From the KnowledgeBase
Spam: Answers to Frequently Asked Questions including spam flagging and filtering
Unsolicited e-mail is most often called "spam." Because the marginal cost of sending each message is negligible, bulk e-mailers can send thousands or millions of messages with the knowledge that a small percentage will respond to a commercial offer. The economic costs are imposed primarily on the recipients, who must spend time sorting through their e-mail to determine which messages are legitimate. The content of unsolicited messages can often be considered offensive, and the most abusive bulk e-mailers are not concerned with providing the ability to opt-out.
First Line of Defense: OIT E-mail Firewall Service
OIT maintains e-mail firewall servers to stem the glut of spam to Princeton mailboxes. The e-mail firewall servers constantly monitor known spammer lists and compare Princeton incoming mail to these lists. The firewall will refuse to accept the confirmed spam and will send it back to the post office it came from. This layer of spam protection has had a significant effect on incoming spam. It is estimated that 70% of the mail that arrives at Princeton electronic post offices is known spam; this service significantly reduces the junk mail.
Second Line of Defense: The Proofpoint Spam Utility
OIT provides and supports a spam-filtering utility that has robust features to fight against the onslaught of unwanted e-mail. The service provides enhanced features for user management of inbound unwanted mail, allowing individuals to identify their own safe lists and blocked lists. You are able to create a "reject" list of e-mail addresses from which you never want to receive messages, and an "accept" list of addresses from which you always want to receive messages. Other features include real time blocking of bad senders, content filtering (e.g. attachment removal), scanning for viruses, and anti-spam measures.
- Proofpoint: Answers to Frequently Asked Questions (FAQ)
- Proofpoint: How to manage your Profile using your Spam policy setting
Third Line of Defense: Configure Your Junk Mail Controls
All modern e-mail applications have built-in tools to control your mail; for example Outlook, Mac Mail, and Mozilla junk mail controls. These preferences, if enabled, can be very effective in fine-tuning your spam controls for any messages that should escape the e-mail firewall or Proofpoint filtering mechanisms. For most people, the Proofpoint anti-spam facility is sufficient to eliminate the majority of spam from your Inbox. Junk mail filters, unless carefully configured, can cause confusion when valid mail is sent to the wrong folder.
- Thunderbird/Mozilla Junk Mail Controls
- Mac OS X Mail Junk Controls
- Microsoft Office Junk Mail Options
If All Else Fails....
You can report spam to the vendor so that they can investigate and add the spammer to their blocked lists. See: Proofpoint: How can I report spam to the Proofpoint vendor? You can also add individual domains to your own blocked list. See: Proofpoint: Safe and blocked lists; how to manage them.