Bulk Verification Documentation

Size: px
Start display at page:

Download "Bulk Email Verification Documentation"

Transcription

1 Bulk Verification Documentation Release verifyapi.com January 14, 2015

2

3 Contents 1 Product Overview Product Overview QuickStart Quick Start Features Features FAQs Frequently Asked Questions Status Codes Verification Response Codes For Bulk Verification Glossary Glossary i

4 ii

5 Our validation service will help your business reduce costs by eliminating bad addresses from your information systems. All you need to do is upload your list and wait for the results to come in. Contents 1

6 2 Contents

7 CHAPTER 1 Product Overview 1.1 Product Overview Why Address Verification? Sending s to non-existent addresses is never a good idea for many reasons including: Damaging the reputation of your ESP infrastructure (IP addresses) Many ESPs will have maximum hard bounce thresholds. Exceed these and your account could be closed. Bad s in a list negatively affects deliver-ability rates A Block List can keep track of failed deliveries (e.g. bad address) at a particular domain. Too many failed deliveries can raise some flags thus raising the risk of your campaign being flagged as spam. Processing hard bounces means wasted time An sent to a bad or non-existent address results in a bounce message coming back. Someone or something (e.g. automated software) is required to remove the bounces from a list so as to avoid sending to bad addresses next time. Tip: Cleansing bad s from a list using verification technology before embarking on an ing campaign significantly reduces the above challenges Product Description verifyapi.com offers data cleansing services specifically for addresses. Offering a fully cloud based solution, verifyapi.com provides fast, reliable and accurate verification. With unrivalled coverage in all areas (including traditionally hard to verify addresses such as Hotmail and Yahoo), verifyapi.com is the natural choice for customers requiring good coverage in their applications for both B2B and B2C addresses Reliable and Secure Security of your data is our primary concern. To ensure security, we implement: Robust data security implemented using Microsoft Trustworthy Computing guidelines. Logical security of your data by allocation of your own, dedicated database. Any data that you upload goes into your database and is not visible by anyone else. Physical security in secure US and UK data centers. 3

8 Once you delete a list from our system, it is wiped completely off our servers. Ultimately, no one gets access to your data except you. As well as the assurance of security, we appreciate that you want reliability. That s why, as a customer, you receive priority support by phone and . In the unlikely event of a technical problem, our promise to you is to resolve your issue within 24 hours. Our systems include built in exception and error alerting. This means that, in the unlikely event that you need to call us, we ll already know about the problem and be well on the way to fixing it How To Get Started To get started create a new account and upload your list. 4 Chapter 1. Product Overview

9 CHAPTER 2 QuickStart 2.1 Quick Start This quick start guide is designed to get you up and running as fast as possible. Please follow the steps below in sequence: ) Create an Account Create an account ) Upload File Navigate to the Upload a file tab. You can drag and drop or manually upload any.csv (Comman-Seperated Values) or.txt (Text File) file. This file can contain multiple data fields, not just addresses. Our system will pick out the address field automatically and preserve the rest of your data ) Choose your Payment Method You can either pay as you go or subscribe to the service for a set number of verifications per day ) Start Verification Please not that bulk lists can take up to 24 hours to verify ) View your Results! 5

10 6 Chapter 2. QuickStart

11 CHAPTER 3 Features 3.1 Features Fanatical Service Quality Management (SQM) verifyapi.com operational staff obsessively monitor services to ensure the best possible uptime and coverage. Uptime and functional correctness is actively monitored on a minute by minute basis from multiple data centers dispersed across North America and Europe Multi Factor Verification Progressive verification using multiple verification processes including: Syntax checking DNS checking Mailbox checking Unrivalled Coverage With more than 5 years experience and the benefit of owning our own software stack, verifyapi.com has refined its services over the years to provide good coverage not only of the easier B2B domains but also the more technically tricky B2C domains including: Hotmail Yahoo AOL Yandex Spam Trap Detection After many years R&D, verifyapi.com has developed various secret sauces that can effectively detect and eliminate spam traps from several well known Block List. 7

12 3.1.5 Disposable Address Detection Detect and eliminate DEA What it does verifyapi.com is used to check addresses in bulk. Not only are syntax and domain checked, but that the user mailbox is available too. This is the only way to know for sure if an address is valid. Additionally identified as part of the verification process is extra information including: DEA. Spam Trap How it works addresses are verified using various filters and processes. As a high level overview, an address submitted for verification goes thorough the following filters: Syntax A basic inspection of the systax of the address to see if it looks valid. Work is done only using server CPU (Central Processing Unit) based on simple pattern matching algorithms. DNS A Verifies a domain exists in DNS. Domains that do not exist in DNS cannot have mail servers or boxes. DNS checks are performed over the network. DNS MX Verify MX records using DNS. Domains that do not have MX records, have no mail servers and therefore no valid boxes. MX checks are performed over the network. MailBox Verify boxes with SMTP checks. Connect to mail server and perform SMTP protocol to verify if mail box exists. This is the deepest level of verification. It is performed over the network. 8 Chapter 3. Features

