4. Domino 6 Server anti-spam features
Chapter 5. Using mail file rules to prevent spam
Chapter 6. Third party anti-spam products

Follow IBM Redbooks

Follow IBM Redbooks