How to configure the Spam mail server

What do you need help with?

A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user’s inbox. … More sophisticated programs, such as Bayesian filters or other heuristic filters, attempt to identify spam through suspicious word patterns or word frequency.

Step 1 : Configuration > Email security > SPAM server setting > Enable the services
Step 2: Mention the Description and Subject on the prefix on the mail
Step 3: A spam score is a score given to an email by applying a set of rules. The higher the score, the higher is the likelihood for the message to be spam. Spam scores are used by antispam software and solutions. default value : 5  range is 0-100
Step 4 : 
I, Enable the RBL  Check  ( Using this Real-time Blackhole List (RBL)is an effort to stop email spamming. It is a “blacklist” of locations on the Internet reputed to send email spam )
ii, Enable the Pyzor Check (Using this pyzor describes itself as a “collaborative, networked system to detect and block spam using identifying digests of the message )
iii, Enable the DNS Check ( Using this to verify that mail claiming to be from your domain is from one of your IP addresses. They do this by checking a special TXT record you put in your DNS records. It is an interesting way to prevent mail spoofing )
iv, Enable /Disable the Bayes system (Using these Bayesian spam filters calculate the probability of a message being spam based on its contents. Unlike simple content-based filters, Bayesian spam filtering learns from spam and from good mail, resulting in a very robust, adapting and efficient anti-spam approach that, best of all, returns hardly any false positives. )
v, Enable/Disable the Bayes Auto Learning  ( Using this auto-adaptive technique, Bayesian filters can learn from both their own and the user’s decisions (if she manually corrects a misjudgment by the filters). The adaptability of Bayesian filtering also makes sure they are most effective for the individual email user. While most people’s spam may have similar characteristics, the legitimate mail is characteristically different for everybody )
Step 6: You must add Add email in the if want to Agree to incoming and ignore depends provide the in Whitelist and Blacklist mention by the Email address or Domain name
For Eg: enter the email address and domain name in the text box field
An email address like
Domain Name like