Proxmox Mail Gateway Deployment Guide
|
|
|
- Blaise Allen
- 9 years ago
- Views:
Transcription
1 Proxmox Mail Gateway Deployment Guide 5/21/2010 MailGatewayDeploymentGuide-V1.8.docx
2 Proxmox Server Solutions GmbH reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the latest version of this document, which is available from NOTE: A license to the Proxmox Software usually includes the right to product updates for one (1) year from the date of purchase. Maintenance can be renewed on an annual basis. All other product or company names different from Proxmox may be trademarks or registered trademarks of their owners. Copyright 2010 Proxmox Server Solutions GmbH. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Proxmox Proxmox Server Solutions GmbH 2 49
3 Table of Contents 1 Introduction Proxmox Mail Gateway Integration system without Proxmox system with Proxmox Proxmox in the Intranet Default port settings Alternative port settings (e.g. for MS Exchange) Proxmox in DMZ (demilitarized zone) Proxmox with multiple server and mail domains Performance Tuning Hardware benchmarks Backup MX Local DNS cache Blocking s on SMTP level Greylisting Sender Policy Framework SPF Real time Blacklists (RBL) Local DNS RBL cache Spamhaus Datafeed Service Configuring local DNS blacklist caches Receiver Verification Proxmox Solutions Enabling Verify Receivers Settings for Exchange 2003 SP Settings for Exchange 2007 SP Rule System Default Rules Block Viruses Virus Alert Block Dangerous Files Mark Spam Custom Rules Enable Spam and Virus quarantine Enable Spam quarantine for just a selection of users Enable Spam quarantine for existing LDAP users Block Spam s with a score higher BCC object An simple archive solution Block Video and Audio Attachments Add Admin Notification to Rules Preventing directory harvesting attacks with LDAP object Block Video and Audio Attachments for LDAP Groups Proxmox HA Cluster High availability Load Balancing with MX Records Multiple Address Records Using third party Firewall features Hardware selection and Virtualization Physical Hardware Certified Hardware Proxmox VE ( 6.3 VMware Settings for VMware ESX, ESXi and vsphere Settings for the Proxmox Mail Gateway Virtual Machine RAM settings VMware Tools Enable VMI Paravirtualization Enable time synchronization Proxmox Server Solutions GmbH 3 49
4 6.3.2 Settings for a VMware Server Host memory settings Settings for Proxmox Mail Gateway Virtual Machine RAM settings VMware Tools Enable VMI Paravirtualization Enable time synchronization OpenVZ Troubleshooting and technical support Table of figures Appendix Proxmox Server Solutions GmbH 4 49
5 1 Introduction The huge amount of traffic is a challenge for every environment. The daily routine brings along some major problems, this includes: performance, reliability, regulation under public law and threads like viruses or Phishing attacks. is an essential service for any organization, and professionally managed improves organizational workflow and customer satisfaction. A missed could mean a lost opportunity, or it could cause a public-relations problem that no organization would want. How does Proxmox work? When an arrives at the Proxmox Mail Gateway, it is analyzed and forwarded to your server which is responsible for sending the to the receiver. If the e- mail server is not working, Proxmox Mail Gateway temporarily stores the message in the queue for later transfer. The process works similar for outgoing s. This document covers samples and deployment information how to integrate and customize Proxmox in your environment. Note: See also the Proxmox Mail Gateway Administration Guide for a detailed product description Proxmox Server Solutions GmbH 5 49
6 2 Proxmox Mail Gateway Integration 2.1 system without Proxmox In a sample configuration, your traffic (SMTP) arrives on the firewall and will be forwarded directly to your server. Figure 2-1 System without Proxmox Mail Gateway 2.2 system with Proxmox A single Proxmox Mail Gateway Server can handle unlimited mail domains with multiple internal mail servers and millions of s per day. For high availability and maximum performance it is recommended to use a Proxmox HA Cluster, see chapter 5 Proxmox HA Cluster High availability. Proxmox Mail Gateway can process incoming AND outgoing SMTP traffic by using different ports. One port is assigned to incoming, one port for outgoing s. With the integrated Proxmox system all your traffic is forwarded to the Proxmox Mail Gateway which filters the whole traffic and removes unwanted s. You can manage incoming and outgoing traffic. Figure 2-2 Incoming with Proxmox Mail Gateway Proxmox Server Solutions GmbH 6 49
7 Many mail filter solutions do not scan outgoing mails. Opposed to that Proxmox Mail Gateway is designed to scan both incoming and outgoing mails. This has two major advantages: Figure 2-3 Outgoing with Proxmox Mail Gateway 1. Proxmox is able to detect viruses sent from an internal host. I many countries you are liable for not sending viruses to other people. Proxmox outgoing scanning feature is an additional protection to avoid that. 2. Proxmox can gather statistics about outgoing s too. Statistics about incoming s looks nice, but they are quite useless. Consider two users, user- 1 receives 10 mails from news portals and wrote 1 mail to a person you never heard from. While user-2 receiver 5 mails from a customer and sent 5 mails back. Which user do you consider more active? I am sure its user-2, because he communicates with your customers. Proxmox advanced address statistics can show you this important information. Solution which does not scan outgoing mail can t do that Proxmox Server Solutions GmbH 7 49
