Controlling e-mail access

 

You should control who accesses your system through e-mail to protect your data from malicious attacks.

Control e-mail access provides tips for protecting your e-mail servers from flooding and spamming.

 

Parent topic:

Planning for e-mail

Related concepts
Independent disk pool examples Determining problems with e-mail

Related tasks
Restricting relays Restricting connections
Related information
AS/400 Internet Security: Protecting Your AS/400 from HARM in the Internet