SlideShare a Scribd company logo
© 2016 Alt-N Technologies
Spam Filter Recommendations
© 2016 Alt-N Technologies
Introduction
Is spam making you pull
your hair out? Follow
these best practices to
reduce spam.
© 2016 Alt-N Technologies
Standard Defense Layers Before Acceptance
• IP Screening
• Host Screening
• Reverse Lookup
• IP Shielding
• Backscatter
Protection
• Tarpitting
• Greylisting
• DNS Black Lists
• DKIM, SPF
• Inline Spam
Filtering
© 2016 Alt-N Technologies
Defense Layers Before Acceptance with SecurityPlus
• IP Screening
• Host Screening
• Reverse Lookup
• IP Shielding
• Backscatter
Protection
• Tarpitting
• Greylisting
• DNS Black Lists
• DKIM, SPF
• Inline Spam
Filtering
• Inline Virus Scan
• Outbreak
Protection
© 2016 Alt-N Technologies
Important Recommendations
Use the latest version of MDaemon
Use the Help menu
to check for
updates.
© 2016 Alt-N Technologies
Important Recommendations
Install the latest SecurityPlus plug-in
Signature-based antivirus
scanning engine
(with automatic updates)
© 2016 Alt-N Technologies
Important Recommendations
Install the latest SecurityPlus plug-in
Outbreak Protection
Filters emails based on
distribution patterns in real-time
© 2016 Alt-N Technologies
Important Recommendations
Enable Bayesian
Classification
Helps train the spam filter to be
more accurate by feeding it
samples of spam & non-spam
© 2016 Alt-N Technologies
Spam filter settings
Place spam in Spam
Trap folder for
Administrator Review.
Helps reduce false-
positives.
© 2016 Alt-N Technologies
Spam filter settings
SMTP rejection
threshold should be
higher than the Spam
Score threshold
© 2016 Alt-N Technologies
Spam filter settings
Black List (by sender)
adds 100 points to
spam score by
default.
© 2016 Alt-N Technologies
Spam filter settings
Black List (by sender)
adds 100 points to
spam score by
default.
Use for blocking legitimate
addresses.
Blacklisting spoofed addresses is not
effective.
© 2016 Alt-N Technologies
DNS-BL
Enable DNS-BL to
check connections
against publicly
hosted DNS blacklists.
© 2016 Alt-N Technologies
DNS-BL
By default, MDaemon will
check DNS blacklists for IP
addresses within received
headers on SMTP and POP
collected mail.
© 2016 Alt-N Technologies
DNS-BL
By default, 3 points
are added to the
spam score for
messages from IP’s
on a blacklist.
You can optionally
refuse messages
from blacklisted IPs.
© 2016 Alt-N Technologies
Spam Honeypots
Enable spam honeypots.
Messages addressed to a honeypot are
fed to the Bayesian Learning engine.
© 2016 Alt-N Technologies
Block relaying attempts with
‘Relay Control’
Check these three boxes
to prevent relaying
© 2016 Alt-N Technologies
Block spoofing with the ‘IP Shield’
Mail from specific
domain must
have come from
designated IP
address or IP
address range.
© 2016 Alt-N Technologies
Block spoofing with the ‘IP Shield’
Local users
connecting from
outside of your
network can be
exempt from IP
Shielding when SMTP
authentication is
used.
© 2016 Alt-N Technologies
Require Strong Passwords
© 2016 Alt-N Technologies
Require SMTP Authentication
© 2016 Alt-N Technologies
Enable Reverse Lookups
These three boxes
are checked by
default
© 2016 Alt-N Technologies
Reverse Lookups
Check this box to
exempt authenticated
sessions.
© 2016 Alt-N Technologies
Handling annoyance emails with
‘Address Blacklist’
Block emails from
legitimate addresses
or domains
© 2016 Alt-N Technologies
Still Suffering from too much
Spam?
• Make sure you haven’t whitelisted or excluded the sender’s or recipient’s
address from MDaemon’s spam filter.
• Make sure the spammer didn’t authenticate their SMTP session by
guessing a local account’s password.
• Make sure the connection didn’t originate from a trusted or local IP
address.
To check the above, check the following two logs:
• MDaemon-yyyymmdd-SMTP-(In).log
• MDaemon-yyyymmdd-AntiSpam.log
•
…located in the MDaemon/Logs directory.
© 2016 Alt-N Technologies
Rebuilding the Bayesian Filtering
Database
1. Stop MDaemon
2. Rename the MDaemonSpamAssassinBayes folder to
MDaemonSpamassassinBayes_old
3. Restart MDaemon
You will then need to feed the Bayesiarn Learning folders
at least 200 spam & 200 non-spam messages to start the
Bayesian learning process again.
See the following knowledge base article for instructions:
http://www.altn.com/Support/KnowledgeBase/KnowledgeBaseResults?Numb
er=KBA-01746
© 2016 Alt-N Technologies
Conclusions
 Install SecurityPlus
 Use Bayesian Filtering
 Configure spam scoring
 Use whitelists & blacklists with caution
 Use DNS blacklist
 Use spam honeypots
 Block relay attempts
 Use the IP shield
 Use strong passwords
 Require SMTP authentication
 Enable reverse lookups
 Use address blacklists
Enable these settings to cut down on spam:
© 2016 Alt-N Technologies
®
Trusted Messaging Solutions
www.altn.com
Thank You

