ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Technology»
  • Internet & the Web

Microsoft Anti Spam Policies and Technologies

Updated on March 20, 2013

The concern

Are you concerned about the security of your corporate network? Don’t you feel disturbed by the spam, viruses or worms? Aren’t you afraid of losing your personal data or the confidential information? Yes, of course you would be concerned about all these devil things. But have you ever thought what could have been done to safe guard your network or your standalone personal computer? Everyday there is a new virus or a worm or some spam mails appearing and annoying you, as if the creators of those malwares have taken a challenge to show their superiority! They are telling we are more intelligent than you; you can’t catch hold of us!

As a system administrator of your corporate network and messaging system you might have raised your hands; everyday thousands of fraudulent messages along with viruses, worms and Trojan horses are flowing through your network and malwares are changing their strategies every now and then, what could you do!

But you can’t sit idle also; after all you have been entrusted for the security of your corporate networks and systems! Let us see what other big corporate like Microsoft are doing in this case.

Microsoft Anti Spam policies for Exchange 2007

Microsoft corporate network receives more than fourteen million messages per day for their 130,000 mail boxes. With the help of antivirus and anti spam policies, they get rid of 95 percent of all spam messages.

How does Microsoft do it? They actually do the filtering of all spam and virus messages by deploying Edge Transport Servers at the perimeter network. This minimizes the internal network security risks and also reduces the hardware costs which are associated with routing and internal mail gateway services. The Edge Transport server role uses the Microsoft Exchange EdgeSync service to retrieve configuration information from the Hub transport Server from the outside of Active Directory directory service forest. Edge Transport Server role is installed in a particular computer and then the Microsoft Exchange EdgeSync service periodically replicates recipients and configuration data from Active Directory to the Active Application Mode (ADAM) instance to this computer.

In Microsoft Exchange 2007 the Edge Transport Server role is deployed as a standalone server in the perimeter network which provides improved anti spam and anti virus protection to the Exchange Organization. The Edge Transport server handles all internets facing mail flow and provides Simple Mail Transfer Protocol (SMTP) relay and Smart Host services for the Exchange Organization. There are also additional layers of messaging protections by a series of agents that run on the Transport Server to act on messages as they are passed by the transport components. Thus it provides a significant protection against the viruses and spams.

Sender ID Framework

Microsoft Corporation has created a leading e-mail authentication protocol with support from other industries across the globe. This is Sender ID Framework (SIDF); it helps protect more than forty five percent of all legitimate e-mail sent worldwide. Your Company can also build up an improved online trust and confidence and realize a competitive advantage for your brand and online marketing initiatives by implementing Sender ID Framework.

Microsoft SmartScreen

This is an intelligent spam filtering solution and Microsoft has integrated it with all Microsoft e-mail platforms including Windows Live Hotmail, Microsoft Exchange Server 2007 and Outlook 2003 messaging and collaboration client, and Windows Mail e-mail clients.

SmartScreen technology learns the technique of distinguishing between legitimate e-mail and spams; detect fishing URLs embedded in the e-mail messages. It could do this by synthesizing extensive user input from millions of Windows Live Hotmail users who are part of the voluntary Feedback loop Program (FBL). This results the improved delivery of legitimate e-mail and better identification and blocking of approximately ninety five percent of spam or junk e-mails.

Office Outlook 2007 E-mail Postmark

The basic purpose of incorporation of this innovative technology in Microsoft Office Outlook 2007 was to improve deliverability of the legitimate e-mails which otherwise would have been identified as junk and might have the risk of getting deleted. This technology checks the outbound messages for indication of spam by using its content filtering technology and then instructs the sender computer to perform a computation or puzzle. This work is then assigned to a header within the e-mail message as a token of legitimacy. This is called the postmark. This postmark is not noticeable to the sender or the receiver, but this certainly creates difficulty for the spammer to send large number of e-mails. When an e-mail is received with the postmark, it becomes easier for the inbound system like Microsoft Exchange 2007 to verify the postmark. This improves the Spam Confidence Level (SCL) of the e-mail messages and also improves the deliverability of the legitimate messages.

Intelligent Message filter

This is a part of a comprehensive effort for the enhancement of the e-mail protection, hygiene, productivity and security. Intelligent Message Filter (IMF) with the help of SmartScreen technology provides server side message filtering, heuristics based message analysis and support for per message spam confidence level (SCL) ratings.

Conclusion

All types of malwares including viruses, Trojans, spams and worms infiltrate the system by using the technology and loopholes of the operating system and / or the messaging system. Therefore it would be easier for creator of those operating systems and messaging systems to find a way to safeguard the vulnerable points. If you are using Microsoft products for the above purposed it is advisable to follow the procedure and policies which they are following to protect their own networks and systems.

NOTE

Please feel free to leave your comment for my encouragement and guidance and if you are satisfied then please rate it up.

Comments

    0 of 8192 characters used
    Post Comment

    • cupid51 profile image
      Author

      cupid51 8 years ago from INDIA

      Thanks lauralolita for stopping by and leaving a beautiful comment!

    • lauralolita profile image

      lauralolita 8 years ago from Florida

      Great hub, Love this pictures!

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: "https://hubpages.com/privacy-policy#gdpr"

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)