SlideShare une entreprise Scribd logo
1  sur  31
24 Hours of Exchange Server 2007 (Part 13 of 24): Maintaining Anti-Spam Systems Harold Wong [email_address] blogs.technet.com/haroldwong Audio: please try Streaming Internet Audio first If that doesn’t work, use: (800) 618-7506: Pin 5800
What We Will Cover ,[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object]
Deploying the Edge Transport Server ,[object Object],[object Object],[object Object],[object Object],Which of the following is not a key consideration when planning for an Edge Transport server?
Deploying the Edge Transport Server ,[object Object],[object Object],[object Object],[object Object],When securing the Edge Transport server,  what ports should be open on the Internet facing network adapter?
Deploying the Edge Transport Server ,[object Object],[object Object],[object Object],[object Object],When securing the Edge Transport server,  what ports should be open on the Corporate facing network adapter?
Configuring Internet Message Delivery ,[object Object],[object Object],[object Object],[object Object],Where is the recipient and configuration  data stored for Exchange Server 2007?
Configuring Internet Message Delivery ,[object Object],[object Object],[object Object],[object Object],Which of the following examines the remote  IP address of an inbound message to filter  spam attacks?
Configuring Internet Message Delivery ,[object Object],[object Object],[object Object],[object Object],Which of the following uses Microsoft  SmartScreen ®  technology with the  Intelligent Message Filter?
Agenda ,[object Object],[object Object],[object Object]
Exchange Server 2007 Anti-Spam Functionality Connection filtering  Sender filtering Recipient filtering Sender ID filtering Content filtering  Sender reputation filtering Attachment filtering Outlook junk e-mail filtering
Anti-Spam Mail Flow Connection filtering  Sender and recipient filtering Sender ID filtering Content filtering  Outlook junk e-mail filtering
The Defense-in-Depth Approach  Perimeter Firewall Edge  Transport Server Interior Firewall Hub Transport Server Mailbox Server Client Access Server Outlook E-mail Filtering
Introduction to Anti-Spam Management ,[object Object],[object Object],[object Object],[object Object],Q1: Which of the following is not a type of  Exchange Server 2007 anti-spam filtering?
Introduction to Anti-Spam Management ,[object Object],[object Object],[object Object],[object Object],Q2: Which anti-spam filtering feature includes  the spam quarantine?
Introduction to Anti-Spam Management ,[object Object],[object Object],[object Object],[object Object],Q3: What is considered the first line of defense  against spam attacks?
Agenda ,[object Object],[object Object],[object Object]
Connection Filtering  Yes Yes No Yes Yes IP allow list IP block list Safe provider list RBL No No No
Sender and Recipient Filtering Delete message Reject via SMTP Yes Yes On sender filter list On recipient block list No No
Sender ID Filtering Delete message Filter message No Yes No From blocked domain Allow sender ID failed On blocked sender list Yes No Yes Query SPF on sender’s DNS DNS
Content Filtering  Delete message Reject via SMTP Send to spam quarantine mailbox Microsoft update No No Yes Yes SCL exceeds deletion SCL exceeds rejection No Apply content filter Assign SCL rating Yes SCL  exceeds quarantine Safelist  Aggregation
[object Object],[object Object],[object Object],[object Object],demonstration
Exchange Server Hosted Filtering  Illegitimate senders Spam quarantine Directory service Exchange hosted filtering
Other Strategies and Techniques  Sender reputation filtering Attachment filtering  Spam quarantine Outlook junk e-mail filtering
[object Object],[object Object],[object Object],demonstration
Understanding Individual Components ,[object Object],[object Object],[object Object],[object Object],Q1: Which of the following is not a feature of  connection filtering?
Understanding Individual Components ,[object Object],[object Object],[object Object],[object Object],Q2: Which of the following filters do not query  outside servers or services?
Understanding Individual Components ,[object Object],[object Object],[object Object],[object Object],Q3: Which of the following component level  filtering includes safelist aggregation?
Session Summary ,[object Object],[object Object],[object Object]
Questions and Answers ,[object Object],[object Object],[object Object],[object Object],[object Object]
 

Contenu connexe

En vedette (9)

Puppet Kyle Easter 2008
Puppet Kyle Easter 2008Puppet Kyle Easter 2008
Puppet Kyle Easter 2008
 
Clase1
Clase1Clase1
Clase1
 
Art6 Examen Nerologico
Art6 Examen NerologicoArt6 Examen Nerologico
Art6 Examen Nerologico
 