More Related Content

What's hot

Demystifying flink memory allocation and tuning - Roshan Naik, Uber
Demystifying flink memory allocation and tuning - Roshan Naik, UberDemystifying flink memory allocation and tuning - Roshan Naik, Uber
Demystifying flink memory allocation and tuning - Roshan Naik, Uber
Flink Forward
 
Understanding Oracle RAC 11g Release 2 Internals
Understanding Oracle RAC 11g Release 2 InternalsUnderstanding Oracle RAC 11g Release 2 Internals
Understanding Oracle RAC 11g Release 2 Internals
Markus Michalewicz
 
Sql Antipatterns Strike Back
Sql Antipatterns Strike BackSql Antipatterns Strike Back
Sql Antipatterns Strike Back
Karwin Software Solutions LLC
 
Unit testing framework
Unit testing frameworkUnit testing framework
Unit testing framework
Igor Vavrish
 
Dynomite @ Redis Conference 2016
Dynomite @ Redis Conference 2016Dynomite @ Redis Conference 2016
Dynomite @ Redis Conference 2016
Ioannis Papapanagiotou
 
AWR Sample Report
AWR Sample ReportAWR Sample Report
AWR Sample Report
Devendra Singh
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
CA Technologies
 
DevNexus 2019: Migrating to Java 11
DevNexus 2019: Migrating to Java 11DevNexus 2019: Migrating to Java 11
DevNexus 2019: Migrating to Java 11
DaliaAboSheasha
 
Percona Live 2022 - MySQL Shell for Visual Studio Code
Percona Live 2022 - MySQL Shell for Visual Studio CodePercona Live 2022 - MySQL Shell for Visual Studio Code
Percona Live 2022 - MySQL Shell for Visual Studio Code
Frederic Descamps
 
Presentation oracle on power power advantages and license optimization
Presentation   oracle on power power advantages and license optimizationPresentation   oracle on power power advantages and license optimization
Presentation oracle on power power advantages and license optimization
solarisyougood
 
What's new in Oracle 19c & 18c Recovery Manager (RMAN)
What's new in Oracle 19c & 18c Recovery Manager (RMAN)What's new in Oracle 19c & 18c Recovery Manager (RMAN)
What's new in Oracle 19c & 18c Recovery Manager (RMAN)
Satishbabu Gunukula
 
Less01 architecture
Less01 architectureLess01 architecture
Less01 architecture
Amit Bhalla
 
S108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905dS108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905d
Tony Pearson
 
Reactive programming with examples
Reactive programming with examplesReactive programming with examples
Reactive programming with examples
Peter Lawrey
 