8 2.3 Proxmox in the Intranet Default port settings The default configuration of the Proxmox Mail Gateway uses port 25 for incoming and port 26 for outgoing s. Figure 2-4 Incoming default port settings (port 25) Outgoing Mails: Configure your mail server to send all s to the Proxmox Mail Gateway, port 26. Note: Proxmox receives the outgoing s on port 26, so Proxmox knows its internal trusted . After processing, Proxmox sends the s to Internet, using standard port 25. Figure 2-5 Outgoing default port settings (port 26) Alternative port settings (e.g. for MS Exchange) Sometimes it is not possible to change the outgoing port due to third party software limitations or existing network configurations (e.g. changing MS Exchange to another sending port will have impact on Exchange internals and it s not recommend) To receive s you have to do port forwarding at your Firewall. So that you re external IP and port 25 shows to the Proxmox Mail Gateway IP and port Proxmox Server Solutions GmbH 8 49
9 Figure 2-6 Incoming alternative port settings (port 26) With MS Exchange you should not use port 26 for outgoing so you have to switch these two values (25 and 26). In the end you have to use port 25 for outgoing and port 26 for incoming mails. Figure 2-7 Outgoing alternative port settings (port 25) Proxmox Server Solutions GmbH 9 49
10 2.4 Proxmox in DMZ (demilitarized zone) To run a DMZ Zone you have to adjust your Firewall settings. The intranet (Local) and DMZ needs to have different IP Networks, for example: Interface Zone IP Address Net mask eth0 Local eth1 Internet eth2 DMZ Figure 2-8 Proxmox in DMZ Proxmox Server Solutions GmbH 10 49
11 2.5 Proxmox with multiple server and mail domains You can use Proxmox Mail Gateway sending s to different internal servers. For example you can send s addressed to domain.com to your first server, and s addressed to subdomain.domain.com to a second one. In the proxy transport section add the IP addresses or hostname, SMTP ports and mail domains of your additional servers. Figure 2-9 Multiple servers Note: you need for each domain an appropriate license, otherwise it will not work! Proxmox Server Solutions GmbH 11 49
12 3 Performance Tuning 3.1 Hardware benchmarks Please use the command line tool proxperf to get an overview about your hardware and DNS performance. Note: Never run proxperf if the system is under load. Here is a sample output of proxperf : proxmox:~# proxperf CPU BOGOMIPS: REGEX/SECOND: HD SIZE: 6.89 GB (/dev/sda2) BUFFERED READS: MB/sec AVERAGE SEEK TIME: 8.09 ms FSYNCS/SECOND: DNS EXT: ms DNS INT: 1.05 ms (domain.com) DNSBL: ms (zen.spamhaus.org) proxmox:~# Please compare your results against this reference. If you get lower results please analyze your hardware and DNS setup for comments your results to [email protected]. 3.2 Backup MX Using your ISPs mail server is not a good idea, because many ISPs do not use advanced spam prevention techniques. And spammers know this and they use your ISP backup MX to work around your Proxmox spam filtering. Additionally, you can never benefit of blocking spam messages on SMTP level. If you need redundancy, it is recommended to run a second Proxmox server in HA Cluster mode to avoid lower spam detection rates 3.3 Local DNS cache Proxmox includes a local DNS cache. It is recommended to enable it if you do not have access to fast (internal) DNS servers, or if you want to reduce the load on those servers. Figure 3-1 Use local DNS Cache Proxmox Server Solutions GmbH 12 49
13 3.4 Blocking s on SMTP level Blocking s before they reach your network saves your internet bandwidth and reduces processing power. By doing the following, you can reduce your traffic by more than 90 %, depends on your environment. If you want to exclude some senders or receivers from getting blocked on the SMTP level, just enter in the Mail proxy whitelist Greylisting Figure 3-2 Mail proxy whitelist Typically, a server that utilizes Greylisting will record the following three pieces of information (referred to as triplet) for all incoming . The IP address of the connecting host The envelope sender address The envelope recipient address The client is checked against the mail server's internal whitelists (if any) first. Then, if the triplet has never been seen before, it is greylisted for a period of time (how much time is dependent on the server configuration). The is rejected with a temporary error. The assumption is that since temporary failures are built into the RFC specifications for delivery, a legitimate server will attempt to connect again later on to deliver the . Greylisting is effective because many mass tools utilized by spammers are not set up to handle temporary failures (or any failures for that matter) so the Spam is never received. This feature can reduce traffic up to 50%. Greylisted s never reach your mail server and your mail server will stop sending useless "Non Delivery Reports" to spammers, filling up the queue. If a sender has a valid SPF record, he will never be greylisted Proxmox Server Solutions GmbH 13 49
