Nigel Metheringham edited this page Nov 25, 2012 · 1 revision

Describe Configuring Exim here. To include description of the configuration file, and system and user filters.

A full (and tested) configurations example for exim with several spam controls (SPF, SRS, DomainKeys Verity, Fast GrayList, ACL HELO Tricks, Headers manipulation, Headers Spam Check, Sender/Recipient Verification, Blocking with Blacklists, Callout, MX Verify), Filename Blocking (and compacted files), Authenticated SMTP, Spam Filtering, Spyware Images Filtering, Link of executables Filtering, SSL Certificates, Routing, BATV signed address, Disk Quota, Database in Mysql, Courier-Imap integration, Spamassassin and others ticks and tips for download: ConfigurationFile session.

Clone this wiki locally
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.
Press h to open a hovercard with more details.