Mail Service Reference
|
|
|
- Helen Johnson
- 10 years ago
- Views:
Transcription
1 IceWarp Server Mail Service Reference Version 10 Printed on 12 August, 2009
2
3 i Contents Mail Service 1 V10 New Features... 2 SmartAttach... 2 IMAP Integrated Mail Archive... 2 IMAP ACL, GroupWare compliant... 2 Load-Balanced IMAP Server File Locking... 2 Load-Balancing for XMPP and SIP... 2 GroupWare Centralized Storage... 2 SPF SRS - Backscatter Protection... 3 Domain Clusters GB RAM on x SMTP Service... 6 General... 6 Delivery... 8 Routing Header / Footer Security General DNS Intrusion Prevention Advanced Filters Content Filters... 22
4 ii Contents Adding a new Filter Filter Conditions Filter Actions Filter Description Editing a filter Deleting a filter Exporting filters Importing filters Bypassing filters Understanding the SMTP protocol and message headers Rules External Filters Archive New in Version Mail Archive ETRN Download Index 57
5 1 C H A P T E R 1 Mail Service The Mail Service node contains four sub-nodes: SMTP Service - various settings for the SMTP service Security - comprehensive set of options for stopping unwanted use of your server. Filters - allows you to define Content Filters, Rules Filters (Black & White lists) and External filters. ETRN Download - allows you to define ETRN (or ATRN) collection options. In This Chapter V10 New Features... 2 SMTP Service... 6 Security Filters Archive ETRN Download... 54
6 2 C H A P T E R 2 V10 New Features SmartAttach Attachments replaced with WebDAV URL, file saved to user's mailbox files folder. Gives user the power to delete, swap and update attachments after the message has been sent. Customization includes account, folder name, expiration, custom header/footer, anonymous or authenticated mode. Variables for attachment file size, expiration time, textual expiration date, message index, download URL. Supports Unicode filenames. Supported by WebMail Pro and Content Filters. IMAP Integrated Mail Archive Mail Archive can now be categorized by user account, divided into subfolders by timeline, and depending on administrator settings, it can contain all history of received and sent messages from all folders, including SMS. Mail Archive is integrated with IMAP and accessible in read-only mode from any client or WebMail, and each user can have it subscribed by default. Taking advantage of ACL and Public folders, administrator can create an Archivist user role, granting a person access to the whole server archive, archive folder of selected domains, groups or users for e-discovery. Supports IMAP flags. 4 new archive modes. IMAP ACL, GroupWare compliant Account sharing, folder sharing, extensive bit rights, inherited permissions. IMAP ACL RFC 4314 compliant, obsolete rights of RFC 2086 supported exactly as in RFC. Load-Balanced IMAP Server File Locking LB environment is automatically detected if ServerID is used. Load-Balancing for XMPP and SIP Master host option, slave server requests processed by master, requires proper settings of Master, Master Host and Slave Hosts. GroupWare Centralized Storage GroupWare attachments (to contacts, events), user's File folder, extracted SmartAttach attachments are stored in mailbox/~gw/attachments/ to enforce mailbox/domain quota and archivation along with s. Original storage calendar/attachments/ is automatically converted when the mailbox attachments storage accessed for the first time.
7 V10 New Features 3 SPF SRS - Backscatter Protection Protects the server from being flooded by bouncebacks with forged From. If Use SRS NDR (Non-Deliverable Reports) Validation option is on and a bounce back is received without valid hash or SRS message, it will be rejected. Domain Clusters Splits a domain into logical parts with distinct settings and users. A set of domains is grouped into a cluster with one domain defined as a master domain. The master domain then serves as a "dynamic alias" for all the other domains. Makes sure it is not possible to create the same account within the cluster. 4 GB RAM on x64 The server is still 32-bit application but can take advantage of the whole 4 GB of user addressing space on 64-bit systems. DB and FS Health Monitoring Checks DB health in multiple connections and availability of config, mail and temp paths every minute and if down, SMTP, POP3 and IMAP socket servers are paused and no more incoming connections are processed ( client reports a server error instead of failed user authentication). Intrusion prevention Failed Logins New option to Block IP address that exceeded number of failed login attempts (if Login policy is enabled). LDAP/Active Directory Synchronization- SASL Plain text authentication for LDAP/AD users updates the local password so SASL authentication works all the time, auto updates after WebMail login (RSA protected plain text authentication to IMAP). LDAP/Active Directory Synchronization- FROM New internal XML options (LDAPUSERFROMDN, USERNAMEFROMCN) for user's mailbox and LDAP authentication. LDAP/Active Directory Synchronization- Filters Introduces custom filters what account/groups to synchronize (<objectclass>[":"<filter>]). SIZELIMIT_EXCEEDED error logged if query size limit is exceeded. LDAP/Active Directory Synchronization- Local Groups Synchronization always preserves manually created users and groups, even if missing on directory server, using the Personalized bit flag 0x10.
8 4 Mail Service Reference IceWarp Server Remote Client Deployment From server directory /install available remotely at (option in Setup). setupinstall.dat package added, contains client applications, installed to /install directory. Mailing Lists Message ID Mailing Lists display original message ID in the client sessions logs. Mailing Lists BATV SRV Mailing list authentication works correctly with BATV SRV encoded sender addresses. Mailing Lists Dedupe SMTP Service Delivery Dedupe messages option now also works for mailing lists. If user is subscribed to mailing list under multiple aliases, IceWarp Server will check for duplicate message to the same user and only deliver one of them. Rules Move To Folder Move To Folder support for non-user accounts added, useful in Groups and direct delivery to a specific folder (instead of Inbox). Rules Date/Time Criteria The rules engine has been extended with ability to define user rules based on time conditions, same as already available for content filters. Users might want to forward incoming s or SMS messages only on weekends for instance. Content Filters RegEx Rewrite Lets create new results using part of the search pattern. Content Filters DNSBL RegEx is used instead of string match which was capable of wildcards only, now allows direct server match, RegEx field added in Administration GUI. Content Filters Edit Message Headers Support for RegEx and RegEx rewrite, even for Delete action (must match the header value) Content Filters SmartAttach Perform SmartAttach action based on any condition, such as attachment size, sender, domain etc. Content Filters Recipient, Cc, To, Attachment Conditions Beside the previous global string match (which converts multiple addresses to string and matches that string), it's now possible to choose whether to match all items, or match at least one item from the string, to apply the condition "per item".
9 V10 New Features 5 Content Filters Unicode Filenames Support for Unicode filenames when extracting attachments to directories (for SmartAttach and others, Anti-Virus remains AnsiString because external filters could not handle Unicode). Content Filters Apply Before Copy Incoming/Outgoing Possibility to apply content filters before the copy operation in Management user Mailbox - Copy incoming mail, Copy outgoing mail actions. Original recipients are saved during Copy incoming/outgoing mail actions and can be used in new %%bcc_recipients%% server variable. Address Extension address extension supported again, e.g. to john:%%myfolder%%@mydomain.com will be delivered to folder MyFolder. Only works for s not tagged as spam, trusted hosts, whitelisted or otherwise bypassed recipients. SMTP Traffic Limits SMTP outgoing queue processing is delayed for low user licenses and high traffic, receiving works normally. Considers amount of incoming and outgoing s to non-local accounts per day with relation to the number of licensed users. If the number of outgoing exceeds a threshold, sending out will be postponed for some time, until the levels balance or 12 AM. The limitation never occurs for 200+ user license, very seldom occurs for 100+ user license, and mostly occurs for less than 50 user licenses. Prevents using low user licenses as filtering gateway and for large mailing lists.
10 6 C H A P T E R 3 SMTP Service The SMTP (Simple Mail Transfer Protocol) Service is the core of IceWarp Server's functionality, as it is the protocol used for sending messages from one server to another. In This Chapter General... 6 Delivery... 8 Routing Header / Footer General Field Mailserver hostname Use DNS lookup Use relay server Description This specifies the name of the IceWarp Server computer. This field must not be left blank as it is used when the IceWarp Server authenticates or introduces itself to another mail server. This should be the hostname of your IceWarp Server which is registered on DNS. You may also want to ensure your IceWarp Server's IP address has a PTR record registered as this is a spam-fighting requirement that some receiving mail servers require. Select this option if your server is going to send messages directly. When sending a message, IceWarp Server will query DNS servers to locate the receiving server's IP address. DNS servers can be specified in the Internet Connection node. Select this option if you wish IceWarp Server to use a relay server to send messages. This is useful when your domain has no public IP address or you are on a slow dial-up
11 SMTP Service 7 connection via an ISP that allows you to use their server to send messages. Connections to your ISP's mail server tend to be faster than other servers on the internet so your messages may be delivered more quickly, keeping your connection costs down. You should enter the hostname or IP address of the relay server. If your relay server requires authentication this can be achieved by using one of the following 'full URL' forms of the hostname: <username>:<password>@<myisphostname> or <[email protected]>:<password>@ <MyISPhostname> The second option should be used if your username is a full address. Example: [email protected]:[email protected] You can specify multiple relay servers here, separated by semicolons. If IceWarp Server cannot connect to the first relay server, it will try to the second etc.. Deliver messages via relay server when direct delivery fail Checking this option only has an effect if you have selected Use DNS lookup and you have defined a relay server (or servers) in the Use relay server text box, IceWarp Server will attempt delivery to via these server(s) if all direct delivery attempts fail. NOTE This option overrides the SMTP retry interval settings. Field Max message size Description Check this box and enter a value to limit the size of messages that can be sent or received via the IceWarp Server (in the above screenshot 10MB). If a user tries to send a message larger than the specified size it will be rejected. NOTE that this limit will be overridden by any non-zero Domain-specific limits or User-specific limits if Override global limits is checked within Global Settings - Domains. Maximum SMTP hop count Maximum SMTP server Sometime a message can get into a 'relay loop', where it is being passed between servers trying to find a delivery point. A hop is defined as one pass of the message to a server. Specifying a value here instructs IceWarp Server to count the number of servers the message has been through, compare it with this value, and reject the message if the number of hops exceeds the specified value. Specify the maximum number of Server session recipients allowed in an outgoing message.
