| Step A: Check if something in the messages is excluded ( e-mail address, IP address, hostname, subject, text or white list ) If so, proceed with step D Step B: Evaluate all methods ( assuming the message is not excluded for that method ) and build a list of failed methods Step C: Calculate which action of the failed methods of step B has the highest
priority: | Method sorted by priority | Subject tag | Script shortcut | | | Address | [e-mail] | e-mail | | IP/Host | [ip] | ip | | DSN | [dsn] | dsn | | Subject | [subj] | subj | | Text | [text] | text | | HTML | [html] | html | | Attachment | [att] | att | | Exploit | [expl] | expl | | MS Office with Macro |
[msvba] | msvba | | MS Office with Password | [offpass] | offpass | | MS Office with ext mismatch | [offext] | offext | | Mailing List | [maillist] | maillist | | CCS | [ccs] | ccs | | Phishing | [phishing] | phishing | | SaneSecurity | [sanesec] | sanesec | | SLS/RBL | [sls] | sls | | Country | [cty] | cty | | Bayes | [bayes] | bayes | | Heuristic | [heur] | heur | | Header | [hdr] | hdr | | BCC | [bcc] | bcc | | Internal From |
[internal-from] | internal-from | | Faked From | [faked-from] | faked-from | | Faked MX | [mx] | mx | | FCrDNS | [iprev] | iprev | | SPF | [spf] | spf | | DKIM | [dkim] | dkim | | GURBL | [surbl] | gurbl | | SURBL | [surbl] | surbl | | Image | [img] | img | | Charset | [charset] | charset | | Auto IP | [auto-ip] | auto-ip | | Senderbase | [senderbase] | senderbase | | Backscatter | [backscatter] | backscatter | | Bitcoin |
[bitcoin] | bitcoin | | SecuriteInfo | [secinfo] | secinfo | | MS Office with Macro | [olevba] | olevba | | Community Rules | [comrule] | comrule | | DisplayName From | [dispf] | dispf | | DisplayName To | [dispt] | dispt | | DisplayName CC | [dispc] | dispc | | Sublime E-Mail Reputation | [ser] | ser | | S/MIME | [smime] | smime | | User Defined Method | [udm] | udm | | Absolute Block | [abs] | abs | Action sorted by priority:
- Discard message - (0)
- Send a non-delivery report to the sender - (4)
- Encapsulate and forward to Postmaster - (1)
- Forward to Postmaster - (6)
- Encapsulate and send to recipient - (2)
- Encapsulate and send to recipient without attachments - (3)
- Mark subject and move to Junk-E-Mail folder - (5)
- Mark subject - (7)
- Forward to recipient - (8)
If the action is Discard message or Send a non-delivery report to the sender then proceed with step E, else proceed with step D Step D: Scan the message for a virus.
If the message has no virus or there is no virus scanner available, then send the message to Exchange Step E: Perform the action that was calculated in step C |