Configuring Spam Management Features for End Users
To |
See |
---|---|
Understand the benefits and limitations of the different authentication methods for end-user access to spam management features. |
Configuring End-User Access to the Spam Quarantine and subsections |
Allow end users to access the spam quarantine directly via browser. |
Authentication Options for End Users Accessing Spam Management Features |
Send users a notification when messages addressed to them are routed to the spam quarantine. Notifications can include links for access to the spam quarantine. | |
Allow users to specify email addresses and domains of senders whom they know to be safe, and of senders whom they know to be sending spam or other unwanted mail. |
Using Safelists and Blocklists to Control Email Delivery Based on Sender |