12 8 Mail Service Reference IceWarp Server recipients Maximum SMTP client recipients Exceptions This can be used to protect your server from overload. Specify the maximum number of Client session recipients allowed in an outgoing message. If the number is exceeded the message will be split into multiple sessions. Here you can override "Maximum SMTP client recipients" for specific target domains. Press the button to open a dialog allowing you enter the target domain and the override value. Delivery Field Undeliverable after Undeliverable warning after Report alias / Report name Bad mail Return truncated message Send information to administrator Description If IceWarp Server cannot contact a server to deliver a message it will queue the message and retry delivery at regular intervals. Specify a value and time unit.. If IceWarp Server cannot contact a server for the specified number of hours the sender is informed. This message is only a warning, IceWarp Server will continue trying to deliver the message. Specify a Value and time unit. The report alias and name are used to generate the From: header in any system generated report messages (for example the undeliverable report, disk space monitor report etc.). If the sender of a message cannot be ascertained (e.g. there is no From: header) and an undeliverable message report is generated it will be sent to the recipient(s) listed here. Multiple addresses can be specified, separated by semicolons. Check this option and only message headers are returned if the message cannot be delivered. Check this option and if the message cannot be delivered, approximately 4 KB of the original message are returned as an attachment. This includes the message headers and in some cases also part of the original message body. Check this option and all undeliverable messages will be copied to the administrator.
13 SMTP Service 9 Bounce back messages Choose a process option for bounce back messages. All senders - Process bounce back messages for all senders. Local senders only - Process only for Local Senders. Disabled - do not process bounce back messages. NOTE - In MDA mode a message is accepted and then processed by other filters at a later time. If a message is then refused a bounce back is sent to the sender. If the sender's address is spoofed than an innocent recipient could get the bounce back which would be considered as spamming - because of this the recommended bounce back level in MDA mode is "local senders" Retry Intervals Press this button to open a dialog allowing you to specify retry intervals for failed deliveries: Use the Add button to add a new retry time. Use the Edit and Delete buttons to modify or remove a retry time. Use the Up and Down arrows to move a retry time in the list. Field Maximum number of simultaneous threads Description Specify the maximum number of threads to use for processing incoming messages. This can help alleviate problems on high-load servers where the sending server times out, but IceWarp Server still processes and delivers the message. The Sending Server then tries again, and a duplicate message is received. If you enter a non-zero value here then any incoming messages are stored immediately to an incoming folder, for later processing, and the session is closed so there are no timeouts.
14 10 Mail Service Reference IceWarp Server You should only consider using this option on high-traffic servers or servers that have major AntiSpam and/or IceWarp Anti Virus processing. NOTE - In MDA mode a message is accepted and then processed by other filters at a later time. If a message is then refused a bounce back is sent to the sender. If the sender's address is spoofed than an innocent recipient could get the bounce back which would be considered as spamming - because of this the recommended bounce back level in MDA mode is "local senders" Processing incoming messages in MDA queue Use MDA queue for internal message delivery Check this option to have the MDA queue used. Check this option to have all internal messages processed via the MDA queues. This means that any internal message (bounce back, server generated message, Account Forwarder message etc.) will be processed via an MDA queue and all filter, rule, AntiSpam, IceWarp Anti Virus etc. processing will be performed on the message. Field Use TLS/SSL Hide IP address from Received: header for all messages Add rdns result to Received: header for all messages Add Return-Path header for all messages Dedupe messages Description Check this box and IceWarp Server will connect to remote servers using TLS/SSL, if the remote server is capable of this. Checking this option tells IceWarp Server not to put the IP address in a messages Received: header. This effectively stops people from being able to work out your local network configuration. Check this option and a reverse DNS lookup will be performed for each incoming message and the result added to the message headers. NOTE - Using this option improves security but can severely impact performance on high-load Servers. Check this option and IceWarp Server will add a Return-Path header to the . This can be useful for debugging and checking where an came from. If a User has multiple aliases and a message is sent to more than one of the aliases the end User will receive multiple copies. Check this option and IceWarp Server will check for duplicate message to the same end user and only deliver one of them.
15 SMTP Service 11 Routing The SMTP Routing feature allows you to redirect messages based on the recipient address. A list of routing rules is displayed: The Source column shows the original recipient. The Destination column shows where the message will be redirected. The Hostname column shows the hostname that messages will be forwarded through. Press the Delete button to delete a selected routing rule. Pressing the Add or Edit button will open the Route dialog, where you can add or modify a routing rule.
16 12 Mail Service Reference IceWarp Server Field Source Destination Hostname Description The address or domain which should be replaced and redirected. You can use the '...' button to select accounts, domains or groups through Select Account Dialog. The address or domain by which the source one is replaced and redirected. You can use the '...' button to select accounts, domains or groups through Select Account Dialog. Syntax: address domain You can use IceWarp Server Variables in this field e.g. %%var_name%% Authentication with a full address example: username@domain:password@host A hostname, with an optional port, that will be used for extended routing, using the following syntax: [email protected]#2525:%%recipient_alias%%@icewarpdemo.com This says that all messages for [email protected] will be routed to relay.isp.com. Local recipients only Skip rules Sender must be authenticated Check this box and routing will only be performed for local recipients. Check this box and rules will not be processed for routed messages. Check this box and all senders of messages processed by this routing must be properly authenticated Pressing the Edit button will open the simple text file containing the rules. You can edit this file directly, examples are given in the editor Header / Footer IceWarp Server can automatically insert a header and/or footer to messages using this option. This will affect all domains within your server. If you want to specify different headers and footers for different domains you should use the domain-based Header/Footer button in Domain - Options - but you must enable the facility in this panel. Check the Active option to enable Header/Footer processing
17 SMTP Service 13 Pressing the Header / Footer button opens the Header/Footer dialog: Field Header text file Header HTML file Description A fully qualified path to a text file which will be inserted as a header to text format messages. A fully qualified path to an HTML file which will be inserted as a header to HTML format messages. NOTE - that the extension of this file must be htm or html for this function to work correctly. Footer text file Footer HTML file A fully qualified path to a text file which will be inserted as a footer to text format messages. A fully qualified path to an HTML file which will be inserted as a footer to HTML format messages. NOTE - that the extension of this file must be htm or html for this function to work correctly. Local to local Remote to local Local to remote Remote to remote Header and Footer will be inserted in a message if the sender and recipient are local. Header and Footer will be inserted in a message if the sender is remote and recipient is local. Header and Footer will be inserted in a message if the sender is local and recipient is remote. Header and Footer will be inserted in a message if the sender is remote and recipient is remote. NOTE - If you are using HTML headers or footers you should only use HTML found within the <BODY> tag.
18 14 C H A P T E R 4 Security One of the more important areas of IceWarp Server, the SMTP Security options are designed to protect your server from unwanted access and use. In This Chapter General DNS Intrusion Prevention Advanced General Field Relay Description Close relay - The recommended option. Choosing this option will require users to be authenticated on your server, unless they are from a trusted Relay IP (see below). Authentication can be done via a user/password combination or by selecting POP before SMTP (see below). Open relay Choose Open relay if you want to allow anyone to use your SMTP server to send messages. This is not a recommended option as it leaves your server open to abuse by spammers and hackers. POP before SMTP Reject if originator's domain is local and not authorized Check this option and IceWarp Server will remember the IP address of any POP or IMAP connections (which are always authenticated) for the number of minutes specified. If an SMTP session is initiated from one of the cached IP addresses it will be allowed. If the sender of the message is a local user (claims to be from your local domain) they have to authorize themselves. Authorization can be done using the SMTP authentication, relaying from IP address or the POP before SMTP feature.
