On 14/08/2022 04:23, Bill Cole wrote:
Not sure what you mean by that... There are a handful of rules that
sidestep specific false positive cases because the hit being evaded
isn't meaningful in specific cases. None of those are intended to
'whitelist' any domain, they exist to avoid incorrect hits.
RCVD_IN_DNSWL* and some trusted rules, as two examples, in years gone
by we've had obvious spam not binned because they were in those headers
taking away the sticks harshness, so we disable them and all like them.
I get it, small offices with no experienced IT on hand might find this
annoying, but enterprises and ISP world are able to fine tune this, but
we use a number of blacklists and complex milter-regex rules that stops
95% of the crud outright before hitting SA.
--
Regards,
Noel Butler
This Email, including attachments, may contain legally privileged
information, therefore at all times remains confidential and subject to
copyright protected under international law. You may not disseminate
this message without the authors express written authority to do so.
If you are not the intended recipient, please notify the sender then
delete all copies of this message including attachments immediately.
Confidentiality, copyright, and legal privilege are not waived or lost
by reason of the mistaken delivery of this message.