Configuring MDaemon for Centralized Spam Blocking and Filtering
|
|
|
- Silas Elvin Manning
- 10 years ago
- Views:
Transcription
1 Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX (817) July 26, 2004 Contents A Centralized Approach to Blocking and Filtering Spam 2 MDaemon AntiSpam Tools Overview 2 Spam Blocking Spam Filtering Content Filtering IMAP Public Folders Step-by-Step Instructions for Configuring MDaemon AntiSpam 7 Check Spam Blocker Create Public Folders Configure Spam Filter Create Content Filter for Collecting Spam Using the AntiSpam Configuration 26 Using the Public Folders for Spam Processing Administrator Instructions User Instructions IMAP Client Method WorldClient Method POP Attachment Method
2 Configuring MDaemon for Centralized Spam Control 2 A Centralized Approach to Blocking and Filtering Spam MDaemon PRO contains antispam tools capable of blocking 95% of spam, while allowing all legitimate messages to reach their destinations. This document describes one way to configure MDaemon PRO to fight spam using a centralized method. This configuration centralizes the collection and processing of spam. It routes all messages flagged as spam to an IMAP public folder. By reviewing the contents of this folder, an administrator can make sure messages are really spam before deleting them. In addition, this configuration distributes to authorized users the ability to identify spam and legitimate messages for the Bayesian filter. Users do this by copying spam messages and legitimate messages to IMAP public folders. The Bayesian filter processes these messages to learn the differences between junk mail and real mail, as defined by the users of each server. Both IMAP and POP account holders can add messages to these public folders. MDaemon AntiSpam Tools Overview These configuration instructions use these MDaemon tools: Spam Blocker Spam Filter Content Filter IMAP server public folders SPAM Spam Blocker Spam Filter Content Filter IMAP Public Folder (Administrator Review) Account Mail Box The instructions assume the Spam Blocker is enabled and using one or more realtime black lists. The Spam Filter and IMAP server are features of MDaemon PRO. They are not available with MDaemon Standard. While the IMAP server must be running, this configuration works for both POP and IMAP accounts. MDaemon must be in Advanced mode to configure the antispam tools. When MDaemon is in its Easy mode the antispam tools use MDaemon s intelligent defaults. You can change between the Easy and Advanced modes by using the File > Switch to... mode command. If the command reads Switch to easy mode you are already using Advanced mode. Spam Blocking The Spam Blocker uses publicly available black lists to control incoming sent from likely sources of spam. Several Internet organizations create and maintain these black lists in hopes of blocking
3 Configuring MDaemon for Centralized Spam Control 3 from both known and potential spammers. The goal is to pressure these sources into being better neighbors on the Internet. SPAM Spam Blocker When enabled, the Spam Blocker looks up the IP addresses of incoming in the black lists. The the IP addresses match, the messages can be flagged for the content filter, isolated or deleted. The inbound SMTP session can also be immediately terminated, refusing the . Spam Filtering Spam Filtering uses heuristic matching and Bayesian classification to intelligently detect and tag spam. SPAM Spam Blocker Spam Filter Heuristics employ pattern-matching technology to identify spam. Bayesian Filtering separates junk mail from legitimate mail by statistically comparing the words of incoming messages to the contents of previous s known to be either spam or non-spam. The Spam Filter includes white listed addresses, black listed addresses and addresses excluded from any
4 Configuring MDaemon for Centralized Spam Control 4 processing. Recent experience shows Bayesian filtering to be particularly effective at blocking spam while allowing legitimate mail through. Content Filtering Content filtering operates as a sieve and re-distribution system for MDaemon. It is one way to regulate the flow of messages in, through, and out of your server. SPAM Spam Blocker Spam Filter Content Filter Content filtering analyzes content by looking at headers, senders, recipients, subjects and the words in a message. Depending on the analysis, Content filtering can, for example: Delete a message. Redistribute a single to multiple addresses. Run a program. Copy a message to a public folder.