19 Security 15 This option can reject also local users if they authenticate against different SMTP server, e.g. their ISP SMTP server. NOTE that whitelist and blacklist are skipped if the remote side tells us the sender is local, but the session is not authenticated nor comes from a trusted IP. The is then processed as usually other rules are applied. It can be turned off only by editing the spam.dat file SpamSkipBypassLocalUntrusted line. Bypass reason code H. The Trusted IPs list show the IP address ranges you consider trustworthy. SMTP connections from these IP addresses will be allowed without authentication. NOTE - that this list of trusted IPs %& Hosts is also use by the AntiSpam Engine's Whitelist as a bypass list, if the "Whitelist trusted IPs and authenticated sessions" option is checked in Antispam/Whitelist/General. Using the Add or Edit buttons opens the IP Address dialog: You can use masks, as shown above, and ranges, for example Hostnames are also allowed here Use the Delete button to delete a selected IP range Use the arrow buttons to move ranges up and down the list Use the Edit File button to open the simple text file containing the IP ranges. Examples are given. NOTE - that you can use Host names as well as IP addresses
20 16 Mail Service Reference IceWarp Server DNS A DNSBL is basically a DNS server which only lists IP addresses of known spammers. If you query an address against a DSNBL server and get a positive result then the address is most likely that of a known spammer. This can be used as an AntiSpam technique. Field Use DNSBL Close connections for DNSBL sessions Host List Description Check this option to use DSNBL checking. Use the B button to specify a list of Ip addresses, Domains and address that you will not perform the DSNBL check for (effectively a list of trusted addresses). Check this option and any connections from IP addresses which are listed on the blacklist will be closed immediately. Here you must define a list of DSNBL server(s) you wish to query. Use the Add and Delete buttons to populate and de-populate the list. You can use as many DSNBLs as you wish but you should be aware that each query will add some processing time. Reject if sender's IP has no rdns Reject if originator's domain does not exist Check this option to enable rdns (reverse DNS) checking. Any connection from a server that does not have an rdns record (PTR record) will be rejected. Check this option to check for the existence of a DNS A record for an incoming message senders domain. If the senders domain has no A record the message is rejected.
21 Security 17 Field Enable SRS (Sender Rewriting Scheme) SRS secret key The 'B' button Description Activates the SRS technology fixing the SPF forwarding mail issue, by forcing the agent to change the "mail from" address The secret key is any arbitrary string you can make up - it is your own passphrase. The secret key will be used for ciphering the data (for hash creation). This field must not be left blank. Use this button to open and edit the SRS bypass file srsbypass.dat. See the example in the bypass file for the correct syntax. Intrusion Prevention Intrusion Prevention enables you to block any IP addresses performing suspicious activities. When activated the Server will monitor all unsuccessful remote server attempts to deliver to unknown recipients. If the number of attempts from one server exceeds the threshold setting then that IP address will be blocked (denied access) for a specified amount of time. This option serves as protection against spammers who are trying to spam your IceWarp Server accounts based on address dictionary attacks. There is an option to create a "bypass list" of IP addresses which will never be blocked. Field Active Description Enables the feature. The "B' for Bypass button Click here to edit the standard Bypass file. If the session is authenticated or comes from trusted IP, it is automatically bypassed even if bypass file is empty. NOTE that most of the conditions are evaluated in early stadium of the SMTP session,
22 18 Mail Service Reference IceWarp Server when not enough information about the session is present. E.g.: the condition Local Sender can not bypass Block IP address that establishes number of connections in one minute, because sender is not known immediately after the connection was made. But IP/Patterrn or DNS A condition can be used here. Block IP address that exceeds unknown user delivery count Block IP address that gets denied for relaying Block IP address that establishes number of connections in one minute Block IP address that exceeds RSET session count Block IP address that exceeds message spam score Block IP address that gets listed on DNSBL Block IP address that exceeds message size Block IP address that exceeded number of failed login attempts Check this option and specify a value. In the above screenshot an address will be blocked after it attempts to deliver 5 messages to unknown users. Check this option to automatically block addresses that attempt to relay through IceWarp Server more than the number of times specified in the "unknown user delivery count". Check this option and specify a value. In the above example an IP address that establishes 100 connections in one minute will be automatically blocked. Check this option and specify a value. In the above example any connection that issues 5 RSET commands in one session will be blocked. Check this option and specify a value. In the above example any IP address that delivers a message with a spam score higher than 8.5 will be automatically blocked Check this option and any connection that is refused because it is on a DNSBL will also be blocked. Check this option to have the IP address blocked for any connection that attempts to deliver a message greater than the specified size. Specify a value and choose Kilobytes, Megabytes or Gigabytes from the drop-down box. This option can be enabled only if login policy is enabled (Domains and Accounts Policies Login Policy Block user login for accounts that exceed a number of failed login attempts). IP address will be added to blocked list after unsuccessful login attempt which reaches or exceeds the number of failed attempts specified in Policies/ Login Policy. Hence all failed login attempts need not to come from one IP address. NOTE - this check differs from the standard SMTP "maximum message size" check in that the connection is closed as soon as the size threshold is reached and the IP address blocked. This is useful for stopping potential bandwidth abusers who send large messages. For example with the settings shown above, someone sends a 1GB message to one of your users. As soon as the system has received the first 100MB it will close the connection and block the IP address for 4 hours. The sending SMTP server may try to re-send the message but it will be denied access until the 4 hours is up, at which point the first 100MB will be accepted then the block happens again. Eventually the sending SMTP server will give up trying to send the message.
23 Security 19 The effect on your server is that instead of having a high bandwidth usage for a 1GB duration it will have high bandwidth usage every 4 hours for a 100MB duration until the sending server gives up, freeing your bandwidth for other send/receive operations in the meantime. Field Amount of time for IP address to be blocked Refuse blocked IP address Close blocked connection Cross session processing Blocked IPs Description Specify here how many minutes an IP address should be blocked for Checking this option will store the blocked IP in a database and refuse any further connection attempts. Be aware that this could cause large growth of the database with performance degradation. The unchecked state lets you use the blocking feature and the IP DB is not used. If checked then any IP address that is blocked will also have any open connection(s) closed immediately. Check this option to have IceWarp Server collect Intrusion Prevention stats across multiple sessions (connections) from the same server. Stats are accumulated over the time selected in "Amount of time for IP address to be blocked". In the above example connections from HostA would be collected and acted upon for 30 minutes. Press this button to jump to the Intrusion Prevention queue, where you can manage your Blocked IP addresses. Intrusion Prevention Reason Codes Reason Code C I M R D A P Y S Explanation Tarpitting invoked via Content Filters IP blocked for exceeding connections in one minute IP blocked for delivering oversized message IP blocked for exceeding RSET command count IP blocked for being listed on DNSBL The account that this message was sent to was a "tarpit" account so the sending IP is tarpitted IP block for exceeding unknown User delivery count IP blocked for Relaying IP blocked for exceeding Spam score in a message
24 20 Mail Service Reference IceWarp Server U Ip blocked Manually via Console Advanced Field Perform a greeting delay for new SMTP connection Reject if SMTP AUTH is different from sender Use global level POP before SMTP Relay only if originator's domain is local Require HELO/EHLO Description Specify a non-zero value here and IceWarp Server will wait that many seconds before responding to an incoming SMTP session. Most spammers systems will time out very quickly as they want to get as much mail delivered as possible within a short time. Genuine connections will wait. Check this option to reject any connections where the Sender information differs from the information used in the SMTP AUTH command. Check this option to allow POP accesses to authorize SMTP accesses from the same IP address Check this option to only allow relaying from local domains. Check this option to deny any connections that do not use the HELO or EHLO commands when they connect. Field Deny SMTP EHLO command (ESMTP Protocol) Description This option prevents servers from connecting with the ESMTP service. If a remote server issues the EHLO command IceWarp Server will reply with an error code. Outgoing SMTP connections will use the standard SMTP commands. This can be useful where remote servers and routers/proxies have implementation bugs. This is not a recommended option.
25 Security 21 Deny SMTP AUTH command Deny SMTP EXPN command Deny SMTP VRFY command If checked, IceWarp Server will not accept the SMTP AUTH command. The EXPN command is used to display the contents (addresses) within a mailing list. Check this option to instruct IceWarp Server not to accept the request. The VRFY command is used to verify the existence of an address on a server. This can be used by spammers to send spam to real addresses. Check this option and IceWarp Server will not respond to the command. NOTE that you should not check this option if you are using a Distributed Domain with VRFY querying. Field Protocol Policy SMTP Policy Banner Server Title Description Press this button to specify Protocol Policy settings. Examples are given within the file. Press this button to specify banner text that will be presented to any client connect to the server to send messages. Examples are given within the file. By default, IceWarp Server will identify itself to a connecting server. Some hackers can use this information to exploit your server. Press this button to change the identification text so no-one can identify the server software you are running. An example is given within the file.
26 22 C H A P T E R 5 Filters These filters can help you catch spam and viruses. If you want to filter messages using advanced rules and make adjustments to messages we recommend using Content Filters (on page 22). If you just want to restrict message acceptance using keywords it is better to use Black & White Lists. Additionally, you can design your own filters and create your own filters in any programming language and then call such filters in External Filters (on page 48) dialog. In This Chapter Content Filters Rules External Filters Content Filters Content Filters (CF) are able to parse message content (headers and body) and perform various actions based on the results. CFs basically work at the server level, however you can set the CF to only act on messages from selected users, domains etc.. Selecting the Mail Service - Filters - Content Filters presents a list of defined filters: The two filters shown in the above screenshot are pre-defined within IceWarp Server and are discussed later in this section. The Active checkbox should be checked if you wish IceWarp Server to process Content Filters.
