Proxmox Mail Gateway Deployment Guide

Size: px
Start display at page:

Download "Proxmox Mail Gateway Deployment Guide"

Transcription

1 Proxmox Mail Gateway Deployment Guide 8/22/2014 MailGatewayDeploymentGuide-V2.0.docx

2 Proxmox Server Solutions GmbH reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the latest version of this document, which is available from NOTE: All prices are one year subscription licenses. After expiration, flow continues but Spam- and AV checks are not working anymore (Exception: ClamAV will continue working). All other product or company names different from Proxmox may be trademarks or registered trademarks of their owners. Copyright 2012 Proxmox Server Solutions GmbH. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Proxmox Proxmox Server Solutions GmbH 2 38

3 Table of Contents 1 Introduction Proxmox Mail Gateway Integration system without Proxmox Mail Gateway system with Proxmox Mail Gateway Proxmox Mail Gateway in the Intranet Default port settings Alternative port settings (e.g. for MS Exchange) Proxmox Mail Gateway in DMZ (demilitarized zone) Proxmox Mail Gateway with multiple server and domains Performance Tuning Hardware benchmarks Backup MX Blocking s on SMTP level Greylisting Sender Policy Framework SPF Real time Blacklists (RBL) Receiver Verification Proxmox Mail Gateway Solutions Enabling Verify Receivers Settings for MS Exchange 2003 SP Settings for MS Exchange 2007 SP1 (and higher version) Rule System Default Rules Blacklist Block Viruses Virus Alert Block Dangerous Files Modify Header Whitelist Quarantine/Mark Spam (Level 3) Custom Rules Enable Spam quarantine for just a selection of users Enable Spam quarantine for existing LDAP users Block Spam s with a score higher BCC object An simple archive solution Block Video and Audio Attachments Add Admin Notification to Rules Block Video and Audio Attachments for LDAP Groups Proxmox Mail Gateway HA Cluster High availability Load Balancing with MX Records Multiple Address Records Using third party Firewall features Hardware selection and Virtualization Physical Hardware Proxmox VE VMware Troubleshooting and technical support Table of figures Appendix Proxmox Server Solutions GmbH 3 38

4 1 Introduction The huge amount of traffic is a challenge for every environment. The daily routine brings along some major problems, this includes: performance, reliability, regulation under public law and threads like viruses or phishing attacks. is an essential service for any organization, and professionally managed improves organizational workflow and customer satisfaction. A missed could mean a lost opportunity, or it could cause a public-relations problem that no organization would want. How does the Proxmox Mail Gateway work? When an arrives at the Proxmox Mail Gateway, it is analyzed and forwarded to your server which is responsible for sending the to the receiver. If the e- mail server is not working, Proxmox Mail Gateway temporarily stores the message in the queue for later transfer. The process works similar for outgoing s. This document covers samples and deployment information how to integrate and customize Proxmox in your environment. Note: See also the Proxmox Mail Gateway Administration Guide for a detailed product description Proxmox Server Solutions GmbH 4 38

5 2 Proxmox Mail Gateway Integration 2.1 system without Proxmox Mail Gateway In a sample configuration, your traffic (SMTP) arrives on the firewall and will be forwarded directly to your server. Figure 2-1 System without Proxmox Mail Gateway 2.2 system with Proxmox Mail Gateway A single Proxmox Mail Gateway Server can handle unlimited mail domains with multiple internal mail servers and millions of s per day. For high availability and maximum performance it is recommended to use a Proxmox Mail Gateway HA Cluster, see chapter 5 Proxmox Mail Gateway HA Cluster High availability. Proxmox Mail Gateway can process incoming AND outgoing SMTP traffic by using different ports. One port is assigned to incoming, one port for outgoing s. With the integrated Proxmox Mail Gateway system all your traffic is forwarded to the Proxmox Mail Gateway which filters the whole traffic and removes unwanted s. You can manage incoming and outgoing traffic. Figure 2-2 Incoming with Proxmox Mail Gateway Proxmox Server Solutions GmbH 5 38

6 Many mail filter solutions do not scan outgoing mails. Opposed to that Proxmox Mail Gateway is designed to scan both incoming and outgoing mails. This has two major advantages: Figure 2-3 Outgoing with Proxmox Mail Gateway 1. Proxmox Mail Gateway is able to detect viruses sent from an internal host. I many countries you are liable for not sending viruses to other people. Proxmox Mail Gateway outgoing scanning feature is an additional protection to avoid that. 2. Proxmox Mail Gateway can gather statistics about outgoing s too. Statistics about incoming s looks nice, but they are quite useless. Consider two users, user-1 receives 10 mails from news portals and wrote 1 mail to a person you never heard from. While user-2 receiver 5 mails from a customer and sent 5 mails back. Which user do you consider more active? I am sure its user-2, because he communicates with your customers. Proxmox Mail Gateway advanced address statistics can show you this important information. Solution which does not scan outgoing mail can t do that Proxmox Server Solutions GmbH 6 38

