Spam Policies CSG – January 2003 Dan Oberst – Princeton University.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

University of Leeds Academic Services How to use ISS filtering service to remove spam with Outlook Qin Li ISS Service Coordinator
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Shared File Service VM Forum January, SFS Topics Targeted Usage Security Accessing CIFS Shares Availability & Protection Monitoring Pricing.
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
Lesson 18 – INSTALLING AND SETTING UP WINDOWS 2000 SERVER.
Filtering Managing Unwanted Mail. Managing unwanted spam mail : Server Side Filtering Spam filtering at Monash comes in two forms. Server Side.
Trend Micro Round Table May 19, Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions.
Introduction to client/server architecture
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
CT NIKHEF Nov Mail NIKHEF CT system support.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Anti-Spam & Anti-Virus WiscMail Implementation University of Wisconsin - Madison CSG Workshop September 21, 2004.
Buying a Laptop. 3 Main Components The 3 main components to consider when buying a laptop or computer are Processor – The Bigger the Ghz the faster the.
File System Project Conversion from Netware to Windows December 2010.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
1 Dave Shafer, ITS Systems & Platforms June 25, 2010.
Hands-On Microsoft Windows Server 2008
Sun One IMAP & Microsoft Exchange Coexistence Dan Oberst Princeton University CSG 9/21/04.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Tutorial 11 Installing, Updating, and Configuring Software
European Shared Treasure Online system Improvements on search page.
Introducing… …taking desktop computing to the cloud making business effortless!
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Module 13: Maintaining Software by Using Windows Server Update Services.
Step By Step Windows Server 2003 Installation Guide Step By Step Windows Server 2003 Installation Guide.
EPolicy Orchestrator WNUG June Meeting 6/6/2002. Presentation Contents What is ePO? What are the requirements? ePO components Demo of ePO Where to get.
Implementing Hyper-V®
Mass User Group July 18, Today’s Agenda I Quickly –Privacy policy –Central opt-out system –Solicitations & surveys –Large numbers.
Microsoft Office Communicator A General Introduction.
Git workflow and basic commands By: Anuj Sharma. Why git? Git is a distributed revision control system with an emphasis on speed, data integrity, and.
Object-Oriented Analysis & Design Subversion. Contents  Configuration management  The repository  Versioning  Tags  Branches  Subversion 2.
ACTIVE DIRECTORY : AN INTRODUCTION The Network Team Knox County Schools.
New Features v1.4. CPO New Features  Send File Link Improvements  Send File Link via mobile phone  “All Plus Share” permission  Desktop Sync (DS)
CSG Fall 2005 Policy Discussion 2: The Future of Student with Steve Kellogg, Chris Bongaarts, and Jon Giltner as Dennis Maloney.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Update on  Mail Gateways  Servers  Spam Tagging  Anti-Virus  IMAP  Web Mail  LISTSERV  POP.
Installing of a VAULT server. Few recommendations: The Vault Server can be any dedicated server or normal PC operating under Windows 2003 server or Windows.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
By Nick Paige.  Identify problems that can occur if hardware is not properly maintained  Identify routine maintenance that can be performed by users.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Introduction to Student Name Student Class.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
1 Information Systems 2/26/03 Tom Coppeto Mark Silis MIT Mail System Update 26 February 2003.
D0 Disk Array Replacement on d0ora2 May 20, 2005.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Implementing Microsoft Exchange Online with Microsoft Office 365
Cloud Servers. What is a Cloud Server?  A Server that is accessed via the internet.
Sydney Region Servers. Windows 2003 Standard Configuration Able to be supported remotely Antivirus updates managed from server.
Windows NT at DESY Status report HEP NT 4 th -8 th October 1999 SLAC.
Page 1 Monitoring, Optimization, and Troubleshooting Lecture 10 Hassan Shuja 11/30/2004.
Technical Coordinators Meeting Steve Siirila Brian Hayden Jeff Williams June 11, 2008.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
Spam Wrangling on UC Berkeley's CalMail. Spam detection CalMail uses Sophos PureMessage, running on CommuniGate Pro's front-end servers PureMessage.
Operations Management - Problems Students cannot play HW Requirements Self-RegistrationSW requirements Upload by Paris SW Capacity Internet connection.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
Finding the Balance: Centralized and Distributed IT Models Case Study: Princeton University IMAP and Exchange Mail Services Dan Oberst CSG
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
CONFIGURING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE
Designing and Implementing Cisco Unified Communications on Unified Computing Systems Dumps practice-questions.html.
Introduction to client/server architecture
Real VMware 2V0-731 Exam Questions and Answers
Design Unit 26 Design a small or home office network
MAINTAINING SERVER AVAILIBILITY
Moldex3D License Admin – Trust Manager
How To Repair Outlook Express Inbox.dbx File After Crash.
Presentation transcript:

spam Policies CSG – January 2003 Dan Oberst – Princeton University

spam Filter Survey Survey Cornell University Harvard (Central Admin Only) Penn State University Princeton University University of Buffalo University of Calif. Office of Pres. University of Minnesota University of Washington University of Wisconsin

Princeton Experience Experience  Filtering using spam Assassin  ALL messages >300K tagged  Users “opt in” and choose threshold Messages moved to spam folder Messages moved to spam folder  87,000 messages/day (since 11/1)  50% meet default threshold  Users can post/local process (procmail, etc.)  ~1,250 users have opted in (~10%)

Horsepower  Original (current) server SUN 280R SUN 280R 4 GB memory4 GB memory 4x36 (external SCSI); 2x9 GB (internal) disks4x36 (external SCSI); 2x9 GB (internal) disks mirrored ~75 GB mirrored ~75 GB Adding spindles improved performanceAdding spindles improved performance External postoffice External postoffice Runs Norton Anti-virus scanning (opt-out) Runs Norton Anti-virus scanning (opt-out)

Horsepower (future)  Part of plan to provide redundant servers  2 x Sun V480 (4 processors) 8 GB memory 8 GB memory 2x36 GB (internal);12x18GB (SCSI) disks raw 2x36 GB (internal);12x18GB (SCSI) disks raw mirrored ~135GBmirrored ~135GB Lots of spindles for performance Lots of spindles for performance  spam filtering, Norton A/V  Capacity for user whitelists, growth, etc.

Princeton  Add user whitelists  Consider border blacklisting/blocking  Commercial software options? Improved performance Improved performance Better scoring Better scoring  Integrate with client (e.g. OS/X) software Peer-to-peer options Peer-to-peer options