27 Filters 23 Check the box next to a filter to enable that filter. In the above screenshot Content Filters are enabled and the two filters are being applied to messages. The buttons at the bottom of the screen are briefly described here and in detail later in this chapter. The Add button opens the Filter dialog to add a new filter. The Edit button opens the Filter dialog to edit the selected filter. The Delete button is used to delete the selected filter. The Up and Down buttons are used to change the order in which the filters are applied to messages (top first). TIP - if you select a rule in the list and hold CTRL while you press the Add button. the new rule is positioned above the selected rule The Export button allows you to export filters to an XML file. The Import button allows you to import filters from an XML file. The B button allows you to define a list of items that filters are not applied to. Adding a New Filter Pressing the Add button opens the Rule dialog which allows you to define a new filter:
28 24 Mail Service Reference IceWarp Server All rules consist of one or more Conditions to be evaluated and one or more Actions to be performed on the message if the evaluation is TRUE. The top pane of the dialog allows you to add Conditions to your rule. The middle pane allows you to add Actions to your rule. The bottom pane shows the structure of your rule and allows you to add values to the Conditions and Actions, where necessary. The Title text box allows you to name your filter. We recommend using meaningful descriptive names so you can identify rules easily. The next sections describe all the conditions and actions you can choose.
29 Filters 25 Filter Conditions Condition Use this condition to... Where From: message header matches some words Where To: message header matches some words Where Subject: message header matches some words Where Cc: message header matches some words Where Reply-To: message header matches some words Where Date: message header matches some words Where Message priority is value Where Message is Spam Where message is size check the From: header for text. Adds a some words option to the rule description (explained below). check the To: header for text. Adds a some words option to the rule description (explained below). This condition has the Multiple Items Matching section within the String Condition dialog with the following options: Convert to single string All items match At Least one item matches For detailed explanation, see further in this section. check the Subject: header for text. Adds a some words option to the rule description (explained below). check the Cc: header for text. Adds a some words option to the rule description (explained below). This condition has the Multiple Items Matching section within the String Condition dialog with the following options: Convert to single string All items match At Least one item matches For detailed explanation, see further in this section. check the Reply-To: header for text. Adds a some words option to the rule description (explained below). check the date: header for text. Adds a some words option to the rule description (explained below). check the priority of the message. Adds Where message priority is Normal to the rule description. Click on Normal to select a priority. check if the message is marked as spam check the size of the message. Adds a 0 kb option to the rule Description. Click on this to chose whether to check the message for a size Greater than or Less than and a size in kilobytes.
30 26 Mail Service Reference IceWarp Server Where Message body matches some words Where Custom message header matches some words Where Any message header matches some words Where Attachment name matches some words Strip Attachment where name matches some words Rename Attachment where name matches some words Where Message contains attachment Where Message charset matches some words Where Sender matches some words check the whole message body for some text. Parse XML function removes all HTML tags from an HTML body and allows you to search for the text in an HTML part of a message Adds a some words option to the rule description (explained below). check any custom headers for some text. Adds a some words option to the rule description (explained below). check all message headers for some text. Adds a some words option to the rule description (explained below). check attachment names for some text. Adds a some words option to the rule description (explained below). Strip any attachment(s) whose name contains some text. Adds a some words option to the rule description (explained below). Rename any attachment(s) whose name contains some text. This adds some words to the rule Description. This is a special case and usage examples follow: Syntax 1 - newstr;oldstr Syntax 2 - *.new;old Syntax once is a simple string replacement, any occurrence of "oldstr" in an attachment name will be replaced by "newstr" Syntax 2 adds ".new" as an extension to the name of any attachment whose name contains "old" Examples: the rule dog;cat would rename attachment mycat.jpg to mydog.jpg the rule *.ex_;.exe would rename attachment Myprogram.exe to Myprogram.exe.ex_ it would also rename not.an.exe.file.jpg to not.an.exe.file.jpg.ex_ evaluates TRUE if the message contains an attachment. check the messages character set name for some text. Adds a some words option to the rule description (explained below). check the sender's address for some text. Adds a some words option to the rule description (explained below).
31 Filters 27 Where Recipient matches some words check the recipient's address for some text. Adds a some words option to the rule description (explained below). This condition has the Multiple Items Matching section within the String Condition dialog with the following options: Convert to single string All items match At Least one item matches For detailed explanation, see further in this section. Where Sender/Recipient is local/remote specify sender/recipient: Sender the defined action will be applied to a sender. Recipient the defined action will be applied to a recipient. Local the sender/recipient is local (from a local domain). Remote the sender/recipient is remote. Ignore ignore the switches and field below. Account exists the sender's/recipient's account exists within the selected domain/group/mailing list/... Account does not exist the sender's/recipient's account does not exist within the selected domain/group/mailing list/... Member of click the "..." button to select the appropriate domain/group/mailing list/... Where Sender's hostname matches some words Where message violates RFC822 check the sender and the recipient for some text. Adds a some words option to the rule description (explained below). check the message for any RFC822 violations. Adds RFC822 to the rule Description. Click on this to open a dialog that allows you to choose the 4 most common RFC822 violations that can cause clients to hang when trying to receive a message.
32 28 Mail Service Reference IceWarp Server Where Condition is execution of application run a specific application to process the message. Adds an application option to the rule description (explained bellow). Click this link to define the path to the application. This (custom) application obtains the path to the file as a parameter. If the application output equals zero, the condition is not met, if the output is differing from zero, the condition is met. Where Sender's IP address matches some words Where rdns (PTR) matches some words Where Sender's IP address is listed on DNSBL server Where Sender's IP address is trusted Where Spam score is Value Where Bayes score is percentage Where SMTP AUTH Where Scanned by Antivirus check the Sender's IP address for some text. Adds a some words option to the rule description (explained below). check the rdns record for some text. Adds a some words option to the rule description (explained below). check a DSNBL server for the Sender's IP address of this message. Adds server to the rule description. Click this to enter the name of the DNSBL server you wish to interrogate. Check the Sender's IP address against the Trusted IP's list. check the spam score assigned by the AntiSpam engine. Adds 0.00 to the rule Description. Click on this to choose Greater or Lower than and a value. Note that the maximum value that the AntiSpam engine will assign is 10, so specifying a rule that says greater than 10 will never evaluate TRUE, similarly less than 10 will always evaluate FALSE unless the score is exactly 10. check the score (%) assigned by the Bayesian filter processing. Adds 0% to the rule Description. Click on this to select Greater or Lower and a percentage value. check whether this message was delivered using the SMTP AUTH command (authenticated login). check messages that were scanned by the IceWarp Anti Virus engine. Adds antivirus to the rule Description. Click on this to open a dialog where you can choose any of the three IceWarp Anti Virus engine results.
33 Filters 29 Note that you should not choose both Message contains a virus AND Message does not contain a virus as this would always evaluate TRUE, as one of those two messages will be within the message. Where Local time meets criteria check the local time (of the IceWarp Server). Adds criteria to the rule Description. Click on this to open a dialog where you can specify local time checking criteria: The above example will evaluate TRUE only if: The date is between 24th August 2006 and 31st August 2006 AND it is a Saturday or Sunday AND the time is between 20:00 and 23:59. This condition is supplied so that you could create a rule that only runs at weekends, or overnight etc.. Where SQL returns records value All messages This option runs a query against the database and if the query returns a result evaluates to TRUE, if the query returns an empty result it evaluate to FALSE. Click on Value in the rule description to specify the Database connection to use and the query to run. Click on reject in the rule description to choose an action if the rules evaluates as TRUE. Evaluates TRUE for all messages. This is useful if you want to apply an action to every incoming message.
34 30 Mail Service Reference IceWarp Server When some words is added to a rule Description you should click it to define the text you wish to check for. The String Condition dialog is presented: The Function drop-down shows the various string selection options available (see below). The String text box contains the string you are evaluating against the Condition. Check Match Case if you want the comparison to be case sensitive, i.e. "Viagra" will match "Viagra" but not "viagra". Check Match whole word only and the comparison will only be true if the string is not part of another word, i.e. "Viagra" will match "Viagra works" but will not match "Viagraworks". The Function box describes the type of test you are doing against the value specified in the String text box: Function Contains list of strings (semi-colon separated) Contains string Use this condition to.. Specify a list of semicolon separated strings. Each string will be checked against the Condition and TRUE will be returned if any string matches. Example: Viagra;Cialis;spam Specify a single string. If the specified string exists in the Condition, TRUE will be returned
35 Filters 31 Regex Starts with string Ends with string Is string Contains list of strings from file Specify a Regex (Regular Expression). See the next section for a simple Regex Tutorial. For comprehensive Regex information see ( Specify a string that Condition must start with. Specify a string that Condition must end with. Specify a string that must be an exact match with the Condition Specify a filename containing a list of strings n the String text box. This must be a fully qualified path to the file. The file must contain one string per line. This Function works like "Contains list of strings" but reads the strings from the file. Multiple Items Matching Field Convert to string All items match At least one item matches Description Default. All recipients are evaluated as one string. Condition is evaluated for each recipient, global match is returned if all recipients match. Condition is evaluated for each recipient, global match is returned if at least one recipient matches. Example 1 Let's have two recipients: [email protected] and [email protected] Condition: contains
36 32 Mail Service Reference IceWarp Server If Convert to string is used, string is constructed and tested. Result is MATCH. If All items match is used, is tested, result is match, then is tested, result is not match. Global result is NOT MATCH. If At least one item matches is used, is tested, result is match, then is tested, result is not match. Global result is MATCH. Example 2: Let's have two recipients: and Condition: does NOT contain If Convert to string is used, string is constructed and tested. Result is NOT MATCH. If All items match is used, is tested, result is not match, then is tested, result is match. Global result is NOT MATCH. If At least one item matches is used, is tested, result is not match, then is tested, result is match. Global result is MATCH. NOTE that this works and will work for Content Filters only. Filter Actions When a Rule is evaluated as true you have the following actions which you can apply to the message. Multiple actions can be applied. Checking an action will modify the Rule Description and may inset a clickable option to refine the action. Action Reject/Accept/Delete/ Spam message Stop processing more rules Forward to address Description Check this option to mark the message for Rejection, Acceptance or Deletion. The text Reject is added to the rule description. Click on Reject to open the Message Action dialog, where you can choose to Reject, Accept or Delete the message, or mark it as spam. Check this option to stop processing this message against further rules. This is useful once you have reached a decision on what to do with this message and saves any further processing power. For example - if you set up a rule to delete all messages from the domain spamcity.com you can set the action to Delete the message and Stop at this rule. The rules processing is completed and the message deleted. Check this option to Forward a copy of the message to another address. The text address is added to the rule description. Click on this to open the address dialog, allowing you to specify the address(es) to forward the message to. Multiple accounts can be specified, separated by semicolons.