7 2.3 Proxmox Mail Gateway in the Intranet Default port settings The default configuration of the Proxmox Mail Gateway uses port 25 for incoming and port 26 for outgoing s. Figure 2-4 Incoming default port settings (port 25) Outgoing Mails: Configure your mail server to send all s to the Proxmox Mail Gateway, port 26. Note: Proxmox Mail Gateway receives the outgoing s on port 26, so Proxmox Mail Gateway knows its internal trusted . After processing, Proxmox Mail Gateway sends the s to Internet, using standard port Figure 2-5 Outgoing default port settings (port 26) Alternative port settings (e.g. for MS Exchange) Sometimes it is not possible to change the outgoing port due to third party software limitations or existing network configurations (e.g. changing MS Exchange to another sending port will have impact on Exchange internals and it s not recommend) To receive s you have to do port forwarding at your Firewall. So that you re external IP and port 25 shows to the Proxmox Mail Gateway IP and port Proxmox Server Solutions GmbH 7 38

8 Figure 2-6 Incoming alternative port settings (port 26) With MS Exchange you should not use port 26 for outgoing so you have to switch these two values (25 and 26). In the end you have to use port 25 for outgoing and port 26 for incoming mails. Figure 2-7 Outgoing alternative port settings (port 25) Proxmox Server Solutions GmbH 8 38

9 2.4 Proxmox Mail Gateway in DMZ (demilitarized zone) To run a DMZ Zone you have to adjust your Firewall settings. The intranet (Local) and DMZ needs to have different IP Networks, for example: Interface Zone IP Address Net mask eth0 Local eth1 Internet eth2 DMZ Figure 2-8 Proxmox Mail Gateway in DMZ Proxmox Server Solutions GmbH 9 38

10 2.5 Proxmox Mail Gateway with multiple server and e- mail domains You can use Proxmox Mail Gateway sending s to different internal servers. For example you can send s addressed to domain.com to your first server, and s addressed to subdomain.domain.com to a second one. In the proxy transport section add the IP addresses or hostname, SMTP ports and mail domains of your additional servers. Figure 2-9 Multiple servers Note: you need for each domain an appropriate license, otherwise it will not work! Proxmox Server Solutions GmbH 10 38

11 3 Performance Tuning 3.1 Hardware benchmarks Please use the command line tool proxperf to get an overview about your hardware and DNS performance. Note: Never run proxperf if the system is under load. Here is a sample output of proxperf : root@proxmox:~# proxperf CPU BOGOMIPS: REGEX/SECOND: HD SIZE: GB (/dev/vda2) BUFFERED READS: MB/sec AVERAGE SEEK TIME: 0.47 ms FSYNCS/SECOND: DNS EXT: ms DNS INT: 3.70 ms (maurer-it.com) DNSBL: ms (black.rbl.commtouch.local) root@proxmox:~# Please compare your results against this reference. If you get lower results please analyze your hardware and DNS setup for comments your results to support@proxmox.com. 3.2 Backup MX Using your ISPs server is not a good idea, because many ISPs do not use advanced spam prevention techniques. And spammers know this and they use your ISP backup MX to work around your Proxmox Mail Gateway spam filtering. Additionally, you can never benefit of blocking spam messages on SMTP level. If you need redundancy, it is recommended to run a second Proxmox Mail Gateway server in HA Cluster mode to avoid lower spam detection rates. 3.3 Blocking s on SMTP level Blocking s before they reach your network saves your internet bandwidth and reduces processing power. By doing the following, you can reduce your traffic by more than 90 %, depends on your environment. If you want to exclude some senders or receivers from getting blocked on the SMTP level, just enter them in the Mail proxy whitelist Proxmox Server Solutions GmbH 11 38

12 Figure 3-1 Mail proxy whitelist Greylisting Typically, a server that utilizes Greylisting will record the following three pieces of information (referred to as triplet) for all incoming . The IP address of the connecting host The envelope sender address The envelope recipient address The client is checked against the mail server's internal whitelists (if any) first. Then, if the triplet has never been seen before, it is greylisted for a period of time (how much time is dependent on the server configuration). The is rejected with a temporary error. The assumption is that since temporary failures are built into the RFC specifications for delivery, a legitimate server will attempt to connect again later on to deliver the . Greylisting is effective because many mass tools utilized by spammers are not set up to handle temporary failures (or any failures for that matter) so the Spam is never received. This feature can reduce traffic up to 50%. Greylisted s never reach your mail server and your mail server will stop sending useless "Non Delivery Reports" to spammers, filling up the queue. If a sender has a valid SPF record, he will never be greylisted Sender Policy Framework SPF Domains use public records (DNS) to direct requests for different services (web, , etc.) to the machines that perform those services. All domains already publish (MX) records to tell the world what machines receive for the domain. SPF works by domains publishing "reverse MX" records to tell the world what machines send e- mail for the domain. When receiving a message from a domain, the recipient can check those records to make sure is coming from where it should be coming from. Please make sure, that you deploy a valid SPF record for your mail domain. Note: see for setting up a SPF for your mail domain Proxmox Server Solutions GmbH 12 38