13 CHAPTER 4 FAQs 4.1 Frequently Asked Questions How fast is it? Please allow up to 24 hours for a list to process How do I get s into the system? Upload any text (.txt) or CSV (.csv) file that contains addresses. This includes Excel (export as.csv), Outlook (export as.csv) or any other application that can support exporting as text (almost all applications support this). Your files can contain extra data fields, we simply append our results to the end of your existing file How do I get results out of the system? You can export results in the same format that you imported them Are there any s that can t be checked? For servers that we know give problems, such as those that give false positives (catch-all), we flag the address appropriately How often should I check addresses? For large lists (i.e. > 10,000), we suggest checking every 2 weeks. Smaller lists can be checked monthly addresses are always changing. People change addresses as they (for example): Move Internet providers Move to a new employer Change name (e.g. after getting married) If your business relies on lists for its marketing, it s important that you keep the lists current and clean to maximize your target potential and reduce the overheads associated with managing too many bounced s. This is why we recommend frequent checking. 9

14 4.1.6 How do I sign up? To get started create a new account and upload your list How secure is my data? Very. We take your security and confidentiality seriously. We know that your lists are confidential and we do everything we can to make sure that they stay that way! Your data is held securely in US and UK data centers. As well as physical security of locked server rooms, we use strong password security in our software services. This means that no-one other than you can see your data. Also, if you choose to cancel your plan at any time, we undertake to destroy / delete your data so that it cannot be retrieved or viewed by any other parties Do you share my lists or use them in any other way? No. No-one other than you has access to your data / lists What browsers do you support? Generally, anything that is younger (as of December 2014) than 7 years old. Including: Safari Internet Explorer (version 7+) Firefox (version 2+) Chrome Opera As this is an Internet based service, it means that it runs happily on any operating system including Mac, PC, Linux, Unix etc Can it do Hotmail? Yes Can it do Yahoo? Yes. Based on our own internal testing verifyapi.com is currently the only verification service to offer effective and repeatable coverage for Yahoo addresses Can it do Yandex? Yes it can. 10 Chapter 4. FAQs

15 Can it find spam traps? Partially. A Spam Trap is a moving target. In theory (and indeed in practice) anyone can setup a Block List and start putting spam traps into the wild. verifyapi.com has Spam Trap detection capabilities that covers several of the well known block lists. Whilst it is not possible to deliver 100% coverage of all spam traps from all block lists, verifyapi.com provides the best Spam Trap detection capabilities available How does it work? At a basic conceptual level, the process of verifying addresses is very simple. Google for Send using telnet for a quick and general overview of how it s done. To verify an address without sending an , simply go as far as the RCPT TO stage and parse the response code. That s the easy bit and can be accomplished in just a couple of dozen lines of a PHP script! The hard bit is dealing with mail services that are intrinsically configured to work against the process of verification or any similar SMTP based activity. The reason that any / SMTP process is difficult from a client perspective is that mail services need to protect themselves from an ever increasing landscape of abuse including spam and DDoS attacks. verifyapi.com s strength in dealing with the hard bit of verification comes from years of experience in doing verification together with our complete ownership of our SMTP verification software stack together with an extensive cloud based infrastructure. That s why verifyapi.com can do the hard bits best and offer outstanding coverage on the more difficult domains such as Yahoo and Hotmail Can I get blacklisted using this service? No. It s verifyapi.com infrastructure that does the work Will anyone know that I am verifying their address? No. It s verifyapi.com infrastructure that does the work Your service says an address is OK and I know it s Bad (or vice versa)? verifyapi.com queries mail servers in real time. Mail servers respond with one of 2 possible answers for a given address: Yes, the address exists - SMTP code 2xx No, the address doe not exist - SMTP code 5xx verifyapi.com uses the above response codes to determine if an address is valid or not and reports this back to you. This method of determining address validity works in >99% cases. However, nothing is guaranteed. In a small number of cases it is possible for a mail server to report one thing on verification and do something different on trying to deliver an to the address verified. For example, say we take an address of [email protected] to send to. We are sending from a fictitious address [email protected] Frequently Asked Questions 11

