From eScan Wiki
Revision as of 08:00, 30 August 2010 WikiSysop (Talk | contribs) ← Previous diff |
Current revision WikiSysop (Talk | contribs) |
||
Line 1: | Line 1: | ||
{| class="wikitable" border="0" | {| class="wikitable" border="0" | ||
- | + | |- | |
- | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | + | |
- | | style="width:56%; color:#000;" | | + | |
- | {| style="width:280px; border:none; background:none;" | + | |
- | | [[Image:Escan_wikipedia.jpg|left|<!--We add confidence to computing-->]] | + | |
- | |} | + | |
- | |width="1000pt" style="width:11%; font-size:95%;" white-space:nowrap;| | + | |
- | <B>General</B> | + | |
- | * [[Main Page|<font color="blue">Home</font>]] | + | |
- | * [[Marketing|<font color="blue">Marketing</font>]] | + | |
- | * [[Events|<font color="blue">Events</font>]] | + | |
- | * [[Marketing/Advertisement|<font color="blue">Advertisement</font>]] | + | |
- | |width="1000pt" style="width:11%; font-size:95%; white-space:nowrap;" | | + | |
- | <B><p> Knowledgebase</p></B> | + | |
- | * [[Technical Info|<font color="blue">Technical Information</font>]] | + | |
- | * [[Beta Testing|<font color="blue">Beta Testing</font>]] | + | |
- | * [[Release Candidate|<font color="blue">Release Candidate</font>]] | + | |
- | * [[User Guide|<font color="blue">User Guides</font>]] | + | |
- | * [[Escan/english/Technologies|<font color="blue">Technologies</font>]] | + | |
- | |width="1000pt" style="width:11%; font-size:95%;white-space:nowrap;" | | + | |
- | <B><p> Support</p></B> | + | |
- | * [[EMail|<font color="blue">eMail</font>]] | + | |
- | * [[Online Chat|<font color="blue">Online Chat</font>]] | + | |
- | * [[Telephonic Support|<font color="blue">Telephone</font>]] | + | |
- | * [[Remote Support|<font color="blue">Remote Support</font>]] | + | |
- | * [[Forums|<font color="blue">Forums</font>]] | + | |
- | |} | + | |
- | {| class="wikitable" border="0" | + | |
- | |} | + | |
- | + | ||
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | ||
| style="width:10%; color:#000;" | | | style="width:10%; color:#000;" | | ||
Line 35: | Line 6: | ||
| [[Image:escan-g.jpg]] | | [[Image:escan-g.jpg]] | ||
|} | |} | ||
- | |style="text-align:left;"|'''·''' [[Escan/english/eScan-Articles|<font size=1.5 color="blue" align="left">Articles</font>]] '''·''' [[Escan/english/eScan-FAQ|<font size=1.5 color="blue">FAQ</font>]] '''·''' [[Escan/english/eScan-Troubleshooting|<font size=1.5 color="blue">Troubleshooting</font>]] | + | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" |
- | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical Information - Main Page</font>]] | + | |
+ | align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 | ||
+ | |||
+ | color="blue">MailScan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 | ||
+ | |||
+ | color="blue">Technologies</font>]] | ||
+ | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical | ||
+ | |||
+ | Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security | ||
+ | |||
+ | Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] | ||
|} | |} | ||
Line 61: | Line 42: | ||
=='''Overview'''== | =='''Overview'''== | ||
- | The Domain & IP Reputation Check technology verifies the credibility of Web domains by tracking any indication of suspicious activities on the web page. This technology also verifies the integrity of the IP address by comparing it with a list of known email senders and by using a dynamic service that assesses email senders reputation in real-time. Emails received from domains with malicious activities are not accepted. | + | Individuals and organizations often use e-mail as their mode of correspondence. However, of late, most people have started complaining about their inboxes being flooded with unsolicited bulk e-mails or spam e-mails. Spam e-mails often contain links to malicious Web sites, such as phishing Web sites and may contain virus and other malware. |
+ | |||
+ | It is therefore imperative for users to determine whether the e-mail that they have received is authentic and from a trusted source. The reputation of the sender depends on criteria, such as the number of invalid e-mail addresses to which the sender is sending mails, the number of spam complaints made about the sender, and the IP address of the sender. This concept is called IP-based sender reputation and it is used to determine the reputation of an IP address based on what it has sent out in the past. | ||
+ | |||
