Knowledge

Email filtering

Source đź“ť

43: 161:
can reject an item at the initial SMTP connection stage or pass it through unchanged for delivery to the user's mailbox. It is also possible to redirect the message for delivery elsewhere, quarantine it for further checking, modify it or 'tag' it in any other way.
245:. Outbound email filtering involves the reverse - scanning email messages from local users before any potentially harmful messages can be delivered to others on the Internet. One method of outbound email filtering that is commonly used by 182:
at some companies to ensure that employees comply with appropriate policies and laws. Users might also employ a mail filter to prioritize messages, and to sort them into folders based on subject matter or other criteria.
241:
Mail filters can operate on inbound and outbound email traffic. Inbound email filtering involves scanning messages from the Internet addressed to users protected by the filtering system or for
289:, which specifies conditions to match and actions to take on matching, which may involve further matching. Some more advanced filters, particularly anti-spam filters, use statistical 301:
to organize incoming emails. Image filtering can use complex image-analysis algorithms to detect skin-tones and specific body shapes normally associated with pornographic images.
146:
to organize it according to specified criteria. The term can apply to the intervention of human intelligence, but most often refers to the automatic processing of messages at an
219:
assets. A catch-all filter will "catch all" of the emails addressed to the domain that do not exist in the mail server - this can help avoid losing emails due to misspelling.
178:. Mailbox providers filter outgoing email to promptly react to spam surges that may result from compromised accounts. A less common use is to 702: 253:, in which email traffic is intercepted and filtered via a transparent proxy within the network. Outbound filtering can also take place in an 212:
as a service to all of their customers. Anti-virus, anti-spam, URL filtering, and authentication-based rejections are common filter types.
742: 717: 530: 233:). In email programs, users can make personal, "manual" filters that then automatically filter mail according to the chosen criteria. 471: 277:. Other times, code may match keywords in the message body, or perhaps the email address of the sender of the message. More complex 126: 367: 60: 898: 380: 341: 107: 64: 79: 147: 697: 579: 192: 86: 298: 737: 484:
A rule is a set of conditions, actions, and exceptions that controls how Outlook processes and organizes messages.
246: 93: 712: 609: 574: 331: 316: 290: 282: 75: 53: 547: 523: 294: 250: 216: 326: 273:
Mail filters have varying degrees of configurability. Sometimes they make decisions based on matching a
28: 430: 225:, may be able to install separate programs (see links below), or configure filtering as part of their 752: 722: 689: 336: 258: 200: 196: 151: 727: 569: 242: 209: 179: 908: 274: 463: 893: 707: 650: 516: 499: 467: 304: 100: 848: 795: 321: 222: 205: 860: 830: 564: 903: 870: 840: 790: 732: 655: 645: 589: 456: 281:
and logic is possible with programming languages; this is typically implemented with a
175: 887: 805: 770: 670: 604: 508: 853: 810: 780: 630: 278: 262: 254: 226: 815: 625: 42: 405: 785: 762: 635: 594: 556: 347: 170:
Common uses for mail filters include organizing incoming email and removal of
454:
Padwick, Gordon; Feddema, Helen Bell (1999). "22: Creating and Using Rules".
820: 800: 675: 17: 154:. Filtering can be applied to incoming emails as well as to outgoing ones. 865: 775: 660: 640: 539: 286: 171: 158: 747: 665: 599: 503: 215:
Corporations often use filters to protect their employees and their
825: 584: 143: 34:
Processing of email to organize it according to specified criteria
512: 27:"Spam filter" redirects here. For Knowledge's spam filter, see 36: 265:
to prevent the leakage of sensitive information via email.
462:. Using Series. Indianapolis: Que Publishing. p.  307:
includes user-generated email filters called "rules".
157:
Depending on the calling environment, email filtering
839: 761: 688: 618: 555: 546: 67:. Unsourced material may be challenged and removed. 455: 431:"A Guide to Smart Filters | InMoat Knowledge Base" 381:"How Pervasive is ISP Outbound Email Filtering?" 344:is an RFC standard for describing mail filters 524: 8: 552: 531: 517: 509: 127:Learn how and when to remove this message 359: 208:can also install mail filters in their 406:"Inbound and Outbound Email Filtering" 7: 65:adding citations to reliable sources 718:Distributed Checksum Clearinghouse 25: 703:Challenge–response spam filtering 540:Unsolicited digital communication 41: 342:Sieve (mail filtering language) 52:needs additional citations for 237:Inbound and outbound filtering 1: 261:technology in their outbound 458:Using Microsoft Outlook 2000 193:Anti-spam techniques (users) 348:White list#Email whitelists 299:natural language processing 257:. Many corporations employ 925: 738:Naive Bayes spam filtering 247:Internet service providers 190: 150:server, possibly applying 26: 251:transparent SMTP proxying 713:Disposable email address 575:Directory harvest attack 379:Zonk (31 January 2008). 337:Outbound Spam Protection 332:Markovian discrimination 317:Bayesian spam filtering 293:techniques such as the 291:document classification 283:data-driven programming 899:Communication software 295:naive Bayes classifier 217:information technology 180:inspect outgoing email 327:Information filtering 142:is the processing of 29:Knowledge:Spam filter 723:Email authentication 368:5xx SMTP status code 259:data leak prevention 210:mail transfer agents 201:Email authentication 197:Anti-spam techniques 152:anti-spam techniques 61:improve this article 570:Bulk email software 243:lawful interception 285:language, such as 275:regular expression 881: 880: 708:Context filtering 684: 683: 305:Microsoft Outlook 297:while others use 206:Mailbox providers 137: 136: 129: 111: 76:"Email filtering" 16:(Redirected from 916: 849:Advance-fee scam 796:Keyword stuffing 553: 533: 526: 519: 510: 487: 486: 481: 480: 461: 451: 445: 444: 442: 441: 427: 421: 420: 418: 416: 402: 396: 395: 393: 391: 376: 370: 364: 176:computer viruses 132: 125: 121: 118: 112: 110: 69: 45: 37: 21: 924: 923: 919: 918: 917: 915: 914: 913: 884: 883: 882: 877: 861:Make Money Fast 835: 831:URL redirection 757: 680: 614: 565:Address munging 542: 537: 496: 491: 490: 478: 476: 474: 453: 452: 448: 439: 437: 429: 428: 424: 414: 412: 404: 403: 399: 389: 387: 378: 377: 373: 365: 361: 356: 313: 271: 239: 203: 191:Main articles: 189: 168: 140:Email filtering 133: 122: 116: 113: 70: 68: 58: 46: 35: 32: 23: 22: 15: 12: 11: 5: 922: 920: 912: 911: 906: 901: 896: 886: 885: 879: 878: 876: 875: 874: 873: 863: 858: 857: 856: 845: 843: 841:Internet fraud 837: 836: 834: 833: 828: 823: 818: 813: 808: 803: 798: 793: 791:Google bombing 788: 783: 778: 773: 767: 765: 759: 758: 756: 755: 750: 745: 740: 735: 733:List poisoning 730: 725: 720: 715: 710: 705: 700: 694: 692: 686: 685: 682: 681: 679: 678: 673: 668: 663: 658: 653: 648: 643: 638: 633: 628: 622: 620: 616: 615: 613: 612: 607: 602: 597: 592: 590:Email spoofing 587: 582: 577: 572: 567: 561: 559: 550: 544: 543: 538: 536: 535: 528: 521: 513: 