| Step A: Check if something in the messages is excluded( e-mail address, IP address, hostname, subject, text or white list )
 If so, proceed with step D Step B: Evaluate all methods ( assuming the message is not excluded for that method ) and build a list of failed methods Step C: Calculate which action of the failed methods of step B has the highest 
priority:    | Method sorted by priority | Subject tag | Script shortcut |  |   | Address | [e-mail] | e-mail |   | IP/Host | [ip] | ip |   | DSN | [dsn] | dsn |   | Subject | [subj] | subj |   | Text | [text] | text |   | HTML | [html] | html |   | Attachment | [att] | att |   | Exploit | [expl] | expl |   | MS Office with Macro | [msvba] | msvba |   | MS Office with Password | [offpass] | offpass |   | MS Office with ext mismatch | [offext] | offext |   | Mailing List | [maillist] | maillist |   | CCS | [ccs] | ccs |   | Phishing | [phishing] | phishing |   | SaneSecurity | [sanesec] | sanesec |   | SLS/RBL | [sls] | sls |   | Country | [cty] | cty |   | Bayes | [bayes] | bayes |   | Heuristic | [heur] | heur |   | Header | [hdr] | hdr |   | BCC | [bcc] | bcc |   | Internal From | [internal-from] | internal-from |   | Faked From | [faked-from] | faked-from |   | Faked MX | [mx] | mx |   | FCrDNS | [iprev] | iprev |   | SPF | [spf] | spf |   | DKIM | [dkim] | dkim |   | GURBL | [surbl] | gurbl |   | SURBL | [surbl] | surbl |   | Image | [img] | img |   | Charset | [charset] | charset |   | Auto IP | [auto-ip] | auto-ip |   | Senderbase | [senderbase] | senderbase |   | Backscatter | [backscatter] | backscatter |   | Bitcoin | [bitcoin] | bitcoin |   | SecuriteInfo | [secinfo] | secinfo |   | MS Office with Macro | [olevba] | olevba |   | Community Rules | [comrule] | comrule |   | DisplayName From | [dispf] | dispf |   | DisplayName To | [dispt] | dispt |   | DisplayName CC | [dispc] | dispc |   | Sublime E-Mail Reputation | [ser] | ser |   | S/MIME | [smime] | smime |   | User Defined Method | [udm] | udm |   | Absolute Block | [abs] | abs |  Action sorted by priority:   Discard message - (0)Send a non-delivery report to the sender - (4)Encapsulate and forward to Postmaster - (1)Forward to Postmaster - (6)Encapsulate and send to recipient - (2)Encapsulate and send to recipient without attachments - (3)Mark subject and move to Junk-E-Mail folder - (5)Mark subject - (7)Forward to recipient - (8) If the action is Discard message or Send a non-delivery report to the sender then proceed with step E, else proceed with step D Step D: Scan the message for a virus. If the message has no virus or there is no virus scanner available, then send the message to Exchange Step E: Perform the action that was calculated in step C |