43:
161:
can reject an item at the initial SMTP connection stage or pass it through unchanged for delivery to the user's mailbox. It is also possible to redirect the message for delivery elsewhere, quarantine it for further checking, modify it or 'tag' it in any other way.
245:. Outbound email filtering involves the reverse - scanning email messages from local users before any potentially harmful messages can be delivered to others on the Internet. One method of outbound email filtering that is commonly used by
182:
at some companies to ensure that employees comply with appropriate policies and laws. Users might also employ a mail filter to prioritize messages, and to sort them into folders based on subject matter or other criteria.
241:
Mail filters can operate on inbound and outbound email traffic. Inbound email filtering involves scanning messages from the
Internet addressed to users protected by the filtering system or for
289:, which specifies conditions to match and actions to take on matching, which may involve further matching. Some more advanced filters, particularly anti-spam filters, use statistical
301:
to organize incoming emails. Image filtering can use complex image-analysis algorithms to detect skin-tones and specific body shapes normally associated with pornographic images.
146:
to organize it according to specified criteria. The term can apply to the intervention of human intelligence, but most often refers to the automatic processing of messages at an
219:
assets. A catch-all filter will "catch all" of the emails addressed to the domain that do not exist in the mail server - this can help avoid losing emails due to misspelling.
178:. Mailbox providers filter outgoing email to promptly react to spam surges that may result from compromised accounts. A less common use is to
253:, in which email traffic is intercepted and filtered via a transparent proxy within the network. Outbound filtering can also take place in an
212:
as a service to all of their customers. Anti-virus, anti-spam, URL filtering, and authentication-based rejections are common filter types.
367:
233:). In email programs, users can make personal, "manual" filters that then automatically filter mail according to the chosen criteria.
277:. Other times, code may match keywords in the message body, or perhaps the email address of the sender of the message. More complex
380:
107:
704:
79:
744:
719:
532:
86:
472:
126:
336:
60:
486:
A rule is a set of conditions, actions, and exceptions that controls how
Outlook processes and organizes messages.
900:
341:
93:
64:
147:
75:
699:
581:
192:
298:
17:
273:
Mail filters have varying degrees of configurability. Sometimes they make decisions based on matching a
739:
430:
225:, may be able to install separate programs (see links below), or configure filtering as part of their
246:
714:
611:
576:
331:
316:
290:
282:
53:
464:
549:
525:
294:
250:
216:
501:
326:
100:
31:
754:
724:
691:
258:
200:
196:
151:
8:
729:
571:
242:
209:
179:
347:
910:
457:
281:
and logic is possible with programming languages; this is typically implemented with a
274:
895:
709:
652:
518:
468:
304:
510:
850:
797:
321:
222:
205:
862:
832:
566:
905:
872:
842:
792:
734:
657:
647:
591:
405:
175:
170:
Common uses for mail filters include organizing incoming email and removal of
889:
807:
772:
672:
606:
455:
Padwick, Gordon; Feddema, Helen Bell (1999). "22: Creating and Using Rules".
855:
812:
782:
632:
278:
262:
254:
226:
154:. Filtering can be applied to incoming emails as well as to outgoing ones.
817:
627:
787:
764:
637:
596:
558:
822:
802:
677:
215:
Corporations often use filters to protect their employees and their
42:
867:
777:
662:
642:
541:
286:
171:
158:
27:
Processing of email to organize it according to specified criteria
749:
667:
601:
505:
30:"Spam filter" redirects here. For Knowledge's spam filter, see
827:
586:
143:
265:
to prevent the leakage of sensitive information via email.
463:. Using Series. Indianapolis: Que Publishing. p.
307:
includes user-generated email filters called "rules".
157:
Depending on the calling environment, email filtering
540:
67:. Unsourced material may be challenged and removed.
456:
431:"A Guide to Smart Filters | InMoat Knowledge Base"
236:
887:
381:"How Pervasive is ISP Outbound Email Filtering?"
