+91 88 00 563434 [email protected] Blog open-book Knowledge Base

Find Solutions in Our Knowledge Base

All about Junk Email Filter

You are here:
Sharing is Caring

The Junk Email is used to keep junk email messages. It is also known as spam and it can be moved to the junk email folder.

Working

The junk email filter checks each incoming message, whether the message is spam or not, based on many factors. These factors include: message sending time, the content of the messages, etc. If the junk email filter setting is on and has a low protection level, then it catches only the most obvious spam. You can adjust the level of junk email protection.

Levels of Junk Email Protection

No Automatic Filtering

No Automatic Filtering option can be used to block messages from email addresses which have been added to the blocked senders list.

Low

The lower level will only filter the most obvious junk. You can use this option if you don’t receive many junk messages or want to filter only the messages that are the most obvious junk.

High

It filters all messages suspected as junk. You can use this option if you don’t want to receive lots of junk email but don’t want to restrict messages from your safe lists.

Safe Lists Only

This is the most restrictive option. The messages are considered junk if the messages that are sent from users are not in the safe senders list or to a mailing list in the safe recipients list.

Junk Email folder

The junk email folder is also known as spam folder. It is used for filtering junk emails. The junk email filter detects and electronically files into the junk email folder before appearing in the user’s inbox. The junk emails can be detected according to the message sending time and the contents of the messages. If it is deemed suspicious, the filter moves the emails into the junk email folder. The junk email settings are different for various email client.

 Junk Email Filter Lists

The junk email filter checks and filter each incoming message based on the junk email filter lists. The filter lists are used to identify if the messages are spam or not. You can add email addresses, names and domains to these lists so the filter can check according to the filter type you have specified.

Safe Senders List

The domain names or email addresses in safe sender limit are not considered as junk emails. It checks the content of the messages, so if any malicious contents are found it is then moved to the junk email folder. All addresses inside this list are safe only if the content of the message is real.

Safe Recipients List

This list can be used if you belong to a mailing list, then you can add the list sender to the safe recipients list. It checks the content of the messages and any malicious contents found are moved to the junk email folder. All address inside this list are safe only if the content of the message is real.

 Blocked Senders List

It can be used when you want to block messages from a particular sender by adding domain names or addresses to the Blocked Senders List. Messages from people or domain names that appear in this list are always moved to the junk folder, regardless of the content of the message.

Blocked Top-Level Domains List

The Blocked Top-Level Domains List is used to block messages from a country/region. You can add country/region codes to this list.

Blocked Encodings List

It can be used to block messages that appear in another character set or alphabet. You can add encodings to the Blocked Encodings List.

The Junk Email Filter can be used with the following kinds of email accounts

1) Exchange accounts in Cached Exchange Mode

2) POP3 account

3) MAP account

4) Exchange account that delivers to an Outlook Data File (.pst)

5) Outlook Connector for Outlook.com (formerly Hotmail)

6) Microsoft Outlook Connector for IBM Lotus Domino

Why Choose Junk Email Filter

1) Accuracy: It checks the behavior of the spammer as well as the content of the message.

2) Ease of setup: No hardware to buy, no software to install.

3) Affordable

4) Support

5) Reliability


Sharing is Caring

Leave a Comment

Table of Contents