5 Configuring MDaemon for Centralized Spam Control 5 IMAP Public Folders IMAP public folders enable the sharing of and attachments. Message Access Protocol, also known as IMAP. They are part of the Internet SPAM Spam Blocker Spam Filter Content Filter IMAP Public Folder (Administrator Review) IMAP is an industry standard protocol for processing . An IMAP server stores and keeps messages for recurring user access. The IMAP account holder can read messages, move them into other folders on the server or copy them to shared folders for access by others, as examples. The account holder can access the same from any computer with an IMAP client. Because of this, the same is available at work, at home, from a wireless notebook computer on the road or from a web client at a computer cafe. For the purposes of antispam, public folders are useful for collecting spam messages. They are also useful for enabling users to identify spam and legitimate messages for the Bayesian filter.
6 Configuring MDaemon for Centralized Spam Control 6
7 Configuring MDaemon for Centralized Spam Control 7 Step-by-Step Instructions for Configuring MDaemon AntiSpam Check Spam Blocker The defaults for the Spam Blocker are very effective. The Spam Blocker is enabled in MDaemon by default. You should check to make sure the Spam Blocker is enabled. The instructions start on the main screen of the MDaemon administration user interface. 1. Use the Security > Spam blocker... command. This displays the Spam Blocker dialog.
8 Configuring MDaemon for Centralized Spam Control 8 2. Select the Spam Blocker tab. 3. Check the settings on this tab. The spam blocker engine should be enabled. The other settings should be those that fit the needs of your organization in most applications these are the defaults. The other tabs on this dialog are: RBL Hosts where you enter the Internet addresses of the black lists you want to use. Caching for use if you have a dialup server and want to store black list look up results off-line for a specified period of time. White List where you can enter the addresses you want to always exclude from black list processing. 4. Use the OK button to exit from the Spam Blocker dialog.
9 Configuring MDaemon for Centralized Spam Control 9 Create Public Folders These instructions show how to create public folders for: centralizing the collection of spam for administrative review. collecting learning samples of spam and legitimate messages submitted by users to the Bayesian filter. The instructions show how to create the folders and apply access permissions to the folders. You first create a root folder, then add sub folders for collecting spam and managing messages for the Bayesian filter learning samples. The instructions start on the main screen of the MDaemon administration user interface. 1. Use the Setup > Shared IMAP folders command. This displays the Shared IMAP Folders dialog.
10 Configuring MDaemon for Centralized Spam Control Activate the Enable public folders check box. 3. Enter a short prefix, such as # or PF- for Public folder prefix string 4. Use the Apply button. 5. Select the Public Folders tab. This tab is for adding, changing and deleting IMAP Public Folders. You manage access permissions to the public folders by using the Edit access control list button. (The Alt-N web site has a white paper Public Folders Concepts and Applications explaining IMAP Public Folders.)
11 Configuring MDaemon for Centralized Spam Control 11 One way to organize public folders is under a root folder named for a department or domain, for example. Sub folders of the root folder inherit the access permissions of the root. The access permissions can be edited for each sub folder. 6. Type the name of the root folder for Folder name (in this example Corvus Press) and use the Create button. 7. Select from the IMAP folders list the folder you just created and use the Edit access control list button.
12 Configuring MDaemon for Centralized Spam Control Select Default rights (anyone) from the list, uncheck all Access Rights and use the Replace button. This prevents global access to your folders. 9. Type (where yourdomain is your domain), activate the Lookup and Read Access Rights check boxes and use the Add button. This provides read access to the public folder for all MDaemon users in your domain.
13 Configuring MDaemon for Centralized Spam Control Use the OK button. This redisplays the Public Folders tab of the Shared IMAP Folders dialog. 11. Type name of the root folder/ Spam for Folder name (in this example Corvus Press/ Spam) and use the Create button. 12. Select from the IMAP folders list the folder you just created and use the Edit access control list button.
