IT tutorials
 
Applications Server
 

Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail

10/24/2014 3:30:48 AM
- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire

Filtering with Safe and Block Senders

Both Outlook 2003 and Outlook 2007 allow users to create and manage their own Safe Senders and Blocked Senders. As the name implies, the Safe Senders list is made up of user-defined addresses or domains, and messages from these addresses or domains will never be treated as junk email. Conversely, the Blocked Senders list is made up of user-defined email addresses or domain names, and all messages from them will automatically be treated as junk email.

In addition, both Outlook 2003 and 2007 provide the option to configure a Safe Recipients list. This option is useful when you are a member of an emailing list or group. By adding the list or group to your Safe Recipients list, any messages sent to the email addresses or domain names on that list will not be treated as junk email messages, regardless of the sender.

Both Outlook 2003 and Outlook 2007 allow you the option to automatically treat anyone in your Outlook Contacts list as a Safe Sender. This option is enabled on the Safe Senders tab by selecting the Also Trust E-Mail from My Contacts check box. By default, this feature is enabled.

In addition, with Outlook 2003 SP1 and later, there is an additional option. If there are people who are not in your Contacts list, but with whom you regularly correspond, you can select to Automatically Add People I E-Mail to the Safe Senders List. This option is also found on the Safe Senders tab.

To quickly add a sender, domain name, or mailing list to one of these lists, you can right-click the message, select Junk E-Mail, and choose the desired option.

Outlook Email Postmark

In Outlook 2007, the concept of the Outlook Email Postmark is introduced. This feature helps ensure that email placed in the client’s Inbox is valid, and that email sent by Outlook 2007 will be trusted by the recipient’s email client.

Microsoft has developed this new technology as part of their ongoing effort to minimize junk email. When using the Email Postmark, the sending computer performs a computation, and assigns the resulting work as a token that the email is valid. By making the computation and sending of the message time consuming and resource intensive, mass emailers will find the process detrimental to their productivity; however, the process does not change the user experience for normal email senders.

Exchange Server 2007, upon receiving a message with an Email Postmark, uses it as one method of verification of the reliability of the incoming message.

Blocking Read Receipts

Both Outlook 2003 and Outlook 2007 enable users to request read receipts for the messages that they send. Read receipts tell the sender that the intended recipient has at least opened the email. Automatically sending these read receipts can offer spammers (or others) more insight into your mail reading habits than you might want to share.

By default, both Outlook 2003 and Outlook 2007 block the automatic sending of read receipts. Instead, the recipient is prompted with a message that asks them if they want to send a response.

If you want, you can change this setting to Always Send a Response, or Never Send a Response. To change this behavior, do the following:

1.
In Outlook, select Tools, Options.

2.
On the Preferences tab, in the E-Mail section, click E-Mail Options.

3.
Click the Tracking Options button.

4.
Select your desired setting, and then click OK three times to exit the configuration.

Information Rights Management

Introduced in Microsoft Office 2003 products, Information Rights Management (IRM) helps organizations protect digital information from unauthorized use. By integrating with a Windows Server 2003 technology called Microsoft Windows Rights Management Services (RMS), IRM enables workers to define how a recipient can use the information contained in a Microsoft Office document.

Users can define exactly who can open, modify, print, forward, or take other actions with protected documents. In addition, users can specify an expiration date, after which the document cannot be viewed or acted upon.

Note

To create IRM-protected documents and email messages, the sending user must be using the Professional or Enterprise version of Office 2007. Users of Office Standard 2007 can still read and use IRM-protected documents, but cannot create them or apply policies to email messages.


IRM granularizes security for supported Microsoft Office applications such as Word, Excel, PowerPoint, and Outlook, as well as any other IRM-aware application. IRM is intended to complement other security technologies, such as Secure/Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) by securing the contents of information (contained in a document, for example), but it does not provide authentication to the information.

 
Others
 
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 1) - Protecting Against Web Beaconing
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 2) - Encrypting Communications Between Outlook and Exchange , Blocking Attachments
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 1) - Outlook Anywhere
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 3) - Keeping Up with Security Patches and Updates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 2) - Utilizing Security Templates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 1) - Windows Server 2003 Security Improvements , Windows Vista Security Improvements
- Securing an Exchange Server 2007 Environment : Client-Level Secured Messaging - Exchange Server 2007 Client-Level Security Enhancements
- Microsoft Exchange Server 2010 Requirements : Additional Requirements
- Microsoft Exchange Server 2010 Requirements : Software Requirements (part 2) - Windows Server Roles and Features
 
25 Inspiring Game of Thrones Quotes
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
programming4us programming4us
 
Popular tags
 
Video Tutorail Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS