Solved

Notes Mail

Posted on 2000-03-18
4
172 Views
Last Modified: 2013-12-18
Is there any way of blocking the e-mail messages from people we don't wish to receive mails from? Similar to the function "Block Sender" of Hotmail. Do we need to write script?Can anyone help me with the sample?
0
Comment
Question by:ina57
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
Arunkumar earned 10 total points
ID: 2632669
Yes !

You can use the Filters in R5 to block unwanted mails from specific recipients and you can lot more to search and block in R5 Which is recipient specific.

If you are on 4.x then i guess there is some server document setting that blocks mails from specific users.  But this applies to the whole server users.

Good Luck !

-Arun
0
 
LVL 1

Expert Comment

by:stharris
ID: 2632691
Arun is correct in that if you are running R5 you can use the Configuration Document(Router/SMTP\Restrictions and Controls\SMTP Inbound Controls) in the Public Directory to block specific email.  However; there is no way to block email from specific people in R4.  You can block specific Domains but not individuals.  To do this in R4 you would have to setup a relay Server and then configure the filtering there.

St. Harris
0
 
LVL 6

Expert Comment

by:ghassan99
ID: 2632952
In R5, you can do something similar at the client, using the Rules folder, deleteing messages from specific email addies...if its a problem to contact the admin.
In R4, you can create a text file of denied domains and use it at the server to reject emails from those domains.

-Gus
0
 
LVL 6

Expert Comment

by:ghassan99
ID: 2632954
Add to that, a script (in the form of an agent) for sure can be  implemented into the mail template in R4 to delete certain mail from certain senders, but I wonder if someone is willing to do that for 10 points...

-Gus
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

  In today’s Arena we can’t imagine our lives without Internet as we are highly used to of it. If we consider our life style just for only 2 min we found that face to face communication is swapped by e-communication.  Every Where from Works place to…
For beginners of Lotus Notes user this is important to know about the types of files and their location supported by IBM Notes. Mostly users are unaware about how many file types are created and what their usages are. This Article is fully dedicated…
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now