14 Configuring MDaemon for Centralized Spam Control Select from the Access rights list deactivate all Access Rights and use the Replace button. This removes access for everyone in the domain. 14. Select from the address list the address of the person to review the messages in this example) labeled as spam, activate the Lookup, Read and Delete access rights check boxes and use the Add button. This enables access for the person who reviews the messages. More than one person can be given this access. 15. Add any other users to the access list. 16. Use the OK button. This redisplays the Public Folders tab of the Shared IMAP Folders dialog.
15 Configuring MDaemon for Centralized Spam Control Add these two public folders to your domain: name of the root folder/real Mail name of the root folder/junk Mail These two folders are for users to identify spam and legitimate messages for the Bayesian filter. Users do this by copying spam messages and legitimate messages to the IMAP public folders. The Bayesian filter processes these messages to learn the differences between junk mail and real mail, as defined by the users of your server. Both IMAP and POP account holders can add messages to these public folders. POP account users can copy messages to these folders by mailing the messages as attachments to and For example, these addresses could be and 18. Select the Real Mail and Junk Mail folders in turn, then use the Edit access control list button
16 Configuring MDaemon for Centralized Spam Control Set these access permissions for both the Real Mail and Junk Mail folders: Default rights (anyone) <none> Lookup, Insert With these settings, general users (anyone) can add messages to the public folders cannot see the contents of the folders. your administrator Lookup, Read, Insert, Delete 20. Use the OK button. This redisplays the Public Folders tab of the Shared IMAP Folders dialog. 21. Use the OK button to exit from the Shared IMAP Folders dialog.
17 Configuring MDaemon for Centralized Spam Control 17 Configure Spam Filter These instructions show how to configure the Spam Filter, including general settings, Heuristic Filtering and Bayesian learning. The instructions start on the main screen of the MDaemon administration user interface. 1. Use the Security > Spam Filter... command. This displays the Spam Filter dialog.
18 Configuring MDaemon for Centralized Spam Control Select the Spam Filtering tab. 3. Choose the... flag the message but let it continue down the delivery path option. The other settings should be those that fit the needs of your organization in most applications these are the defaults. 4. Select the Heuristics tab. Heuristic filtering is enabled in MDaemon by default. 5. Check the settings on this tab. Enable heuristic message scoring system should be enabled. The other settings should be those that fit the needs of your organization in most applications these are the defaults.
19 Configuring MDaemon for Centralized Spam Control Select the Bayesian tab. 7. Activate all check boxes on this tab. 8. Use the Pub Folder button to select the spam Public Folder you created earlier. Using a Pub Folder button displays a Public Folders dialog. 9. Select the appropriate public folder for spam and use the OK button. 10. Repeat steps 8 and 9 for the non-spam Pub Folder button.
20 Configuring MDaemon for Centralized Spam Control Use the OK button to exit from the Spam Filter dialog.
21 Configuring MDaemon for Centralized Spam Control 21 Create Content Filter for Collecting Spam These instructions create a content filter for routing all messages flagged as spam into the public folder you created in step 11 on page 13. The instructions start on the main screen of the MDaemon administration user interface. 1. Use the Security > Content filter... command. This displays the Content Filter dialog. 2. Use the New rule button. This displays the Create Rule dialog.
22 Configuring MDaemon for Centralized Spam Control 22 The new rule processes local queue messages containing the X-Spam-Flag header. A message contains this header if MDaemon antispam has labeled it as spam. 3. Type Divert Potential Spam into the Give this rule a name box. 4. Scroll to and activate If the user defined 1 HEADER contains in the Select Conditions For This Rule box. 5. Scroll to and activate Move the message to a public folder... in the Select Actions For This Rule box.
23 Configuring MDaemon for Centralized Spam Control Click on Local & Remote in the Rule Description box of the Create Rule dialog. This displays a dialog for selecting local and remote queues. 7. Deactivate the Remote queue box. Keep the Local queue box active. Use the OK button. 8. Click on userdef1 in the Rule Description box of the Create Rule dialog. This displays a dialog for entering a user-defined header. 9. Type X-Spam-Flag into the User defined header box. Use the OK button.
