Knowledge

Email filtering

Source đź“ť

43: 161:
can reject an item at the initial SMTP connection stage or pass it through unchanged for delivery to the user's mailbox. It is also possible to redirect the message for delivery elsewhere, quarantine it for further checking, modify it or 'tag' it in any other way.
245:. Outbound email filtering involves the reverse - scanning email messages from local users before any potentially harmful messages can be delivered to others on the Internet. One method of outbound email filtering that is commonly used by 182:
at some companies to ensure that employees comply with appropriate policies and laws. Users might also employ a mail filter to prioritize messages, and to sort them into folders based on subject matter or other criteria.
241:
Mail filters can operate on inbound and outbound email traffic. Inbound email filtering involves scanning messages from the Internet addressed to users protected by the filtering system or for
289:, which specifies conditions to match and actions to take on matching, which may involve further matching. Some more advanced filters, particularly anti-spam filters, use statistical 301:
to organize incoming emails. Image filtering can use complex image-analysis algorithms to detect skin-tones and specific body shapes normally associated with pornographic images.
146:
to organize it according to specified criteria. The term can apply to the intervention of human intelligence, but most often refers to the automatic processing of messages at an
219:
assets. A catch-all filter will "catch all" of the emails addressed to the domain that do not exist in the mail server - this can help avoid losing emails due to misspelling.
178:. Mailbox providers filter outgoing email to promptly react to spam surges that may result from compromised accounts. A less common use is to 253:, in which email traffic is intercepted and filtered via a transparent proxy within the network. Outbound filtering can also take place in an 212:
as a service to all of their customers. Anti-virus, anti-spam, URL filtering, and authentication-based rejections are common filter types.
367: 233:). In email programs, users can make personal, "manual" filters that then automatically filter mail according to the chosen criteria. 277:. Other times, code may match keywords in the message body, or perhaps the email address of the sender of the message. More complex 380: 107: 704: 79: 744: 719: 532: 86: 472: 126: 336: 60: 486:
A rule is a set of conditions, actions, and exceptions that controls how Outlook processes and organizes messages.
900: 341: 93: 64: 147: 75: 699: 581: 192: 298: 17: 273:
Mail filters have varying degrees of configurability. Sometimes they make decisions based on matching a
739: 430: 225:, may be able to install separate programs (see links below), or configure filtering as part of their 246: 714: 611: 576: 331: 316: 290: 282: 53: 464: 549: 525: 294: 250: 216: 501: 326: 100: 31: 754: 724: 691: 258: 200: 196: 151: 8: 729: 571: 242: 209: 179: 347: 910: 457: 281:
and logic is possible with programming languages; this is typically implemented with a
274: 895: 709: 652: 518: 468: 304: 510: 850: 797: 321: 222: 205: 862: 832: 566: 905: 872: 842: 792: 734: 657: 647: 591: 405: 175: 170:
Common uses for mail filters include organizing incoming email and removal of
889: 807: 772: 672: 606: 455:
Padwick, Gordon; Feddema, Helen Bell (1999). "22: Creating and Using Rules".
855: 812: 782: 632: 278: 262: 254: 226: 154:. Filtering can be applied to incoming emails as well as to outgoing ones. 817: 627: 787: 764: 637: 596: 558: 822: 802: 677: 215:
