All the ways are summarized in
1-
local sender checks ( using DoLocalSenderDomain and DoLocalSenderAddress )
2- Using
ASSP scoring for local senders
3-
local spam activity detector (using ex_localdomains.php and find_abusers.php )
1) and 2) are good if your customer send outgoing spam using smtp authenticated sessions.
If the email are sent via script/email-socket the better way is using point 3) and analyzing
the email activity report using the new "email queue finder". Also to reduce the issue where a client's website gets hacked , you may run regularly clamscan in your /home account using a cron. Another good behaviour is setting strict limits per hour in your WHM / Tweak settings. Most of the outgoing spam will go in queue, and using the step 3) you can analyze it and stop the activity very soon.
The activity spam detector has been improved in ASSP WHM 6.x, now you will receive via email a message email like this
2940
email sent ::= > /home/daaclimi/public_html
::
Example email ::
2012-03-05 10:55:53 1S4d4b-001BbG-GE <=
[email protected] U=daaclimi P=local S=558 T="
From Find out how to pick up females right."
2012-03-05 10:55:53 1S4d4b-001Bbh-UX <=
[email protected] U=daaclimi P=local S=522 T="
From How to pick up ladies correctly?"
2012-03-05 10:55:54 1S4d4c-001Bc2-On <=
[email protected] U=daaclimi P=local S=527 T="
From Easy way to pick up a female."
which shows you the location of the script sending the spam
/home/daaclimi/public_html , some example email containing EXIM id and the
email subject which in the example above is a clear spam.
Once received the email , you can analyze the email content using the new EXIM QUEUE FINDER in your ASSP WHM INTERFACE and take actions (i.e removing the malicious script,suspending the account if the activity was caused by the owner account..)