454:
344:is an RFC standard for describing mail filters
526:
533:
519:
127:Learn how and when to remove this message
208:can also install mail filters in their
14:
888:
406:"Inbound and Outbound Email Filtering"
514:
378:
65:adding citations to reliable sources
36:
24:
720:Distributed Checksum Clearinghouse
25:
922:
705:Challenge–response spam filtering
542:Unsolicited digital communication
495:
268:
41:
342:Sieve (mail filtering language)
52:needs additional citations for
448:
423:
398:
372:
360:
237:Inbound and outbound filtering
13:
1:
353:
261:technology in their outbound
165:
459:Using Microsoft Outlook 2000
193:Anti-spam techniques (users)
7:
348:White list#Email whitelists
310:
299:natural language processing
257:. Many corporations employ
10:
927:
740:Naive Bayes spam filtering
247:Internet service providers
190:
186:
150:server, possibly applying
29:
841:
763:
690:
620:
557:
548:
251:transparent SMTP proxying
715:Disposable email address
577:Directory harvest attack
379:Zonk (31 January 2008).
337:Outbound Spam Protection
332:Markovian discrimination
317:Bayesian spam filtering
293:techniques such as the
291:document classification
283:data-driven programming
901:Communication software
295:naive Bayes classifier
217:information technology
180:inspect outgoing email
327:Information filtering
142:is the processing of
32:Knowledge:Spam filter
725:Email authentication
368:5xx SMTP status code
259:data leak prevention
210:mail transfer agents
201:Email authentication
197:Anti-spam techniques
152:anti-spam techniques
61:improve this article
572:Bulk email software
243:lawful interception
285:language, such as
275:regular expression
883:
882:
710:Context filtering
686:
685:
305:Microsoft Outlook
297:while others use
206:Mailbox providers
137:
136:
129:
111:
76:"Email filtering"
16:(Redirected from
918:
851:Advance-fee scam
798:Keyword stuffing
555:
554:
535:
528:
521:
512:
511:
489:
488:
483:
481:
462:
452:
446:
445:
443:
441:
427:
421:
420:
418:
416:
402:
396:
395:
393:
391:
376:
370:
364:
176:computer viruses
132:
125:
121:
118:
112:
110:
69:
45:
37:
21:
926:
925:
921:
920:
919:
917:
916:
915:
886:
885:
884:
879:
863:Make Money Fast
837:
833:URL redirection
759:
682:
616:
567:Address munging
544:
539:
498:
493:
492:
479:
477:
475:
453:
449:
439:
437:
429:
428:
424:
414:
412:
404:
403:
399:
389:
387:
377:
373:
365:
361:
356:
313:
271:
239:
203:
191:Main articles:
189:
168:
140:Email filtering
133:
122:
116:
113:
70:
68:
58:
46:
35:
28:
23:
22:
15:
12:
11:
5:
924:
914:
913:
908:
903:
898:
881:
880:
878:
877:
876:
875:
865:
860:
859:
858:
847:
845:
843:Internet fraud
839:
838:
836:
835:
830:
825:
820:
815:
810:
805:
800:
795:
793:Google bombing
790:
785:
780:
775:
769:
767:
761:
760:
758:
757:
752:
747:
742:
737:
735:List poisoning
732:
727:
722:
717:
712:
707:
702:
696:
694:
688:
687:
684:
683:
681:
680:
675:
670:
665:
660:
655:
650:
645:
640:
635:
630:
624:
622:
618:
617:
615:
614:
609:
604:
599:
594:
592:Email spoofing
589:
584:
579:
574:
569:
563:
561:
552:
546:
545:
538:
537:
530:
523:
515:
509:
508:
502:Spam filtering