24 Configuring MDaemon for Centralized Spam Control Click on contains specific strings in the Rule Description box of the Create Rule dialog. This displays a Specify Search text dialog for specifying the string. 11. Click on contains... in the dialog. This displays an Options dialog for selecting content options. 12. Select Exists from the drop down list. 13. Use the OK button on the Options dialog. Use the OK button on the Specify Search text dialog.
25 Configuring MDaemon for Centralized Spam Control Click on specify information in the Rule Description box of the Create Rule dialog. This displays a Move to Public Folders... dialog. 15. Select the public folder you created in step 11 on page 13. This is the public folder for centralizing the collection of spam for administrative review. 16. Use the >> button to choose the selected folder. 17. Use the OK button on the Move to Public Folders... dialog. 18. Use the OK button on the Create Rule dialog. 19. Use the OK button to exit from the Content Filter.
26 Configuring MDaemon for Centralized Spam Control 26 Using the AntiSpam Configuration Using the Public Folders for Spam Processing From the administrator and user points of view, MDaemon has two public folders for processing spam. Both of these were created in step 17 on page 15. Junk Mail This folder is for spam messages not identified as spam by the antispam tools. When a message is placed in this folder it is processed by Bayesian learning. In this way the next similar message received will be labeled as spam. Real Mail This folder is for legitimate messages falsely identified as spam by the antispam tools. When a message is placed in this folder it is processed by Bayesian learning. In this way the next similar message received will be passed to its recipient and not labeled as spam. In addition, the administrator has a third spam-related public folder: Spam. This folder is for messages identified as spam by the antispam tools and routed to the folder by the content filter rule.
27 Configuring MDaemon for Centralized Spam Control 27 Administrator Instructions Using an IMAP client, the administrator checks all messages routed to the Spam folder. The main purpose is to find messages marked incorrectly as spam. When such a wrongly-marked message is found, the administrator should: 1. Copy the message to the Real Mail folder. 2. Forward the message to the original recipient. These functions can be carried out by using an IMAP client and subscribing to the three public folders used for processing spam. For example, the administrator can drag and drop mis-labeled messages into the Real Mail folder. The administrator can also do these functions using WorldClient as shown on the next page.
28 Configuring MDaemon for Centralized Spam Control 28
29 Configuring MDaemon for Centralized Spam Control 29 User Instructions Users can help define spam and legitimate for a site by copying messages of both types to the Junk Mail and Real Mail folders, respectively. Note: Because of the type of permissions assigned to these folders for anyone@yourdomain, users can drag and drop messages into the spam processing public folders but cannot view the contents of the folders. By defining both types of messages, the users help the Bayesian filter do a better job of separating junk mail from real mail. Users can copy messages to the spam processing public folders by using any of three methods: 1. IMAP client 2. WorldClient webmail 3. attachments sent to the public folders from a POP account IMAP Client Method With this method, the user has an IMAP account. Many enterprises are now deploying IMAP because of the obvious convenience factors of having your always available online and sharing messages online. Using an IMAP client, the account holder can just copy spam and real mail to their respective public folders. WorldClient Method In terms of helping define spam and real mail, WorldClient operates similarly to an IMAP client.
30 Configuring MDaemon for Centralized Spam Control 30 The account holder selects the messages and copies them to the corresponding public folder. POP Attachment Method Note: SMTP authentication must be enabled for this method to prevent abuse of the SpamLearn and HamLearn addresses. You enable SMTP authentication by using the Security > IP Shielding / AUTH / POP Before SMTP... command. The default settings work well. On servers with POP accounts only, users can spam and real mail to: SpamLearn@yourdomain for spam HamLearn@yourdomain for real mail The messages must be sent as attachments of the type message/rfc822. MDaemon rejects all other types of messages sent to these accounts.
