Adding to Domain Blacklist
How to get here
- From the home page, click the menu tab, and the Connection Checks page for the specified domain appears.
-- OR --
- From the home page, click the menu tab Domain > Spam Filtering The page appears.
- Locate the link near the bottom of page, click . The page appears.
Before adding to the for a domain, be sure that it has been added to the system level Realtime Blacklist, found at >
Realtime Blacklist selection will only display items that are enabled. This option is set in the . By default all items added to the are enabled.
Disabling an item in the will automatically remove it from the or . Should the item be enabled at a later date it will automatically re-enable the list in or .
A match made to the Trusted Realtime Blacklist will automatically be deleted.
Creating a Trusted Realtime Blacklist
- Click on the page, and a pop-up will display all available domains that can be selected for the blacklist.
- Select a domain and click . The selected domain will appear on the Connection Checks list.
- The check box must be checked.
- Click " to save this domain to the Standard Realtime Blacklist.
To easily see all domains that are in the , sort the "Trusted" column (click the column title).
Creating a Standard Realtime Blacklist
- Click at the page, and the following list will display all domains available to be added to the realtime blacklist.
- Select a domain and click . The selected domain will appear in the Connection Checks list. The "Trusted" check box by default is unchecked.
- Click " to save this domain to the Standard Realtime Blacklist.
- Select a Realtime Blacklist you want to add. This list is maintained under System > Realtime Blacklists.
- Displays the type of lookup that the blacklist performs from the list box (ADDR, DNS, HELO, RHS).
- This column displays the domain name or IP address of the DNS server to contact for blacklist queries. This field contains an asterisk (*) by default, which indicates that the default IMail Server DNS is used for blacklist queries, where it relays the DNS query to the DNS server for the blacklist. Using the asterisk eliminates the need to enter the IP address or domain.
- This column displays the domain to query in the zone file. This name usually matches the server domain name. However, sometimes a blacklist will contain multiple zones to query on the same server. When this happens, the server name and the query domain will be different. The only way to know this is to read the documentation for the blacklist being used.
- . This shows if TCP/IP First check box has been enabled. This check box allows the administrator to flag a list as one of these types.
- Click this button after you have made your selection.
- Click this button to cancel adding a trusted Realtime Blacklist.