16 reports with status code of OK from the verification service. However, when you send an to the bounces. Further inspection of the bounced NDR (Non Delivery Report) headers show something like the following: Delivered-To: Received: by with SMTP id n6csp24867ioo; Sat, 6 Jun :57: (PST) X-Received: by with SMTP id 5mr oie ; Sat, 06 Jun :57: (PST) Return-Path: <> Received: from SNT004-OMC2S34.hotmail.com (snt004-omc2s34.hotmail.com. [ ]) by mx.google.com with ESMTPS id ws5si obb for <[email protected]> (version=tlsv1.2 cipher=ecdhe-rsa-aes128-sha bits=128/128); Fri, 6 Jun :57: (PST) Received-SPF: none (google.com: SNT004-OMC2S34.hotmail.com does not designate permitted sender hosts) Authentication-Results: mx.google.com; spf=none (google.com: SNT004-OMC2S34.hotmail.com does not designate permitted sender hosts Received: from SNT004-MC2F40.hotmail.com ([ ]) by SNT004-OMC2S34.hotmail.com over TLS secur Fri, 6 Jun :57: From: [email protected] To: [email protected] Date: Fri, 6 Jun :57: MIME-Version: 1.0 Content-Type: multipart/report; report-type=delivery-status; boundary="9b095b5adsn=_01d010aabce2c5cc0008c930snt004?mc2f40.ho" X-DSNContext: 335a7efd Message-ID: <mjz7zgtpi @snt004-mc2f40.hotmail.com> Subject: Delivery Status Notification (Failure) Return-Path: <> X-OriginalArrivalTime: 06 Jun :57: (UTC) FILETIME=[CEAD2EE0:01D0114B] This is a MIME-formatted message. Portions of this message may be unreadable without a MIME-capable mail program. --9B095B5ADSN=_01D010AABCE2C5CC0008C930SNT004?MC2F40.ho Content-Type: text/plain; charset=unicode-1-1-utf-7 This is an automatically generated Delivery Status Notification. Delivery to the following recipients failed. [email protected] The header of the NDR shows that Hotmail thinks the address is invalid as far as sending to this address is concerned. However, Hotmail reports that the same address is valid as far as the verification activity performed by verifyapi.com. The discrepancy in verification results versus mail send is with the Hotmail infrastructure reporting one thing but doing the exact opposite. This behaviour occasionally (particularly from Hotmail) is seen in a small amount of cases and is attributable to internal Hotmail (or other mail services) system anomalies. The majority (>99%) of verification status versus mail send is consistent. However there are some edge cases caused by system faults in the mail service providers themselves. For these small number of cases, there is nothing that can be done at the verification stage. 12 Chapter 4. FAQs

17 How do I cancel a subscription? For pay as you go accounts, the account is free and you just pay when you need it. For subscription plans, you simply need to contact us via the support button in your account dashboard, and your cancellation will take effect at the end of the month. Please note that subscription plans have a minimum 2 month period, after that you can cancel at any time. Our service is so good that we hope that you won t need to cancel! However, if you do, we are proud of our simple cancellation process. Unlike many other companies, there are no hassles with fine print and tricky notice periods. Once you ve cancelled your service, we ll disable your account and make sure that all your data is securely disposed of (deleted) I have received x percentage of bounce backs using s you verified If you experienced a large number of NDRS (Non Delivery Reports) using addresses that were verified OK by our service there may have been an issue with your Service Provider (ESP) or the target mail server. Due to the nature of our verification process a mail box reported as OK can definitely accept incoming s. This is due to a target mail server existing, the server not being a catch all and the mail box accepting incoming mail. If you experience a bounce back with your validated OK addresses, there has likely been a fault with your ESP or on the target mail server. We are happy to work with customers and their ESPs in order to resolve such issues Frequently Asked Questions 13

18 14 Chapter 4. FAQs

19 CHAPTER 5 Status Codes 5.1 Verification Response Codes For Bulk Verification Main Status Codes Ok Verification passes all checks including Syntax, DNS, MX, Mailbox, Deep Server Configuration, Grey Listing Bad Verification fails checks for definitive reasons (e.g. mail box does not exist) Unknown Conclusive verification result cannot be achieved due to mail server configuration or anti-spam measures. See table Additional Status Codes Additional Status Codes None No additional information is available. This status differs from other additional status codes as it should not be retried (the result will not change). AtSignNotFound The sign is not found in address. CatchAllConnectionFailure The secondary catch all verification failed upon connection. CatchAllValidationTimeout The secondary catch all validation timed out. DnsConnectionFailure The DNS connection failed. DnsQueryTimout The DNS service failed to respond (timeout). A typical example of this status code is when a DNS server on the target infrastructure is configured incorrectly. DomainIsInexistent The domain (i.e. the bit after character) defined in the address does not exist, according to DNS records. A domain that does not exist cannot have boxes. A domain that does not exist cannot have boxes. DomainIsWellKnownDea The domain is a well known Disposable Address DEA. There are many services available that permit users to use a one-time only address. Typically, these addresses are used by individuals wishing to gain access to content or services requiring registration of addresses but same individuals not wishing to divulge their true identities (e.g. permanent addresses). 15