Primeros pasos con Logstash y Beats
Primeros pasos con Logstash y BeatsPrimeros pasos con Logstash y Beats
Primeros pasos con Logstash y Beats
UllyCarolinneSampaio
 
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
オラクルエンジニア通信
 
Writing and testing high frequency trading engines in java
Writing and testing high frequency trading engines in javaWriting and testing high frequency trading engines in java
Writing and testing high frequency trading engines in java
Peter Lawrey
 
Analyzing awr report
Analyzing awr reportAnalyzing awr report
Analyzing awr report
satish Gaddipati
 
FAQ on Dedupe NetApp
FAQ on Dedupe NetAppFAQ on Dedupe NetApp
FAQ on Dedupe NetApp
Ashwin Pawar
 
Disaster recovery strategies for oVirt
Disaster recovery strategies for oVirtDisaster recovery strategies for oVirt
Disaster recovery strategies for oVirt
Pawel Maczka
 

What's hot (20)

Demystifying flink memory allocation and tuning - Roshan Naik, Uber
Demystifying flink memory allocation and tuning - Roshan Naik, UberDemystifying flink memory allocation and tuning - Roshan Naik, Uber
Demystifying flink memory allocation and tuning - Roshan Naik, Uber
 
Understanding Oracle RAC 11g Release 2 Internals
Understanding Oracle RAC 11g Release 2 InternalsUnderstanding Oracle RAC 11g Release 2 Internals
Understanding Oracle RAC 11g Release 2 Internals
 
Sql Antipatterns Strike Back
Sql Antipatterns Strike BackSql Antipatterns Strike Back
Sql Antipatterns Strike Back
 
Unit testing framework
Unit testing frameworkUnit testing framework
Unit testing framework
 
Dynomite @ Redis Conference 2016
Dynomite @ Redis Conference 2016Dynomite @ Redis Conference 2016
Dynomite @ Redis Conference 2016
 
AWR Sample Report
AWR Sample ReportAWR Sample Report
AWR Sample Report
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
 
DevNexus 2019: Migrating to Java 11
DevNexus 2019: Migrating to Java 11DevNexus 2019: Migrating to Java 11
DevNexus 2019: Migrating to Java 11
 
Percona Live 2022 - MySQL Shell for Visual Studio Code
Percona Live 2022 - MySQL Shell for Visual Studio CodePercona Live 2022 - MySQL Shell for Visual Studio Code
Percona Live 2022 - MySQL Shell for Visual Studio Code
 
Presentation oracle on power power advantages and license optimization
Presentation   oracle on power power advantages and license optimizationPresentation   oracle on power power advantages and license optimization
Presentation oracle on power power advantages and license optimization
 
What's new in Oracle 19c & 18c Recovery Manager (RMAN)
What's new in Oracle 19c & 18c Recovery Manager (RMAN)What's new in Oracle 19c & 18c Recovery Manager (RMAN)
What's new in Oracle 19c & 18c Recovery Manager (RMAN)
 
Less01 architecture
Less01 architectureLess01 architecture
Less01 architecture
 
S108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905dS108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905d
 
Reactive programming with examples
Reactive programming with examplesReactive programming with examples
Reactive programming with examples
 
Primeros pasos con Logstash y Beats
Primeros pasos con Logstash y BeatsPrimeros pasos con Logstash y Beats
Primeros pasos con Logstash y Beats
 
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
 
Writing and testing high frequency trading engines in java
Writing and testing high frequency trading engines in javaWriting and testing high frequency trading engines in java
Writing and testing high frequency trading engines in java
 
Analyzing awr report
Analyzing awr reportAnalyzing awr report
Analyzing awr report
 
FAQ on Dedupe NetApp
FAQ on Dedupe NetAppFAQ on Dedupe NetApp
FAQ on Dedupe NetApp
 
Disaster recovery strategies for oVirt
Disaster recovery strategies for oVirtDisaster recovery strategies for oVirt
Disaster recovery strategies for oVirt
 

