Solved

How to use zen spamhaus with Exchange 2007?

Posted on 2009-04-07
5
1,900 Views
Last Modified: 2012-06-27
How do you configure Edge Server to use Zen from Spam haus?  Do you have to buy Zen? If so where do I buy it?  Is there a step by step out there?
0
Comment
Question by:lynndaly2000
  • 3
  • 2
5 Comments
 
LVL 58

Expert Comment

by:tigermatt
ID: 24095209

Add it as an IP Block List Provider in the Edge Server's Configuration: http://technet.microsoft.com/en-us/library/bb691031.aspx.

The provider name is 'Spamhaus', the lookup domain zen.spamhaus.org.

-Matt
0
 

Author Comment

by:lynndaly2000
ID: 24111068
Thanks!  How do I know if its working?  Will the rejected e-mails be sent to the quartine box or will they just be blocked?
0
 
LVL 58

Expert Comment

by:tigermatt
ID: 24111518

You won't get much spam, and an RBL (in conjunction with other anti-spam techniques) means message tracking logs won't report an inordinate number of emails accepted and then NDRs sent.

The messages won't be quarantined, since the RBL is checked the moment the remote server connects. If its IP address is a positive match for an address on the RBL match, the session is immediately dropped by the server; no further communication takes place - the message is never transmitted to your server.

-Matt
0
 

Author Comment

by:lynndaly2000
ID: 24149186
I really want to keep a quarantine is there anyway to do this?
0
 
LVL 58

Accepted Solution

by:
tigermatt earned 500 total points
ID: 24149345

No. The way an RBL works, the connection is rejected before any message data is transferred to your server. The intention behind this being that very little bandwidth, CPU cycles and processing time is used to handle the inbound connection, which, if listed on an RBL, is most likely to be spam mail anyway.

This is simply the nature of an RBL and the way in which it is implemented,

-Matt
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We were having a lot of "Heartbeat Alerts" in our SCOM environment, now "Heartbeat" in a SCOM environment for those of you who might not be familiar with SCOM is a packet of data sent from the agent to the management server on a regular basis, basic…
Article by: Leon
Software Metering within our group of companies has always been an afterthought until auditing of software and licensing became a pain point. Orchestrator and SCCM metering gave us the answer and it was an exciting process.
The viewer will learn how to simulate a series of coin tosses with the rand() function and learn how to make these “tosses” depend on a predetermined probability. Flipping Coins in Excel: Enter =RAND() into cell A2: Recalculate the random variable…
The view will learn how to download and install SIMTOOLS and FORMLIST into Excel, how to use SIMTOOLS to generate a Monte Carlo simulation of 30 sales calls, and how to calculate the conditional probability based on the results of the Monte Carlo …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now