37 Filters 33 You can use the '...' button to select accounts. Move to folder Copy to folder Encrypt message Respond with message Send message Edit message header Set message priority to value Set message flags Add score Check this option to move the message to a folder. Click on folder in the rule description to open a folder-tree view dialog where you can select the folder to use Check this option to copy the message to a folder. Click on folder in the rule description to open a folder-tree view dialog where you can select the folder to use Check this option to have IceWarp Server encrypt the message. Check this option to send a message back to the sender of this message. The text message is added to the rule description. Click on this to open the Message dialog, where you can specify the From address, the Subject, the message Text (or a file containing the message text) and whether the message Type ( , Instant message, or both). Check this option to send a message to any user. The text message is added to the rule description. Click on this to open the Message dialog, where you can specify the From address, the To address, the Subject, the message Text (or a file containing the message text) and whether the message Type ( , Instant message, or both). Check this option to edit the message headers. You can add, remove or change headers. The text header is added to the rule description. Click this to open the Headers dialog, where you can specify the action to take, and which header to take it on. System variables are allowed here, so for example you could modify the Subject: header to add some text: Subject: [MyNewText] %%Subject%% Check this to change the message priority. Click Normal in the Description field to select the value of x-priority message header in the Message Priority dialogue. Check this option to set message flags. Click on flags in the rule description to select which flags to set Check this option to add a value to the spam score of the message. Click on 1.00 in the rule description to set the value to be added. NOTE - that you can specify a negative value to have the spam score decreased. Execute application Add header/footer Check this option to run an executable. The text executable will be added to the rule description. Click this to open the Executable dialog where you can specify the fully qualified path to the executable and it's type (Executable, StdCall, Cdecl or URL) Check this option to add a header and/or footer to the . Headers and Footers are stored in files and can be plain text or HTML. The text header/footer is added to the rule description. Click this to open the Header/Footer dialog, which allows you to specify the fully qualified paths to the header and or footer files you
38 34 Mail Service Reference IceWarp Server want to add to the message. Strip all attachments Extract all attachments to directory Add text to a file Respond with SMTP message text Fix RFC822 message Block sender's IP address Execute SQL statement value Check this option to strip any attachments from the message. Check this option to store all attachments to a folder. The text directory is added to the rule description. Click this to open the extract attachments dialog, where you can specify the directory in which attachments should be stored. If the attachments is an IDP (IceWarp Data Packager) file you can optionally choose to have the files extracted from the package. You can also optionally choose to overwrite existing files. Check this option to add a line of text to a file. The text text is added to the rule description. Click this to open the Add Text dialog, where you can specify the fully qualified filename to write to and the text to be written. You can optionally choose to create a new file each time. System variables can be used within the text. This option can be useful to create your own format logs containing any information you wish to record Check this option to specify the SMTP servers response to the incoming message. The text text is added to the rule description. Click on this to open the SMTP Response dialog, which allows you to specify the text to send back to the originating server. The format of the text should be a numeric response code followed by your freeform text. Check this option to fix messages that are not RFC822 compliant. These messages can cause problems with your server and with your user's clients. Non-compliant messages are usually spam or hacker attacks and we recommend that you delete them with the condition "Where message violates RFC822" combined with Action "Delete" and "Stop at this filter" rather than allowing them through. Check this option to invoke Intrusion Prevention blocking rules to block this senders IP address for an amount of time. Check this box to execute an SQL query against a database. Click value in the rule description to define the database connection parameters and the query to be run. Filter Description Once you have built your rule there is a description of the rule in the lower pane of the Rule.
39 Filters 35 This section discusses the description and the ways you can manipulate it. All conditions are initially linked with or conditions, these can be changed to and conditions by clicking on them. Brackets can be inserted in your rule by placing your cursor where you want the bracket and pressing the appropriate button. "(" or ")". A condition can be negated by placing your cursor before the condition and pressing the exclamation mark "!" button. Conditions can be moved up and down the list by placing your cursor within the condition and using the up and down buttons. A condition can be deleted from the rule by placing the cursor within the condition and pressing the delete button "X" Editing a filter Pressing the Edit button opens the currently selected rule for editing. The same Rule dialog is opened as for adding a rule. The difference is that all conditions and actions will be selected as appropriate and the rule description will be populated.
40 36 Mail Service Reference IceWarp Server Please refer to Adding a new Rule (see "Adding a new Filter" on page 23) for full information. Deleting a Filter Pressing the Delete button will delete the currently selected rule. A confirmation dialog will be presented. Exporting Filters The Export button will open the Export dialog where you can select rules to be exported to an XML file. Check all the rules that you want to export and press the Export Selected Filters Now button. A standard file dialog will open allowing you to name and place your XML file. This can be useful as a backup copy of your filters or if you want to copy your filters from one IceWarp Server to another. Importing Filters The Import button opens a standard file browser dialog to locate and open your XML file of exported filters.
41 Filters 37 Once the XML file is opened you will be presented with the Import dialog You should check the filters you wish to import and press the Import Selected Filters Now button Bypassing Filters You may wish to bypass Rules processing for certain senders, recipients, domains or addresses. The "B" button allows you to specify a bypass list. Press the button to open the edit dialog where you specify the bypass items. Examples and rules are given within the file. Understanding the SMTP Protocol and Message Headers To implement Rules properly, you should understand the structure of an s and how they are transferred via the SMTP protocol. An is transferred over the network using the SMTP protocol as a plain text file with a header and body part. Instead of the term , we will use the term "message". A "message" is a plain text file which contains an and all of its attachments and other parts. Confusion is often caused by the fact that the SMTP sender and recipient can be completely different to the From and To information displayed in an client. To understand the difference, look at the IceWarp Server system variables, which are related to messages. %%From%% %%From_ %% %%From_Alias%% "From:" is taken from the message header, displayed in the recipient client.
42 38 Mail Service Reference IceWarp Server %%From_Domain%% %%From_Name%% %%To%% %%To_ %% %%To_Alias%% %%To_Domain%% %%To_Name%% %%Sender%% %%Sender_ %% %%Sender_Alias%% %%Sender_Domain%% %%Recipient%% %%Recipient_ %% %%Recipient_Alias%% %%Recipient_Domain%% "To:" is also taken from the message header. Both - From and To are taken from the message header and they NEED NOT be the same as the one used in the SMTP protocol during message transmission. The Sender is the real sender in the SMTP protocol. The "From:" in the message header can be different. This is the real recipient in the SMTP protocol. The message will be delivered to this recipient regardless of the message's To: header. An client displays the information from the message header, while the delivery of the message is given by the information in the SMTP protocol. Example: The following is an extract from the SMTP log: The message delivered from [email protected] to the [email protected] - SMTP protocol: [000009F8] Wed, 10 Mar :41: Connected [000009F8] Wed, 10 Mar :41: >>> 220 mail.icewarpdemo.com ESMTP Merak 7.2.4; Wed, 10 Mar :41: [000009F8] Wed, 10 Mar :41: <<< MAIL From:[email protected] [000009F8] Wed, 10 Mar :41: >>> <[email protected]>... Sender ok [000009F8] Wed, 10 Mar :41: <<< RCPT To:[email protected] [000009F8] Wed, 10 Mar :41: >>> <[email protected]>... Recipient ok [000009F8] Wed, 10 Mar :41: <<< DATA [000009F8] Wed, 10 Mar :41: >>> 354 Enter mail, end with "." on a line by itself [000009F8] Wed, 10 Mar :41: *** <[email protected]> <[email protected]> :00:00 OK [000009F8] Wed, 10 Mar :41: >>> bytes received in 00:00:00; Message accepted for delivery
43 Filters [000009F8] Wed, 10 Mar :41: <<< QUIT [000009F8] Wed, 10 Mar :41: >>> mail.icewarpdemo.com closing connection SYSTEM [000009F8] Wed, 10 Mar :41: Disconnected It shows that the message is from and should be delivered to The following shows the actual headers of the message Received: from servcom2.domaine.local ([ ]) by mail.icewarp.com (Merak 7.2.1) with ESMTP id CRA73883 for Mon, 09 Feb :28: Received: from metallography ([ ]) by servcom2.domaine.local with Microsoft SMTPSVC( ); Mon, 9 Feb :30: From: "Sazedur Cerezo"<[email protected]> To: [email protected] Subject: lgoc: H*G*H-Lo0k Younger Whl1e L0slnq We19ht Mime-Version: 1.0 Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: 7bit Return-Path: [email protected] Message-ID: <[email protected]> X-OriginalArrivalTime: 09 Feb :30: (UTC) FILETIME=[F10A78F0:01C3EEE6] Date: 9 Feb :30: This shows that the headers say that the message is from "Sazedur Cerezo" and is sent to [email protected]. This is the information that is displayed in the client: From & To used in the Content Filter Condition correspond to the From: and To: of the HEADER of the message, while the Sender & Recipient are taken from SMTP protocol.