13 3.3.3 Real time Blacklists (RBL) Proxmox Mail Gateway can use RBL checks on SMTP level to reject s. Therefore Proxmox Mail Gateway has to query the RBL server for every SMTP connection. Proxmox use the following RBL providers by default: Commtouch RPD and GlobalView Figure 3-2 Enable RBL checks Proxmox Server Solutions GmbH 13 38

14 3.3.4 Receiver Verification Nowadays, domains are receiving a lot of s to non-existing users. This could be up to 95 % of junk messages. In short, this means for your systems: Increased traffic on your internet connection Your server is handling junk s instead of working for you High load on your scanners Slow overall performance and high costs Proxmox Mail Gateway Solutions Proxmox Mail Gateway can detect these s to non-existing users on SMTP level, which means BEFORE the s are transferred to your networks. In short, this means for your systems: Reduced traffic, up to 90 % Your internal server is now working for you again Reduced load on your scanners, 90 % less s to analyze for spam and viruses Good performance and costs Proxmox Server Solutions GmbH 14 38

15 Enabling Verify Receivers You can enable this option on the admin interface (Configuration/Mail Proxy/Options) We recommend selecting yes (450). 450 means, that in the case of a short downtime of your internal mail server no messages are lost. Note: Your internal server has to be reconfigured to reject unknown user. Proxmox Mail Gateway is doing a short query to the internal server to check if the user is valid. For settings on Exchange 2003 SP2, see chapter Settings for MS Exchange 2003 SP2 Figure 3-3 Enable Verify Receivers Proxmox Server Solutions GmbH 15 38

16 Settings for MS Exchange 2003 SP2 You have to enable Recipient Filtering, please use the Exchange System Manager. Figure 3-4 Exchange 2003: Filter recipients Proxmox Server Solutions GmbH 16 38

17 Figure 3-5 Exchange 2003: Filter recipients Proxmox Server Solutions GmbH 17 38

18 Figure 3-6 Exchange 2003: Filter recipients 3 Figure 3-7 Exchange 2003: Filter recipients Proxmox Server Solutions GmbH 18 38

19 Settings for MS Exchange 2007 SP1 (and higher version) First, make sure that you have the MS Exchange 2007 Anti-Spam agent. If you installed a typical one server installation, this is NOT installed by default. Microsoft provides an install script to manually install the Anti-Spam agent: 1. Open the Exchange Management Shell 2. cd c:\program files\microsoft\exchange Server\Scripts 3..\install-AntispamAgents 4. Restart the Microsoft Exchange Transport service Figure 3-8 MS Exchange 2007 SP1: Install Anti-Spam agent Now you can enable Recipient Filtering on the Anti-Spam agent, please use the MS Exchange Management Console. Figure 3-9 MS Exchange 2007 SP1: Filter recipients Proxmox Server Solutions GmbH 19 38

20 Figure 3-10 MS Exchange 2007 SP1: Filter recipients 2 4 Rule System The object-oriented rule system enables custom rules for your domains. It s an easy but very powerful way to define filter rules by user, domains, time frame, content type and resulting action. Who - object For TO and/or FROM Category Example: Mail object - Who is the sender or receiver of the ? When - object Example: When is the received by Proxmox Mail Gateway? What - object Example: Does the contain spam? Action - object Example: Mark with "SPAM:" in the subject. Every rule has got 5 categories (FROM, TO, WHEN, WHAT, ACTION) which can contain several objects. For example enable Archive Solutions with BCC Object (Blind carbon copy, recipients not visible in the "To" field) to Mailbox or to a Public Folder FROM: Anybody TO: Anybody WHEN: Always WHAT: Mail ACTION: BCC to Publicfolder In most of the countries worldwide a company has to forward all s to their employees this includes spam s as well. For example to send Spam s in quarantine Proxmox Server Solutions GmbH 20 38

21 FROM: Anybody TO: Anybody WHEN: Always WHAT: Spam ACTION: Quarantine With this kind of setup the receiver gets detailed Information about the Spam s. Quarantine can be enabled just for existing LDAP groups or via BCC to Public Folders or Mailboxes. At present the usefulness of is being threatened by three phenomena: spamming, phishing and worms. Spamming is unsolicited commercial . Because of the very low cost of sending e- mail, spammers can send hundreds of millions of messages each day over an inexpensive internet connection. Hundreds of active spammers sending this volume of mail results in information overload for many computer users who receive tens or even hundreds of junk messages each day. worms use as a way of replicating themselves into vulnerable computers. The combination of spam and worm programs results in users receiving a constant drizzle of junk , which reduces the usefulness of as a practical tool. To increase the efficiency of communications the use of anti-spam, anti-phishing and antivirus software is essential. With the deployment of Proxmox Mail Gateway you get the job done. Based on the design as software appliance one of the strengths of Proxmox Mail Gateway is its flexibility. It can be easy integrated in existing architecture. It s compatible to every type of mail server or MTA (e.g. MS Exchange, Lotus Domino, Postfix ). For example a virus protection looks like this: FROM: Anybody TO: Anybody WHEN: Always WHAT: Virus ACTION: Block (or Quarantine) Options range from simple spam and virus filter setups to sophisticated, highly customized configurations blocking certain types of s and generating notifications Proxmox Server Solutions GmbH 21 38

