Book Image

SpamAssassin: A practical guide to integration and configuration

Book Image

SpamAssassin: A practical guide to integration and configuration

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
Glossary

Chapter 18. Choosing Other Spam Tools

SpamAssassin is the Swiss-army knife of spam filtering. By encompassing other technologies such as DCC and RBLs, coupled with highly configurable rules-based scoring, it holds an edge over most alternative spam filters.

However, there may be benefits to using more than one spam-filtering tool:

  • If system load on an email server is high, a separate machine hosting a simple filter can filter out obvious spam, allowing further filtering to be carried out using SpamAssassin. ISPs often take this approach, filtering some spam, notably pornographic spam and verbatim copies of known spam, but avoiding statistical analysis, which is computationally intensive.

  • A spam filter that uses a different statistical analysis method than SpamAssassin will be triggered by different spam. This should produce a higher combined filtering rate.

  • By using two filters, spam detection policies become more flexible. At the simplest level, emails can be considered spam if and only if...