Cloudmark 3048 Home Security System User Manual


 
Cloudmark Cartridge Installation and Administration Guide Chapter 1
2 Cloudmark fingerprinting algorithms
A new fingerprinting scheme provides faster processing.
A new statistics field reports your unique installation ID. See “What statistics
are collected” on page 31.
Cloudmark fingerprinting algorithms
The Cloudmark Cartridge includes Cloudmark’s fingerprinting algorithms,
designed to target the most current spamming techniques. Using these
algorithms, the Cloudmark Cartridge generates a set of fingerprints for each
incoming message.
The Cloudmark Cartridge maintains a cache of all fingerprints that have a known
classification, such as spam, phishing, or virus fingerprints. The fingerprints of
an incoming message are compared to these known fingerprints, and a message
score is generated. This list of known fingerprints is regularly updated with the
latest data from the Cloudmark Global Threat Network, using the micro-updates
mechanism. See “Cloudmark Global Threat Network” below and “Micro-
updates” on page 3.
Cloudmark Global Threat Network
Cloudmark’s community of millions of end users provides constant, real-time
feedback about which messages are considered spam, phishing, or email-borne
viruses, and which ones are considered legitimate. The Trust Evaluation System
(TES) assigns each user a trust level based on how well the user’s feedback
concurs with that of other trusted users. Less-trusted users have less influence
over network-wide message classification, while the most trusted users have more
influence.
When a sufficient number of trusted users block a certain message as junk, this
message’s fingerprint is flagged. Information about the fingerprint is distributed
throughout the network to automatically block that message (and all its
permutations) for other users.
Micro-updates provide the latest known fingerprints as determined by the
Cloudmark Global Threat Network. By using micro-updates, you protect your
platform against the most current email-borne threats. See “Micro-updates”
below.