We have been able to block TLDs with a rule that can be created as below:
Additional Policy -> Add (for Inbound)
Select Rule Type: use only message attributes (Next)
Message Attributes -> Add
Change dropdown box to : Header
Name : From
Change bubble to : matches regular expression
Value we use is .*@.*\.(xxx|link|rocks|nl|ru|sk|fr|it|pl|jp|hk|glb|info|club|invalid|click)
Rest of the config is up to you really.
****Note the regex above will catch anything in the sender domain area with the TLD names you configure
for example: since I have the "sk" TLD listed (to catch spam from any @xxxxxxxxx.sk domain), an address like @skymailer.skyauction.com (since it contains a ".sk" entry) would also be filtered. You can use logs and sender exceptions to excempt known good domains from the policy. Might be a more elegant regex to use here but this one is working and meets my needs for now.
HTH Good luck!
We have been able to block TLDs with a rule that can be created as below:
Additional Policy -> Add (for Inbound)
Select Rule Type: use only message attributes (Next)
Message Attributes -> Add
Change dropdown box to : Header
Name : From
Change bubble to : matches regular expression
Value we use is .*@.*\.(xxx|link|rocks|nl|ru|sk|fr|it|pl|jp|hk|glb|info|club|invalid|click)
Rest of the config is up to you really.
****Note the regex above will catch anything in the sender domain area with the TLD names you configure
for example: since I have the "sk" TLD listed (to catch spam from any @xxxxxxxxx.sk domain), an address like @skymailer.skyauction.com (since it contains a ".sk" entry) would also be filtered. You can use logs and sender exceptions to excempt known good domains from the policy. Might be a more elegant regex to use here but this one is working and meets my needs for now.
HTH Good luck!