14 3.4.2 Sender Policy Framework SPF Domains use public records (DNS) to direct requests for different services (web, , etc.) to the machines that perform those services. All domains already publish (MX) records to tell the world what machines receive for the domain. SPF works by domains publishing "reverse MX" records to tell the world what machines send e- mail for the domain. When receiving a message from a domain, the recipient can check those records to make sure is coming from where it should be coming from. Please make sure, that you deploy a valid SPF record for your mail domain. Note: see for setting up a SPF for your mail domain Real time Blacklists (RBL) Proxmox can use RBL checks on SMTP level to reject s. Therefore Proxmox has to query the RBL server for every SMTP connection. Proxmox use the following RBL providers by default: Spamhaus.org dsbl.org Figure 3-3 Enable RBL checks Proxmox Server Solutions GmbH 14 49
15 3.4.4 Local DNS RBL cache Spamhaus Datafeed Service Each leads to a DNS query to the RBL server of spamhaus and dsbl. If these servers are under heavy it cannot be guaranteed that you will get an answer also if you are running a high traffic site it is recommended to locally cache both RBL s. Proxmox can synchronize these blacklists locally to provide quality of service and speed up the query time Configuring local DNS blacklist caches Some DNS blacklist providers offers data feed services. You can locally mirror blacklist data making queries to remote DNS servers unnecessary. Proxmox can use local DNS blacklist caches of spamhaus.org and dsbl.org. Just set the IP address of your local mirror, or ' ' to disable it (default). You can use your Proxmox Server to download the blacklists, but you can also use any other server within your network. Note: Spamhaus data feed is a commercial service additional license/account required. For details visit HowTo: Synchronize DNS blacklist to the Proxmox server Local sync is done via proxblsync, usually started via cron. Please log in to the console and configure the following: crontab e 11,41 * * * * proxblsync --spamhaus rsync1.spamhaus.org --dsbl rsync.dsbl.org - -mailto root Note: 11,41 stands for the minutes of each hour, please replace these values with the one in your spamhaus datafeed license. Next, configure the RBLDNS daemon configuration file: nano /etc/default/rbldnsd RBLDNSD="- -r/var/lib/rbldns -f -b \ sbl.spamhaus.org:ip4set:sbl \ pbl.spamhaus.org:ip4trie:pbl \ xbl.spamhaus.org:ip4tset:xbl \ zen.spamhaus.org:ip4set:sbl \ zen.spamhaus.org:ip4trie:pbl \ zen.spamhaus.org:ip4tset:xbl \ list.dsbl.org:ip4set:dsbl" Proxmox Server Solutions GmbH 15 49
16 Start the RBLDNS service: /etc/init.d/rbldnsd start Finally, redirect query to local mirror: Figure 3-4 Enable local RLB cache Spamhaus.org and Dsbl.org Receiver Verification Nowadays, domains are receiving a lot of s to non-existing users. This could be up to 95 % of junk messages. In short, this means for your systems: Increased traffic on your internet connection Your server is handling junk s instead of working for you High load on your scanners Slow overall performance and high costs Proxmox Solutions Proxmox can detect these s to non-existing users on SMTP level, which means BEFORE the s are transferred to your networks. In short, this means for your systems: reduced traffic, up to 90 % Your internal server is now working for you again Reduced load on your scanners, 90 % less s to analyze for spam and viruses Good performance and costs Proxmox Server Solutions GmbH 16 49
17 Enabling Verify Receivers You can enable this option on the admin interface (Configuration/Mail Proxy/Options) We recommend selecting yes (450). 450 means, that in the case of a short downtime of your internal mail server no messages are lost. Note: Your internal server has to be reconfigured to reject unknown user. Proxmox is doing a short query to the internal server to check if the user is valid. For settings on Exchange 2003 SP2, see chapter Settings for Exchange 2003 SP2 Figure 3-5 Enable Verify Receivers Proxmox Server Solutions GmbH 17 49
18 Settings for Exchange 2003 SP2 You have to enable Recipient Filtering, please use the Exchange System Manager. Figure 3-6 Exchange 2003: Filter recipients Proxmox Server Solutions GmbH 18 49
19 Figure 3-7 Exchange 2003: Filter recipients Proxmox Server Solutions GmbH 19 49
20 Figure 3-8 Exchange 2003: Filter recipients 3 Figure 3-9 Exchange 2003: Filter recipients Proxmox Server Solutions GmbH 20 49
21 Settings for Exchange 2007 SP1 First, make sure that you have the Exchange 2007 Anti-Spam agent. If you installed a typical one server installation, this is NOT installed by default. Microsoft provides an install script to manually install the Anti-Spam agent: 1. Open the Exchange Management Shell 2. cd c:\program files\microsoft\exchange Server\Scripts 3..\install-AntispamAgents 4. Restart the Microsoft Exchange Transport service Figure 3-10 Exchange 2007 SP1: Install Anti-Spam agent Now you can enable Recipient Filtering on the Anti-Spam agent, please use the Exchange Management Console. Figure 3-11 Exchange 2007 SP1: Filter recipients Proxmox Server Solutions GmbH 21 49
22 Figure 3-12 Exchange 2007 SP1: Filter recipients 2 4 Rule System The object-oriented rule system enables custom rules for your domains. It s an easy but very powerful way to define filter rules by user, domains, time frame, content type and resulting action. Who - object For TO and/or FROM Category Example: Mail object - Who is the sender or receiver of the ? When - object Example: When is the received by Proxmox Mail Gateway? What - object Example: Does the contain spam? Action - object Example: Mark with "SPAM:" in the subject. Every rule has got 5 categories (FROM, TO, WHEN, WHAT, ACTION) which can contain several objects. For example enable Archive Solutions with BCC Object (Blind carbon copy, recipients not visible in the "To" field) to Mailbox or to a Public Folder FROM: Anybody TO: Anybody WHEN: Always WHAT: Mail ACTION: BCC to Publicfolder In most of the countries worldwide a company has to forward all s to there employees this includes spam s as well Proxmox Server Solutions GmbH 22 49