20 DEA addresses should not be regarded as valid for send purposes as it is unlikely that messages sent to DEA (Disposable Address) addresses will ever be read. DEA addresses should not be regarded as valid for send purposes as it is unlikely that messages sent to DEA addresses will ever be read. DomainPartCompliancyFailure The domain part compliancy failed. DoubleDotSequence The addresses domain contained double dots. IpBlockDetected An IP block has been detected. InvalidAddressLength The address is an invalid length. InvalidCharacterInSequence The address contains an invalid character. InvalidFoldingWhiteSpaceSequence The address contains a folding white space. InvalidLocalPartLength The address contains an invalid local part length. InvalidWordBoundaryStart LocalSenderAddressRejected The local sender address was rejected. MailboxFull The mailbox is full. Mailboxes that are full are unable to receive any further messages until such time as the user empties the mail box or the system administrator grants extra storage quota. Most full mailboxes usually indicate accounts that have been abandoned by users and will therefore never be looked at again. We do not recommend sending s to addresses identified as full. MailboxDoesNotExist The mailbox does not exist. 100% confidence that the mail box does not exist. MailboxTemporarilyUnavaible The mail server is operating Grey Listing. Whilst we endeavour to verify grey listed addresses, sometimes it is not possible whilst still offering timely verification results. NoMxServersFound There are no mail servers defined for this domain, according to DNS. addresses cannot be valid if there are no servers defined in DNS for the domain. OperationCanceled The operation was cancelled. ProxyConnectionTimeout The proxy timed out. ServerDoesNotSupportInternationalMailboxes The server does not support international mailboxes. International boxes are those that use international character sets such as Chinese / Kanji etc. International boxes require systems in place for Punycode translation. Where these systems are not in place, verification or delivery is not possible. For further information see Punycode. ServerIsCatchAll The server is configured for catch all and responds to all verifications with a status of Ok. Mail servers can be configured with a policy known as Catch All. Catch all redirects any address sent to a particular domain to a central box for manual inspection. Catch all configured servers cannot respond to requests for address verification. SmtpConnectionFailure The TCP connection to the target mail server failed. SmtpConnectionShutdown The target mail server prematurely terminated the connection. 16 Chapter 5. Status Codes

21 SmtpConnectionTimeout A timeout occurred whilst waiting for a connection to the target mail server. SmtpConnectionRefused The SMTP connection was refused by the remote server. This status code applies to all Office 365 mail server, stopping verification, as these mail servers all operate a catchall policy. Success Successful verification. 100% confidence that the mail box exists. TcpSocketUnavailable The TCP socket is unavailable for date exchange. TooManyAtSignsFound Too signs found in address. Only character is allowed in addresses. UnableToBindToLocalIpAddress Cannot bind local IP endpoint specified. UnexpectedQuotedPairSequence UnhandledException Transient service fault. Unknown The reason for the verification result is unknown. PossibleSpamTrapDetected A possible spam trap address or domain has been detected. Spam traps are addresses or domains deliberately placed on-line in order to capture and flag potential spam based operations. Our advanced detection heuristics are capable of detecting likely spam trap addresses or domains known to be associated with spam trap techniques. We do not recommend sending s to addresses identified as associated with known spam trap behaviour. Sending s to known spam traps or domains will result in your ESP being subjected to blocks from a DNS Block List.. An ESP cannot tolerate entries in a Block List (as it adversely affects deliver-ability for all customers) and will actively refuse to send s on behalf of customers with a history of generating entries in a Block List Verification Response Codes For Bulk Verification 17

