8 Index

A

Abstract data model

   client

   server

Abstract data model - server

   Junk Email rule

Adding a sender to the trusted recipients list example

Applicability

C

Capability negotiation

Change tracking

Client

   abstract data model

   initialization

   other local events

   timer events

   timers

Client - higher layer triggered events

   retrieval of spam preferences

   user adds a new contact to their Contacts folder

   user changes client spam preferences

   user sends an e-mail

Client - higher-layer triggered events

   creating the Junk Email rule

   obtaining or creating the junk email move stamp

   server Junk Email rule changes

Client - message processing

   receiving an e-mail message

Client - sequencing rules

   receiving an e-mail message

D

Data model - abstract

   client

   server

E

Example

   adding a sender to the trusted recipients list

F

Fields - vendor-extensible

Format of the Junk Email Rule message

G

Glossary

H

Higher layer triggered events - client

   retrieval of spam preferences

   user adds a new contact to their Contacts folder

   user changes client spam preferences

   user sends an e-mail

Higher-layer triggered events - client

   creating the Junk Email rule

   obtaining or creating the junk email move stamp

   server Junk Email rule changes

Higher-layer triggered events - server

   creating the Junk Email rule

I

Implementer - security considerations

Inbox folder properties

   PidTagAdditionalRenEntryIds property

Inbox Folder Properties message

Index of security parameters

Informative references

Initialization

   client

   server

Introduction

J

Junk Email rule properties

   PidTagJunkAddRecipientsToSafeSendersList property

   PidTagJunkIncludeContacts property

   PidTagJunkPermanentlyDelete property

   PidTagJunkPhishingEnableLinks property

   PidTagJunkThreshold property

   PidTagReportTime property

Junk Email Rule Properties message

M

Message object properties

   PidLidSpamOriginalFolder property

   PidNameExchangeJunkEmailMoveStamp property

   PidTagContentFilterSpamConfidenceLevel property

Message Object Properties message

Message processing

   server

Message processing - client

   receiving an e-mail message

Message processing - server

   executing the Junk Email rule on a message

Messages

   Format of the Junk Email Rule

   Inbox Folder Properties

   Junk Email Rule Properties

   Message Object Properties

   transport

N

Normative references

O

Other local events

   client

   server

Overview (synopsis)

P

Parameters - security index

PidLidSpamOriginalFolder Message object property

PidNameExchangeJunkEmailMoveStamp Message object property

PidTagAdditionalRenEntryIds Inbox folder property

PidTagContentFilterSpamConfidenceLevel Message object property

PidTagJunkAddRecipientsToSafeSendersList Junk Email rule property

PidTagJunkIncludeContacts Junk Email rule property

PidTagJunkPermanentlyDelete Junk Email rule property

PidTagJunkPhishingEnableLinks Junk Email rule property

PidTagJunkThreshold Junk Email rule property

PidTagReportTime Junk Email rule property

Preconditions

Prerequisites

Product behavior

R

References

   informative

   normative

Relationship to other protocols

S

Security

   implementer considerations

   parameter index

Sequencing rules

   server

Sequencing rules - client

   receiving an e-mail message

Sequencing rules - server

   executing the Junk Email rule on a message

Server

   abstract data model

   initialization

   message processing

   other local events

   sequencing rules

   timer events

   timers

Server - abstract data model

   Junk Email rule

Server - higher-layer triggered events

   creating the Junk Email rule

Server - message processing

   executing the Junk Email rule on a message

Server - sequencing rules

   executing the Junk Email rule on a message

Standards assignments

T

Timer events

   client

   server

Timers

   client

   server

Tracking changes

Transport

Triggered events - client

   creating the Junk Email rule

   obtaining or creating the junk email move stamp

   retrieval of spam preferences

   server Junk Email rule changes

   user adds a new contact to their Contacts folder

   user changes client spam preferences

   user sends an e-mail

Triggered events - server

   creating the Junk Email rule

V

Vendor-extensible fields

Versioning