Page 47 - Mercury Manual.book
P. 47

Mail Filtering Rules  42
                                                                                         How mail filtering works



                                    Rules that always trigger (the Always triggers button)  This creates a rule that has no condi-
                                    tions and always triggers. You will most commonly use this type of rule in conjunction with
                                    flow control actions (see later in this section).

                                    Message size matching (the Size button)  Allows you to create a rule that triggers based on
                                    the size of the message. Enter the size you want to check, and whether the rule should trigger
                                    when the message is smaller or larger than that size.

                                    Message attributes (the Attribute button)  Allows you to trigger a rule depending on certain
                                    identifiable characteristics of the message. Select the attributes that should trigger the rule by
                                    checking any of the boxes in the editor dialog. Note that the rule will trigger if any of the con-
                                    ditions you check is true. If you want to check for messages that contain multiple attributes,
                                    you should check for each attribute and connect the rules using a Logical AND operator rule
                                    action (see below).

                                    List membership scan (the Scan list button)  creates a rule that triggers if the sender of the
                                    message is a member of a specified distribution list (see the section later in this manual for
                                    more information on distribution lists). You can use this type of rule to control access to your
                                    mailing lists (for instance, by allowing only list members to post mail to a list); you can also
                                    use it to control spam, or unsolicited commercial e-mail by adding known spam addresses to
                                    a distribution list then checking it before you accept mail for delivery. When you create the
                                    rule, simply type in the name of the distribution list Mercury should search, and it will do the
                                    rest (note: you should enter the name of the list as it appears in your "list of lists" file, without
                                    a domain). You can tell Mercury to scan a plain text file instead of a Mercury mailing list by
                                    entering the special character '@' followed by the full path to the file.

                                    List scan rules have two major applications:

                                    1. Creating "kill" files to catch "spam" (Unsolicited Commercial E-mail) from known
                 See the chapter on the   addresses. When you receive an unsolicited spam message, you can add the sender's
                 MercuryS SMTP Server
                 for information on other   address to a list of known evildoers, then delete all future messages from that address
                 ways of blacklisting known   using a single rule of this type.
                 spammers and their sys-
                 tems.
                                    2. Verifying that a person is a list member: if you offer services that are triggered by filter-
                                       ing rules (for instance, if you return product information or encryption keys in response
                                       to automated messages), then you may wish to verify that the person sending the request
                                       is actually a member of a list of authorised people before providing the service. You can
                                       use a rule of this type to determine whether or not the person is authorised based on their
                                       membership of a list.

                                    Advanced option – matching whole domains: You can create an entry in your target distribu-
                                    tion list that matches any address from a single domain by editing the list manually and add-
                                    ing a line exactly like this:

                                       \MATCH *@domain.com
                                    The "\" character must appear hard against the left margin of the file.


                                    Example: to suppress all mail from any address within the domain "bigdeals.com", you
                                    would add the following line to your distribution list:

                                       \MATCH *@bigdeals.com
   42   43   44   45   46   47   48   49   50   51   52