22 18 Chapter 5. Status Codes

23 CHAPTER 6 Glossary 6.1 Glossary B2B Business To(2) Business Business hosting services are generally private, enterprise grade hosting services typically hosted in either private data centers or in cloud based infrastructure such. Business to business refers to the activity of businesses sending to clients using business addresses. B2C Business To(2) Consumer Consumer hosting providers are generally well known, mostly web based providers such as Hotmail, Yahoo, AOL, Gmail etc. Business to consumer refers to the activity of businesses sending to clients using consumer addresses. Verifying addresses in consumer domains is generally more technically challenging than B2B Block List See DNSBL. DDoS Distributed Denial of Service See Wikipedia - Denial-of-service attack for more information. DEA Disposable Address There are many services available that permit users to use a one-time only address. Typically, these addresses are used by individuals wishing to gain access to content or services requiring registration of addresses but same individuals not wishing to divulge their true identities (e.g. permanent addresses). DEA addresses should not be regarded as valid for send purposes as it is unlikely that messages sent to DEA addresses will ever be read. DEA addresses should not be regarded as valid for send purposes as it is unlikely that messages sent to DEA addresses will ever be read. DNS Domain Name System At its simplest level, DNS converts text based queries (e.g. a domain name) into IP addresses. DNS is also responsible for providing the MX records needed to locate a domains mail servers. See Wikipedia - Domain Name System for more information. DNSBL DNS Block List 19

24 As an anti-spam measure, mail servers can use spam black lists to look up the reputation of IP addresses and domains sending . If an IP or domain is on a block list, the mail server may reject the senders message. See Wikipedia - DNSBL for more information. ESP Service Provider A service that sends s on your behalf. See Wikipedia - service provider (marketing) for more information. Grey Listing A technique used in mail servers as an anti-spam technique. Sometimes also known as deferred, grey listing arbitrarily delays the delivery of s with a try again later response to the client sending the . MX See Wikipedia - Grey Listing for more information. Mail Exchanger The MX is a server responsible for interchange with a client. Office 365 Office 365 mail servers (e.g. x-com.mail.protection.outlook.com) are always configured with the catch all policy, accepting all s sent to the domain and redirecting them to a central box for manual inspection. Catch all configured servers cannot respond to requests for address verification. This does not affect our coverage of Hotmail, Live and Outlook mail boxes. Punycode Punycode is a way to represent Unicode with the limited character subset of ASCII supported by the Domain Name System. See Wikipedia - Punycode for more information. RESTful Representational state transfer SMTP See Wikipedia - RESTful for further information. Simple Mail Transport Protocol SMTP is a protocol. It is the sequence of commands and responses between a client (the software sending an ) and server (the software receiving an ) that facilitates the sending and receiving of between computer based messaging systems. Spam Trap Spam traps are addresses used for the sole purpose of detecting spamming activities. Spam traps are used by many block lists (DNSBL) to detect spammers. For more information, see Wikipedia - Spam Traps. 20 Chapter 6. Glossary

25 Index B B2B, 19 B2C, 19 Block List, 19 D DDoS, 19 DEA, 19 DNS, 19 DNSBL, 19 E ESP, 20 G Grey Listing, 20 M MX, 20 O Office 365, 20 P Punycode, 20 R RESTful, 20 S SMTP, 20 Spam Trap, 20 21

Implementing MDaemon as an Email Security Gateway to Exchange Server

Implementing MDaemon as an Email Security Gateway to Exchange Server Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend

More information

Swift Email Verifier API Client MANUAL

Swift Email Verifier API Client MANUAL Swift Email Verifier API Java Client- User Manual Swift Email Verifier API Client MANUAL Why use SEV API Client SEV API Client is a simple java tool which is highly optimized to validate and scrub emails

More information

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server. Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication

More information

Email. MIME is the protocol that was devised to allow non-ascii encoded content in an email and attached files to an email.

Email. MIME is the protocol that was devised to allow non-ascii encoded content in an email and attached files to an email. Email Basics: Email protocols were developed even before there was an Internet, at a time when no one was anticipating widespread use of digital graphics or even rich text format (fonts, colors, etc.),

More information

SMTPSWITCH MAILER V6 FEATURES

SMTPSWITCH MAILER V6 FEATURES SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor

More information

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107 A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that

More information

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Setting up and controlling E-mail

Setting up and controlling E-mail Setting up and controlling E-mail Two methods Web based PC based Setting up and controlling E-mail Web based the messages are on the Internet accessed by dial-up or broadband at your Internet Service Provider

More information

SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel

SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam...

