Recommendations on great spam filtering?

I no longer recommend any spam solution that requires software to be installed locally, there are so many benefits to having a cloud based spam system. We use MaxFocus/GFI Mail Protection, the margins are tight but we charge a fee for setup and then direct debit the monthly.
 
SpamHero looks interesting but they haven't updated their blog in over a year and only one time last year and one time in 2013. Lets hope they update their services more than that.
 
Is O365 spam filtering really that good? I thought it was just basics and 3rd party was still recommended / advised.

Works fairly well...clients that have gone to O365 from other systems...have not complained. Plus they like the integration of the JunkMail folder instead of having to read a separate quarantine digest.
 
I lean towards onsite for mail server and spam filtering because I'm dealing with medical practices. I can train about sending outside email with patient info and keep intra-office email inside the offices, and if outside senders send PII/PHI I can at least make sure it's not on outside systems that I have influence over.
 
When I migrated my first O365 customer I signed them up for the 30 day trial of Appriver's antispam service. Did not continue it since they had a minimum of 50 seats ($50 per month). The customer did not notice a difference between before and after in terms of spam.
 
I lean towards onsite for mail server and spam filtering because I'm dealing with medical practices. I can train about sending outside email with patient info and keep intra-office email inside the offices, and if outside senders send PII/PHI I can at least make sure it's not on outside systems that I have influence over.

MaxMail is HIPPA compliant I think and internal email wouldn't be scanned anyway.
 
We do TLS connections 'tween our spam filter appliance, and our customers on-prem servers. Inter-office e-mail never leaves the clients site anyways...it's all internal to Exchange. But incoming e-mail from the "public"...you don't need to worry about that, since it already came from public roads. But if a healthcare clients frequently communicates with other healthcare businesses (such as a home nursing agency and a hospital)...we just setup TLS connectors between the two agencies mail servers.
 
Bluehost uses SpamExperts. I have set it up on 2 domains. One of which was yesterday. Within 5 minutes the emails ceased. Oh what a sigh of relief. I only wish I would have spent the $3 per month sooner.
 
I have a client who's been getting railed against with phishing and spear phishing scams. I signed up as a reseller for SpamHero and setup two domains so far. It works well and is rather inexpensive. The domain level filtering is a lot easier IMO than managing individual users. This client is already on O365 and has the BitDefender email plugin for Outlook. Still, they're a juicy target so the scam artists are constantly knocking.

I told them if a guy comes up to them with a document that requires OneDrive username and password... just tug on his mustache. If he's a scammer the fake mustache will peel right off and his true identity will be revealed.
 
SpamHero has some nice features - ones that I like include the geographic blocks (for the customer I set up with it there's nobody in Africa that's going to be sending them legit mail....) and the ability to add a delay and rescan to some messages - a 2 hour delay may give rapidly-updated definitions time to catch emergent malware spreading via attachments.
 
SpamHero has some nice features - ones that I like include the geographic blocks (for the customer I set up with it there's nobody in Africa that's going to be sending them legit mail....) and the ability to add a delay and rescan to some messages - a 2 hour delay may give rapidly-updated definitions time to catch emergent malware spreading via attachments.

yeah spam hero is great - With Office 365 you can setup a mail flow rule to only allow mail from Spam Hero - This is good to do too. They also just realsed or will be releasing outbound filtering which will be awesome.
 
Office 365 works well. Also, if you are using POP, couple clients I have love spam filtering service from onlymyemail.com. Final option is to use a free gmail account to relay you gmail, google does a great job in filtering, think of it as a poor man's hack to avoid spam, but it works well - better than O365, not as good as onlymyemail.com (IMHO). It does require some training at first to avoid the false positices, but I believe it is true for any filter.
 
We run our own small hosting company for our websites and some clients. We've recently seen a large flood of spam getting though and discovered it's from all the new tlds that apparently RBLs aren't blocking. Our servers run two RBLs (spamhaus and barracuda) and literally hundreds of spam messages a day were getting past them and being delivered with tlds like, .ninja, .xyz, .website, etc. Seems these RBLs haven't adapted for the new tlds and spammers have figured it out. :(

Because we own all our servers, I created an EXIM filter to block all the new tlds these spammers were using. About once a day I'd run a report to see what emails (spam) got delivered, pick out the tlds they were using and add them to the EXIM filter. After a couple weeks now we have these spammers back under control. I imagine sooner or later these RBLs will update to start filtering the new tlds but we and our clients needed an immediate solution as we were getting hundreds a day, thousands a week.

Code:
# Blacklist Domains
if first_delivery
and (
  ("$h_from:" matches ".+@.+\\\\.space[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.work[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.click[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.cricket[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.exercise[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.link[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.ninja[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.rocks[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.science[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.co.in[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.xyz[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.review[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.date[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.co[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.biz[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.us[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.uno[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.party[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.webcam[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.gq[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.faith[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.eu[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.me[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.tk[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.au[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.vn[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.website[^a-zA-Z0-9_]")
or ("$h_from:" matches ".+@.+\\\\.nl[^a-zA-Z0-9_]")
)
then
headers add "SpamRule: EXIM FILTER Block Newfangled Domains (was: $h_subject:)"
deliver "Newfangled <blacklist@yourdomain.com>"
seen finish
endif

Hi InBargains,

I'm new at posting to this forum. I've used your Exim Filter for Newfangled Domains for the last couple years and it works great!

I'm now noticed that a lot of spammers are now getting around this great filter by using alias domains like...

blabla@blabla.blabla.work
or
blabla@blabla.blabla.blabla.date

I've tried experimenting with the regex but I can't get it to work for the above examples. Would you be able to share a new set of regex for the above examples?

Thanks again as you've same our clients with untold amount of spam.
 
Back
Top