23 For example to send Spam mails in quarantine FROM: Anybody TO: Anybody WHEN: Always WHAT: Spam ACTION: Quarantine With this kind of setup the receiver gets detailed Information about the Spam s. Quarantine can be enabled just for existing LDAP groups or via BCC to Public Folders or Mailboxes. At present the usefulness of is being threatened by three phenomena: spamming, pishing and worms. Spamming is unsolicited commercial . Because of the very low cost of sending e- mail, spammers can send hundreds of millions of messages each day over an inexpensive internet connection. Hundreds of active spammers sending this volume of mail results in information overload for many computer users who receive tens or even hundreds of junk messages each day. worms use as a way of replicating themselves into vulnerable computers. The combination of spam and worm programs results in users receiving a constant drizzle of junk , which reduces the usefulness of as a practical tool. To increase the efficiency of communications the use of anti-spam, anti-pishing and antivirus software is essential. With the deployment of Proxmox Mail Gateway you get the job done. Based on the design as software appliance one of the strengths of Proxmox Mail Gateway is its flexibility. It can be easy integrated in existing architecture. It s compatible to every type of mail server or MTA (e.g. Microsoft Exchange, Lotus Domino, Postfix ). For example a virus protection looks like this: FROM: Anybody TO: Anybody WHEN: Always WHAT: Virus ACTION: Block Options range from simple spam and virus filter setups to sophisticated, highly customized configurations blocking certain types of s and generating notifications Proxmox Server Solutions GmbH 23 49
24 4.1 Default Rules Block Viruses This rule blocks all incoming virus and informs the admin via notification Virus Alert Figure 4-1 Rule: Block Viruses This rule blocks all outgoing virus and informs the admin and sender via notification. Figure 4-2 Rule: Virus Alert Proxmox Server Solutions GmbH 24 49
25 4.1.3 Block Dangerous Files This rule removes dangerous attachments from incoming s (.vbs,.bat,.com, ) Mark Spam Figure 4-3 Rule: Block Dangerous Files This rule identifies spam and modifies the spam level and the subject. Figure 4-4 Rule: Mark Spam Proxmox Server Solutions GmbH 25 49
26 4.2 Custom Rules Proxmox provides samples for custom rules to show the functionality. For support or help configuring rules see the Proxmox support forum at: or contact a Proxmox partner Enable Spam and Virus quarantine Activate or change the Spam and/or Virus rule with the existing action object Quarantine. Figure 4-5 Add Quarantine action to rule Mark Spam Enable Spam quarantine for just a selection of users If you want to use the spam quarantine for specific users or a specific domain (and for the rest just Mark Spam ), create a new WHO object containing these users or domains. 1. Create a new WHO object; give a name like Quarantine Users and add the users or domains to this object 2. Use the existing (inactive) rule Spam Quarantine and set higher priority than the Mark Spam rule (e.g. 81) 3. Add the WHO object Quarantine Users 4. Activate the rule Proxmox Server Solutions GmbH 26 49
27 Figure 4-6 Enable Spam quarantine for just a selection of users Enable Spam quarantine for existing LDAP users If you want to use the spam quarantine only for existing internal addresses, you can use the LDAP query Existing LDAP. 1. Create a new WHO object; give a name like Existing LDAP address and add the LDAP group Existing LDAP address 2. Use the existing (inactive) rule Spam Quarantine and set higher priority than the Mark Spam rule (e.g. 81) 3. Add the WHO object Existing LDAP address 4. Activate the rule Figure 4-7 Create WHO object Existing LDAP address Proxmox Server Solutions GmbH 27 49
28 Figure 4-8 Enable Spam quarantine for existing LDAP addresses Proxmox Server Solutions GmbH 28 49
29 4.2.4 Block Spam s with a score higher 10 The default setting marks Spam with a score higher 5 and delivers the to the user. With this additional rule, you can block Spam with a score higher 10 to reduce the delivery of spam s to the user. 1. Create a new What Object, give a name, e.g. Spam Level 10 Figure Add Spam Filter to the Object Figure Set the Set Spam Filter to Level 10 Figure Add new Rule, give a name, e.g. Delete Spamlevel 10, Set Priority to 81 (higher than the Mark Spam rule!, set Direction to In Figure Add What Object Spam Level 10 to the rule Figure Add Action Object Block to the rule Figure Final review (still inactive) Figure Activate rule Figure 4-16 Figure 4-9 Add new What Object Proxmox Server Solutions GmbH 29 49
30 Figure 4-10 Add Spam Filter to a What Object Figure 4-11 Set Spam Filter to Level Proxmox Server Solutions GmbH 30 49
31 Figure 4-12 Add new Rule Figure 4-13 Add What Object to a Rule Proxmox Server Solutions GmbH 31 49
32 Figure 4-14 Add Action Object to a Rule Figure 4-15 Final Review of Rule (still inactive) Proxmox Server Solutions GmbH 32 49