Mall Hunt Winners
Mall Hunt WinnersMall Hunt Winners
Mall Hunt Winners
 
1. revolusi amerika
1. revolusi amerika1. revolusi amerika
1. revolusi amerika
 
Centro Mtropolitano Cemeined
Centro Mtropolitano CemeinedCentro Mtropolitano Cemeined
Centro Mtropolitano Cemeined
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 
Revolusi Amerika
Revolusi AmerikaRevolusi Amerika
Revolusi Amerika
 
Searching the Internet
Searching the Internet Searching the Internet
Searching the Internet
 

Similaire à 24 Hours Of Exchange Server 2007 ( Part 13 Of 24)

10135 a 06
10135 a 0610135 a 06
10135 a 06
Bố Su
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
webhostingguy
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
Apollo_n
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
John Jefferies
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04
Bố Su
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
bartholomeocoombs
 
On Premises Protection Technologies
On Premises Protection TechnologiesOn Premises Protection Technologies
On Premises Protection Technologies
Curtis Parker
 
Review the steps found in business process engineering. Review the.docx
Review the steps found in business process engineering. Review the.docxReview the steps found in business process engineering. Review the.docx
Review the steps found in business process engineering. Review the.docx
joellemurphey
 
Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08
kamensm02
 

Similaire à 24 Hours Of Exchange Server 2007 ( Part 13 Of 24) (20)

24 Hours Of Exchange Server 2007 ( Part 12 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 12 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 12 Of 24)
24 Hours Of Exchange Server 2007 ( Part 12 Of 24)
 
10135 a 06
10135 a 0610135 a 06
10135 a 06
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
10135 b 06
10135 b 0610135 b 06
10135 b 06
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
office365-exchange-online-protection
office365-exchange-online-protection office365-exchange-online-protection
office365-exchange-online-protection
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
 
On Premises Protection Technologies
On Premises Protection TechnologiesOn Premises Protection Technologies
On Premises Protection Technologies
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
Review the steps found in business process engineering. Review the.docx
Review the steps found in business process engineering. Review the.docxReview the steps found in business process engineering. Review the.docx
Review the steps found in business process engineering. Review the.docx
 
24 Hours Of Exchange Server 2007 ( Part 15 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 15 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 15 Of 24)
24 Hours Of Exchange Server 2007 ( Part 15 Of 24)
 
Forefront Protection for Office Overview
Forefront Protection for Office OverviewForefront Protection for Office Overview
Forefront Protection for Office Overview
 
Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08
 
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
 

Plus de Harold Wong

It camp veeam presentation (no videos)
It camp veeam presentation (no videos)It camp veeam presentation (no videos)
It camp veeam presentation (no videos)
Harold Wong
 

Plus de Harold Wong (20)

System Center 2012 SP1 Overview and Window Azure IaaS
System Center 2012 SP1 Overview and Window Azure IaaSSystem Center 2012 SP1 Overview and Window Azure IaaS
System Center 2012 SP1 Overview and Window Azure IaaS
 
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
 
Windows 8 Deployment
Windows 8 DeploymentWindows 8 Deployment
Windows 8 Deployment
 
FY13 Q2 IT Camp - Windows 8 Overview
FY13 Q2 IT Camp - Windows 8 OverviewFY13 Q2 IT Camp - Windows 8 Overview
FY13 Q2 IT Camp - Windows 8 Overview
 
TechMentor 2012: Deploying Windows Server 2012 Server Core
TechMentor 2012: Deploying Windows Server 2012 Server CoreTechMentor 2012: Deploying Windows Server 2012 Server Core
TechMentor 2012: Deploying Windows Server 2012 Server Core
 
TechMentor 2012: What's new in Windows Server 2012 and Hyper-V
TechMentor 2012: What's new in Windows Server 2012 and Hyper-VTechMentor 2012: What's new in Windows Server 2012 and Hyper-V
TechMentor 2012: What's new in Windows Server 2012 and Hyper-V
 
IT Camp - Vision Solutions Presentation
IT Camp - Vision Solutions PresentationIT Camp - Vision Solutions Presentation
IT Camp - Vision Solutions Presentation
 
Windows Server 2012 Beta Storage Overview
Windows Server 2012 Beta Storage OverviewWindows Server 2012 Beta Storage Overview
Windows Server 2012 Beta Storage Overview
 
