Browse Definitions :
Definition

greylist (or graylist)

A graylist (also spelled greylist) is a list of E-mail addresses or domain names a spam filter can use to identify suspected spam. If a message arrives from an address or domain on the list, it will be quarantined and then delivered to the subscriber only if the sender attempts to send the message again within a certain period of time. Once a sender has been recognized as legitimate, its address is removed from the list and future messages from that address can pass through the filter unhindered.

The chief advantage of graylisting is the fact that it eliminates most spam while giving desired e-mail traffic a chance to get through. It requires no special configuration efforts on the part of the end user and places no additional burden on the resources of the end user's computer. However, unless a sender transmits its first message to a graylist user twice from the same e-mail address within the prescribed time, the filter will reject the message. Graylisting can also cause annoying delays in the receipt of initial messages.

The term graylist arises from the fact that its mode of operation is between that of a blacklist and a whitelist. A blacklist is a list of e-mail addresses or domain names known to be sources of spam. After filtering, traffic from an address or domain on the list disappears forever. A whitelist works in the opposite way; it is a list of e-mail addresses or domain names from which an e-mail filter allows messages to be received.

This was last updated in April 2007

Continue Reading About greylist (or graylist)

Networking
  • remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT ...

  • port address translation (PAT)

    Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 ...

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

Security
  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • governance, risk and compliance (GRC)

    Governance, risk and compliance (GRC) refers to an organization's strategy for handling the interdependencies among the following...

  • total risk

    Total risk is an assessment that identifies all the risk factors associated with pursuing a specific course of action.

CIO
  • digital platform

    A digital platform is a web-based structural software package that speeds and eases transactions among users.

  • transfer learning

    Transfer learning is a machine learning method where a model already developed for a task is reused in another task.

  • enterprise IT (enterprise-class IT)

    Enterprise-class IT (also known as enterprise-grade, or enterprise IT) is hardware, software and other IT services designed to ...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

  • Salesforce DX

    Salesforce DX, or SFDX, is a set of software development tools that lets developers build, test and ship many kinds of ...

Close