?
Solved

Spam Assassin or 3rd party anti-spam

Posted on 2009-05-14
4
Medium Priority
?
410 Views
Last Modified: 2013-12-09
Hi All,

Our domain is getting flooded with spam mail. I have been asked to come up with a solution. We have sendmail as our edge transport for mail, it has spam assassin installed but not configured, and I was thinking of trying to configure it.

On the other hand, I have read about a company called 'message labs', that collect all mail, scan for spam and remove it prior to sending it to our domain.

I guess my questions are, is spam assassin a good solution? if so, what documentation is there for its configuration for someone who has never used spam assassin?

What do you guys thinking of the message labs solution? Obviously its a cost to the company, but is it a better solution?

Your advise is greatly appreciated. Thanks.
0
Comment
Question by:Network_Padawan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 29

Expert Comment

by:Michael Worsham
ID: 24391468
Message Labs is a good choice, but gets expensive if you have a lot of inbound and outbound mail that needs to be scanned. One other solution would be setting up an open-source Untangle appliance server (www.untangle.com) to scan e-mail for spam and viruses...

Untangle Spam Blocker: http://www.untangle.com/Spam-Blocker
Untangle Virus Blocker: http://www.untangle.com/Virus-Blocker
Untangle Demo Video: http://www.untangle.com/video_overview/
0
 
LVL 97

Expert Comment

by:Experienced Member
ID: 24391509
Spamassassin works. My email ISP has Spamassassin running and I have a well-doctored user_prefs file that kills most spam. By itself, with no configuration (other than installation) it knocked out 85% of my spam instantly.  At the user level (on the server) it invokes easily enough.

The big problem I have with Spamassassin is that it is hard to retreive stuff from spam-folder (where I put stuff marked spam). So I do have to sometimes ask a person to re-send their email. More advanced products with quarantines are better in this regard.

Another thing my email ISP does is run grey-listing. This is very much worth looking at. If the sending email cannot be traced, it doesn't get through. I know nothing about grey-listing save for two things: (1) it most definitely works and (2) it can be purchased (could be at least) as a hardware appliance.   Take a look at http://www.greylisting.org/

The prior post also had some ideas, and at this point, I think what we are trying to do is point you to ideas.
.. Thinkpads_User

0
 

Author Comment

by:Network_Padawan
ID: 24391680
Thanks guys. As a first try I want to configure spamassassin and see how it performs... I am using spamassassin-3.2.5-1. All the docs Ive seen are for older versions and for postfix, I use send sendmail and centos 5.3.

Anyone know of some guides?
0
 
LVL 29

Accepted Solution

by:
Michael Worsham earned 1500 total points
ID: 24393982
Install and configure SpamAssassin on Fedora/RHEL/(CentOS)
http://spevack.org/SpamAssassin
0

Featured Post

WatchGuard's M Series Appliances - Miecom Approved

WatchGuard's newest M series appliances were put to the test by Miercom.  We had great results and outperformed all of our competitors in both stateless and stateful traffic throghput scenarios! Ready to see how your UTM appliance stacked up? Download the Miercom Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Forget those services on TV trying to sell you software – that’s step one.  Almost all of the software you need should be available for free.  The tricky part is doing the work.  If you are not comfortable performing these steps yourself, contact a …
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question