Your domain's email addresses can have individualised white and black lists, to meet the specific needs of your users, on newsletters, or to change certain items from your domain's lists.
Creation of individual lists
There are two ways to add an address:
1. By adding a configuration to an address. When you add an address to a group configuration, it will automatically be added to the list of addresses that have the possibility of having white and black lists.
2. By using
the addendum form.
This is a simple addition that will have the effect of giving the e-mail address the ability to have filter lists.
The address should be added without the domain.
When you select an e-mail address, the page is automatically reloaded with your user's lists.
- By the user's action in their ICD
- Automatically for the whitelist, depending on the user's behaviour.
- By adding via the quarantine report
To clear an individual list you can use a purge or delete available on the list of items.
Exception lists :
Exception lists are groups of addresses internal to the protected domain, on which the filtering policies are not applied.
Addresses in these groups will not be filtered by anti-spam systems.
However, for obvious security reasons, the anti-virus filters will be retained.
The addresses in this list are generally service and/or contact addresses, requiring receipt of all messages addressed to them.
Example: info@votredomaine.com, contact@votredomaine.com, support@votredomaine.com...
In addition, IT departments that receive a lot of messages from bots may find it useful to be included in this list and thus escape the filtering of addresses with machine-to-machine functions.
These lists are set up as follows:
In the 'Filtering' menu, select 'Configuration', then go to 'Groups & Users'.
You will find all the groups you have created. All you have to do is edit the one that is to become an exception list, go to the security rules and tick off Disable SPAM filtering. You can then add the addresses you want.
In order to add to your exception list or even modify it, we invite you to go to the section "Configuration of security rules" or "Configuration of rules by groups & users".