What does IU do to protect users from spam and virus-infected email?

On this page:

Attachment blocking

To protect against viruses, worms, and other malicious programs spread by email, UITS blocks certain attachments, filtering them from the Indiana University email system.

Spam quarantine

UITS offers a spam quarantine service that analyzes all mail delivered to IU Exchange accounts.

Bandwidth limits

IU limits each host to sending only several hundred messages per minute. If someone is trying to send email to you from a non-IU host that has exceeded its message limit, then that email may very likely not get through to you.

As the high volume of spam on the Internet continues to increase, servers belonging to some popular email hosts are sending IU thousands of messages per minute, and the vast majority of those messages are undeliverable (i.e., from domains that don't exist). These hosts quickly and repeatedly exceed their bandwidth thresholds with illegitimate mail, much to the detriment of their customers who are trying to send legitimate mail to IU users.

IU email system architecture separates its internal university mail flow from the rest of the Internet. This provides a layer of protection that allows IU email to flow reliably between its students, faculty, and staff members. For this reason, it is expected that all official university email is sent via the IU system, and not through external, non-IU hosts. For more, see At IU, what is the policy about official communications from the university to students?

Other steps

UITS is continuing to explore other systems that can block spam and email harvesting without disrupting legitimate use of IU systems. The following are some current ways that IU helps reduce the amount of spam you receive:

  • On Exchange, UITS limits the number of visible addresses (i.e., those on the "To:" and "Cc:" lines) and the number of individual recipients for each email message.
  • All email coming into IU is scanned multiple times by different systems for spam, viruses and malware, to reduce the amount of malicious mail delivered to users.
  • To search the online IU Address Book, the searcher must enter at least two characters of the last name, and search results are limited to 50.

IU computer users commonly wonder why an email address on a web page is spam-inducing, while an email address in the online IU Address Book is not. This is true because it is relatively simple to create a program that harvests email addresses from static web pages and then program it to browse sites for hours or even days, gathering email addresses. To harvest addresses from form-based address books, such as the IU Address Book, the programmer would have to create something smart enough to interact with different search engines on each address book.

Policies for IU internal mail

At Indiana University, if you are considering mass mailing, be aware that the University Information Policy Office (UIPO) distinguishes between administrative mailings and mail that is for interpersonal communication, and treats the two differently. For details, see What is IU's policy concerning mass mailing via email?

Back to top

This is document aele in the Knowledge Base.
Last modified on 2015-10-06 00:00:00.

  • Fill out this form to submit your issue to the UITS Support Center.
  • Please note that you must be affiliated with Indiana University to receive support.
  • All fields are required.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.

  • Fill out this form to submit your comment to the IU Knowledge Base.
  • If you are affiliated with Indiana University and need help with a computing problem, please use the I need help with a computing problem section above, or contact your campus Support Center.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.