Book Image

SpamAssassin: A practical guide to integration and configuration

Book Image

SpamAssassin: A practical guide to integration and configuration

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
Glossary

Spam Policies


When only SpamAssassin is in use, spam policies are relatively simple—spam tagging may be implemented either site-wide or per-user, spam may be deleted or moved to a separate folder, users may share a Bayesian database, and so on. A second filter adds an extra degree of flexibility.

In addition to simply using the results of the two filters in a filter1 AND filter2 or a filter1 OR filter2 solution, the spam policy for a site can be more complex. Email for some users might be passed through both filters, whereas mail for others may continue to be processed only by SpamAssassin, or not to be processed at all.

Even more complex policies are possible—for example, only running SpamAssassin if the score from another filter is below a certain threshold. Some filters use a simple yes/no switch and others provide a score or give a probability of the email being spam.

It is possible to implement complex policies within most MTAs. However, the simplest and most flexible method is to use...