22 4.1 Default Rules Blacklist This rule blocks all s received from the senders listed in the Blacklist. The Blacklist can contain several items. (Please note, the term Blacklist is widely used in industry and it s not meant as racist.) Figure 4-1 Rule: Blacklist Figure 4-2 Who Object: Blacklist Block Viruses This rule quarantines all incoming virus and informs the admin via notification Proxmox Server Solutions GmbH 22 38

23 4.1.3 Virus Alert Figure 4-3 Rule: Block Viruses This rule blocks all outgoing virus and informs the admin and sender via notification. Figure 4-4 Rule: Virus Alert Block Dangerous Files This rule removes dangerous attachments from incoming s (.vbs,.bat,.com, ) Proxmox Server Solutions GmbH 23 38

24 4.1.5 Modify Header Figure 4-5 Rule: Block Dangerous Files This rule modifies header for all incoming e- . It just adds the results of the spam analysis, including the test names and the reached spam score. Figure 4-6 Rule: Modify Header Whitelist This rule accepts all s received from the senders listed in the Whitelist. The Whitelist can contain several items. (Please note, the term Whitelist is widely used in industry and it s not meant as racist.) Proxmox Server Solutions GmbH 24 38

25 Figure 4-7 Rule: Whitelist Figure 4-8 Who Object: Whitelist Quarantine/Mark Spam (Level 3) This rule identifies Spam with Level 3 and modifies the subject and move the e- mail to the spam quarantine Proxmox Server Solutions GmbH 25 38

26 Figure 4-9 Rule: Quarantine/Mark Spam (Level 3) Proxmox Server Solutions GmbH 26 38

27 4.2 Custom Rules Proxmox Mail Gateway provides samples for custom rules to show the functionality. For support or help configuring rules the Proxmox support forum at or submit a support request via the Proxmox Customer Portal at Enable Spam quarantine for just a selection of users If you want to use the spam quarantine for specific users or a specific domain (and for the rest just Mark Spam ), create a new WHO object containing these users or domains. 1. Create a new WHO object; give a name like Quarantine Users and add the users or domains to this object 2. Use the existing (inactive) rule Spam Quarantine and set higher priority than the Mark Spam rule (e.g. 81) 3. Add the WHO object Quarantine Users 4. Activate the rule Figure 4-10 Enable Spam quarantine for just a selection of users Enable Spam quarantine for existing LDAP users If you want to use the spam quarantine only for existing internal addresses, you can use the LDAP query Existing LDAP. 1. Create a new WHO object; give a name like Existing LDAP address and add the LDAP group Existing LDAP address 2. Use the existing (inactive) rule Spam Quarantine and set higher priority than the Mark Spam rule (e.g. 81) 3. Add the WHO object Existing LDAP address 4. Activate the rule Proxmox Server Solutions GmbH 27 38

28 Figure 4-11 Create WHO object Existing LDAP address Figure 4-12 Enable Spam quarantine for existing LDAP addresses Proxmox Server Solutions GmbH 28 38

29 4.2.3 Block Spam s with a score higher 10 The default rule moves Spam with a score higher 3 to the spam quarantine. By activating this additional rule, you can block Spam with a score higher 10 to reduce the delivery of spam s to the user spam quarantine Figure 4-13 Activate Block Spam (Level 10) BCC object An simple archive solution If you need to archive s it s useful to send a copy to a special mailbox. If you have Microsoft Exchange, you can also send a copy to a enabled public folder. 1. Create an Action Object: Add BCC Object, name it BCC to Archive Public folder or Mailbox 2. Under Receiver, type the address of the public folder/mailbox 3. Click on an already existing rule or create a new one 4. Add Action Object BCC to Archive Public folder or Mailbox to the rule How to create a Mail Enable Public Folder under MS Exchange 2000/2003? Create a public folder in MS Exchange (MS Exchange System Manager or via Outlook) 2. "Mail enable" the public folder via MS Exchange system manager right click an select Mail Enable 3. Wait a few minutes, MS Exchange creates the address 4. Right click the folder an check the address (or change it, if you want), remember address 5. Set appropriate client permission (note: anonymous must have the right to create items) 6. Optional: Set age limit: select Limits and set the age limit to 90 days (all messages older than 90 days will be automatically deleted) Block Video and Audio Attachments 1. Create a new rule, e.g. Block Multimedia Files, define direction and set priority 2. Add What Object Multimedia to the rule Proxmox Server Solutions GmbH 29 38