IT Camp Windows Server 2012 Beta Hyper-V Overview
IT Camp Windows Server 2012 Beta Hyper-V OverviewIT Camp Windows Server 2012 Beta Hyper-V Overview
IT Camp Windows Server 2012 Beta Hyper-V Overview
 
FI-B328 How to Build a Microsoft Private Cloud Lab in 1,000 Tiny Steps
FI-B328 How to Build a Microsoft Private Cloud Lab in 1,000 Tiny StepsFI-B328 How to Build a Microsoft Private Cloud Lab in 1,000 Tiny Steps
FI-B328 How to Build a Microsoft Private Cloud Lab in 1,000 Tiny Steps
 
It camp veeam presentation (no videos)
It camp veeam presentation (no videos)It camp veeam presentation (no videos)
It camp veeam presentation (no videos)
 
Cloud Intelligence - Get Your Head Out of the Clouds
Cloud Intelligence - Get Your Head Out of the CloudsCloud Intelligence - Get Your Head Out of the Clouds
Cloud Intelligence - Get Your Head Out of the Clouds
 
Cloud Intelligence - Build a Private Cloud in a 1,000 Easy Steps
Cloud Intelligence - Build a Private Cloud in a 1,000 Easy StepsCloud Intelligence - Build a Private Cloud in a 1,000 Easy Steps
Cloud Intelligence - Build a Private Cloud in a 1,000 Easy Steps
 
IT Camp Opening - Los Angeles
IT Camp Opening - Los AngelesIT Camp Opening - Los Angeles
IT Camp Opening - Los Angeles
 
IT Camp Opening - Phoenix / Tempe
IT Camp Opening - Phoenix / TempeIT Camp Opening - Phoenix / Tempe
IT Camp Opening - Phoenix / Tempe
 
IT Camp - Server Migration Overview
IT Camp - Server Migration OverviewIT Camp - Server Migration Overview
IT Camp - Server Migration Overview
 
Private cloud forefront identity manager 2010 (adam bresson)
Private cloud   forefront identity manager 2010 (adam bresson)Private cloud   forefront identity manager 2010 (adam bresson)
Private cloud forefront identity manager 2010 (adam bresson)
 
Private cloud 201 how to build a private cloud
Private cloud 201 how to build a private cloud Private cloud 201 how to build a private cloud
Private cloud 201 how to build a private cloud
 
Get ready for tomorrow, today!
Get ready for tomorrow, today!Get ready for tomorrow, today!
Get ready for tomorrow, today!
 
Lync 2010 Conferencing Deep Dive
Lync 2010 Conferencing Deep DiveLync 2010 Conferencing Deep Dive
Lync 2010 Conferencing Deep Dive
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

24 Hours Of Exchange Server 2007 ( Part 13 Of 24)

  • 1. 24 Hours of Exchange Server 2007 (Part 13 of 24): Maintaining Anti-Spam Systems Harold Wong [email_address] blogs.technet.com/haroldwong Audio: please try Streaming Internet Audio first If that doesn’t work, use: (800) 618-7506: Pin 5800
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Exchange Server 2007 Anti-Spam Functionality Connection filtering Sender filtering Recipient filtering Sender ID filtering Content filtering Sender reputation filtering Attachment filtering Outlook junk e-mail filtering
  • 12. Anti-Spam Mail Flow Connection filtering Sender and recipient filtering Sender ID filtering Content filtering Outlook junk e-mail filtering
  • 13. The Defense-in-Depth Approach Perimeter Firewall Edge Transport Server Interior Firewall Hub Transport Server Mailbox Server Client Access Server Outlook E-mail Filtering
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Connection Filtering Yes Yes No Yes Yes IP allow list IP block list Safe provider list RBL No No No
  • 19. Sender and Recipient Filtering Delete message Reject via SMTP Yes Yes On sender filter list On recipient block list No No
  • 20. Sender ID Filtering Delete message Filter message No Yes No From blocked domain Allow sender ID failed On blocked sender list Yes No Yes Query SPF on sender’s DNS DNS
  • 21. Content Filtering Delete message Reject via SMTP Send to spam quarantine mailbox Microsoft update No No Yes Yes SCL exceeds deletion SCL exceeds rejection No Apply content filter Assign SCL rating Yes SCL exceeds quarantine Safelist Aggregation
  • 22.
  • 23. Exchange Server Hosted Filtering Illegitimate senders Spam quarantine Directory service Exchange hosted filtering
  • 24. Other Strategies and Techniques Sender reputation filtering Attachment filtering Spam quarantine Outlook junk e-mail filtering
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.