User Guide vii
Using weighted dictionaries.................................................................................................................... 160
Chapter 7 Intercept Anti-Spam ..............................................................................................................163
Intercept Anti-Spam Overview .................................................................................................................... 163
Trusted and Untrusted Mail Sources ......................................................................................................... 164
Trusted subnet.............................................................................................................................................. 165
Trusting via specific access patterns..................................................................................................... 165
Intercept connection control aggressiveness ................................................................................... 166
Intercept Anti-Spam aggressiveness .................................................................................................... 167
Intercept Anti-Virus aggressiveness...................................................................................................... 167
Intercept Connection Control...................................................................................................................... 168
ReputationAuthority, DNSBL, and Backscatter rejects................................................................... 169
Intercept actions .......................................................................................................................................... 170
Anti-Spam header........................................................................................................................................ 171
ReputationAuthority/DNSBL/UBL timeout setting.......................................................................... 172
Adding a spam words dictionary ........................................................................................................... 175
Mail Anomalies .................................................................................................................................................. 176
DNSBL servers ............................................................................................................................................... 180
Timeout mode............................................................................................................................................... 180
Timeout mode............................................................................................................................................... 182
UBL whitelist.................................................................................................................................................. 182
ReputationAuthority........................................................................................................................................ 183
Domain and sender reputation .............................................................................................................. 183
ReputationAuthority statistics sharing ................................................................................................ 184
Trusted clients and known mail servers .............................................................................................. 185
Configuring ReputationAuthority checks........................................................................................... 186
How Token Analysis works ....................................................................................................................... 190
Token Analysis training.............................................................................................................................. 190
Configuring Token Analysis ..................................................................................................................... 191
Database and Training.......................................................................................................................... 191
Token Analysis advanced options ......................................................................................................... 192
Neutral words........................................................................................................................................... 192
Token Analysis and languages........................................................................................................... 192
Japanese, Chinese, and Korean languages.................................................................................... 193
Image analysis.......................................................................................................................................... 193
PDF spam analysis .................................................................................................................................. 193
Diagnostics................................................................................................................................................ 194
Spam training ........................................................................................................................................... 196
Spam settings........................................................................................................................................... 196
Dictionary spam count.......................................................................................................................... 197
Troubleshooting Token Analysis....................................................................................................... 197
Anti-Spam header........................................................................................................................................ 199
Configuring Backscatter detection........................................................................................................ 200
Sender Policy Framework (SPF)................................................................................................................... 201
SPF records..................................................................................................................................................... 201
Configuring SPF............................................................................................................................................ 202
DomainKeys........................................................................................................................................................ 202
Configuring DomainKeys.......................................................................................................................... 203
DomainKeys log messages....................................................................................................................... 203
DomainKeys outbound message signing........................................................................................... 204
DomainKeys DNS record ...................................................................................................................... 206
Recommended strategy............................................................................................................................ 208
Chapter 8 Web Scanning ........................................................................................................................ 211