44 40 C HAP T E R 6 Rules This dialog is the same for all accounts and domains. Selecting Mail Service -> Rules or the Rules tab with a Domain or User selected will give you access to the Rules list, allowing you to perform maintenance on the rules. NOTE - that the above graphic may be incorrect depending upon where you are accessing a Rules tab. Also be aware that Rules are only processed against incoming messages. The filter is a text file with a strictly defined format. The file can be edited directly using a standard text file editor but we highly recommend that you use the Add, Edit and Delete buttons as even the simplest mistake can cause valid s to be rejected. Multiple rules can be selected for deletion by holding the Ctrl key and clicking multiple rules. A range of rules can be selected by clicking the first rule and then clicking the second rule while holding down the Shift key. Rules can be activated and de-activated by checking/un-checking the box to the left of the rule. This is useful for testing purposes or to disable a rule for a time without deleting it.
45 Filters 41 Clicking on the Add or Edit button will open a dialog like this, which allows you to define or modify your rule: The various options, and the String conditions dialog, are discussed in detail in the following table but first we will explain basic use of the three sections of the dialog: The Conditions block The Actions block The Logic Buttons In this area you can select the properties of the message that you wish to perform some test on. Multiple conditions can be tested by checking multiple boxes. The same condition can be added multiple times by double clicking the Condition when it is checked. In this area you select the Action(s) that you want to perform on the message if the Rule evaluates as True Multiple actions can be selected by checking multiple boxes. The buttons below the Actions block are used to add logic to the rule
46 42 Mail Service Reference IceWarp Server The Exclamation mark will negate (NOT) the Condition you are currently modifying. The up and down arrows will move the conditions up and down within the rule. The X button will delete the current Condition. We recommend experimentation with these buttons to familiarize yourself with their function The Description block Title This will show the rule you are building or modifying and will change dynamically as you select or de-select Conditions and Actions. Areas of the rules that can be modified are highlighted in this block and clicking on them will open a further dialog box to allow you to define your test. The name of the rule, for identification purposes. Condition Where From: message header matches some words Where To: message header matches some words Where Subject: message header matches some words Where Cc: message header matches some words Where Reply-To: message header matches some words Where Date: message header matches some words Where Message priority is value Where Message is spam Where Message is size Where Message body matches some words Description Check the From: header for a string Condition. In the rule description click on some words to create the string condition (explained below). Check the To: header for a string Condition. In the rule description click on some words to create the string condition (explained below). Check the Subject: header for a string Condition. In the rule description click on some words to create the string condition (explained below). Check the Cc: header for a string Condition. In the rule description click on some words to create the string condition (explained below). Check the Reply-To: header for a string Condition. In the rule description click on some words to create the string condition (explained below). Check the Date: header for a string Condition. In the rule description click on some words to create the string condition (explained below). Check the priority of a message. Click on Normal in the Rule description to select a priority. Check if the message has been marked as spam. Check the Message size. Click the 0 kb to select the message size criteria. Select Greater or Lower and specify a Size (in kb) Check the message body for a string condition. In the rule description click on some words to create the string condition (explained below). NOTE - Use this option with care as scanning the whole message body of every incoming
47 Filters 43 message could seriously affect your Server performance. Where Custom message header matches some words Check a Custom message Header for a string condition. In the rule description click on some words to create the string condition (explained below). NOTE - this rule has an unusual format for the string condition! format - <header>:<string condition> where <header> is the name of your custom header <string condition> is the string condition to test for. Example MyHeader:jim;bob;john Would check the header "MyHeader" for any of the strings "jim", "bob" or "john". Where Any message header matches some words Where Attachment name matches some words Where message contains attachment Where Sender matches some words Where Recipient matches some words Check all headers for a string condition. In the rule description click on some words to create the string condition (explained below). Check the Attachment name for a string condition. In the rule description click on some words to create the string condition (explained below). Check whether the message has an attachment. Check the Sender for a string condition. In the rule description click on some words to create the string condition (explained below). Check the Recipient for a string condition. In the rule description click on some words to create the string condition (explained below).
48 44 Mail Service Reference IceWarp Server Where sender/recipient is local/remote Check the location of the sender or recipient. In the rule description click on local/remote to open the following dialog: Sender / Recipient Select whether you want to check the the Sender or Recipient address Local / Remote Select whether you want whether the chosen address is a Local account or a Remote account. Ignore / Account exists / Account does not exist select whether you want to check whether the account exists, doesn't exist, or ignore this check. Only available for Local accounts Member of: Check whether the account belongs to a particular Domain, Group, Mailing List etc.. Press the '...' button to open the standard Select Item dialog. Only available for local accounts that you check the existence or non-existence of Where Sender's IP address matches some words Where rdns (PTR) matches some words Where Sender's IP address is trusted Where Spam score is value Where SMTP AUTH All messages Check the Remote IP address for a string condition. In the rule description click on some words to create the string condition (explained below). Check the rdns (PTR) record for a string condition. In the rule description click on some words to create the string condition (explained below). Check if the Senders IP address is in the trusted list Click on 0.0 in the Rule description to define a greater than or less than value to check the spam score against. Check if this message was delivered using an SMTP Authorized connection A special condition that evaluates TRUE for all messages - use with care! String Testing Description Clicking on some words (in a new condition) or the string itself (in a condition already defined)
49 Filters 45 will open the String Condition dialog box. There are four options available in the dialog: The Function drop-down box offers 7 options for the string test, the option chosen effects the content required in the String text-box Contains list of strings (semi-colon separated) Contains string Regex Starts with string Ends with string Is string Contains list of strings from file Match case Match whole word only Populate the String box with a list of strings to test for Populate the String box with the string you to test for Populate the String box with a regular expression. There is a basic Regex tutorial here Looks for the string specified in the String box at the start of the tested condition Looks for the string specified in the String box at the end of the tested condition Tests whether the tested condition is exactly equal to the string specified in the String box The String box should contain the path to a text file containing a list of strings you wish to test for. Press the "..." button to open a file dialog to navigate to a file where you can specify strings, one per line. Check this box to take string case into account. Check this box to perform a standard "whole word" check against the string. Actions Description The following Actions are available when a Condition is evaluated TRUE. Multiple Actions can be selected by checking multiple boxes. Selecting an Action will add the Action to the Description box and for some Actions you are able to click the text in the description to define the Action further. Details follow: Reject/Accept/Delete/ Spam message Stop processing more rules Forward to address Adds an Action to Reject (default) the message. Click on Reject in the Description area to select Reject, Accept, Delete, or mark the message as Spam. Stop any further Rules from being processed, if this Rule is evaluated as TRUE. Forward the message to an address. Click address in the Description area to specify the address. NOTE - that you can also send an instant message or an sms using this option: sms - use sms:<number> e.g. sms: IM - use xmpp:<jabberid> e.g. [email protected] Move to folder Move the message to a folder.
50 46 Mail Service Reference IceWarp Server Click on folder in the Description area to select the folder to move to. NOTE - The folder tree does not fill when you access this Action within Content Filters, you have to manually specify a mailbox. ALSO - although the INBOX folder may be shown in the folder tree, there is little point selecting this folder as this is the default folder that messages will come in to. ALSO - that you can have delivered to a specific mailbox folder by specifying %%Extension%% as the folder name. When this is specified IceWarp Server will look for a folder name within the address and store the message to that folder if it exists. Example: A message sent to john:%%important%%@icewarpdemo.com will be stored in the folder important Note the colon used to separate the User alias from the folder name, this can be changed to another character using the API. Copy to Folder Copy the message to a folder. Click on folder in the Description area to select the folder to copy to. NOTE - The folder tree does not fill when you access this Action within Content Filters, you have to manually specify a mailbox. ALSO - although the INBOX folder may be shown in the folder tree, there is little point selecting this folder as this is the default folder that messages will come in to. ALSO - that you can have delivered to a specific mailbox folder by specifying %%Extension%% as the folder name. When this is specified IceWarp Server will look for a folder name within the address and store the message to that folder if it exists. Example: A message sent to john:%%important%%@icewarpdemo.com will be stored in the folder important Note the colon used to separate the User alias from the folder name, this can be changed to another character using the API. Encrypt message Check this option to have the message encrypted. NOTE -that for this option to work there must be a copy of the User's public certificate located in a file called cert.pem in the User's mailbox folder. The message will be encrypted using this certificate and then can only be decrypted by the user using his private key in his client. Send message Edit message header Send a message. Click message in the Description area to open a dialog to define the message. You can define To, From and Subject fields, the Text of the message (or a file to retrieve the text from), the type of message (text, HTML, or message with attachment) and whether the message is , an instant message, or both. Select this option to Add, Edit or Delete a message header. Click on header to open the Edit Message Headers dialog.
