Q
Problem solve Get help with specific problems with your technologies, process and projects.

Prevent servers from receiving messages from blank senders using Domino features

Is there a way to prevent the Domino servers from receiving Internet messages from blank senders? I need this to reduce the amount of spam in my SMTP traffic.

I know there are some third-party products that do this job. I'd like to do it just by using Domino features.
I'd hate to modify the mail template or the mail.box template for this in R5. In Domino 6 you could create a server rule to check the sender to make sure it has some value. Also, you could turn on reverse DNS lookups to verify the sender has at least a registered domain. This can be problematic, though, as not all valid domains and senders will have a corresponding PTR record in DNS.

This was last published in July 2003

Dig Deeper on Lotus Notes Domino Administration Tools

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchWindowsServer

Search400

  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchContentManagement

Close