8 Index
A
Abstract data model
Abstract data model - server
Adding a sender to the trusted recipients list example
C
Client
Client - higher layer triggered events
user adds a new contact to their Contacts folder
user changes client spam preferences
Client - higher-layer triggered events
obtaining or creating the junk email move stamp
server Junk Email rule changes
Client - message processing
Client - sequencing rules
D
Data model - abstract
E
Example
adding a sender to the trusted recipients list
F
Format of the Junk Email Rule message
G
H
Higher layer triggered events - client
user adds a new contact to their Contacts folder
user changes client spam preferences
Higher-layer triggered events - client
obtaining or creating the junk email move stamp
server Junk Email rule changes
Higher-layer triggered events - server
I
Implementer - security considerations
Inbox folder properties
PidTagAdditionalRenEntryIds property
Inbox Folder Properties message
Initialization
J
Junk Email rule properties
PidTagJunkAddRecipientsToSafeSendersList property
PidTagJunkIncludeContacts property
PidTagJunkPermanentlyDelete property
PidTagJunkPhishingEnableLinks property
Junk Email Rule Properties message
M
Message object properties
PidLidSpamOriginalFolder property
PidNameExchangeJunkEmailMoveStamp property
PidTagContentFilterSpamConfidenceLevel property
Message Object Properties message
Message processing
Message processing - client
Message processing - server
executing the Junk Email rule on a message
Messages
N
O
Other local events
P
PidLidSpamOriginalFolder Message object property
PidNameExchangeJunkEmailMoveStamp Message object property
PidTagAdditionalRenEntryIds Inbox folder property
PidTagContentFilterSpamConfidenceLevel Message object property
PidTagJunkAddRecipientsToSafeSendersList Junk Email rule property
PidTagJunkIncludeContacts Junk Email rule property
PidTagJunkPermanentlyDelete Junk Email rule property
PidTagJunkPhishingEnableLinks Junk Email rule property
PidTagJunkThreshold Junk Email rule property
PidTagReportTime Junk Email rule property
R
Relationship to other protocols
S
Security
Sequencing rules
Sequencing rules - client
Sequencing rules - server
executing the Junk Email rule on a message
Server
Server - abstract data model
Server - higher-layer triggered events
Server - message processing
executing the Junk Email rule on a message
Server - sequencing rules
executing the Junk Email rule on a message
T
Timer events
Timers
Triggered events - client
obtaining or creating the junk email move stamp
server Junk Email rule changes
user adds a new contact to their Contacts folder
user changes client spam preferences
Triggered events - server
V