Skip to content
Nigel Metheringham edited this page Nov 25, 2012 · 1 revision

Describe Configuring Exim here. To include description of the configuration file, and system and user filters.

A full (and tested) configurations example for exim with several spam controls (SPF, SRS, DomainKeys Verity, Fast GrayList, ACL HELO Tricks, Headers manipulation, Headers Spam Check, Sender/Recipient Verification, Blocking with Blacklists, Callout, MX Verify), Filename Blocking (and compacted files), Authenticated SMTP, Spam Filtering, Spyware Images Filtering, Link of executables Filtering, SSL Certificates, Routing, BATV signed address, Disk Quota, Database in Mysql, Courier-Imap integration, Spamassassin and others ticks and tips for download: ConfigurationFile session.

Clone this wiki locally