• Live Chat
  • Report an IT Security Incident
  • Request Help
  • Help & Support
    • Live Chat
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Computer Labs & Classrooms Information
  • Service Catalog
    • ITS General Help
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Information Security
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Bits & Bytes Archive
    • Spotlights
    • Bulletins
George Mason University
  • Live Chat
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • Live Chat
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Computer Labs & Classrooms Information
  • Service Catalog
    • ITS General Help
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Information Security
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Bits & Bytes Archive
    • Spotlights
    • Bulletins

How can ITS help you?

Our services are designed to help you succeed at Mason—
search our services, knowledge articles, how to guides, FAQs, and more.

Knowledge Base

Home > Help & Support > Knowledge Base > Email & Collaboration > IronPort > How to Use Safelists and Blocklists in IronPort Anti-Spam

How to Use Safelists and Blocklists in IronPort Anti-Spam

Using Safelists and Blocklists

You can create safelists to ensure that messages from certain senders are not scanned with anti-spam scanning engines, and you can use blocklists to ensure that messages from certain senders are not delivered to your inbox. For example, you may receive email from a mailing list that no longer interests you. You may decide to add this sender to the blocklist to prevent these emails from getting delivered to your inbox. On the other hand, you may find that emails from specific senders get sent to your Spam Quarantine when you don't want them to be quarantined. To ensure messages from these senders are not scanned with anti-spam scanning engines, you may want to add the senders to your safelists.

NOTE: Safelist/Blocklist settings are contingent on other settings configured by the system administrator. A safelisted message may not be delivered to your inbox if it is determined to be virus-positive, or if the administrator determines that the content does not conform to company email policies.

Also, your administrator may modify safelists and blocklists for all users including you.

Accessing Safelists and Blocklists

To modify safelists and blocklists, you need to log into your account if your account is authenticated using LDAP or Mailbox (IMAP/POP) authentication. If you do not know your login, check with your system administrator. You must log into your account even if you are accustomed to accessing your messages via a link in a spam notification (which usually doesn't require authentication). However, you can still view the messages in your Spam Quarantine without logging into your account.

Adding Entries to Safelists and Blocklists

Entries can be added to safelists and blocklists using the following formats:

  • [email protected], user@[10.1.1.0], or user@[ipv6:2001:420:80:1::5]
  • server.domain.com
  • domain.com, [10.1.1.0], or [ipv6:2001:420:80:1::5]

You cannot add a sender or domain to both safe and block lists at the same time. However, if you add a domain to a safelist and a user for that domain to the blocklist (or vice versa), the Cisco appliance applies both rules to incoming mail. For example, if you add example.com to the safelist, and add [email protected] to the blocklist, the Cisco appliance delivers all mail from example.com without scanning for spam, but will treat mail from [email protected] as spam. You cannot allow or block a range of sub-domains using the following syntax: .domain.com. However, you can explicitly block a specific domain using the following syntax: server.domain.com.

Working with Safelists

You can add senders to safelists in two ways. From the Spam Quarantine, you can manually add a sender to the safelist by selecting Options > Safelist. Then, add an email address or domain to the list, and click Add to List.

You can also add senders to the safelist if a message from the sender has been sent to the end-user quarantine. If the message from a given sender is sent to end user quarantine, you can select the checkbox next to message, and choose "Release and Add to Safelist" from the drop-down menu.

Working with Blocklists

You can use blocklists to ensure that you never receive mail from specified senders. To add senders to a blocklist, you select Options > Blocklist from the end-user quarantine. From the end-user quarantine, you can enter an email address or domain in the field, and click Add to List. When the Cisco appliance receives mail from the specified email address or domain that matches an entry in the blocklist, it quarantines or rejects the email. The mail is rejected or quarantined depending on the safelist/blockist action settings configured by your administrator.

Last modified: August 14, 2018

Previous

How to Work with Messages in IronPort Anti-Spam

Next

How to Report Phishing to Microsoft and IronPort

Related articles

  • Will I receive daily Spam Quarantine digest messages?
  • How to Work with Messages in IronPort Anti-Spam
  • How to Report Phishing to Microsoft and IronPort

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

READ MORE

Quick Links

Patriot Pass Password Reset
Create a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

READ MORE

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

I T S Logo

© 2024 George Mason University
4400 University Drive
Fairfax, Virginia 22030

Follow Us
location pin for in-person IT support   @GeorgeMasonITS
location pin for in-person IT support   @georgemasonits
ITS Support 24/7
   703-993-8870
   Live Chat
  • Webmaster