Book Image

SpamAssassin: A practical guide to integration and configuration

Book Image

SpamAssassin: A practical guide to integration and configuration

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
Glossary

General Configuration Rules


Most email clients allow rules or filters to be created. These typically come into action when one or more events occur, such as receiving new email, reading email, and sending email. For spam to be removed from the inbox automatically, the rule should run when new email is retrieved.

Rules act on the value of a header. If the email client allows rules to run based on the value of a specific header, then it is best to use the X-Spam-Status: header, and search for the value Yes.

The procedure for moving tagged email messages into a separate folder is outlined below:

  1. 1. Create a folder (or mailbox) for holding spam email. The folder name should be intuitive, for example, Spam.

  2. 2. Create a rule to be executed when emails arrive. The rule should look for the text X-Spam-Status: Yes in the message header. Check the text for a real spam message and use that, if it is different from the text shown here.

  3. 3. The action on the rule should be to move the message to the spam...