Technical Information

Deployment

Deployment of the TetherFilter appliance could not be easier:

  • Connect TetherFilter to your network
  • Power up and set the IP address via. the front panel LCD and keypad
  • Point your domain's MX record in the DNS to the TetherFilter's IP address - or -
  • Set the TetherFilter's IP address to the one used by your email server, and then change its address
  • Log into the web interface of the TetherFilter and enter your domain information
  • Congratulations, you are now stopping 98%+ of the spam entering your network!

TetherFilter ships with a solid set of spam filtering rules, so straight out of the box, without modification, it can begin stripping spam out of your incoming email flow while ensuring accurate delivery of legitimate business email

Configuration

TetherFilter also allows system administrators and individual users, who are enabled by the system administrator, to define a sequence of rules to customize TetherFilter behavior. System Administrators can extend default behavior to look for inappropriate, confidential, or potentially dangerous electronic mail messages on the network. The open architecture defined in TetherFilter, gives system administrators the ability to dynamically change behavior when high priority emergencies emerge. And throughout the simple and clean web based interface, Tethernet has produced a compelling and powerful tool to remove unwanted mail from your e-mail server. There is no longer any excuse for unwanted electronic mail messages.

View screen shots of the TetherFilter web interface

End-User Administration

TetherFilter can accommodate simple 'zero-admin overhead' user management. Users automatically receive TetherFilter login information through their e-mail addresses and no account/password integration is necessary with existing corporate account management. TetherFilter users can view their own quarantined folders and can customize user specific message handling rules. The TetherFilter administrator can determine if quarantine messages are deleted, placed in the system quarantine or sent to the users quarantine folder. Quarantine folders can be viewed though the TetherFilter web interface. TetherFilter works within your corporate security philosophy when customizing access and handling of unwanted messages. Users can be prevented from accessing TetherFilter's interface or given greater access which reduces administration management headaches.

When TetherFilter first receives a message from the internet, that message is processed though the system global incoming rules. For most organizations, these will use the default TetherFilter rules. The default rules remove about 99% of unwanted spam. This spam, by default is placed in the system quarantine and not available for users to view. Administrators can, optionally, send the quarantined messages to the users quarantine folder. This will allow users to login to the TetherFilter web interface and view the quarantine messages. Users can,optionally, specify additional message handling rules. All user incoming rules are processed after the global system incoming rules.

Anti-Spam Engine

TetherFilter does not, by default, consider the content of a message to determine if it is unwanted bulk mail. Instead, it uses protocol and formatting rule violations to determine the nature of the message. The great majority of unwanted build mail violates these rules. As a result, TetherFilter is a safe product for doctors, engineers, lawyers and other professionals who routinely deal with content that mainstream anti-spam products will tag as pornographic mail. Accidental marking of legitimate mail is the number one cause of complaint by users of such products that mistakenly mark a legitimate message as undesirable pornographic commercial mail.




image image image image image image image image image image image image image image
image