30 Add Action Object Block to the rule 4. Final review (still inactive) 5. Activate the rule Add Admin Notification to Rules If you block mails it s useful to inform the Proxmox Mail Gateway Admin. 1. Click on the desired rule 2. Add the notify Admin action to the rule Proxmox Server Solutions GmbH 30 38

31 4.2.7 Block Video and Audio Attachments for LDAP Groups The LDAP groups can be used to apply special settings to groups. Most people like sending joke videos and audio files via this grows up your users mailboxes. On the other side, you do not want to block these funny things for everybody. We assume you have a MS ADS group called Staff (including all your active users) Create a new WHO Object, give a name, e.g. Staff Add LDAP Group to the Object, select your LDAP Profile and select Staff from the dropdown menu, click save. Now you can test your object against addresses Add new rule, give a name, e.g. Block Multimedia for Staff, set priority to 70, set direction to in, click save Add the WHO object Staff from above to the rule (as to ) Add the WHAT Multimedia to the rule Add the ACTION object Remove Attachments Final review (still inactive) Activate the rule Note: Removed attachments from s are replaced with a text file. Figure 4-14 Block video and Audio attachment for LDAP group Staff Proxmox Server Solutions GmbH 31 38

32 5 Proxmox Mail Gateway HA Cluster High availability We are living in a world where becomes more and more important - failures in e- mail systems are just not acceptable. To meet these requirements we developed the Proxmox Mail Gateway HA (High Availability) Cluster. The Proxmox Mail Gateway HA Cluster consists of a master and several nodes (minimum one maser and one node). Configuration is done on the master. Configuration and data is synchronized to all cluster nodes over a VPN tunnel. This provides the following advantages: centralized configuration management fully redundant data storage high availability high performance Proxmox Mail Gateway uses a unique application level clustering scheme, which provides extremely good performance. Special considerations where taken to make management as easy as possible. Complete Cluster setup is done within minutes, and nodes automatically reintegrate after temporary failures without any operator interaction. Figure 5-1 Proxmox Mail Gateway HA Cluster with load balanced MX records Proxmox Server Solutions GmbH 32 38

33 5.1 Load Balancing with MX Records It s quite simple to set up a high performance load balanced mail cluster using MX records. You have to define two MX records with the same priority. You need to have 2 working Proxmox Mail Gateways (mail1.example.com and mail2.example.com), each having its own IP address (the rest of the setting should be more or less equal, i.e. you can use backup/restore to copy the rules). We recommend adding reverse lookup entries (PTR records) for those hosts. Many systems nowadays reject mails from hosts without valid PTR records. This is all you need. You will receive mails on both hosts, more or less load-balanced (round-robin scheduling). If one host fails the other is used. Figure 5-2 Load balancing via MX Records Proxmox Server Solutions GmbH 33 38

34 5.2 Multiple Address Records Using several DNS MX record is sometime clumsy if you have many domains. It is also possible to use one MX record per domain, but multiple address records: Figure 5-3 Load balancing Multiple Address Records 5.3 Using third party Firewall features Many firewalls can do some kind of RR-Scheduling (round-robin) when using DNAT. See your firewall manual for more details Proxmox Server Solutions GmbH 34 38

35 6 Hardware selection and Virtualization Proxmox Mail Gateway always needs a dedicated PC or server hardware. Alternative, Proxmox Mail Gateway can be run under the following virtualization technologies: Proxmox VE (recommended OpenVZ or KVM) Vmware vsphere (known to work very well, vmware tools are integrated in the ISO) Hyper-V (Hyper-V Linux integration tools are integrated in the ISO) KVM (virtio drivers are integrated, great performance) OpenVZ (great performance) Virtual box Citrix XenServer (Citrix xentool can be manually installed) 6.1 Physical Hardware See for hardware recommendation or contact us via the Proxmox Customer Portal at For maximum performance we recommend: Hard disks CPU RAM SAS Disk (15.000rpm) or SSD, Hardware Raid with battery backup and write cache enabled Two physical CPU with a lot of cores (e.g. Intel Xeon) 4 GB ECC 6.2 Proxmox VE The Proxmox Mail Gateway is available as a certified Virtual Appliance for Proxmox VE. For all details see VMware Proxmox Mail Gateway runs perfectly under VMware. Proxmox Mail Gateway 3 ISO installer includes vmware tools by default. Just install from ISO Proxmox Server Solutions GmbH 35 38

36 7 Troubleshooting and technical support Use the moderated Proxmox support forum or contact us via the Proxmox Customer Portal at All information: Proxmox Server Solutions GmbH 36 38

