9. What do you need?

The techniques described in this document predicate system access to the inbound Mail Exchanger(s) for the internet domain where you receive e-mail. Essentially, you need to be able to install software and/or modify the configuration files for the Mail Transport Agent on that system.

Although the discussions in this document are conceptual in nature and can be incorporated into a number of different MTAs, a sample Exim 4 implementation is provided. This implementation, in turn, incorporates other software tools, such as SpamAssassin. See Appendix A for details.