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

HOW TO VALIDATE EMAILS THROUGH API USING ADVANCED EMAIL VERIFIER

HOW TO VALIDATE EMAILS THROUGH API USING ADVANCED EMAIL VERIFIER HOW TO VALIDATE EMAILS THROUGH API USING ADVANCED EMAIL VERIFIER Introduction Bpsocks.com has partnered with worldwide leader in email marketing and SEO applications vendor; Glocksoft.com to provide an

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

G-Lock WPNewsman WordPress Plugin Reviewer s Guide

G-Lock WPNewsman WordPress Plugin Reviewer s Guide G-Lock WPNewsman WordPress Plugin Reviewer s Guide 1 Table of Contents This document is your reviewer's guide for G-Lock WPNewsman WordPress Plugin. It is designed to provide you with information you need

More information

Email Reputation Metrics Troubleshooter. Share it!

Email Reputation Metrics Troubleshooter. Share it! Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Real Time Email Verification API Documentation

Real Time Email Verification API Documentation Real Time Email Verification API Documentation Release 1.0.17 email-checker.com February 27, 2016 Contents 1 Product Overview 3 1.1 Product Overview............................................ 3 2 Quick

More information

OpenProtocols Connector for Microsoft Outlook Version 2.00 ARPDev Pty. Ltd. Overview. Features. Requirements

OpenProtocols Connector for Microsoft Outlook Version 2.00 ARPDev Pty. Ltd. Overview. Features. Requirements OpenProtocols Connector for Microsoft Outlook Version 2.00 ARPDev Pty. Ltd Overview This guide describes the installation and functionality of the OpenProtocols for Microsoft Outlook. The OpenProtocols

More information

EFFECTIVE SPAM FILTERING WITH MDAEMON

EFFECTIVE SPAM FILTERING WITH MDAEMON EFFECTIVE SPAM FILTERING WITH MDAEMON Introduction The following guide provides a recommended method for increasing the overall effectiveness of MDaemon s spam filter to reduce the level of spam received

More information

Reputation Monitor User Guide

Reputation Monitor User Guide August 18, 2015 Return Path, Inc. Table of Contents What is Reputation Monitor... 3 How Reputation Monitor Works... 4 What is a Sender Score... 5 How is a Sender Score Calculated... 5 Reputation Measures

More information

TABLE OF CONTENTS. Creating an Account Why Use enewsletters. Setting Up an enewsletter Account. Create/Send Logging In.

TABLE OF CONTENTS. Creating an Account Why Use enewsletters. Setting Up an enewsletter Account. Create/Send Logging In. ENEWSLETTER GUIDE TABLE OF CONTENTS Creating an Account Why Use enewsletters Setting Up an enewsletter Account 3 3 Create/Send Logging In Saved Drafts Creating a New Campaign Adding Content to a New Campaign

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

INinbox Start-up Pack

INinbox Start-up Pack 2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Spreading the Word: Raising Awareness and Funds with Email. Presented by: Alec Stern, VP, Constant Contact

Spreading the Word: Raising Awareness and Funds with Email. Presented by: Alec Stern, VP, Constant Contact Spreading the Word: Raising Awareness and Funds with Email Presented by: Alec Stern, VP, Constant Contact Agenda Section 1: Email 101 Section 2: Getting Started Section 3: Getting Your Email Delivered

More information

BACKSCATTER PROTECTION AGENT Version 1.1 documentation

BACKSCATTER PROTECTION AGENT Version 1.1 documentation BACKSCATTER PROTECTION AGENT Version 1.1 documentation Revision 1.3 (for ORF version 5.0) Date June 3, 2012 INTRODUCTION What is backscatter? Backscatter (or reverse NDR ) attacks occur when a spammer

More information

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.

More information

TELSTRA BUSINESS BROADBAND GET YOUR BUSINESS IN THE FAST LANE

TELSTRA BUSINESS BROADBAND GET YOUR BUSINESS IN THE FAST LANE TELSTRA BUSINESS BROADBAND GET YOUR BUSINESS IN THE FAST LANE BROADBAND THAT S AS DEDICATED TO YOUR BUSINESS AS YOU ARE This guide will help you get your service up and running, make the most of various

More information

Secure File Transfer Help Guide

Secure File Transfer Help Guide Secure File Transfer Help Guide Establish a Secure File Transfer Account When a package is sent to your email address, you will receive an email from the sender that includes a link to instructions to

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

Email Quick-Start Guide

Email Quick-Start Guide For TradeMark Media s email system Thank you for choosing TradeMark Media for your email hosting. You ve made a wise choice. TradeMark Media offers comprehensive spam and virus protection, POP3 and WebMail

More information

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite Migrate from Exchange Public Folders to Business Productivity Online Standard Suite White Paper Microsoft Corporation Published: July 2009 Information in this document, including URL and other Internet

