Book Image

SpamAssassin: A practical guide to integration and configuration

Book Image

SpamAssassin: A practical guide to integration and configuration

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
Glossary

Summary


Spam email is usually archived for the purposes of creating a corpus for training a filter and identifying false positives. The user is required to manually go through spam messages to perform this sorting. One way of reducing this effort on the part of the user is to use automatic scripts and cron jobs to process and filter spam emails.

Separating spam into levels based on scores aid the user by presenting them with a smaller folder of spam to check for false positives. Spam reports can be generated by using similar scripts that parse the spam statistics that result from commands such as ps -ef. This is done by calling simple scripts from Procmail, or from running reports on system logs. These scripts and their results can be modified as required. For example, you can have site-wide and hourly reports. A little bit of an effort will relieve the system administrator and users from the considerable effort of sifting through large numbers of spam emails.