Corporations often use filters to protect their employees and their
42: 867: 777: 662: 642: 541: 286: 171: 158: 27:
Processing of email to organize it according to specified criteria
749: 667: 601: 505: 30:"Spam filter" redirects here. For Knowledge's spam filter, see 827: 586: 143: 265:
to prevent the leakage of sensitive information via email.
463:. Using Series. Indianapolis: Que Publishing. p.  307:
includes user-generated email filters called "rules".
157:
Depending on the calling environment, email filtering
540: 67:. Unsourced material may be challenged and removed. 456: 431:"A Guide to Smart Filters | InMoat Knowledge Base" 236: 887: 381:"How Pervasive is ISP Outbound Email Filtering?" 454: 344:is an RFC standard for describing mail filters 526: 533: 519: 127:Learn how and when to remove this message 208:can also install mail filters in their 14: 888: 406:"Inbound and Outbound Email Filtering" 514: 378: 65:adding citations to reliable sources 36: 24: 720:Distributed Checksum Clearinghouse 25: 922: 705:Challenge–response spam filtering 542:Unsolicited digital communication 495: 268: 41: 342:Sieve (mail filtering language) 52:needs additional citations for 448: 423: 398: 372: 360: 237:Inbound and outbound filtering 13: 1: 353: 261:technology in their outbound 165: 459:Using Microsoft Outlook 2000 193:Anti-spam techniques (users) 7: 348:White list#Email whitelists 310: 299:natural language processing 257:. Many corporations employ 10: 927: 740:Naive Bayes spam filtering 247:Internet service providers 190: 186: 150:server, possibly applying 29: 841: 763: 690: 620: 557: 548: 251:transparent SMTP proxying 715:Disposable email address 577:Directory harvest attack 379:Zonk (31 January 2008). 337:Outbound Spam Protection 332:Markovian discrimination 317:Bayesian spam filtering 293:techniques such as the 291:document classification 283:data-driven programming 901:Communication software 295:naive Bayes classifier 217:information technology 180:inspect outgoing email 327:Information filtering 142:is the processing of 32:Knowledge:Spam filter 725:Email authentication 368:5xx SMTP status code 259:data leak prevention 210:mail transfer agents 201:Email authentication 197:Anti-spam techniques 152:anti-spam techniques 61:improve this article 572:Bulk email software 243:lawful interception 285:language, such as 275:regular expression 883: 882: 710:Context filtering 686: 685: 305:Microsoft Outlook 297:while others use 206:Mailbox providers 137: 136: 129: 111: 76:"Email filtering" 16:(Redirected from 918: 851:Advance-fee scam 798:Keyword stuffing 555: 554: 535: 528: 521: 512: 511: 489: 488: 483: 481: 462: 452: 446: 445: 443: 441: 427: 421: 420: 418: 416: 402: 396: 395: 393: 391: 376: 370: 364: 176:computer viruses 132: 125: 121: 118: 112: 110: 69: 45: 37: 21: 926: 925: 921: 920: 919: 917: 916: 915: 886: 885: 884: 879: 863:Make Money Fast 837: 833:URL redirection 759: 682: 616: 567:Address munging 544: 539: 498: 493: 492: 479: 477: 475: 453: 449: 439: 437: 429: 428: 424: 414: 412: 404: 403: 399: 389: 387: 377: 373: 365: 361: 356: 313: 271: 239: 203: 191:Main articles: 189: 168: 140:Email filtering 133: 122: 116: 113: 70: 68: 58: 46: 35: 28: 23: 22: 15: 12: 11: 5: 924: 914: 913: 908: 903: 898: 881: 880: 878: 877: 876: 875: 865: 860: 859: 858: 847: 845: 843:Internet fraud 839: 838: 836: 835: 830: 825: 820: 815: 810: 805: 800: 795: 793:Google bombing 790: 785: 780: 775: 769: 767: 761: 760: 758: 757: 752: 747: 742: 737: 735:List poisoning 732: 727: 722: 717: 712: 707: 702: 696: 694: 688: 687: 684: 683: 681: 680: 675: 670: 665: 660: 655: 650: 645: 640: 635: 630: 624: 622: 618: 617: 615: 614: 609: 604: 599: 594: 592:Email spoofing 589: 