- Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and
- Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.
The organization centrally manages spam protection mechanisms.
The information system automatically updates spam protection mechanisms.
The information system implements spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.