All anti-spam solutions should give you a basic feature of blocking bad e-mails. However, increasingly better spam attack techniques force us to continuously improve the anti-spam solution capabilties. Here are 4 key features that should be used to counter future spam attacks.
- Administration of underlying OS: Relevant only for software-based solutions. Whether when using Windows or UNIX, someone will need to spend some time updating the operating system: making configuration changes, installing patches from time to time, and tracking resource performance and consumption.
- Enterprise policy administration: When using centralized spam blockers, whether it is a software-, appliance-, or ASP-based system, will require certain amount of organization-level administration, including quarantine management and white-list management for adjusting the degree of filtering, should too few or too many messages are tagged as spam.
- Performance upgrades monitoring: As the company and/or the e-mail capacity grows, someone has to watch resource utilizations over time so that an upgrade to network capacity and server hardware can yield better results
- Automatic algorithm and signature updates: In order to stay completely effective, an anti-spam solution must have the most recent rules (ways to determine whether an e-mail is spam or not) and signatures (characteristics of all known spam messages). Spam filters do this by periodically downloading and installing updates from the spam filter’s website. Someone must watch this diligently to make sure that the updates work properly.