33 Figure 4-16 Activate Rule BCC object An simple archive solution If you need to archive s it s useful to send a copy to a special mailbox. If you have Microsoft Exchange, you can also send a copy to a mail enabled public folder. 1. Create an Action Object: Add BCC Object, name it BCC to Archive Public folder or Mailbox 2. Under Receiver, type the address of the public folder/mailbox 3. Click on an already existing rule or create a new one 4. Add Action Object BCC to Archive Public folder or Mailbox to the rule How to create a Mail Enable Public Folder under Exchange 2000/2003? 1. Create a public folder in Exchange (Exchange System Manager or via Outlook) 2. "Mail enable" the public folder via Exchange system manager right click an select Mail Enable 3. Wait a few minutes, Exchange creates the address 4. Right click the folder an check the address (or change it, if you want), remember address 5. Set appropriate client permission (note: anonymous must have the right to create items) 6. Optional: Set age limit: select Limits and set the age limit to 90 days (all messages older than 90 days will be automatically deleted) Block Video and Audio Attachments 1. Create a new rule, e.g. Block Multimedia Files, define direction and set priority 2. Add What Object Multimedia to the rule Proxmox Server Solutions GmbH 33 49
34 3. Add Action Object Block to the rule 4. Final review (still inactive) 5. Activate the rule Add Admin Notification to Rules If you block mails it s useful to inform the Proxmox Admin. 1. Click on the desired rule 2. Add the notify Admin action to the rule Preventing directory harvesting attacks with LDAP object The LDAP group object Unknown LDAP address can be used to prevent directory harvesting attacks. The Mail Gateway can check incoming addresses against valid addresses in your organization. 1. Create a new WHO Object, give a name, e.g. Unknown LDAP 2. Add an LDAP Group to the Object, select Any profile and Unknown LDAP Address, then click save. 3. Now you can test your object against addresses. If you type an unknown address, it should be member of the Unknown LDAP group. If you type a valid address, it should not be member. 4. Add new rule, give a name, e.g. Unknown LDAP, set priority to 85 (higher than the Mark Spam rule, set direction to in 5. Add the WHO object Unknown LDAP from above to the rule (as to ) 6. Add the WHAT Spam to the rule 7. Add the ACTION object block (for testing, just add a notify to see results be careful with block action) 8. Final review (still inactive) 9. Activate the rule Note: Add always the Spam object because most directory attacks are also spam. So you just block attacks from spammers and you still are able to send NDR to people just mistyping an address Proxmox Server Solutions GmbH 34 49
35 Figure 4-17 Unknown LDAP address rule Block Video and Audio Attachments for LDAP Groups The LDAP groups can be used to apply special settings to groups. Most people like sending joke videos and audio files via this grows up your users mailboxes. On the other side, you do not want to block these funny things for everybody. We assume you have a LDAP group called Staff. Create a new WHO Object, give a name, e.g. Staff Add LDAP Group to the Object, select your LDAP Profile and select Staff from the dropdown menu, click save. Now you can test your object against addresses Add new rule, give a name, e.g. Block Multimedia for Staff, set priority to 70, set direction to in, click save Add the WHO object Staff from above to the rule (as to ) Add the WHAT Multimedia to the rule Add the ACTION object Remove Attachments Final review (still inactive) Activate the rule Note: Removed attachments from s are replaced with a text file Proxmox Server Solutions GmbH 35 49
36 Figure 4-18 Block video and Audio attachment for LDAP group Staff Proxmox Server Solutions GmbH 36 49
37 5 Proxmox HA Cluster High availability We are living in a world where becomes more and more important - failures in e- mail systems are just not acceptable. To meet these requirements we developed the Proxmox HA (High Availability) Cluster. The Proxmox HA Cluster consists of a master and several nodes (minimum one node). Configuration is done on the master. Configuration and data is synchronized to all cluster nodes over a VPN tunnel. This provides the following advantages: centralized configuration management fully redundant data storage high availability high performance Proxmox uses a unique application level clustering scheme, which provides extremely good performance. Special considerations where taken to make management as easy as possible. Complete Cluster setup is done within minutes, and nodes automatically reintegrate after temporary failures without any operator interaction. Figure 5-1 Proxmox HA Cluster with load balanced MX records Proxmox Server Solutions GmbH 37 49
38 5.1 Load Balancing with MX Records It s quite simple to set up a high performance load balanced mail cluster using MX records. You have to define two MX records with the same priority. You need to have 2 working Proxmox Mail Gateways (mail1.example.com and mail2.example.com), each having its own IP address (the rest of the setting should be more or less equal, i.e. you can use backup/restore to copy the rules). We recommend adding reverse lookup entries (PTR records) for those hosts. Many systems nowadays reject mails from hosts without valid PTR records. This is all you need. You will receive mails on both hosts, more or less load-balanced (round-robin scheduling). If one host fails the other is used. Figure 5-2 Load balancing via MX Records Proxmox Server Solutions GmbH 38 49
