Solved

My Sender Whitelist does not seem to be working?

Posted on 2008-10-27
5
818 Views
Last Modified: 2013-12-09
I realize this is an older version of Symantec Mail Security for Exchange, but I'm wondering why the whitelist is not working?

Do I have to populate the recipient and sender whitelist?  I do have an RBL it's running against as well.  This is with Exchange 2003.

Thank you!
0
Comment
Question by:cas_three
  • 3
  • 2
5 Comments
 
LVL 14

Accepted Solution

by:
Ehab Salem earned 500 total points
ID: 22820792
RBL comes first, then white list.
Is white list not working for all the list or for some?
Please bare in mind that a max of 50 emails only is processed.
0
 

Author Comment

by:cas_three
ID: 22821628
I thought only the recipient whitelist can hold up to 50, the sender whitelist does not indicate any limit.
0
 
LVL 14

Expert Comment

by:Ehab Salem
ID: 22821728
No, whitelist is limited to 50.
From Symantec Support:
http://service1.symantec.com/support/ent-gate.nsf/854fa02b4f5013678825731a007d06af/a62bb2cccb63253688256f010071827f?OpenDocument
To configure a recipient white list in Symantec Mail Security 4.6.x/4.5.x
Open Symantec Mail Security for the single server.
In the left pane, expand Configuration.
Click Spam Prevention Settings.
In the right pane, under Recipient White List, type the fully qualified email addresses (one per line) for which spam processing will be bypassed.
You can list up to 50 email addresses.

Click Save.
0
 

Author Comment

by:cas_three
ID: 22824835
Yeah, the sender whitelist does not indicate any limit.  I have worked with Symantec Mail Security before and did not have issues going above 50 for the sender whitelist, just the recepient whitelist.
0
 
LVL 14

Expert Comment

by:Ehab Salem
ID: 22828871
My answer above is copied from Symantec Website. Same is found in the SMSMSE Help. Even Ver 6 has got this limitation.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
vMware vShield Endpoint 6.0 4 61
Virus .zepto files 10 70
Can't upload license into Microsoft Dynamics Nav flf file 2 43
SPAM and Ransomware and Backup 11 84
For those of you actively in the Malware fightling business, we now have available an amazing new tool in the malware wars (first recommended to me by rpggamergirl (http://www.experts-exchange.com/M_3598771.html), the Zone Advisor for the Virus and …
HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now