How Spam & Virus Filtering Works
Technology On Call has partnered with the industry leader for detecting junk E-mail to create DRx Spam. The result of thousands of hours of development and DRx Spam’s
experience from processing billions of messages DRx Spam has created techniques for spam and virus detection in combination with a variety of next-generation approaches for message
analysis that provide effective and successful filtering results.
As a managed service provider DRx Spam is compatible with any E-mail system and can be implemented rapidly. At the same time, DRx Spam
’s customizable management interface and innovative features such as one-click white listing assure that the solution is both simple to deploy and extremely easy to maintain.
Through a simple DNS change, E-mail is automatically protected, without any hardware, software, or configuration changes for the customer. The change of the 'MX' record (mail exchanger) for your domain point to DRx Spam's systems. After that change has been made, your E-mail will be redirected through DRx Spam
’s filters before being automatically delivered to your mail server.
Drop detected spam: An aggressive approach that reduces a customer’s network bandwidth requirements and mail server load. Due to DRx Spam
's extremely low percentage of "false positives" it is very rare that a legitimate E-mail message will be dropped.
Tag and forward detected spam: with a modified subject line, incoming E-mail can be automatically directed to a specific folder in each user’s E-mail program for periodic review and/or deletion.
Redirect detected spam: junk mail can be directed to an alternative address, e.g., firstname.lastname@example.org.
Quarantine: Junk messages are redirected to individual web-mail quarantine accounts that can be reviewed at any time by end users. The most common choice of larger businesses and ISPs, this approach reduces
bandwidth requirements and mail server load for customers while providing complete assurance that no legitimate message will ever be lost.
In addition to these basic choices which be configured by person, by group, by domain, or by company, customers can opt to receive periodic message digests, which provide each user a summary list of the junk E-mail received for them.
- An extensive, continually updated Heuristic Rule Set that encompasses message headers, body text, and other characteristics of both English-language and non-English messages
- Public and Private Blacklists of mail servers, relays, or networks known to be used by spammers
- Extensive URI Databases of unique elements such as URLs, phone numbers, and physical addresses known to be used by spammers
- A self-learning Bayesian Engine that analyzes patterns of phrases in messages, and assigns mathematical probabilities for the presence of those phrases in junk mail versus legitimate mail
- Incorporation of Domain History and Reputation to increase the accuracy of blacklists and URI databases
- Real-Time Message Source Analysis to assess whether an increased volume of mail flow is simply a legitimate high-volume mailing, or the result of a spammer hijacking or the use of a ‘zombie’ network
- User-Based Message Profiling that allows for refinement of message scoring for each user based on a history of his or her message traffic
- Customizable white lists and blacklists which can be applied on an account-wide, organization-wide, domain-wide, or user-specific basis
- Message Fingerprinting to compare E-mail signatures to frequently updated public and internal databases of known spam messages
- Authenticity Checks including detailed header analysis