More filters

Navigation:  Settings > AntiSpam >

More filters

Previous pageReturn to chapter overviewNext page

The following filters are created by default; however, if necessary you can also switch them off by unchecking the box.

Disable HTML scripts

Filter harmful attachments

You can use the New button to set up new filter rules, or edit existing filters with the Edit button. The filters created are shown in the list and can be enabled or disabled as required by checking the checkbox to the left of the relevant entry. If you see a check in the checkbox, it means that that filter is active. If there is no checkmark in the box, the filter is inactive. To permanently delete a filter, click the relevant filter once to highlight it and then click the Delete button.

The filter options available here are additional filters that support the actual G Data software spam filter and make it easier for you to configure your own personal settings. The spam filter itself provides you with an extensive range of settings options for effectively blocking email with undesirable content or from undesirable senders (e.g. mass email senders). The program checks for numerous email characteristics that are typical of spam. These characteristics are used to calculate a value reflecting the likelihood of it being spam. To this end multiple tabs are available providing you with all the relevant settings options sorted by subject.

When you create a new filter, a selection window appears in which you can specify the basic filter type. All of the other details about the filter can be created using a wizard, which will guide you through that filter type. This is a convenient way to create filters for every imaginable type of threat.

Disable HTML scripts: This filter disables scripts in the HTML part of an email. Scripts that might look OK on a web page tend to be rather irritating when they are integrated into an HTML email. In some cases, HTML scripts are also used to actively infect computers. Such scripts are capable of running not only when the infected attachment is opened but even when an email is previewed.

Filter harmful attachments: A large number of filter options for filtering email attachments are provided. Most email viruses are spread through attachments, which usually have more or less well-hidden executable files. This can be a standard .exe file containing malware, or a VB script hidden in a graphic, film or music file that is assumed to be safe. In general, users should exercise extreme caution when opening email attachments. If in doubt, the sender of the email should be asked before opening files that have not been expressly requested. Under File extensions you can list the file extensions to which you would like to apply the respective filter. You can, for instance, combine all executable files (such as .exe and .com files) in a single filter, while also filtering out other formats (for instance MPEG, AVI, MP3, JPEG, JPG, GIF etc) that are a burden for your mail server due to their size. You can also filter archive files (e.g. ZIP, RAR or CAB). Please use a semicolon to separate all file extensions in a filter group. The Also filter attachments in embedded email function ensures that the filtering performed under File extensions for the selected attachment types also applies to email messages that are themselves being forwarded as email attachments. This option should generally be enabled. Choosing Only rename attachments has the effect of renaming attachments that are to be filtered rather than deleting them automatically. This is not only recommended for executable files (such as EXE and COM) but also for Microsoft Office files that may contain executable scripts and macros. Renaming an attachment makes it impossible to open it simply by clicking it. Instead, the user must first save (and possibly rename) the attachment before it can be used. If the checkmark for the Only rename attachments function has not been set, the respective attachments are deleted directly. Under Suffix you can enter a character string that should be appended to the file extension (*.exe.danger, for instance), which prevents this type of file from being executed by just clicking on it. Under Insert message in email text you can inform the recipient of the filtered email that an attachment was deleted or renamed based on a filter rule.

Content filter: You can use the content filter to easily block email messages which contain certain subjects or text. Simply enter the keywords and expressions to which the G Data software should react under Search criteria. It is possible to use the AND and OR logical operators to link text components with one another. Under Search scope you can now enter those elements of an email message where these expressions should be looked for. The header is the part of an email message that, among other things, contains the email address of the sender and the recipient, the subject line, information on the programs and protocols used, and the date sent. If you have, for instance, activated Subject as the search area, only the content of the subject line will be checked, and no other information contained in the header. If you select Email text as the search area, you have the additional option of limiting the search area to pure text emails, or extending the search to text in HTML emails (HTML text). By checking Embedded email you can define whether the content filter search should also cover email messages included as attachments in received messages. Under Reaction you can determine what is to be done with email recognised as spam by the G Data software. Using Reject email means the email in question will not even be accepted by your email program. If you check the box for Insert warning in email subject and text you can prefix the actual text in the subject line with a warning (prefix in subject line), e.g. Spam or Warning. You can also enter text to be placed above the actual email text in the event of suspected spam (Message in text). If you use Microsoft Outlook (caution: not to be confused with Outlook Express or Outlook Mail), you also have the option of moving email containing suspected spam to a fully customisable folder in your mailbox (Move email to folder). You can create this folder directly via the G Data software by defining the corresponding folder under Folder name.

The ANDlogical operator assumes that all components that have been linked with AND must be present, while the OR operator assumes that at least one of the elements needs to be present.

Sender filter: You can use the sender filter to easily block email coming from certain senders. To do this, simply enter the email addresses or domain names to which the G Data software should react under Senders/Domains. Use a semicolon to separate multiple entries. Under Reaction you can determine what is to be done with email recognised as spam by the G Data software. Using Reject email means the email in question will not even be accepted by your email program. If you check the box for Insert warning in email subject and text you can prefix the actual text in the subject line with a warning (prefix in subject line), e.g. Spam or Warning. You can also enter text to be placed above the actual email text in the event of suspected spam (Message in text). If you use Microsoft Outlook (caution: not to be confused with Outlook Express or Windows Mail), you also have the option of moving email containing suspected spam to a fully customisable folder in your mailbox (Move email to folder). You can create this folder directly via the G Data software by defining the corresponding folder under Folder name.

Language filter: The language filter lets you automatically define email in specific languages as spam. For example, if you do not generally have email contact with a German-speaking person, you can set German as a spam language which should be filtered out. Simply select the languages in which you do not receive regular email contact and the G Data software will raise the spam probability for such emails. Under Reaction you can determine what is to be done with email recognised as spam by the G Data software. Using Reject email means the email in question will not even be accepted by your email program. If you check the box for Insert warning in email subject and text you can prefix the actual text in the subject line with a warning (prefix in subject line), e.g. Spam or Warning. You can also enter text to be placed above the actual email text in the event of suspected spam (Message in text). If you use Microsoft Outlook (caution: not to be confused with Outlook Express or Windows Mail), you also have the option of moving email containing suspected spam to a fully customisable folder in your mailbox (Move email to folder). You can create this folder directly via the G Data software by defining the corresponding folder under Folder name.