51 Filters 47 Click Add to add a new rule. Select an already defined rule and Click Edit or Delete to modify or remove a rule. In the Action drop-down you should select whether this rule will Add/Edit a header or Delete a Header. In the Header field you should specify the header you are actioning - remember that a header name should always finish with a colon. You can also add your own named headers e.g. MyHeader: The first rule shown in the screenshot above modifies the From header - it adds the string "[URGENT]" to the start of the header. Note the use of the IceWarp Server system variable %%from%% here, which is the value of the original From header. Any system variable can be used. The second rule simply deletes the From header. Set message priority to value Set message flag Select this option to have the priority of the message changed. Click on Normal to select the new priority to be assigned. Select this option to set a message flag. Click on flags to set the flag(s) you wish.
52 48 Mail Service Reference IceWarp Server External Filters External filters are DLL modules that are loaded in memory and invoked each time a message is received. The filter should return a result if it wants IceWarp Server to mark the message in some way. The Add button opens the External Filter dialog, which allows you to define an external filter: Field Title Module Message SMTP Message Enabled Description Just a descriptive text. The DLL library which is called to evaluate messages. If no SMTP message is defined, this one is used plus it has pre-defined prefix. This message is used in SMTP connections as a response when the message was caught by this filter. Activates/deactivates the filter. The Edit and Delete buttons are used to Edit or Delete Filter definitions, respectively.. The up and down arrow buttons are used to change the order that filters are applied (top first). The Edit File button opens up the text file of filter definitions. Examples are included. The B button opens up a bypass file where you can specify senders, recipients, domains and IP address ranges that will not have these filters applied.
53 49 C H A P T E R 7 Archive New in Version 10 The archiving capabilities are much richer and allow the administrator to bring archiving features directly to end users via IMAP. SMS messages are also archived automatically. Technically all archived s are always stored as.imap files which makes it possible to link the whole archive with a public folder. They also contain the Seen flag so they appear as read/unread in clients. New directory trailer path option works as an appendix to directory path so you can create e.g. this: C:\Archive\domain.com\john\Sent\2009-Jun\. It is also possible to store all messages in the root of the user's folder or keep them in folders (Inbox, Sent). Native integration with IMAP allows all users of WebMail and any other IMAP client to see a new Archive folder by default (or however named by the administrator). Users can then browse through their archive, but access to the archive folder is readonly so they cannot delete, flag or change the read status of messages. Examples of time-based archive structure: <Archive>\Inbox\ \ <Archive>\Sent\ \ or simply <Archive>\2009\ with all messages included. Archivist User Role You have large variety of possibilities by using public folders in combination with Archive: You can grant persons access to: the whole server archive the archive folder(s) of one or more domains archive folders of the selected users or groups. To grant access, do the following: 1. Under Domains and Accounts Management <domain> tab, create a new user (e.g. Archivist). 2. Set the user's Mailbox path (Domains and Accounts Management <user> Mailbox) same as the mail archive path (Mail Service Archive Archive to directory).
54 50 Mail Service Reference IceWarp Server E.g.: C:\Program Files\IceWarp\Archive\ NOTE that is highly recommended not to use the "datetime" variables in the basic mail archive path. Use directory trailer path instead. For information about "datetime" variables, refer to the Shared Server Variables section. 3. Create a new public folder (GroupWare Public Folders General) with the just created user selected in the Account field (Public Folder dialog Public Folder tab). 4. On the Public Folder dialog Access Control List tab, do the following: To grant someone access to archive folders of all server accounts, click the account name (e.g. [email protected]), click the Set ACL button and in the Access Control List dialog, select the person you want to grant access to. NOTE remember that archive folders are always read-only, when dealing with the rights. To grant someone access to archive folders of a specific domain, click the domain name (e.g. domain.com), click the Set ACL button and in the Access Control List dialog, select the person you want to grant access to. To grant someone access to archive folders of specific users or groups, click the user/group name, click the Set ACL button and in the Access Control List dialog, select the person you want to grant access to. Eventually, repeat this step for another users/groups. For larger numbers of auditors or archivists, it can be useful to create groups with appropriate rights, assign individual persons to these groups and set permissions for the whole group at once. Example Part of the archivist mail folder tree with one domain and two account folders available:
55 Archive 51 Compatibility Compatibility with the old archive is preserved. However.tmp (POP3) files will not be available in the new IMAP-based Archive. Only newly received messages will be properly converted. Old structures created in the mail folders will be visible but messages will have not the Seen flag so it will appear they have not been read. In This Chapter Mail Archive Mail Archive The Archive sub-node allows you to specify mail Archive and pruning options: Field Active Archive to Directory Directory trailer path Integrate archive with IMAP folder Description Check this option to activate Mail Archiving. Select the path to the directory where mail should be archived. Directory that precedes the user's inbox/sent items folder. This field can either: be left blank or contain the date time variables to have folders (and mails) sorted chronologically. If ticked, the Archive folder will appear in the IMAP folder list and users will have access to their received/sent messages in read-only mode.
56 52 Mail Service Reference IceWarp Server Field Archive messages Description Select from four options: Received and sent messages to Inbox and Sent folder Archives both incoming and outgoing messages into separate folders. Received messages to Inbox folder Archives incoming messages into the appropriate folder. Received and sent messages to root folder Archives all messages into the root folder. Received messages to root folder Archives incoming messages into the root folder. NOTE root folder here means the root of the user's mailbox - so there will not be Inbox/Sent folders. Do not archive spam Archive all users or Archive only specified users and domains Check this box and messages which are marked as spam will be excluded from the archive process. Choose this option to archive mail for all users in all domains. Choose this option to select specific domains and/or users to archive mail for. Use the Add Domain and/or Add Account buttons to choose domains and/or users. Field Delete messages from Description Enter a number here and s older than this number of days will be deleted.
57 Archive 53 archive older than (Days) Backup deleted s to Check this option and enter a directory name to have deleted s backed up to the specified file. The file name can contain "yyyymmdd", which will create a separate file for each day. These backup files are in standard ZIP format and files are stored with relative path information, so to restore a particular file you should extract the contents to your top-level mail directory with the extract option to "use folder names". Password protection Delete Backup files older than (Days) Optionally specify a password here to have the backup file password protected. Enter a number here and backups older than that many days will be deleted. NOTE - that this function deletes all files with the same extension based on the system file time stamp. It is highly recommended that, if you use this function, you specify a directory that only contains these backup files.
58 54 C H A P T E R 8 ETRN Download Short for Extended Turn, ETRN is an extension to the SMTP mail delivery protocol that allows an SMTP server to request from another SMTP server any messages it has for a specific domain. ETRN is typically used by a mail server that does not have a dedicated connection to the Internet. The ETRN download node lets you to define ETRN or ATRN client requests to remote mail servers, allowing you to have IceWarp Server pick up messages held on other servers. Multiple downloads can be defined and message collection(s) can be scheduled. The Delete button is used to delete a selected download definition. The Schedule button allows you to define a schedule for downloads. The Download Now button allows to start a manual connection and collection of mail. The Add and Edit buttons open the ETRN / ATRN Item dialog, allowing you to add or modify a downloads definition.
59 ETRN Download 55 Field Description Hostname Domain User Password ATRN Description A description of this download so you can identify it. Specifies the full hostname or IP address of the remote mail server including the port if required. If this is an ETRN connection then you should specify the domain name here If this is an ETRN connection then you should specify the User name for authentication here. If this is an ETRN connection then you should specify the Account Password here for authentication The default mode for collecting messages is ETRN. If the server you are collecting from requires ATRN (Authenticated Turn) then you should check this box and specify the Domain, User and Password to be used for authentication as described above.
60
61 57 Index No index entries found.
Mail Service Reference
IceWarp Unified Communications Mail Service Reference Version 10.4 Printed on 3 January, 2013 Contents Mail Service 1 General... 2 Delivery... 2 Routing... 5 Advanced... 7 Security... 14 General... 14
Mail Service Reference
IceWarp Unified Communications Reference Version 11.3 Published on 8/11/2015 Contents... 4 About... 5 7-Zip License Requirements... 5 Reference... 6 General... 6 Spool Manager Main Features... 6 Delivery...
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Merak Windows Administration
Administration Guide Merak Windows Administration Version 7.4.2 (c) IceWarp Ltd. Printed on 31 March, 2004 i Contents Server Windows Administration 3 Main Menu...4 Remote Server Administration...7 Configuration
Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section
Web Domain Administration
IceWarp Unified Communications Web Domain Administration Version 11 Published on 4/18/2013 Contents... 5 Management... 6 Main Screen... 6 Domain Settings... 7 Domain... 7 Limits... 7 Policies... 9 Options...
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
IceWarp Outlook Sync User Guide
IceWarp Unified Communications IceWarp Outlook Sync User Guide Version 10.4 Printed on 28 March, 2012 Contents IceWarp Outlook Sync User Guide 1 Installation... 2 Installation Pre-requisites... 3 Installation
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Help for System Administrators
Help for System Administrators Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help for System Administrators
IceWarp Server Outlook Sync User Guide
IceWarp Unified Communications IceWarp Server Outlook Sync User Guide Version 11 Published on 7/23/2013 Contents Installation... 4 Installation Pre-requisites... 4 Installation Step-by-Step... 5 Activation...
