Lotus Domino 6 spam Survival Guide for IBM eServer
An IBM Redbooks publication
Published 29 January 2003
IBM Form #: SG24-6930-00
Other Language Versions
Note: Other language versions may not be as current as the English edition.
Rate and comment
Authors: Tommi Tulisalo, Ted Chappell, Beth Anne Collopy, Kris Hansen, Mark Ramos, Bruce Walenius
In this IBM Redbooks publication we describe how you can use IBM Lotus Domino 6 to prevent and manage “spam.”
We begin by describing and categorizing spam, which is the commonly used term for unsolicited commercial e-mail. We discuss ways to prevent spam, outlining different techniques available to avoid and block spam.
We then explain how anti-spam control and management work can be divided between servers, between server tasks, and between administrators and end users. We also describe the anti-spam architecture of the Domino 6 messaging environment.
Anti-spam features of Domino 6 are presented in detail. They include the ability to control connections from spammers and the delivery of spam, and protecting against the use of your server as an open relay. We also discuss using mail file rules and server mail rules to prevent spam.
Finally, we highlight some of the business partner products available to further address the spam problem. These products fall into two categories: those that run on a Domino server, and those that operate as separate anti-spam servers and gateways. We include a number of examples of each type, along with references to help you obtain more information directly from them.
This book is written primarily for Lotus Domino administrators who want to prevent and manage spam in their environments. It is also useful as a basic introduction to the topic of spam.
Table of contents
Chapter 1. Introduction
Chapter 2. Preventing unwanted e-mail and spam
Chapter 3. Domino 6 anti-spam architecture
Chapter 4. Domino 6 Server anti-spam features
Chapter 5. Using mail file rules to prevent spam
Chapter 6. Third party anti-spam products
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks