43:
161:
can reject an item at the initial SMTP connection stage or pass it through unchanged for delivery to the user's mailbox. It is also possible to redirect the message for delivery elsewhere, quarantine it for further checking, modify it or 'tag' it in any other way.
245:. Outbound email filtering involves the reverse - scanning email messages from local users before any potentially harmful messages can be delivered to others on the Internet. One method of outbound email filtering that is commonly used by
182:
at some companies to ensure that employees comply with appropriate policies and laws. Users might also employ a mail filter to prioritize messages, and to sort them into folders based on subject matter or other criteria.
241:
Mail filters can operate on inbound and outbound email traffic. Inbound email filtering involves scanning messages from the
Internet addressed to users protected by the filtering system or for
289:, which specifies conditions to match and actions to take on matching, which may involve further matching. Some more advanced filters, particularly anti-spam filters, use statistical
301:
to organize incoming emails. Image filtering can use complex image-analysis algorithms to detect skin-tones and specific body shapes normally associated with pornographic images.
146:
to organize it according to specified criteria. The term can apply to the intervention of human intelligence, but most often refers to the automatic processing of messages at an
219:
assets. A catch-all filter will "catch all" of the emails addressed to the domain that do not exist in the mail server - this can help avoid losing emails due to misspelling.
178:. Mailbox providers filter outgoing email to promptly react to spam surges that may result from compromised accounts. A less common use is to
702:
253:, in which email traffic is intercepted and filtered via a transparent proxy within the network. Outbound filtering can also take place in an
212:
as a service to all of their customers. Anti-virus, anti-spam, URL filtering, and authentication-based rejections are common filter types.
742:
717:
530:
233:). In email programs, users can make personal, "manual" filters that then automatically filter mail according to the chosen criteria.
471:
277:. Other times, code may match keywords in the message body, or perhaps the email address of the sender of the message. More complex
126:
367:
60:
898:
380:
341:
107:
64:
79:
147:
697:
579:
192:
86:
298:
737:
484:
A rule is a set of conditions, actions, and exceptions that controls how
Outlook processes and organizes messages.
246:
93:
712:
609:
574:
331:
316:
290:
282:
75:
53:
547:
523:
294:
250:
216:
326:
273:
Mail filters have varying degrees of configurability. Sometimes they make decisions based on matching a
28:
430:
225:, may be able to install separate programs (see links below), or configure filtering as part of their
752:
722:
689:
336:
258:
200:
196:
151:
727:
569:
242:
209:
179:
908:
274:
463:
893:
707:
650:
516:
499:
467:
304:
100:
848:
795:
321:
222:
205:
860:
830:
564:
903:
870:
840:
790:
732:
655:
645:
589:
456:
281:
and logic is possible with programming languages; this is typically implemented with a
175:
887:
805:
770:
670:
604:
508:
853:
810:
780:
630:
278:
262:
254:
226:
815:
625:
42:
405:
785:
762:
635:
594:
556:
347:
170:
Common uses for mail filters include organizing incoming email and removal of
454:
Padwick, Gordon; Feddema, Helen Bell (1999). "22: Creating and Using Rules".
820:
800:
675:
17:
154:. Filtering can be applied to incoming emails as well as to outgoing ones.
865:
775:
660:
640:
539:
286:
171:
158:
747:
665:
599:
503:
215:
Corporations often use filters to protect their employees and their
825:
584:
143:
34:
Processing of email to organize it according to specified criteria
512:
27:"Spam filter" redirects here. For Knowledge's spam filter, see
36:
265:
to prevent the leakage of sensitive information via email.
462:. Using Series. Indianapolis: Que Publishing. p.
307:
includes user-generated email filters called "rules".
157:
Depending on the calling environment, email filtering
839:
761:
688:
618:
555:
546:
67:. Unsourced material may be challenged and removed.
455:
431:"A Guide to Smart Filters | InMoat Knowledge Base"
381:"How Pervasive is ISP Outbound Email Filtering?"
344:is an RFC standard for describing mail filters
524:
8:
552:
531:
517:
509:
127:Learn how and when to remove this message
359:
208:can also install mail filters in their
406:"Inbound and Outbound Email Filtering"
7:
65:adding citations to reliable sources
718:Distributed Checksum Clearinghouse
25:
703:Challenge–response spam filtering
540:Unsolicited digital communication
41:
342:Sieve (mail filtering language)
52:needs additional citations for
237:Inbound and outbound filtering
1:
261:technology in their outbound
458:Using Microsoft Outlook 2000
193:Anti-spam techniques (users)
348:White list#Email whitelists
299:natural language processing
257:. Many corporations employ
925:
738:Naive Bayes spam filtering
247:Internet service providers
190:
150:server, possibly applying
26:
251:transparent SMTP proxying
713:Disposable email address
575:Directory harvest attack
379:Zonk (31 January 2008).
337:Outbound Spam Protection
332:Markovian discrimination
317:Bayesian spam filtering
293:techniques such as the
291:document classification
283:data-driven programming
899:Communication software
295:naive Bayes classifier
217:information technology
180:inspect outgoing email
327:Information filtering
142:is the processing of
29:Knowledge:Spam filter
723:Email authentication
368:5xx SMTP status code
259:data leak prevention
210:mail transfer agents
201:Email authentication
197:Anti-spam techniques
152:anti-spam techniques
61:improve this article
570:Bulk email software
243:lawful interception
285:language, such as
275:regular expression
881:
880:
708:Context filtering
684:
683:
305:Microsoft Outlook
297:while others use
206:Mailbox providers
137:
136:
129:
111:
76:"Email filtering"
16:(Redirected from
916:
849:Advance-fee scam
796:Keyword stuffing
553:
533:
526:
519:
510:
487:
486:
481:
480:
461:
451:
445:
444:
442:
441:
427:
421:
420:
418:
416:
402:
396:
395:
393:
391:
376:
370:
364:
176:computer viruses
132:
125:
121:
118:
112:
110:
69:
45:
37:
21:
924:
923:
919:
918:
917:
915:
914:
913:
884:
883:
882:
877:
861:Make Money Fast
835:
831:URL redirection
757:
680:
614:
565:Address munging
542:
537:
496:
491:
490:
478:
476:
474:
453:
452:
448:
439:
437:
429:
428:
424:
414:
412:
404:
403:
399:
389:
387:
378:
377:
373:
365:
361:
356:
313:
271:
239:
203:
191:Main articles:
189:
168:
140:Email filtering
133:
122:
116:
113:
70:
68:
58:
46:
35:
32:
23:
22:
15:
12:
11:
5:
922:
920:
912:
911:
906:
901:
896:
886:
885:
879:
878:
876:
875:
874:
873:
863:
858:
857:
856:
845:
843:
841:Internet fraud
837:
836:
834:
833:
828:
823:
818:
813:
808:
803:
798:
793:
791:Google bombing
788:
783:
778:
773:
767:
765:
759:
758:
756:
755:
750:
745:
740:
735:
733:List poisoning
730:
725:
720:
715:
710:
705:
700:
694:
692:
686:
685:
682:
681:
679:
678:
673:
668:
663:
658:
653:
648:
643:
638:
633:
628:
622:
620:
616:
615:
613:
612:
607:
602:
597:
592:
590:Email spoofing
587:
582:
577:
572:
567:
561:
559:
550:
544:
543:
538:
536:
535:
528:
521:
513:
507:
506:
500:Spam filtering
495:
494:External links
492:
489:
488:
472:
446:
435:www.inmoat.com
422:
397:
