On 14/08/2022 04:23, Bill Cole wrote:

Not sure what you mean by that... There are a handful of rules that sidestep specific false positive cases because the hit being evaded isn't meaningful in specific cases. None of those are intended to 'whitelist' any domain, they exist to avoid incorrect hits.

RCVD_IN_DNSWL* and some trusted rules, as two examples, in years gone by we've had obvious spam not binned because they were in those headers taking away the sticks harshness, so we disable them and all like them.

I get it, small offices with no experienced IT on hand might find this annoying, but enterprises and ISP world are able to fine tune this, but we use a number of blacklists and complex milter-regex rules that stops 95% of the crud outright before hitting SA.

--
Regards,
Noel Butler

This Email, including attachments, may contain legally privileged information, therefore at all times remains confidential and subject to copyright protected under international law. You may not disseminate this message without the authors express written authority to do so. If you are not the intended recipient, please notify the sender then delete all copies of this message including attachments immediately. Confidentiality, copyright, and legal privilege are not waived or lost by reason of the mistaken delivery of this message.

Reply via email to