Similar to MDaemon Spam Filter Recommended Settings

SecurityGateway for Email Servers - Feature Overview
SecurityGateway for Email Servers - Feature OverviewSecurityGateway for Email Servers - Feature Overview
SecurityGateway for Email Servers - Feature Overview
Alt-N Technologies
 
Spamtitan_brochure_V3
Spamtitan_brochure_V3Spamtitan_brochure_V3
Spamtitan_brochure_V3
Shamal Abeyrathne
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
B2BCamp
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
Jason Trost
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Canada
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
Dryden Geary
 
Anatomy Of An Attack
Anatomy Of An AttackAnatomy Of An Attack
Anatomy Of An Attack
Cisco Canada
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Canada
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
Cisco Canada
 
Cisco connect winnipeg 2018 anatomy of an attack
Cisco connect winnipeg 2018   anatomy of an attackCisco connect winnipeg 2018   anatomy of an attack
Cisco connect winnipeg 2018 anatomy of an attack
Cisco Canada
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email Deliverability
Chris Arrendale
 
OWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls PresentationOWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls Presentation
OWASP Atlanta
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
NormShield
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Carl Blume
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Amazon Web Services
 
Prevention first platform for cyber defence the alternative strategy khipu ...
Prevention first platform for cyber defence the alternative strategy   khipu ...Prevention first platform for cyber defence the alternative strategy   khipu ...
Prevention first platform for cyber defence the alternative strategy khipu ...
Jisc
 
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešeníAntispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
MarketingArrowECS_CZ
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01
Ralbary
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Amazon Web Services
 

Similar to MDaemon Spam Filter Recommended Settings (20)

SecurityGateway for Email Servers - Feature Overview
SecurityGateway for Email Servers - Feature OverviewSecurityGateway for Email Servers - Feature Overview
SecurityGateway for Email Servers - Feature Overview
 
Spamtitan_brochure_V3
Spamtitan_brochure_V3Spamtitan_brochure_V3
Spamtitan_brochure_V3
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
Anatomy Of An Attack
Anatomy Of An AttackAnatomy Of An Attack
Anatomy Of An Attack
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
 
Cisco connect winnipeg 2018 anatomy of an attack
Cisco connect winnipeg 2018   anatomy of an attackCisco connect winnipeg 2018   anatomy of an attack
Cisco connect winnipeg 2018 anatomy of an attack
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email Deliverability
 
OWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls PresentationOWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls Presentation
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
 
Prevention first platform for cyber defence the alternative strategy khipu ...
Prevention first platform for cyber defence the alternative strategy   khipu ...Prevention first platform for cyber defence the alternative strategy   khipu ...
Prevention first platform for cyber defence the alternative strategy khipu ...
 
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešeníAntispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 

Recently uploaded

Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
Envertis Software Solutions
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 

Recently uploaded (20)

Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 

MDaemon Spam Filter Recommended Settings

  • 1. © 2016 Alt-N Technologies Spam Filter Recommendations
  • 2. © 2016 Alt-N Technologies Introduction Is spam making you pull your hair out? Follow these best practices to reduce spam.
  • 3. © 2016 Alt-N Technologies Standard Defense Layers Before Acceptance • IP Screening • Host Screening • Reverse Lookup • IP Shielding • Backscatter Protection • Tarpitting • Greylisting • DNS Black Lists • DKIM, SPF • Inline Spam Filtering
  • 4. © 2016 Alt-N Technologies Defense Layers Before Acceptance with SecurityPlus • IP Screening • Host Screening • Reverse Lookup • IP Shielding • Backscatter Protection • Tarpitting • Greylisting • DNS Black Lists • DKIM, SPF • Inline Spam Filtering • Inline Virus Scan • Outbreak Protection
  • 5. © 2016 Alt-N Technologies Important Recommendations Use the latest version of MDaemon Use the Help menu to check for updates.
  • 6. © 2016 Alt-N Technologies Important Recommendations Install the latest SecurityPlus plug-in Signature-based antivirus scanning engine (with automatic updates)
  • 7. © 2016 Alt-N Technologies Important Recommendations Install the latest SecurityPlus plug-in Outbreak Protection Filters emails based on distribution patterns in real-time
  • 8. © 2016 Alt-N Technologies Important Recommendations Enable Bayesian Classification Helps train the spam filter to be more accurate by feeding it samples of spam & non-spam
  • 9. © 2016 Alt-N Technologies Spam filter settings Place spam in Spam Trap folder for Administrator Review. Helps reduce false- positives.
  • 10. © 2016 Alt-N Technologies Spam filter settings SMTP rejection threshold should be higher than the Spam Score threshold
  • 11. © 2016 Alt-N Technologies Spam filter settings Black List (by sender) adds 100 points to spam score by default.
  • 12. © 2016 Alt-N Technologies Spam filter settings Black List (by sender) adds 100 points to spam score by default. Use for blocking legitimate addresses. Blacklisting spoofed addresses is not effective.
  • 13. © 2016 Alt-N Technologies DNS-BL Enable DNS-BL to check connections against publicly hosted DNS blacklists.
  • 14. © 2016 Alt-N Technologies DNS-BL By default, MDaemon will check DNS blacklists for IP addresses within received headers on SMTP and POP collected mail.
  • 15. © 2016 Alt-N Technologies DNS-BL By default, 3 points are added to the spam score for messages from IP’s on a blacklist. You can optionally refuse messages from blacklisted IPs.
  • 16. © 2016 Alt-N Technologies Spam Honeypots Enable spam honeypots. Messages addressed to a honeypot are fed to the Bayesian Learning engine.
  • 17. © 2016 Alt-N Technologies Block relaying attempts with ‘Relay Control’ Check these three boxes to prevent relaying
  • 18. © 2016 Alt-N Technologies Block spoofing with the ‘IP Shield’ Mail from specific domain must have come from designated IP address or IP address range.
  • 19. © 2016 Alt-N Technologies Block spoofing with the ‘IP Shield’ Local users connecting from outside of your network can be exempt from IP Shielding when SMTP authentication is used.
  • 20. © 2016 Alt-N Technologies Require Strong Passwords
  • 21. © 2016 Alt-N Technologies Require SMTP Authentication
  • 22. © 2016 Alt-N Technologies Enable Reverse Lookups These three boxes are checked by default
  • 23. © 2016 Alt-N Technologies Reverse Lookups Check this box to exempt authenticated sessions.
  • 24. © 2016 Alt-N Technologies Handling annoyance emails with ‘Address Blacklist’ Block emails from legitimate addresses or domains
  • 25. © 2016 Alt-N Technologies Still Suffering from too much Spam? • Make sure you haven’t whitelisted or excluded the sender’s or recipient’s address from MDaemon’s spam filter. • Make sure the spammer didn’t authenticate their SMTP session by guessing a local account’s password. • Make sure the connection didn’t originate from a trusted or local IP address. To check the above, check the following two logs: • MDaemon-yyyymmdd-SMTP-(In).log • MDaemon-yyyymmdd-AntiSpam.log • …located in the MDaemon/Logs directory.
  • 26. © 2016 Alt-N Technologies Rebuilding the Bayesian Filtering Database 1. Stop MDaemon 2. Rename the MDaemonSpamAssassinBayes folder to MDaemonSpamassassinBayes_old 3. Restart MDaemon You will then need to feed the Bayesiarn Learning folders at least 200 spam & 200 non-spam messages to start the Bayesian learning process again. See the following knowledge base article for instructions: http://www.altn.com/Support/KnowledgeBase/KnowledgeBaseResults?Numb er=KBA-01746
  • 27. © 2016 Alt-N Technologies Conclusions  Install SecurityPlus  Use Bayesian Filtering  Configure spam scoring  Use whitelists & blacklists with caution  Use DNS blacklist  Use spam honeypots  Block relay attempts  Use the IP shield  Use strong passwords  Require SMTP authentication  Enable reverse lookups  Use address blacklists Enable these settings to cut down on spam:
  • 28. © 2016 Alt-N Technologies ® Trusted Messaging Solutions www.altn.com Thank You