31 Configuring MDaemon for Centralized Spam Control 31 Note: You can change the addresses MDaemon uses by editing these lines the CFILTER.INI file: [SpamFilter] The last character of these must
EFFECTIVE SPAM FILTERING WITH MDAEMON
EFFECTIVE SPAM FILTERING WITH MDAEMON Introduction The following guide provides a recommended method for increasing the overall effectiveness of MDaemon s spam filter to reduce the level of spam received
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
Email Gateways Using MDaemon 6.0
Email Gateways Using MDaemon 6.0 Alt-N Technologies, Ltd 1179 Corporate Drive West, #103 Arlington, TX 76006 Tel: (817) 652-0204 2002 Alt-N Technologies. All rights reserved. Product and company names
Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow
Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
IMF Tune Opens Exchange to Any Anti-Spam Filter
Page 1 of 8 IMF Tune Opens Exchange to Any Anti-Spam Filter September 23, 2005 10 th July 2007 Update Include updates for configuration steps in IMF Tune v3.0. IMF Tune enables any anti-spam filter to
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
Anti-Spam Configuration in Outlook 2003 INDEX. Webmail settings Page 2. Client settings Page 6. Creation date 12.12.06 Version 1.2
Anti-Spam Configuration in Outlook 2003 INDEX Webmail settings Page 2 Client settings Page 6 Creation date 12.12.06 Version 1.2 Webmail settings In this section, you will learn how to activate and configure
Oakland County Webmail Anti-Spam Setup
Webmail Anti-Spam is a tool that allows you to filter junk mail (Spam) from your inbox. Once the Anti-Spam control is turned on, most junk mail will be redirected to a Junk Mail folder. Please note that
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Setup Guide for Exchange Server
Setup Guide for Exchange Server Table of Contents Overview... 1 A. Exchange Server 2007/2010 Inbound Mail... 2 B. Exchange Server 2007/2010 Outbound Mail (optional)... 8 C. Exchange Server 2003/2000 Inbound
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
Configuring Outlook 2013 For IMAP Connections
Configuring Outlook 2013 For IMAP Connections VERSION 1.0 1 P a g e U A C o n n e c t C o n f i g u r i n g O u t l o o k 2013 f o r I M A P 12/2013 Configuring Outlook 2013 for IMAP Connections Overview
Install and Configure RelayFax
RelayFax Network Fax Manager How To Quick Start Guide Install and Configure RelayFax Welcome to RelayFax Network Fax Manager. This guide is designed to help you quickly install and start using your RelayFax.
**Web mail users: Web mail provides you with the ability to access your email via a browser using a "Hotmail-like" or "Outlook 2003 like" interface.
Welcome to NetWest s new and improved email services; where we give you the power to manage your email. Please take a moment to read the following information about the new services available to you. NetWest
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
Configuration Guide for Exchange 2003, 2007 and 2010
Configuration Guide for Exchange 2003, 2007 and 2010 Table of Contents Exchange 2013... 2 Configuring Outbound Smart Host... 2 Configure Access Restriction to Prevent DoS Attacks... 2 Exchange 2007/2010...
Plesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
Protect Outbound Mail with DMARC
MDaemon Messaging Server How To Quick Start Guide Protect Outbound Mail with DMARC To protect outbound mail from your domain, you will need to create a DMARC record for your domain. We recommend carefully
Using MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
Quick Start Policy Patrol Spam Filter 9
Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
IceWarp Outlook Connector 4 User Guide
IceWarp Unified Communications IceWarp Outlook Connector 4 User Guide Version 10.3 Printed on 23 February, 2011 Contents IceWarp Outlook Connector 4 1 Installing IceWarp Connector... 2 Pre-Installation
Email Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
Outlook Connector. Version 2 User Manual. client-side plugin. Collaborate Using Outlook. Version 2.0.0
Outlook Connector client-side plugin Collaborate Using Outlook Version 2 User Manual Version 2.0.0 2003-2005 Alt-N Technologies. All rights reserved. MDaemon, WorldClient, and RelayFax are registered trademarks
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
Parallels Plesk Control Panel
Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
Using MDaemon AntiSpam for Spam Control
Using MDaemon AntiSpam for Spam Control Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 Tel: (817) 525-2005 2003 Alt-N Technologies. All rights reserved. SPAM is a trademark
Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.
Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved
Using WinGate 6 Email. Concepts, Features, and Configurations.
WinGate Feature Guide Using WinGate 6 Email Concepts, Features, and Configurations. Neil Gooden Qbik New Zealand Limited Rev 1.0 December 2004 2 Introduction...3 Basic Email Concepts... 3 Differences in
How to Use Red Condor Spam Filtering
What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in
Quick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
10 Step 2 System Service Setup. 11 Step 3 RelayFax Server Setup. 11 Step 4 Company Name and CSID String. 12 Step 5 Fax and Voice Number
Contents Before you Begin 2 RelayFax Server Setup RelayFax Desktop SMTP Client Setup Step 1 Begin Install 3 Step 1 Install RelayFax Desktop SMTP Client 10 Step 2 System Service Setup 4 Step 2 RelayFax
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Mail and Address Book Management
Mail and Address Book Management How you manage your mail depends in part on how it is being delivered to your Inbox. The following definitions of IMAP and POP will help you better understand where your
Managing Junk Mail. About the Junk Mail Filter
Managing Junk Mail Outlook can filter out certain types of messages and send them to a separate folder to keep your Inbox from being cluttered with junk mail. Outlook can also disable links in suspicious
DomainKeys Identified Mail DKIM authenticates senders, message content
DomainKeys Identified Mail DKIM authenticates senders, message content Alt-N Technologies, Ltd. 2201 East Lamar Blvd, Suite 270 Arlington, Texas 76006 Phone: (817) 525-2005 Fax: (817) 525-2019 http://www.altn.com/
Quick Start Policy Patrol Mail Security 9
Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.
Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication
Web Hosting Getting Started Guide
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
Plesk 7.6 For Windows E-mail User Guide
SWsoft, Inc. Plesk 7.6 For Windows E-mail User Guide (Revision 1.0) (c) 1999-2006 ISBN: N/A SWsoft, Inc. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703)
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Guide to Pro Spam Remove
Guide to Pro Spam Remove 1) SUMMARY 2) BASIC INSTRUCTIONS 3) CONFIGURATION 4) FILTER 5) E-MAIL ARCHIVE 6) FINAL NOTES 1) SUMMARY Pro Spam Remove is a software product that locks out all the spam received
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
About junk e-mail protection
About junk e-mail protection Entourage 2008 Junk E-Mail Protection Entourage has a built-in junk mail filter that helps separate junk e-mail also called spam from legitimate messages. By default, the level
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
MailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
Content Filtering With MDaemon 6.0
Content Filtering With MDaemon 6.0 Alt-N Technologies, Ltd 1179 Corporate Drive West, #103 Arlington, TX 76006 Tel: (817) 652-0204 2002 Alt-N Technologies. All rights reserved. Product and company names
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
Outlook Web App OWA Quick Guide. Getting you up to speed quickly.
Outlook Web App OWA Quick Guide Getting you up to speed quickly. Information Services 8-1-2014 Contents Exploring the OWA (Outlook Web App) User Interface... 2 Getting Started... 2 Mail... 6 Creating and
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
Grapevine Mail User Guide
Grapevine Mail User Guide Table of Contents Accessing Grapevine Mail...2 How to access the Mail portal... 2 How to login... 2 Grapevine Mail user guide... 5 Copying your contacts to the new Grapevine Mail
MS Outlook 2002/2003. V1.0 BullsEye Telecom Email
IMAP Settings Manual Our application allows you to access your email in many different ways. For those of you who do not wish to use the Webmail interface, you may also manage your email and custom folder
How To Filter Spam With Thunderbird On A Pc Or Macintosh (Sailor) On A Macintosh Or Macbook) On Pc Or Ipa (Macintosh) On An Ipa Or Ipam (Soulbird) On Windows
Instructions for Filtering Spam with Mozilla Thunderbird When an Email is processed through ISOMEDIA s SpamCatcher, the message header is tagged with asterisks ( * ) indicating the likelihood that the
What browsers can I use to view my mail?
