Processing suspected spam messages that exceed a SCL threshold

book

Article ID: 181293

calendar_today

Updated On:

Products

Mail Security for Microsoft Exchange

Issue/Introduction

 

Resolution

If you use a mail screening tool, you can configure Mail Security to reject or accept the suspected spam messages that exceed an SCL threshold. Assign the SCL threshold for which the suspected spam and SCL settings apply.

You can log all spam events to the specified logging destinations.

See About logging events

You can specify how you want Mail Security to process the messages that are identified as suspected spam and exceed the SCL threshold that you specify

If you configure Mail Security to reject spam messages, then a spam message is not accepted by the SMTP server for delivery. The connection is closed and no error message is sent to the SMTP service that sent the message.

If you configure Mail Security to accept suspected spam messages that exceed the threshold, you can configure the following message delivery options:

To reject suspected spam messages that exceed a SCL threshold

  1. In the console on the primary navigation bar, click Policies.

  2. In the sidebar under Antispam, click Premium AntiSpam Actions.

  3. Under Suspected Spam and SCL, from theIf message is Suspected Spam and SCL is list, select the SCL value threshold.

    You can choose a value from > 0 to > 8. The default value is > 5.

  4. Check Reject the message.

  5. Check Log to log suspected spam messages to the specified logging destinations.

    See About logging events

  6. On the toolbar, click Deploy changes to apply your changes.

    See Deploying settings and changes to a server or group

To accept suspected spam messages that exceed a SCL threshold

  1. In the console on the primary navigation bar, click Policies.

  2. In the sidebar under Antispam, click Premium AntiSpam Actions.

  3. Under Suspected Spam and SCL, from the If message is Suspected Spam and SCL is list, select the SCL value threshold.

    You can choose a value from > 0 to > 8. The default value is > 5.

  4. Check Accept the message.

  5. Check Prevent delivery to original recipient(s) to prevent the intended recipients from receiving suspected spam messages.

  6. Check Deliver to alternate recipient to send suspected spam messages to a different recipient, and type the address to which suspected spam messages are delivered.

    You can only specify one recipient.

  7. Check Add to subject line to prepend the subject line of suspected spam messages, and in the subject line box, type your customized text.

    The default text is Spam.

  8. Check Add X-header(s) to add one or more X-headers to messages that trigger the violation, and then do any of the following:

    Add an existing X-header

    Do the following:

    • Click Add X-header.

    • In the X-header name column, use the drop-down menu to select the X-header that you want to use.

      You can modify the existing X-header by clicking on the text and typing the new content.

    • In the X-header value column, type the X-header value.

      You can type up to 127 characters. The following characters are not supported in X-header values:

      ~ |

    Create a new X-header

    Do the following:

    • Click Add X-header.

    • In the X-header box, type the name of the X-header.

      You can type up to 127 characters. The name must begin with "x-" or X-". The following characters are not supported in X-header names:

      , . ; < > : ? / = ( )[ ] @ | ;~

    • In the X-header box, type the X-header value.

      You can type up to 127 characters. The following characters are not supported in X-header values:

      ~ |

    Remove an existing X-header

    Do the following:

    • Select the X-header that you want to remove by clicking to the left of the X-header name column.

    • Click Delete X-header(s).

  9. Check Assign SCL value to message to assign an SCL value to suspected spam messages, and in the drop-down list, select the threshold value.

    You can choose a value from 1 to 9. The default value is 8.

    See About spam confidence level values

  10. Check Log to log suspected spam messages to the specified logging destinations.

    Suspected spam messages that meet or exceed an SCL value are identified in the Windows event log as information or events.

    See About logging events

  11. On the toolbar, click Deploy changes to apply your changes.

    See Deploying settings and changes to a server or group