37 8 Table of figures Figure 2-1 System without Proxmox Mail Gateway... 5 Figure 2-2 Incoming with Proxmox Mail Gateway... 5 Figure 2-3 Outgoing with Proxmox Mail Gateway... 6 Figure 2-4 Incoming default port settings (port 25)... 7 Figure 2-5 Outgoing default port settings (port 26)... 7 Figure 2-6 Incoming alternative port settings (port 26)... 8 Figure 2-7 Outgoing alternative port settings (port 25)... 8 Figure 2-8 Proxmox Mail Gateway in DMZ... 9 Figure 2-9 Multiple servers...10 Figure 3-2 Mail proxy whitelist...12 Figure 3-3 Enable RBL checks...13 Figure 3-5 Enable Verify Receivers...15 Figure 3-6 Exchange 2003: Filter recipients Figure 3-7 Exchange 2003: Filter recipients Figure 3-8 Exchange 2003: Filter recipients Figure 3-9 Exchange 2003: Filter recipients Figure 3-10 MS Exchange 2007 SP1: Install Anti-Spam agent...19 Figure 3-11 MS Exchange 2007 SP1: Filter recipients Figure 3-12 MS Exchange 2007 SP1: Filter recipients Figure 4-1 Rule: Blacklist...22 Figure 4-1 Who Object: Blacklist...22 Figure 4-1 Rule: Block Viruses...23 Figure 4-2 Rule: Virus Alert...23 Figure 4-3 Rule: Block Dangerous Files...24 Figure 4-3 Rule: Modify Header...24 Figure 4-1 Rule: Whitelist...25 Figure 4-1 Who Object: Whitelist...25 Figure 4-4 Rule: Quarantine/Mark Spam (Level 3)...26 Figure 4-6 Enable Spam quarantine for just a selection of users...27 Figure 4-7 Create WHO object Existing LDAP address...28 Figure 4-8 Enable Spam quarantine for existing LDAP addresses...28 Figure 4-16 Activate Block Spam (Level 10)...29 Figure 4-18 Block video and Audio attachment for LDAP group Staff...31 Figure 5-1 Proxmox Mail Gateway HA Cluster with load balanced MX records..32 Figure 5-2 Load balancing via MX Records...33 Figure 5-3 Load balancing Multiple Address Records Proxmox Server Solutions GmbH 37 38

38 9 Appendix Reference document: Mail Gateway AdminGuide You can download the latest version from - End of document Proxmox Server Solutions GmbH 38 38

Proxmox Mail Gateway Deployment Guide

Proxmox Mail Gateway Deployment Guide Proxmox Mail Gateway Deployment Guide 5/21/2010 MailGatewayDeploymentGuide-V1.8.docx Proxmox Server Solutions GmbH reserves the right to make changes to this document and to the products described herein

More information

Proxmox Mail Gateway Administration Guide

Proxmox Mail Gateway Administration Guide Proxmox Mail Gateway Administration Guide 5/21/2010 MailGatewayAdminGuide-V3.1.doc Proxmox Server Solutions GmbH reserves the right to make changes to this document and to the products described herein

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

Deployment Guides. Help Documentation

Deployment Guides. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Deployment Guides SmarterMail in Individual and Micro-business

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Quick Start Policy Patrol Spam Filter 9

Quick Start Policy Patrol Spam Filter 9 Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

I N S T A L L A T I O N M A N U A L

I N S T A L L A T I O N M A N U A L I N S T A L L A T I O N M A N U A L 2015 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

CipherMail Gateway Quick Setup Guide

CipherMail Gateway Quick Setup Guide CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4

What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4 Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External

More information

Quick Start Policy Patrol Mail Security 9

Quick Start Policy Patrol Mail Security 9 Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in

More information

GFI Product Manual. Getting Started Guide

GFI Product Manual. Getting Started Guide GFI Product Manual Getting Started Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty

More information

Cloud Email Firewall. 1. Introduction. a. What is Spam?

Cloud Email Firewall. 1. Introduction. a. What is Spam? Cloud Email Firewall 1. Introduction a. What is Spam? Spam are messages which are unsolicited or sent from unknown senders. Usually they are sent in large quantities (even massive) and with commercial

More information

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12 Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but

More information

AntiSpam QuickStart Guide

AntiSpam QuickStart Guide IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...