Merak Outlook Connector User Guide
IceWarp Server Merak Outlook Connector User Guide Version 9.0 Printed on 21 August, 2007 i Contents Introduction 1 Installation 2 Pre-requisites... 2 Running the install... 2 Add Account Wizard... 6 Finalizing
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
IceWarp Outlook Connector 4 User Guide
IceWarp Unified Communications IceWarp Outlook Connector 4 User Guide Version 10.3 Printed on 23 February, 2011 Contents IceWarp Outlook Connector 4 1 Installing IceWarp Connector... 2 Pre-Installation
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
FTP Service Reference
IceWarp Unified Communications Reference Version 11.3 Published on 1/6/2015 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...
IceWarp Unified Communications. AntiVirus Reference. Version 10.4
IceWarp Unified Communications AntiVirus Reference Version 10.4 Printed on 13 January, 2012 Contents AntiVirus 1 Anti-Virus... 2 Latest Avast! Engine... 2 Kaspersky Anti-Virus Support... 2 Support for
IceWarp Outlook Sync User Guide
IceWarp Unified Communications IceWarp Outlook Sync User Guide Version 10.5 Printed on 20 December, 2012 Contents IceWarp Outlook Sync User Guide 1 Installation... 2 Installation Pre-requisites... 3 Installation
Using Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Configuring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
MDaemon Vs. Microsoft Exchange Server 2013 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
IceWarp Server Outlook Sync User Guide
IceWarp Unified Communications IceWarp Server Outlook Sync User Guide Version 11 Published on 3/13/2014 Contents IceWarp... 4 Installation... 5 Installation Pre-requisites... 5 Installation Step-by-Step...
What browsers can I use to view my mail?
How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
Webmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
IceWarp Server Outlook Sync User Guide
IceWarp Unified Communications IceWarp Server Outlook Sync User Guide Version 11.1 Published on 1/6/2015 Contents IceWarp... 4 Installation... 5 Installation Pre-requisites... 5 Installation Modes... 5
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
SmarterMail Email User Guide
SmarterMail Email User Guide Page 1 of 16 What is SmarterMail? SmarterMail gives email administrators and users and more power and control than ever before with the most flexible email server currently
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
Log Analyzer Reference
IceWarp Unified Communications Log Analyzer Reference Version 10.4 Printed on 27 February, 2012 Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 3 Advanced Configuration...
WEBMAIL USER MANUAL AN INTRODUCTION TO WLINK WEBMAIL. Table of content:
WEBMAIL USER MANUAL Table of content: An introduction to Wlink WebMail Interface guide Read/Delete Email Compose/Send Email Attachment Searching Email Message filter Spam setting Whitelist/Blacklist Email
Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.
Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
Log Analyzer Viewer Guide
IceWarp Unified Communications Log Analyzer Viewer Guide Version 10.3 Printed on 10 December, 2010 Contents Log Analyzer Viewer 1 Introduction... 1 Special thanks:... 1 Getting Started... 3 Log Analyzer
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
Security. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with
Contents CHAPTER 1 IMail Utilities
Contents CHAPTER 1 IMail Utilities CHAPTER 2 Collaboration Duplicate Entry Remover... 2 CHAPTER 3 Disk Space Usage Reporter... 3 CHAPTER 4 Forward Finder... 4 CHAPTER 5 IMAP Copy Utility... 5 About IMAP
Log Analyzer Viewer Guide
IceWarp Unified Communications Guide Version 11.3 Published on 1/6/2015 Contents... 4 Introduction... 4 Special Thanks... 4 Getting Started... 5 Log Analyzer Configuration... 6 Import Log Files... 7 IP
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
Email Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM
WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create
EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.
CONFIGURING THE ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like Challenge/Response, Whitelist and Blacklist. EnterGroup Anti-Spam
Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header
Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
Email Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
Email Getting Started Guide Unix Platform
Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
Integrated Migration Tool
IceWarp Unified Communications Integrated Migration Tool Version 10.4 Printed on 16 April, 2012 Contents Integrated Migration Tool 1 How It Works... 2 Performing Migration... 3 Set up the Domain in IceWarp
SECURE MESSAGING PLATFORM
SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9
Administrator Manual v3.0
Administrator Manual v3.0 SecurityGateway for Email Servers Administrator Manual Products that are referred to in this document may be trademarks and/or registered trademarks of the respective owners.
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
Using WinGate 6 Email. Concepts, Features, and Configurations.
WinGate Feature Guide Using WinGate 6 Email Concepts, Features, and Configurations. Neil Gooden Qbik New Zealand Limited Rev 1.0 December 2004 2 Introduction...3 Basic Email Concepts... 3 Differences in
Avira Managed Email Security (AMES) User Guide
Avira Managed Email Security (AMES) User Guide 1 Product information... 3 1.1 Functionality... 3 1.2 Licensing AMES... 3 2 Getting started with AMES... 4 2.1 Adding a new domain to AMES... 4 2.2 Logging
Email Gateways Using MDaemon 6.0
Email Gateways Using MDaemon 6.0 Alt-N Technologies, Ltd 1179 Corporate Drive West, #103 Arlington, TX 76006 Tel: (817) 652-0204 2002 Alt-N Technologies. All rights reserved. Product and company names
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
PureMessage for Microsoft Exchange Help. Product version: 4.0
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php
Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
User Guide. ThreatTrack Security Product Manual
User Guide ThreatTrack Security Product Manual Copyright 2014 ThreatTrack Security, Inc. All Rights Reserved. The legal rights, license, and warranties of the software product described herein are governed
E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Administrator's Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Administrator's Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS NOTICES... I Notices...ii Comments on this Guide?...ii
TECHNICAL REFERENCE GUIDE
TECHNICAL REFERENCE GUIDE SOURCE TARGET Kerio Microsoft Exchange/Outlook (PST) (versions 2010, 2007) Copyright 2014 by Transend Corporation EXECUTIVE SUMMARY This White Paper provides detailed information
Ciphermail Gateway Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Administration Guide October 10, 2015, Rev: 10214 Copyright 2008-2015, ciphermail.com. Acknowledgements: Thanks goes out to Andreas Hödle for feedback. CONTENTS
MailFoundry User Manual. Page 1 of 86. Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved. Page 1 of 86
MailFoundry User Manual Page 1 of 86 MailFoundry User Manual Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved Page 1 of 86 Table of Contents MailFoundry User Manual Page 2 of 86 Chapter
Quick Start Policy Patrol Spam Filter 5
Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)
MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE
How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
CONFIGURING FUSEMAIL ANTI-SPAM
CONFIGURING FUSEMAIL ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like FuseFilter, Challenge/Response, Whitelist and Blacklist.
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam...
VoIP Server Reference
IceWarp Server VoIP Server Reference Version 10 Printed on 12 August, 2009 i Contents VoIP Service 1 Introduction... 1 V10 New Features... 3 SIP REFER... 3 SIP Call Transfer Agent Settings... 3 NAT traversal
Log Analyzer Viewer Guide
IceWarp Unified Communications Log Analyzer Viewer Guide Version 10.4 Printed on 27 February, 2012 Contents Log Analyzer Viewer 1 Introduction... 1 Special thanks:... 1 Getting Started... 3 Log Analyzer
Ciphermail Gateway Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Administration Guide September 23, 2014, Rev: 9112 Copyright 2008-2014, ciphermail.com. Acknowledgements: Thanks goes out to Andreas Hödle for feedback. CONTENTS
Kerio Connect. Step-by-Step. Kerio Technologies
Kerio Connect Step-by-Step Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Connect, version 7.2. All additional modifications and
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
Exclaimer Mail Utilities Manual
Exclaimer Exclaimer UK +44 (0) 845 050 2300 USA 1-888-450-9631 [email protected] Copyright Notice The information in this document is subject to change without notice. Exclaimer Ltd assumes no responsibility
Symantec Hosted Mail Security. Console and Spam Quarantine User Guide
Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license
Advanced Settings. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods
Training Guide eprism Email Security Appliance 4.0
Training Guide eprism Email Security Appliance 4.0 2 Lesson 1 Email Security and eprism Contents LESSON 1...5 EMAIL SECURITY AND EPRISM...5 Mail Delivery Process...6 eprism Overview...7 LESSON 2...9 INSTALLING
IceWarp Server. Log Analyzer. Version 10
IceWarp Server Log Analyzer Version 10 Printed on 23 June, 2009 i Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 2 Advanced Configuration... 5 Log Importer... 6 General...
SPAMfighter SMTP Anti Spam Server
SPAMfighter SMTP Anti Spam Server Users Manual Copyright SPAMfighter ApS 2005 Revised 4/27/2006 1 Table of Contents 2 Terminology...3 3 Technology...4 3.1 Tunneling and Interception...4 3.2 Content Classification...5
SmarterMail 1.x Documentation
SmarterTools Inc. SmarterMail 1.x Documentation DOCUMENTATION SmarterMail 1.x is now a legacy product and is no longer supported by SmarterTools Inc. This documentation is intended for reference only,
How To Manage Your Spam On Graymail On Pc Or Macodeo.Com
User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header.
Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox
Email -- Reading and Printing Email
Email -- Reading and Printing Email Checking for New Email By default, webmail checks for new email automatically. If you want to manually check for new email, click the Check Email button. Or, click the
MAPI Connector Overview
The CommuniGate Pro Server can be used as a "service provider" for Microsoft Windows applications supporting the MAPI (Microsoft Messaging API). To use this service, a special Connector library (CommuniGate
