Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:emai:spam_chain [2021-06-16 10:48] – vesely | public:emai:spam_chain [2021-06-17 13:54] (current) – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Spam fiters at CERGE-EI ====== | ====== Spam fiters at CERGE-EI ====== | ||
+ | |||
+ | See also [[: | ||
+ | |||
+ | ---- | ||
====== Incoming emails ====== | ====== Incoming emails ====== | ||
Line 13: | Line 17: | ||
Malicious content - is blocked and is put to system quarantine for further analysis. | Malicious content - is blocked and is put to system quarantine for further analysis. | ||
- | Suspicious content - usualy add warning to the subject - warning texts are in lowercase: **[Spam], [Newsletter] , [Warning - bad SPF]** etc. | + | Suspicious content - usualy add warning to the subject - <font inherit/ |
==== Step 2: Ironport ==== | ==== Step 2: Ironport ==== | ||
Line 24: | Line 28: | ||
Malicious content - is rejected | Malicious content - is rejected | ||
- | Suspicious content - is put to personal quarantine. Warnings are added to the subject - warning texts are in uppercase: **[SPAM], [SUSPECTED SPAM]** etc. | + | Suspicious content - is put to personal quarantine. Warnings are added to the subject - <font inherit/ |
User gets regular email digest about newly quarantined emails. It is possible to manually release email and even whitelist sender. | User gets regular email digest about newly quarantined emails. It is possible to manually release email and even whitelist sender. | ||
==== Step 3: Zimbra ==== | ==== Step 3: Zimbra ==== | ||
+ | |||
+ | //**Zimbra mailserver is the main email server at CERGE-EI** // | ||
Zimbra mailserver may put problematic email message to the Junk folder. | Zimbra mailserver may put problematic email message to the Junk folder. | ||
Line 36: | Line 42: | ||
==== Step 4: Email client ==== | ==== Step 4: Email client ==== | ||
- | Last step of detection is usualy done in user's client software (Thunderbird, | + | Last step of detection is usualy done in user's client software (Thunderbird, |
Each email client deals with suspicious content differently. It is necessary to be informed how your specific client works and where to find problematic emails (Junk folder, Spam folder, Newsletter folder etc.) | Each email client deals with suspicious content differently. It is necessary to be informed how your specific client works and where to find problematic emails (Junk folder, Spam folder, Newsletter folder etc.) | ||