Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages; and Update spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transported by different means, including email, email attachments, and web accesses. Spam protection mechanisms include signature definitions.
spam protection mechanisms are employed at system entry points to detect unsolicited messages; spam protection mechanisms are employed at system exit points to detect unsolicited messages; spam protection mechanisms are employed at system entry points to act on unsolicited messages; spam protection mechanisms are employed at system exit points to act on unsolicited messages; spam protection mechanisms are updated when new releases are available in accordance with organizational configuration management policies and procedures.