39 5.2 Multiple Address Records Using several DNS MX record is sometime clumsy if you have many domains. It is also possible to use one MX record per domain, but multiple address records: Figure 5-3 Load balancing Multiple Address Records 5.3 Using third party Firewall features Many firewalls can do some kind of RR-Scheduling (round-robin) when using DNAT. See your firewall manual for more details Proxmox Server Solutions GmbH 39 49
40 6 Hardware selection and Virtualization Proxmox always needs a dedicated PC or server hardware. Alternative, Proxmox can be run under VMware, OpenVZ and Proxmox VE. Proxmox delivers prebuilt Virtual Appliances for: Proxmox VE ( VMware OpenVZ Also known to work (Intel VT or AMD-V needed): Virtualbox XEN (Full virtualized) Citrix XenServer (Full virtualized) Parallels Server Virtualbox Hyper-V For best performance please use physical hardware or OS virtualization like Proxmox VE (OpenVZ). 6.1 Physical Hardware See for certified hardware. For maximum performance we recommend: Hard disks CPU RAM SAS Disk (15.000rpm), Hardware Raid with battery backup and cache enabled Two Quad Core Xeon (5xxx) 4 GB ECC Certified Hardware The latest certified hardware list is published on Proxmox VE ( The Mail Gateway is available as a certified Virtual Appliance for Proxmox VE. For all details see VMware Proxmox runs perfectly under VMware. For quick deployment Proxmox delivers a ready to run, preconfigured and certified Virtual Appliance. Installation from the ISO-Image is also fully supported and gives the possibility for custom settings, optimized for the VMware Host. Proxmox 2.3 and later supports VMware para-virtualization (Kernel ) and we deliver a prebuilt VMware Tools package for installation (already included in the Appliance) Proxmox Server Solutions GmbH 40 49
41 6.3.1 Settings for VMware ESX, ESXi and vsphere Proxmox dynamically adapts the number of processes referring to the given memory to maximize performance. This means, if Proxmox runs on a machine with 1 GB memory it uses 1 GB of memory. A VMware host can swap memory between guests and if configured, the host can show more physical memory to the guest as available by swapping to disks. This leads to very poor performance. While memory overcommit is possible, for optimal operation you should never assign more memory to virtual machines than is available on the host. For more details see VMware documentation on Settings for the Proxmox Mail Gateway Virtual Machine RAM settings The minimum memory for running Proxmox Mail Gateway is 512 MB RAM VMware Tools Proxmox precompiles the VMware Tools components for easy installation. Please visit the support forum for detailed instructions and downloads Enable VMI Paravirtualization Figure 6-1 Enable VMI Paravirtualization for Proxmox Mail Gateway on ESX Proxmox Server Solutions GmbH 41 49
42 Enable time synchronization Figure 6-2 Enable time synchronization on ESX/ESXi Settings for a VMware Server 2 Proxmox dynamically adapts the number of processes referring to the given memory to maximize performance. This means, if Proxmox runs on a machine with 1 GB memory it uses 1 GB of memory. A VMware host can swap memory between guests and if configured, the host can show more physical memory to the guest as available by swapping to disks. This leads to very poor performance. While memory overcommit is possible, for optimal operation you should never assign more memory to virtual machines than is available on the host. For more details see VMware documentation on Host memory settings Always choose this option: Fit all virtual machine memory into reserved host RAM Strictly apply the reserved memory limit set in the top of the panel. This setting imposes the tightest restrictions on the number and memory size of virtual machines that can run at a given time. Because the virtual machines are running entirely in RAM, they have the best possible performance Proxmox Server Solutions GmbH 42 49
43 Figure 6-3 Memory settings for VMware Server 2 Host Settings for Proxmox Mail Gateway Virtual Machine RAM settings The minimum memory for running Proxmox Mail Gateway is 512 MB RAM VMware Tools Proxmox precompiles the VMware Tools components for easy installation. Please visit the support forum for detailed instructions and downloads Enable VMI Paravirtualization Proxmox Server Solutions GmbH 43 49
44 Figure 6-4 Enable VMI Paravirtualization for Proxmox Mail Gateway Enable time synchronization Proxmox Server Solutions GmbH 44 49
45 Figure 6-5 Enable time synchronization on VMware Server 2 Host 6.4 OpenVZ OpenVZ is an Open Source Operating System-level server virtualization solution, built on Linux. For details about OpenVZ, please visit OpenVZ is also used in Proxmox VE ( Main advantage from Operating System-level server virtualization is minimum overhead which leads to maximum performance. Proxmox runs on OpenVZ quite as fast as on physical hardware with all advantages from virtualization. OpenVZ supports online migration from a running Proxmox from one hardware node to another without downtime. For running Proxmox on OpenVZ, we launched a wiki page on: Proxmox Server Solutions GmbH 45 49
46 For online backups of a running OpenVZ, we developed vzdump: Proxmox Server Solutions GmbH 46 49
47 7 Troubleshooting and technical support Use the moderated Proxmox support forum or contact a Proxmox partner for their support offerings. All information: support: [email protected] Proxmox Server Solutions GmbH 47 49