How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.
Security. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with
Using Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
Visendo Email Suite a reliable solution for SMBs
Visendo Email Suite a reliable solution for SMBs Visendo offers a range of Email solutions to assist companies in meeting complex e-mail requirements Visendo Security for Email Servers Multi-engine spam
Outlook Express POP Instructions - Bloomsburg University Students
1. Open Outlook Express by clicking Start, All Programs, and Outlook Express. 2. Click on the Tools menu and click Accounts. 1 3. Click on Add Mail 4. Enter your name and click Next. 2 5. Enter your full
The Leading Email Security Suites
The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
eprism Enterprise Tech Notes
eprism Enterprise Tech Notes Utilizing Microsoft Active Directory for eprism s Directory Services Context eprism can integrate with an existing LDAP (Lightweight Directory Access Protocol) directory for
Getting Started Guide
Getting Started Guide Mulberry IMAP Internet Mail Client Versions 3.0 & 3.1 Cyrusoft International, Inc. Suite 780 The Design Center 5001 Baum Blvd. Pittsburgh PA 15213 USA Tel: +1 412 605 0499 Fax: +1
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam...
How to make sure you receive all emails from the University of Edinburgh
How to make sure you receive all emails from the University of Edinburgh To ensure that any email from The University of Edinburgh - or any address you choose - is not automatically sent to your junk or
Outlook 2011 Window. [Day], [Work Week], [Full [Home]. Schedule and plan: Click the [New
MS Outlook 2011 Quick Reference for Macintosh The Ribbon consists a series of tabs giving access to buttons, menus, and dialog boxes in various groups to facilitate locating the tools required for a particular
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
Support for Microsoft Outlook
Support for Microsoft Outlook Kerio Technologies C 1997-2006 Kerio Technologies. All Rights Reserved. Release Date: July 10, 2006 This guide provides detailed description on Kerio Outlook Connector and
Setting up Your Acusis Email Address. Microsoft Outlook
Setting up Your Acusis Email Address in Microsoft Outlook Click on your Microsoft Outlook Version you are using: Microsoft Outlook 2002/XP Microsoft Outlook 2003 Microsoft Outlook 2007 Microsoft Outlook
Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 [email protected]
Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2010, Parallels, Inc.
Quick Start Policy Patrol Spam Filter 5
Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
Configuring Outlook 2013
Configuring Outlook 2013 Contents 1. Configuring Outlook 2013... 1 2. Add the new IMAP email account to Outlook... 2 3. Change Start-up default Inbox... 7 4. IMAP Folders:... 8 5. Add/Change your signature....
Administration and Configuration Manual
GFI MailEssentials 14.1 Administration and Configuration Manual By GFI Software Ltd. http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies,
Using Your New Webmail
1 Using Your New Webmail Contents Compose a New Message... 3 Add an Attachment... 5 Insert a Hyperlink... 6 Forward an Email... 7 Search Email... 8 Download Email from an existing POP3 Account... 9 Move
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
USING OUTLOOK WITH ENTERGROUP. Microsoft Outlook
USING OUTLOOK WITH ENTERGROUP In this tutorial you will learn how to use Outlook with your EnterGroup account. You will learn how to setup an IMAP or POP account, and also how to move your emails and contacts
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Versions Addressed: Microsoft Office Outlook 2010/2013. Document Updated: 2014. Copyright 2014 Smarsh, Inc. All right reserved
Versions Addressed: Microsoft Office Outlook 2010/2013 Document Updated: 2014 Copyright 2014 Smarsh, Inc. All right reserved Table of Contents Getting Started 3 Add Your New Account 3 Account Setup 5 Basic
USING MS OUTLOOK. Microsoft Outlook
USING MS OUTLOOK In this tutorial you will learn how to use Microsoft Outlook with your EmailHosting.com account. You will learn how to setup an IMAP account, and also how to move your emails and contacts
PROOFPOINT - EMAIL SPAM FILTER
416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
OPS Data Quick Start Guide
OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
