Get started Bring yourself up to speed with our introductory content.

ISA Server as SMTP filter: Configure the message screener

In this portion of the step-by-step guide to using the ISA server as an SMTP filter, Brien Posey explains how to configure the message screener.

The message screener is the component that will weed out some of the junk before it reaches your Exchange server. There's no way I can cover every aspect of the message screener in this amount of space, but I do want to show you some of the basics.

  1. To access the message screener, navigate through the ISA Server's console to your server -> Configuration -> Add-ins.

  2. Right click on the SMTP Filter add-in and select Properties.

The SMTP Filter properties sheet is used to set parameters for filtering SMTP messages. You can filter messages based on keywords, e-mail address, domain name, attachments, or embedded SMTP commands.

As I said before, the message screener is not a dedicated antispam or antivirus program, but you can filter out some of the garbage before it makes it to your Exchange server.

For example, suppose you wanted to block any message with the .EXE extension from entering your organization. To do so, you would simply select the properties sheet's Attachments tab, click the Add button, click the Attachment Extension button, and enter the .EXE extension into the space provided.

You also have the option of selecting an action to take. For example, you could delete the message or forward it to someone you don't like. The choice is yours.


How to use an ISA Server as an SMTP filter

  Introduction
  Install the SMTP service
  Configure the Internet Information Server
  Install ISA Server 2004
  Create an SMTP publishing rule
  Create a DNS publishing rule
 Configure the message screener
  Change your DNS server's MX record

Brien Posey

About the author
Brien M. Posey, MCSE, is a Microsoft Most Valuable Professional for his work with Windows 2000 Server and IIS. Brien has served as the CIO for a nationwide chain of hospitals and was once in charge of IT security for Fort Knox. As a freelance technical writer he has written for Microsoft, TechTarget, CNET, ZDNet, MSD2D, Relevant Technologies and other technology companies.

This tip originally appeared on SearchSecurity.com.

This was last published in February 2007

Dig Deeper on Managed network services technology

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close