48 8 Table of figures Figure 2-1 System without Proxmox Mail Gateway... 6 Figure 2-2 Incoming with Proxmox Mail Gateway... 6 Figure 2-3 Outgoing with Proxmox Mail Gateway... 7 Figure 2-4 Incoming default port settings (port 25)... 8 Figure 2-5 Outgoing default port settings (port 26)... 8 Figure 2-6 Incoming alternative port settings (port 26)... 9 Figure 2-7 Outgoing alternative port settings (port 25)... 9 Figure 2-8 Proxmox in DMZ...10 Figure 2-9 Multiple servers...11 Figure 3-1 Use local DNS Cache...12 Figure 3-2 Mail proxy whitelist...13 Figure 3-3 Enable RBL checks...14 Figure 3-4 Enable local RLB cache Spamhaus.org and Dsbl.org...16 Figure 3-5 Enable Verify Receivers...17 Figure 3-6 Exchange 2003: Filter recipients Figure 3-7 Exchange 2003: Filter recipients Figure 3-8 Exchange 2003: Filter recipients Figure 3-9 Exchange 2003: Filter recipients Figure 3-10 Exchange 2007 SP1: Install Anti-Spam agent...21 Figure 3-11 Exchange 2007 SP1: Filter recipients Figure 3-12 Exchange 2007 SP1: Filter recipients Figure 4-1 Rule: Block Viruses...24 Figure 4-2 Rule: Virus Alert...24 Figure 4-3 Rule: Block Dangerous Files...25 Figure 4-4 Rule: Mark Spam...25 Figure 4-5 Add Quarantine action to rule Mark Spam...26 Figure 4-6 Enable Spam quarantine for just a selection of users...27 Figure 4-7 Create WHO object Existing LDAP address...27 Figure 4-8 Enable Spam quarantine for existing LDAP addresses...28 Figure 4-9 Add new What Object...29 Figure 4-10 Add Spam Filter to a What Object...30 Figure 4-11 Set Spam Filter to Level Figure 4-12 Add new Rule...31 Figure 4-13 Add What Object to a Rule...31 Figure 4-14 Add Action Object to a Rule...32 Figure 4-15 Final Review of Rule (still inactive)...32 Figure 4-16 Activate Rule...33 Figure 4-17 Unknown LDAP address rule...35 Figure 4-18 Block video and Audio attachment for LDAP group Staff...36 Figure 5-1 Proxmox HA Cluster with load balanced MX records...37 Figure 5-2 Load balancing via MX Records...38 Figure 5-3 Load balancing Multiple Address Records...39 Figure 6-1 Enable VMI Paravirtualization for Proxmox Mail Gateway on ESX...41 Figure 6-2 Enable time synchronization on ESX/ESXi...42 Figure 6-3 Memory settings for VMware Server 2 Host...43 Figure 6-4 Enable VMI Paravirtualization for Proxmox Mail Gateway...44 Figure 6-5 Enable time synchronization on VMware Server 2 Host Proxmox Server Solutions GmbH 48 49
49 9 Appendix Reference document: Mail Gateway AdminGuide You can download the latest version from - End of document Proxmox Server Solutions GmbH 49 49
Proxmox Mail Gateway Administration Guide
Proxmox Mail Gateway Administration Guide 5/21/2010 MailGatewayAdminGuide-V3.1.doc Proxmox Server Solutions GmbH reserves the right to make changes to this document and to the products described herein
ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Trend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product
GFI Product Manual. Getting Started Guide
GFI Product Manual Getting Started Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty
Quick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in
Quick Start Policy Patrol Spam Filter 9
Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
English Translation of SecurityGateway for Exchange/SMTP Servers
Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
Deployment Guides. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Deployment Guides SmarterMail in Individual and Micro-business
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Panda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
WatchGuard XCSv Setup Guide
WatchGuard XCSv Setup Guide All XCSv Editions Copyright and Patent Information Copyright 2010 2013 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, LiveSecurity, and
I N S T A L L A T I O N M A N U A L
I N S T A L L A T I O N M A N U A L 2015 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Quick Start Policy Patrol Mail Security 9
Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Avira Exchange Security Version 12. HowTo
Avira Exchange Security Version 12 HowTo Table of contents 1. General information... 3 2. System requirements... 3 3. Installation of Avira Exchange Security...4 4. Licensing... 5 5. Configuration of Email
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Chapter 6: ScanMail emanager
Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Websense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5
GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Quick Start Policy Patrol Spam Filter 5
Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
IBM Lotus Protector for Mail Security. Administrator Guide. Version 2.8 Release 2.8.1 SC27-3829-01
IBM Lotus Protector for Mail Security Administrator Guide Version 2.8 Release 2.8.1 SC27-3829-01 Copyright statement Copyright IBM Corporation 2006, 2013. U.S. Government Users Restricted Rights Use, duplication
ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000
ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide APPLICATION VERSION: 9.0 MAINTENANCE RELEASE 1 Dear User! Thank you for choosing our product. We hope that this document will
ISPS & WEBHOSTS SETUP REQUIREMENTS & SIGNUP FORM LOCAL CLOUD
ISPS & WEBHOSTS SETUP REQUIREMENTS & SIGNUP FORM LOCAL CLOUD LOCAL CLOUD SETUP REQUIREMENTS Hardware Requirements Local Cloud Hardware Different hardware requirements apply depending on the amount of emails
StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster
#1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the
KASPERSKY LAB. Kaspersky SMTP-Gateway 5.5 for Linux/Unix ADMINISTRATOR S GUIDE
