You should control who accesses your system through e-mail to protect your data from malicious attacks.
Control e-mail access provides tips for protecting your e-mail servers from flooding and spamming.
Related concepts
Independent disk pool examples Determining problems with e-mail