Chapter 28. Processing and Securing E-Mail

In This Chapter

Understanding junk e-mail filtering

Setting junk e-mail options

Defining blocked and allowed lists

Understanding e-mail rules

Defining a new rule

Looking at some rule examples

Managing e-mail rules

Protecting against viruses

Understanding Outlook’s attachment blocking

Implementing macro security

Using certificates and digital signatures

Encrypting and digitally signing messages

Junk e-mail, often called spam, is a problem for most e-mail users. It can range from a minor annoyance for a home user to a major problem for a large organization, clogging mail servers and reducing the efficiency of employees. Fortunately, Outlook provides you with tools that greatly reduce the spam problem. You also can use message rules to process incoming e-mail, cutting down on the amount of time you spend moving messages around or deleting them. Computer security has unfortunately become a very important topic. With the almost universal use of the Internet and e-mail, it’s easier than ever for various kinds of malicious software such as viruses to spread. Security issues also include message privacy and verification of people’s identities. Because e-mail is the favored means of spreading such malware, Outlook users have to be particularly vigilant. This chapter explains the various tools that Outlook provides to make you more efficient in dealing with spam and managing messages, and to enhance your security.

Get Office 2007 Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.