KASPERSKY LAB Kaspersky SMTP-Gateway 5.5 for Linux/Unix ADMINISTRATOR S GUIDE KASPERSKY SMTP-GATEWAY 5.5 FOR LINUX/UNIX Administrator s Guide Kaspersky Lab http://www.kaspersky.com Revision date: July
Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12
Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but
Clearswift SECURE Exchange Gateway Installation & Setup Guide. Version 1.0
Clearswift SECURE Exchange Gateway Installation & Setup Guide Version 1.0 Copyright Revision 1.0, December, 2013 Published by Clearswift Ltd. 1995 2013 Clearswift Ltd. All rights reserved. The materials
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Help for System Administrators
Help for System Administrators Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help for System Administrators
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Web. Anti- Spam. Disk. Mail DNS. Server. Backup
Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves
INLINE INGUARD E-MAIL GUARDIAN
INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine [email protected] 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail
GFI Product Manual. GFI MailEssentials Administrator Guide
GFI Product Manual GFI MailEssentials Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail
Symantec Messaging Gateway 10.0 Installation Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of
1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12
Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties of any kind, either express or implied, including
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
SonicWALL Email Security Appliance Administrator Guide
SonicWALL Email Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: [email protected] Part Number:
CYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section
Best Practices Revision A. McAfee Email Gateway 7.x Appliances
Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
SonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
IceWarp Unified Communications. AntiVirus Reference. Version 10.4
IceWarp Unified Communications AntiVirus Reference Version 10.4 Printed on 13 January, 2012 Contents AntiVirus 1 Anti-Virus... 2 Latest Avast! Engine... 2 Kaspersky Anti-Virus Support... 2 Support for
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
GFI FAXmaker 14.3 for Exchange/Lotus/SMTP. Manual. By GFI Software Ltd
GFI FAXmaker 14.3 for Exchange/Lotus/SMTP Manual By GFI Software Ltd http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
User Guide. ThreatTrack Security Product Manual
User Guide ThreatTrack Security Product Manual Copyright 2014 ThreatTrack Security, Inc. All Rights Reserved. The legal rights, license, and warranties of the software product described herein are governed
GFI MailEssentials 12. Manual. By GFI Software
GFI MailEssentials 12 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein
AVG Email Server Edition
AVG Email Server Edition User Manual Document revision 2015.11 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.
F-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Installing Policy Patrol with Lotus Domino
Policy Patrol 9 technical documentation May 21, 2013 If you have Lotus Domino R5/6/7/8/9 Mail Server, you must install Policy Patrol on a separate Windows 2003/2008/2012 machine and forward your mails
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
NetIQ Sentinel 7.0.1 Quick Start Guide
NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
RSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide A P P L I C A T I O N V E R S I O N : 9. 0 Dear User! Thank you for choosing our product. We hope that this document will help
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Bitrix Site Manager. VMBitrix Virtual Machine. Quick Start And Usage Guide
Bitrix Site Manager VMBitrix Virtual Machine. Quick Start And Usage Guide Contents Introduction... 3 Chapter 1. Starting The VMBitrix Virtual Machine... 4 Minimum Requirements For VMWare Player / VMBitrix...
Email Security 7.4 Administrator s Guide
Email Security 7.4 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Getting Started Guide
GFI MailArchiver for Exchange Getting Started Guide By GFI Software Ltd. http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and
Dell KACE K1000 Management Appliance. Service Desk Administrator Guide. Release 5.3. Revision Date: May 13, 2011
Dell KACE K1000 Management Appliance Service Desk Administrator Guide Release 5.3 Revision Date: May 13, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Configuring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Manual POLICY PATROL EMAIL SPAM FILTER
Manual POLICY PATROL EMAIL SPAM FILTER MANUAL Policy Patrol Email Spam filter This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may
Policy Patrol 7 Upgrade Guide
Policy Patrol 7 technical documentation September 4, 2012 www.policypatrol.com If you have Policy Patrol 4, 5 or 6 installed you can upgrade to version 7 and keep your existing configuration. Please follow
Avira Managed Email Security AMES FAQ. www.avira.com
Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change
Barracuda Spam Firewall Administrator s Guide
Barracuda Spam Firewall Administrator s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license.
EMC Data Domain Management Center
EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
CMT for Exchange 3.7. Requirements
CMT for Exchange 3.7 Requirements May 2016 Table of Contents Section 1. Introduction... 3 Section 2. Migration Control Center and Workstation Requirements... 4 Section 3. Onsite System Administrator...