More information

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4

More information

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011 Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation

More information

Quick Start Policy Patrol Spam Filter 5

Quick Start Policy Patrol Spam Filter 5 Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

WatchGuard XCSv Setup Guide

WatchGuard XCSv Setup Guide WatchGuard XCSv Setup Guide All XCSv Editions Copyright and Patent Information Copyright 2010 2013 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, LiveSecurity, and

More information

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product

More information

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12 Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties of any kind, either express or implied, including

More information

User Guide. ThreatTrack Security Product Manual

User Guide. ThreatTrack Security Product Manual User Guide ThreatTrack Security Product Manual Copyright 2014 ThreatTrack Security, Inc. All Rights Reserved. The legal rights, license, and warranties of the software product described herein are governed

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server. Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

Frequently Asked Questions

Frequently Asked Questions Questions and Answers Questions About Platform, Requirements, and Capabilities What is the difference between a SonicWALL Appliance and Software SonicWALL Email Security? The hardware version is a Linux

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

The Leading Email Security Suites

The Leading Email Security Suites The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server

More information

English Translation of SecurityGateway for Exchange/SMTP Servers

English Translation of SecurityGateway for Exchange/SMTP Servers Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose

More information

Barracuda Spam Firewall Administrator s Guide

Barracuda Spam Firewall Administrator s Guide Barracuda Spam Firewall Administrator s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license.

More information

Clearswift SECURE Exchange Gateway Installation & Setup Guide. Version 1.0

Clearswift SECURE Exchange Gateway Installation & Setup Guide. Version 1.0 Clearswift SECURE Exchange Gateway Installation & Setup Guide Version 1.0 Copyright Revision 1.0, December, 2013 Published by Clearswift Ltd. 1995 2013 Clearswift Ltd. All rights reserved. The materials

More information

1 Introduction 10 1.1 About this manual 10 1.2 Terms and conventions used in this manual 11

1 Introduction 10 1.1 About this manual 10 1.2 Terms and conventions used in this manual 11 Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but

More information

Web. Anti- Spam. Disk. Mail DNS. Server. Backup

Web. Anti- Spam. Disk. Mail DNS. Server. Backup Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves

More information

Avira Exchange Security Version 12. HowTo

Avira Exchange Security Version 12. HowTo Avira Exchange Security Version 12 HowTo Table of contents 1. General information... 3 2. System requirements... 3 3. Installation of Avira Exchange Security...4 4. Licensing... 5 5. Configuration of Email

More information

Configuring Your Gateman Email Server

Configuring Your Gateman Email Server Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

SonicWALL Email Security Appliance Administrator Guide

SonicWALL Email Security Appliance Administrator Guide SonicWALL Email Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number:

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Best Practices Revision A. McAfee Email Gateway 7.x Appliances

Best Practices Revision A. McAfee Email Gateway 7.x Appliances Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Email Security Series

Email Security Series Email Security Series Elegantly simple, brutally effective, always affordable anti-spam protection Email spam threatens the security and productivity of today s small and mid-size organizations. Spam attacks

More information

Avira Managed Email Security AMES FAQ. www.avira.com

Avira Managed Email Security AMES FAQ. www.avira.com Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change

More information

Chapter 6: ScanMail emanager

Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager

More information

PreciseMail Overview - The Email Threat

PreciseMail Overview - The Email Threat PreciseMail Overview - The Email Threat Spam, viruses, and other malware are a converging email threat that produce more sophisticated attacks which can result in significant damage to an organization

More information

Policy Patrol 7 Upgrade Guide

Policy Patrol 7 Upgrade Guide Policy Patrol 7 technical documentation September 4, 2012 www.policypatrol.com If you have Policy Patrol 4, 5 or 6 installed you can upgrade to version 7 and keep your existing configuration. Please follow

More information

GFI MailEssentials 12. Manual. By GFI Software

GFI MailEssentials 12. Manual. By GFI Software GFI MailEssentials 12 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

Email services. Anders Wiehe IT department Gjøvik University College

Email services. Anders Wiehe IT department Gjøvik University College Email services Anders Wiehe IT department Gjøvik University College Topics Lessons learnt Planning a new email system Lab: Basic configuration Lab: SMTP:Postfix configuration Lab: POP3/IMAP:Dovecot configuration

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Email Security 7.4 Administrator s Guide

Email Security 7.4 Administrator s Guide Email Security 7.4 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

Implementing MDaemon as an Email Security Gateway to Exchange Server

Implementing MDaemon as an Email Security Gateway to Exchange Server Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

GFI Product Manual. GFI MailEssentials Administrator Guide

GFI Product Manual. GFI MailEssentials Administrator Guide GFI Product Manual GFI MailEssentials Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Installing Policy Patrol with Lotus Domino

Installing Policy Patrol with Lotus Domino Policy Patrol 9 technical documentation May 21, 2013 If you have Lotus Domino R5/6/7/8/9 Mail Server, you must install Policy Patrol on a separate Windows 2003/2008/2012 machine and forward your mails

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

Best Practices Guide

Best Practices Guide Best Practices Guide ThreatTrack Security Product Manual Copyright 2014 ThreatTrack Security, Inc. All Rights Reserved. The legal rights, license, and warranties of the software product described herein

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0

Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0 Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start

More information

MailFoundry User Manual. Page 1 of 86. Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved. Page 1 of 86

MailFoundry User Manual. Page 1 of 86. Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved. Page 1 of 86 MailFoundry User Manual Page 1 of 86 MailFoundry User Manual Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved Page 1 of 86 Table of Contents MailFoundry User Manual Page 2 of 86 Chapter