497:
496:External links
494:
491:
490:
473:
447:
435:www.inmoat.com
422:
397:
371:
358:
357:
355:
352:
351:
350:
345:
339:
334:
329:
324:
319:
312:
309:
270:
267:
238:
235:
188:
185:
167:
164:
135:
134:
49:
47:
40:
26:
9:
6:
4:
3:
2:
923:
912:
909:
907:
904:
902:
899:
897:
894:
893:
891:
874:
871:
870:
869:
866:
864:
861:
857:
854:
853:
852:
849:
848:
846:
844:
840:
834:
831:
829:
826:
824:
821:
819:
816:
814:
811:
809:
808:Referrer spam
806:
804:
801:
799:
796:
794:
791:
789:
786:
784:
781:
779:
776:
774:
771:
770:
768:
766:
762:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
731:
728:
726:
723:
721:
718:
716:
713:
711:
708:
706:
703:
701:
698:
697:
695:
693:
689:
679:
676:
674:
673:Telemarketing
671:
669:
666:
664:
661:
659:
656:
654:
651:
649:
646:
644:
641:
639:
636:
634:
631:
629:
626:
625:
623:
619:
613:
610:
608:
607:Pink contract
605:
603:
600:
598:
595:
593:
590:
588:
585:
583:
580:
578:
575:
573:
570:
568:
565:
564:
562:
560:
556:
553:
551:
547:
543:
536:
531:
529:
524:
522:
517:
516:
513:
507:
503:
500:
499:
487:
476:
474:9780789719096
470:
466:
461:
460:
451:
436:
432:
426:
411:
407:
401:
386:
382:
375:
369:
363:
359:
349:
346:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
314:
308:
306:
302:
300:
296:
292:
288:
284:
280:
276:
269:Customization
266:
264:
260:
256:
252:
248:
244:
234:
232:
228:
227:email program
224:
220:
218:
213:
211:
207:
202:
198:
194:
184:
181:
177:
173:
163:
160:
155:
153:
149:
145:
141:
131:
128:
120:
109:
106:
102:
99:
95:
92:
88:
85:
81:
78: –
77:
73:
72:Find sources:
66:
62:
56:
55:
50:This article
48:
44:
39:
38:
33:
19:
856:Lottery scam
813:Scraper site
783:Doorway page
653:Mobile phone
633:Cold calling
485:
478:. Retrieved
458:
450:
438:. Retrieved
434:
425:
413:. Retrieved
409:
400:
390:15 September
388:. Retrieved
385:Slashdot.org
384:
374:
362:
303:
279:control flow
272:
263:mail servers
255:email server
240:
231:email client
230:
221:
214:
204:
169:
156:
139:
138:
123:
114:
104:
97:
90:
83:
71:
59:Please help
54:verification
51:
818:Social spam
730:Greylisting
700:Client-side
628:Auto dialer
18:Spam filter
890:Categories
823:Spam blogs
788:Forum spam
765:Spamdexing
638:Flyposting
597:Image spam
559:Email spam
480:10 January
440:19 October
410:thexyz.com
354:References
166:Motivation
87:newspapers
911:Anti-spam
803:Link farm
773:Blog spam
692:Anti-spam
658:Newsgroup
648:Messaging
550:Protocols
896:Spamming
868:Phishing
778:Cloaking
755:Spamhaus
663:Robocall
643:Junk fax
311:See also
287:procmail
159:software
117:May 2024
750:SpamCop
668:Spambot
612:Spambot
602:Joe job
366:With a
187:Methods
101:scholar
506:Curlie
471:
415:15 May
322:CRM114
199:, and
103:
96:
89:
82:
74:
906:Email
873:Voice
828:Sping
745:SORBS
621:Other
587:DNSWL
582:DNSBL
223:Users
144:email
108:JSTOR
94:books
678:VoIP
482:2017
469:ISBN
442:2021
417:2023
392:2011
174:and
172:spam
148:SMTP
80:news
504:at
465:618
249:is
63:by
892::
484:.
467:.
433:.
408:.
383:.
195:,
534:e
527:t
520:v
444:.
419:.
394:.
229:(
130:)
124:(
119:)
115:(
105:·
98:·
91:·
84:·
57:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.