507: 506: 500:Spam filtering 495: 494:External links 492: 489: 488: 472: 446: 435:www.inmoat.com 422: 397: 371: 358: 357: 355: 352: 351: 350: 345: 339: 334: 329: 324: 319: 312: 309: 270: 267: 238: 235: 188: 185: 167: 164: 135: 134: 49: 47: 40: 33: 24: 14: 13: 10: 9: 6: 4: 3: 2: 921: 910: 907: 905: 902: 900: 897: 895: 892: 891: 889: 872: 869: 868: 867: 864: 862: 859: 855: 852: 851: 850: 847: 846: 844: 842: 838: 832: 829: 827: 824: 822: 819: 817: 814: 812: 809: 807: 806:Referrer spam 804: 802: 799: 797: 794: 792: 789: 787: 784: 782: 779: 777: 774: 772: 769: 768: 766: 764: 760: 754: 751: 749: 746: 744: 741: 739: 736: 734: 731: 729: 726: 724: 721: 719: 716: 714: 711: 709: 706: 704: 701: 699: 696: 695: 693: 691: 687: 677: 674: 672: 671:Telemarketing 669: 667: 664: 662: 659: 657: 654: 652: 649: 647: 644: 642: 639: 637: 634: 632: 629: 627: 624: 623: 621: 617: 611: 608: 606: 605:Pink contract 603: 601: 598: 596: 593: 591: 588: 586: 583: 581: 578: 576: 573: 571: 568: 566: 563: 562: 560: 558: 554: 551: 549: 545: 541: 534: 529: 527: 522: 520: 515: 514: 511: 505: 501: 498: 497: 493: 485: 475: 473:9780789719096 469: 465: 460: 459: 450: 447: 436: 432: 426: 423: 411: 407: 401: 398: 386: 382: 375: 372: 369: 363: 360: 353: 349: 346: 343: 340: 338: 335: 333: 330: 328: 325: 323: 320: 318: 315: 314: 310: 308: 306: 302: 300: 296: 292: 288: 284: 280: 276: 269:Customization 268: 266: 264: 260: 256: 252: 248: 244: 236: 234: 232: 228: 227:email program 224: 220: 218: 213: 211: 207: 202: 198: 194: 186: 184: 181: 177: 173: 165: 163: 160: 155: 153: 149: 145: 141: 131: 128: 120: 109: 106: 102: 99: 95: 92: 88: 85: 81: 78: â€“  77: 73: 72:Find sources: 66: 62: 56: 55: 50:This article 48: 44: 39: 38: 30: 19: 854:Lottery scam 811:Scraper site 781:Doorway page 651:Mobile phone 631:Cold calling 483: 477:. Retrieved 457: 449: 438:. Retrieved 434: 425: 413:. Retrieved 409: 400: 390:15 September 388:. Retrieved 385:Slashdot.org 384: 374: 362: 303: 279:control flow 272: 263:mail servers 255:email server 240: 231:email client 230: 221: 214: 204: 169: 156: 139: 138: 123: 114: 104: 97: 90: 83: 71: 59:Please help 54:verification 51: 18:Email Filter 816:Social spam 728:Greylisting 698:Client-side 626:Auto dialer 888:Categories 821:Spam blogs 786:Forum spam 763:Spamdexing 636:Flyposting 595:Image spam 557:Email spam 479:2017-01-10 440:2021-10-19 410:thexyz.com 354:References 166:Motivation 87:newspapers 909:Anti-spam 801:Link farm 771:Blog spam 690:Anti-spam 656:Newsgroup 646:Messaging 548:Protocols 894:Spamming 866:Phishing 776:Cloaking 753:Spamhaus 661:Robocall 641:Junk fax 311:See also 287:procmail 159:software 117:May 2024 748:SpamCop 666:Spambot 610:Spambot 600:Joe job 366:With a 187:Methods 101:scholar 504:Curlie 470:  415:15 May 322:CRM114 199:, and 103:  96:  89:  82:  74:  904:Email 871:Voice 826:Sping 743:SORBS 619:Other 585:DNSWL 580:DNSBL 223:Users 144:email 108:JSTOR 94:books 676:VoIP 468:ISBN 417:2023 392:2011 174:and 172:spam 148:SMTP 80:news 502:at 464:618 249:is 63:by 890:: 482:. 466:. 433:. 408:. 383:. 195:, 532:e 525:t 518:v 443:. 419:. 394:. 229:( 130:) 124:( 119:) 115:( 105:· 98:· 91:· 84:· 57:. 31:. 20:)

Index

Email Filter
Knowledge:Spam filter

verification
improve this article
adding citations to reliable sources
"Email filtering"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
email
SMTP
anti-spam techniques
software
spam
computer viruses
inspect outgoing email
Anti-spam techniques (users)
Anti-spam techniques
Email authentication
Mailbox providers
mail transfer agents
information technology
Users
email program
lawful interception
Internet service providers

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