More information

City of Austell. Online Presentment and Payment Frequently Asked Questions

City of Austell. Online Presentment and Payment Frequently Asked Questions General What are some of the benefits of receiving my bill electronically? It is convenient, saves time, reduces errors, allows you to receive bills anywhere at any time and helps the environment by saving

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Advanced Settings. Help Documentation

Advanced Settings. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods

More information

5 tips to improve your email database. An Experian Data Quality white paper

5 tips to improve your email database. An Experian Data Quality white paper 5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers

More information

Simplicity Itself. User Guide

Simplicity Itself. User Guide Simplicity Itself User Guide TekEx 2013 Contents WELCOME... 3 TEKEX OVERVIEW... 3 DOWNLOAD OUTLOOK... 4 CONFIGURE OUTLOOK... 5 CONFIGURE MAC EMAIL CLIENT... 10 SMARTPHONE SETUP... 12 IPHONE SETUP... 12

More information

From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway

From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway This guide will assist you in going from the SPAMfighter SMTP Anti Spam Server to the SPAMfighter Mail Gateway. It is strongly advised

More information

Office 365 Exchange Online Protection Administration Guide

Office 365 Exchange Online Protection Administration Guide Chapter 10 Office 365 Exchange Online Protection Administration Guide Office 365 version 2013 is a suite of software products: Software as a Service (SaaS). Customers can purchase Office 365 in many ways,

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

If your response to any of the questions above was Yes, then SmarterMail Enterprise Edition may be right for you.

If your response to any of the questions above was Yes, then SmarterMail Enterprise Edition may be right for you. Professional Edition vs. Enterprise Edition SmarterMail Professional Edition has all of the features required to host a fully-functional mail server. SmarterMail Enterprise Edition offers additional features,

More information

Good Practice use of Outlook, Thunderbird and HORDE Webmail

Good Practice use of Outlook, Thunderbird and HORDE Webmail Midwest Data, Inc. Good Practice use of Outlook, Thunderbird and HORDE Webmail This document is merely suggested setups and usage that in MDI s experience works best. For any questions please e-mail [email protected].

More information

How To Ensure Your Email Is Delivered

How To Ensure Your Email Is Delivered Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making

More information

How to set up a multifunction device or application to send email using Office 365

How to set up a multifunction device or application to send email using Office 365 How to set up a multifunction device or application to send email using Office 365 Exchange Online 232 out of 424 rated this helpful Applies to: Exchange Online Topic Last Modified: 2015 10 14 You can

More information

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions Bitrix Site Manager 4.0 Quick Start Guide to Newsletters and Subscriptions Contents PREFACE...3 CONFIGURING THE MODULE...4 SETTING UP FOR MANUAL SENDING E-MAIL MESSAGES...6 Creating a newsletter...6 Providing

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection

More information

How to make the Emails you Send from Outlook 2010 appear to Originate from different Email Addresses

How to make the Emails you Send from Outlook 2010 appear to Originate from different Email Addresses How to make the Emails you Send from Outlook 2010 appear to Originate from different Email Addresses If you only use a single email address to send out all your business and personal emails then you're

More information

Before you think about sending another email campaign, it s time to spring clean your list of subscribers and make sure they re up to date.

Before you think about sending another email campaign, it s time to spring clean your list of subscribers and make sure they re up to date. with Maxmail What s Inside Before you think about sending another email campaign, it s time to spring clean your list of subscribers and make sure they re up to date. Cleaning your lists on a regular basis

More information

Email Getting Started Guide Unix Platform

Email Getting Started Guide Unix Platform Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses

More information

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...

More information

Basic E- mail Skills. Google s Gmail. www.netliteracy.org

Basic E- mail Skills. Google s Gmail. www.netliteracy.org Email it s convenient, free and easy. Today, it is the most rapidly growing means of communication. This is a basic introduction to email and we use a conversational non- technical style to explain how

More information

isecuremail User Guide for iphone

isecuremail User Guide for iphone isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide

SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide One of the typical usage cases for NowSMS is as an E-Mail to SMS & MMS Gateway. E-Mail users can send an SMS or MMS message by sending an e-mail

More information

Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account.

Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account. Factsheet 22 Student Email September 2011 This factsheet can be made available in alternative formats. Please make your request at the Library Help Desk, telephone 01642 342100 or email [email protected]

More information

Quick Start Policy Patrol Spam Filter 9

Quick Start Policy Patrol Spam Filter 9 Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

Live Agent for Support Agents

Live Agent for Support Agents Live Agent for Support Agents Salesforce, Spring 16 @salesforcedocs Last updated: February 18, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

A D M I N I S T R A T O R V 1. 0

A D M I N I S T R A T O R V 1. 0 A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA

More information

BULK MAIL CAMPAIGN RULES

BULK MAIL CAMPAIGN RULES BULK MAIL CAMPAIGN RULES No matter what you do, or how closely you follow the guidelines we provide, the issue of spam is an ever changing and always evolving problem it is estimated that more than 70%

More information

How to make a VPN connection to our servers from Windows 8

How to make a VPN connection to our servers from Windows 8 How to make a VPN connection to our servers from Windows 8 Windows 8 is able to make a newer type of VPN connection called a Secure Socket Tunnelling Protocol (SSTP) connection. This works just like a

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

Inbox Monitor User Guide

Inbox Monitor User Guide September 15, 2015 Return Path, Inc. Table of Contents What is Inbox Monitor?... 3 How Does Inbox Monitor Work... 4 Seed Data... 4 Subscriber Data... 4 Getting Started with the Seed List... 5 How to Import

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Administrator Functions How do I add a new employee to my organization? As an administrator, select Add User from the drop down option under the Administrator tab. If the new

More information

Customer admin guide. UC Management Centre

Customer admin guide. UC Management Centre Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

Email Marketing Do s and Don ts A Sprint Mail Whitepaper

Email Marketing Do s and Don ts A Sprint Mail Whitepaper Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations

More information

Instructions Microsoft Outlook Express Page 1

Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express This manual is written for users who already have an e-mail account configured in Outlook Express and will therefore

More information

Contents. Introduction. Creating a list. Growing your list. Managing unsubscribes. Handling spam complaints. Managing bounces

Contents. Introduction. Creating a list. Growing your list. Managing unsubscribes. Handling spam complaints. Managing bounces Managing your data Contents 01 02 03 04 05 06 07 08 09 10 11 Introduction Creating a list Growing your list Managing unsubscribes Handling spam complaints Managing bounces Dealing with Out of Office notifications

More information

2014-10-07. Email security

2014-10-07. Email security Email security Simple Mail Transfer Protocol First defined in RFC821 (1982), later updated in RFC 2821 (2001) and most recently in RFC5321 (Oct 2008) Communication involves two hosts SMTP Client SMTP Server

More information

Cannot send Autosupport e-mail, error message: Unknown User

Cannot send Autosupport e-mail, error message: Unknown User Cannot send Autosupport e-mail, error message: Unknown User Symptoms Unable to send Autosupport e-mails and the following error message is reported: asup.smtp.fail http://now.netapp.com/eservice/ems?emsaction=details&eventid=200573&software=ontap&em

More information

SMTP Status Codes & SMTP Error Codes Reference

SMTP Status Codes & SMTP Error Codes Reference & SMTP Error Codes Reference There comes a time in the life of a Computer Consultant where, one day, he/she will have to deal with email server problems. It is inevitable. Sometimes these problems will

More information

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook) MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE

More information

Exchange 2003 Standard Journaling Guide

Exchange 2003 Standard Journaling Guide Exchange 2003 Standard Journaling Guide Websense Email Security Solutions v7.3 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary

More information

EVENT LOG MANAGEMENT...

EVENT LOG MANAGEMENT... Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6

More information

Internet Technologies Internet Protocols and Services

Internet Technologies Internet Protocols and Services QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department [email protected] http://ce.qu.edu.az/~aadamov

More information

Quick Start Policy Patrol Spam Filter 5

Quick Start Policy Patrol Spam Filter 5 Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

NYSeMail Office 365 Administration Guide for Agencies

NYSeMail Office 365 Administration Guide for Agencies NYSeMail Office 365 Administration Guide for Agencies Office 365 Overview... 34 What is included... 34 Software Requirements... 34 Message Limits... 34 Provisioning... 34 Archive and Retention Policy...

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

Transferring Your Internet Services

Transferring Your Internet Services Page 1 of 6 Transferring Your Internet Services Below you will find the instructions necessary to move your web hosting, email, and DNS services to NuVox. The Basics Transferring your domain name Preparing

More information

XGENPLUS SECURITY FEATURES...

XGENPLUS SECURITY FEATURES... Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...

More information

Quick Start Policy Patrol Mail Security 9

Quick Start Policy Patrol Mail Security 9 Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and

Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide Rev: 2013-02-01 Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide A practical guide to creating and managing web

More information

Invoice Cloud Frequently Asked Questions

Invoice Cloud Frequently Asked Questions Invoice Cloud Frequently Asked Questions The Town of Salem works with a third party vendor, Invoice Cloud, to provide online bill pay services for property tax and utility bills. General What are the benefits

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information