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information

More information

KASPERSKY LAB. Kaspersky SMTP-Gateway 5.5 for Linux/Unix ADMINISTRATOR S GUIDE

KASPERSKY LAB. Kaspersky SMTP-Gateway 5.5 for Linux/Unix ADMINISTRATOR S GUIDE KASPERSKY LAB Kaspersky SMTP-Gateway 5.5 for Linux/Unix ADMINISTRATOR S GUIDE KASPERSKY SMTP-GATEWAY 5.5 FOR LINUX/UNIX Administrator s Guide Kaspersky Lab http://www.kaspersky.com Revision date: July

More information

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features Mail Services Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features Enterprise-class mail server High-performance Postfix SMTP services Scalable Cyrus IMAP and

More information

GETTING STARTED GUIDE Exclaimer Anti-spam

GETTING STARTED GUIDE Exclaimer Anti-spam GETTING STARTED GUIDE Exclaimer Anti-spam Getting Started Guide www.exclaimer.com Getting Started Guide - Anti-spam 01/30 Contents About This Guide...2 Anti-spam Overview...3 How does it Work?...3 What

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

How To Set Up A Barcuda Email Server On A Pc Or Mac Or Mac (For Free) With A Webmail Server (For A Limited Time) With An Ipad Or Ipad (For An Ipa) With The Ip

How To Set Up A Barcuda Email Server On A Pc Or Mac Or Mac (For Free) With A Webmail Server (For A Limited Time) With An Ipad Or Ipad (For An Ipa) With The Ip Version Barracuda Spam Firewall Administrator s Guide Barracuda Networks Inc. 385 Ravendale Drive Mountain View, CA 94043 http://www.barracudanetworks.com 1 Copyright Notice Copyright 2005, Barracuda Networks

More information

INLINE INGUARD E-MAIL GUARDIAN

INLINE INGUARD E-MAIL GUARDIAN INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine support@inline.com 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail

More information

Edge-based Virus Scanning

Edge-based Virus Scanning APPLICATION NOTE Edge-based Virus Scanning 658 Gibraltar Court Milpitas, CA 95035 Phone: 408-635-8400 Fax: 408-635-8470 www.servgate.com i Edge-based Virus Scanning APPLICATION NOTE All product names referenced

More information

AVG Email Server Edition

AVG Email Server Edition AVG Email Server Edition User Manual Document revision 2015.11 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Security. Help Documentation

Security. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with

More information

From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway

From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway This guide will assist you in going from the SPAMfighter SMTP Anti Spam Server to the SPAMfighter Mail Gateway. It is strongly advised

More information

IBM Lotus Protector for Mail Security. Administrator Guide. Version 2.8 Release 2.8.1 SC27-3829-01

IBM Lotus Protector for Mail Security. Administrator Guide. Version 2.8 Release 2.8.1 SC27-3829-01 IBM Lotus Protector for Mail Security Administrator Guide Version 2.8 Release 2.8.1 SC27-3829-01 Copyright statement Copyright IBM Corporation 2006, 2013. U.S. Government Users Restricted Rights Use, duplication

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

A D M I N I S T R A T O R V 1. 0

A D M I N I S T R A T O R V 1. 0 A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

If your response to any of the questions above was Yes, then SmarterMail Enterprise Edition may be right for you.

If your response to any of the questions above was Yes, then SmarterMail Enterprise Edition may be right for you. Professional Edition vs. Enterprise Edition SmarterMail Professional Edition has all of the features required to host a fully-functional mail server. SmarterMail Enterprise Edition offers additional features,

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide APPLICATION VERSION: 9.0 MAINTENANCE RELEASE 1 Dear User! Thank you for choosing our product. We hope that this document will

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Service Launch Guide (US Customer) SEG Filtering

Service Launch Guide (US Customer) SEG Filtering Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required

More information

Email Security 8.0 Administrator s Guide

Email Security 8.0 Administrator s Guide Email Security 8.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

DJIGZO EMAIL ENCRYPTION. Djigzo white paper

DJIGZO EMAIL ENCRYPTION. Djigzo white paper DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

White Paper X-Spam for Exchange 2000-2003 Server

White Paper X-Spam for Exchange 2000-2003 Server White Paper X-Spam for Exchange 2000-2003 Server X-Spam for Exchange 2000-2003 (X-Spam) is a highly adaptive Anti-Spam Software that protects the Microsoft Exchange 2000-2003 servers from Spam. X-Spam

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Purchase College Barracuda Anti-Spam Firewall User s Guide

Purchase College Barracuda Anti-Spam Firewall User s Guide Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to

More information

Load Balancing & High Availability

Load Balancing & High Availability Load Balancing & High Availability 0 Optimizing System Resources through Effective Load Balancing An IceWarp White Paper October 2008 www.icewarp.com 1 Background Every server is finite. Regardless of

More information