+ | This approach has its own share of disadvantages. If an organization uses a marketing service for marketing its products, it may share its IP reputation with other organizations that use the same service provider. So, if one of the organizations is involved in spamming, all other organizations will have the same IP reputation. Moreover, if an organization changes its IP address, its IP reputation will depend on the reputation of the new IP. But, if the organization uses an actual domain name instead of an IP address, its reputation will be independent of the computer or location. This concept is called domain-based sender reputation. | ||
+ | |||
+ | However, most organizations use both IP-based and domain-based sender reputation. Therefore, eScan uses the DIRC technology to block spam e-mails. | ||
+ | |||
+ | =='''Description'''== | ||
+ | |||
+ | '''How DIRC Works?''' | ||
+ | |||
+ | eScan’s DIRC technology verifies the credibility of Web domains by tracking suspicious activities happening on their Web pages. ISPs usually follow authentication standards such as Sender Policy Framework (SPF), Sender ID, and DomainKeys and Domain Key Identified Mail (DKIM). DIRC also verifies the integrity of the IP addresses by comparing them with a list of known e-mail senders (Real-time Blacklist Servers [RBL servers] and Auto-Spam Whitelist) and by using a dynamic service that assesses the reputation of e-mail senders on a real-time basis. If the e-mail fails to conform to any one of the criteria, DIRC tags it as [SPAM] and takes the appropriate action on it. | ||
+ | |||
+ | |||
+ | =='''Benefits of DIRC'''== | ||
+ | |||
+ | '''The following are some of the benefits of the DIRC technology:''' | ||
+ | # It frees the reputation of the organization from the being dependent on only the IP address of the underlying computer or only the domain. | ||
+ | # It prevents spam mails from reaching the inbox of the user. | ||
+ | |||
+ | |||
+ | =='''Summary'''== | ||
+ | In this chapter, you learnt about the DIRC technology and how eScan uses it to block spam e-mails. | ||
+ | |||
+ | |||
+ | Return to [[Escan/english/Technologies| <font color="blue">Technologies]] | ||
+ | |||
+ | |||
+ | ------------ |
Current revision
| · eScan · MailScan · Technologies | · Technical Info · Security Awareness · User Guides |
Domain & IP Reputation Check Technology |
|
[edit] OverviewIndividuals and organizations often use e-mail as their mode of correspondence. However, of late, most people have started complaining about their inboxes being flooded with unsolicited bulk e-mails or spam e-mails. Spam e-mails often contain links to malicious Web sites, such as phishing Web sites and may contain virus and other malware. It is therefore imperative for users to determine whether the e-mail that they have received is authentic and from a trusted source. The reputation of the sender depends on criteria, such as the number of invalid e-mail addresses to which the sender is sending mails, the number of spam complaints made about the sender, and the IP address of the sender. This concept is called IP-based sender reputation and it is used to determine the reputation of an IP address based on what it has sent out in the past. This approach has its own share of disadvantages. If an organization uses a marketing service for marketing its products, it may share its IP reputation with other organizations that use the same service provider. So, if one of the organizations is involved in spamming, all other organizations will have the same IP reputation. Moreover, if an organization changes its IP address, its IP reputation will depend on the reputation of the new IP. But, if the organization uses an actual domain name instead of an IP address, its reputation will be independent of the computer or location. This concept is called domain-based sender reputation. However, most organizations use both IP-based and domain-based sender reputation. Therefore, eScan uses the DIRC technology to block spam e-mails. [edit] DescriptionHow DIRC Works? eScan’s DIRC technology verifies the credibility of Web domains by tracking suspicious activities happening on their Web pages. ISPs usually follow authentication standards such as Sender Policy Framework (SPF), Sender ID, and DomainKeys and Domain Key Identified Mail (DKIM). DIRC also verifies the integrity of the IP addresses by comparing them with a list of known e-mail senders (Real-time Blacklist Servers [RBL servers] and Auto-Spam Whitelist) and by using a dynamic service that assesses the reputation of e-mail senders on a real-time basis. If the e-mail fails to conform to any one of the criteria, DIRC tags it as [SPAM] and takes the appropriate action on it.
[edit] Benefits of DIRCThe following are some of the benefits of the DIRC technology:
[edit] SummaryIn this chapter, you learnt about the DIRC technology and how eScan uses it to block spam e-mails.
|