584: 579: 574: 569: 563: 561: 552: 546: 545: 538: 537: 530: 523: 515: 509: 508: 502:Spam filtering 497: 496:External links 494: 491: 490: 473: 447: 435:www.inmoat.com 422: 397: 371: 358: 357: 355: 352: 351: 350: 345: 339: 334: 329: 324: 319: 312: 309: 270: 267: 238: 235: 188: 185: 167: 164: 135: 134: 49: 47: 40: 26: 9: 6: 4: 3: 2: 923: 912: 909: 907: 904: 902: 899: 897: 894: 893: 891: 874: 871: 870: 869: 866: 864: 861: 857: 854: 853: 852: 849: 848: 846: 844: 840: 834: 831: 829: 826: 824: 821: 819: 816: 814: 811: 809: 808:Referrer spam 806: 804: 801: 799: 796: 794: 791: 789: 786: 784: 781: 779: 776: 774: 771: 770: 768: 766: 762: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 721: 718: 716: 713: 711: 708: 706: 703: 701: 698: 697: 695: 693: 689: 679: 676: 674: 673:Telemarketing 671: 669: 666: 664: 661: 659: 656: 654: 651: 649: 646: 644: 641: 639: 636: 634: 631: 629: 626: 625: 623: 619: 613: 610: 608: 607:Pink contract 605: 603: 600: 598: 595: 593: 590: 588: 585: 583: 580: 578: 575: 573: 570: 568: 565: 564: 562: 560: 556: 553: 551: 547: 543: 536: 531: 529: 524: 522: 517: 516: 513: 507: 503: 500: 499: 487: 476: 474:9780789719096 470: 466: 461: 460: 451: 436: 432: 426: 411: 407: 401: 386: 382: 375: 369: 363: 359: 349: 346: 343: 340: 338: 335: 333: 330: 328: 325: 323: 320: 318: 315: 314: 308: 306: 302: 300: 296: 292: 288: 284: 280: 276: 269:Customization 266: 264: 260: 256: 252: 248: 244: 234: 232: 228: 227:email program 224: 220: 218: 213: 211: 207: 202: 198: 194: 184: 181: 177: 173: 163: 160: 155: 153: 149: 145: 141: 131: 128: 120: 109: 106: 102: 99: 95: 92: 88: 85: 81: 78: â€“  77: 73: 72:Find sources: 66: 62: 56: 55: 50:This article 48: 44: 39: 38: 33: 19: 856:Lottery scam 813:Scraper site 783:Doorway page 653:Mobile phone 633:Cold calling 485: 478:. Retrieved 458: 450: 438:. Retrieved 434: 425: 413:. Retrieved 409: 400: 390:15 September 388:. Retrieved 385:Slashdot.org 384: 374: 362: 303: 279:control flow 272: 263:mail servers 255:email server 240: 231:email client 230: 221: 214: 204: 169: 156: 139: 138: 123: 114: 104: 97: 90: 83: 71: 59:Please help 54:verification 51: 818:Social spam 730:Greylisting 700:Client-side 628:Auto dialer 18:Spam filter 890:Categories 823:Spam blogs 788:Forum spam 765:Spamdexing 638:Flyposting 597:Image spam 559:Email spam 480:10 January 440:19 October 410:thexyz.com 354:References 166:Motivation 87:newspapers 911:Anti-spam 803:Link farm 773:Blog spam 692:Anti-spam 658:Newsgroup 648:Messaging 550:Protocols 896:Spamming 868:Phishing 778:Cloaking 755:Spamhaus 663:Robocall 643:Junk fax 311:See also 287:procmail 159:software 117:May 2024 750:SpamCop 668:Spambot 612:Spambot 602:Joe job 366:With a 187:Methods 101:scholar 506:Curlie 471:  415:15 May 322:CRM114 199:, and 103:  96:  89:  82:  74:  906:Email 873:Voice 828:Sping 745:SORBS 621:Other 587:DNSWL 582:DNSBL 223:Users 144:email 108:JSTOR 94:books 678:VoIP 482:2017 469:ISBN 442:2021 417:2023 392:2011 174:and 172:spam 148:SMTP 80:news 504:at 465:618 249:is 63:by 892:: 484:. 467:. 433:. 408:. 383:. 195:, 534:e 527:t 520:v 444:. 419:. 394:. 229:( 130:) 124:( 119:) 115:( 105:· 98:· 91:· 84:· 57:. 34:. 20:)

Index

Spam filter
Knowledge:Spam filter

verification
improve this article
adding citations to reliable sources
"Email filtering"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
email
SMTP
anti-spam techniques
software
spam
computer viruses
inspect outgoing email
Anti-spam techniques (users)
Anti-spam techniques
Email authentication
Mailbox providers
mail transfer agents
information technology
Users
email program
lawful interception
Internet service providers

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