371:
358:
357:
355:
352:
351:
350:
345:
339:
334:
329:
324:
319:
312:
309:
270:
267:
238:
235:
188:
185:
167:
164:
135:
134:
49:
47:
40:
33:
24:
14:
13:
10:
9:
6:
4:
3:
2:
921:
910:
907:
905:
902:
900:
897:
895:
892:
891:
889:
872:
869:
868:
867:
864:
862:
859:
855:
852:
851:
850:
847:
846:
844:
842:
838:
832:
829:
827:
824:
822:
819:
817:
814:
812:
809:
807:
806:Referrer spam
804:
802:
799:
797:
794:
792:
789:
787:
784:
782:
779:
777:
774:
772:
769:
768:
766:
764:
760:
754:
751:
749:
746:
744:
741:
739:
736:
734:
731:
729:
726:
724:
721:
719:
716:
714:
711:
709:
706:
704:
701:
699:
696:
695:
693:
691:
687:
677:
674:
672:
671:Telemarketing
669:
667:
664:
662:
659:
657:
654:
652:
649:
647:
644:
642:
639:
637:
634:
632:
629:
627:
624:
623:
621:
617:
611:
608:
606:
605:Pink contract
603:
601:
598:
596:
593:
591:
588:
586:
583:
581:
578:
576:
573:
571:
568:
566:
563:
562:
560:
558:
554:
551:
549:
545:
541:
534:
529:
527:
522:
520:
515:
514:
511:
505:
501:
498:
497:
493:
485:
475:
473:9780789719096
469:
465:
460:
459:
450:
447:
436:
432:
426:
423:
411:
407:
401:
398:
386:
382:
375:
372:
369:
363:
360:
353:
349:
346:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
314:
310:
308:
306:
302:
300:
296:
292:
288:
284:
280:
276:
269:Customization
268:
266:
264:
260:
256:
252:
248:
244:
236:
234:
232:
228:
227:email program
224:
220:
218:
213:
211:
207:
202:
198:
194:
186:
184:
181:
177:
173:
165:
163:
160:
155:
153:
149:
145:
141:
131:
128:
120:
109:
106:
102:
99:
95:
92:
88:
85:
81:
78: –
77:
73:
72:Find sources:
66:
62:
56:
55:
50:This article
48:
44:
39:
38:
30:
19:
854:Lottery scam
811:Scraper site
781:Doorway page
651:Mobile phone
631:Cold calling
483:
477:. Retrieved
457:
449:
438:. Retrieved
434:
425:
413:. Retrieved
409:
400:
390:15 September
388:. Retrieved
385:Slashdot.org
384:
374:
362:
303:
279:control flow
272:
263:mail servers
255:email server
240:
231:email client
230:
221:
214:
204:
169:
156:
139:
138:
123:
114:
104:
97:
90:
83:
71:
59:Please help
54:verification
51:
18:Email Filter
816:Social spam
728:Greylisting
698:Client-side
626:Auto dialer
888:Categories
821:Spam blogs
786:Forum spam
763:Spamdexing
636:Flyposting
595:Image spam
557:Email spam
479:2017-01-10
440:2021-10-19
410:thexyz.com
354:References
166:Motivation
87:newspapers
909:Anti-spam
801:Link farm
771:Blog spam
690:Anti-spam
656:Newsgroup
646:Messaging
548:Protocols
894:Spamming
866:Phishing
776:Cloaking
753:Spamhaus
661:Robocall
641:Junk fax
311:See also
287:procmail
159:software
117:May 2024
748:SpamCop
666:Spambot
610:Spambot
600:Joe job
366:With a
187:Methods
101:scholar
504:Curlie
470:
415:15 May
322:CRM114
199:, and
103:
96:
89:
82:
74:
904:Email
871:Voice
826:Sping
743:SORBS
619:Other
585:DNSWL
580:DNSBL
223:Users
144:email
108:JSTOR
94:books
676:VoIP
468:ISBN
417:2023
392:2011
174:and
172:spam
148:SMTP
80:news
502:at
464:618
249:is
63:by
890::
482:.
466:.
433:.
408:.
383:.
195:,
532:e
525:t
518:v
443:.
419:.
394:.
229:(
130:)
124:(
119:)
115:(
105:·
98:·
91:·
84:·
57:.
31:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.