Mailgate Ltd. MailGate Spam Filter User Manual
|
|
|
- Poppy Reynolds
- 10 years ago
- Views:
Transcription
1 Mailgate Ltd. MailGate Spam Filter User Manual
2 Microsoft is a registered trademark and Windows 95, Windows 98 and Windows NT are trademarks of Microsoft Corporation. Copyright 2001 Mailgate Ltd. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in and for or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Mailgate Ltd. Edited by Lani K. and David D. Thompson. MailGate Spam Filter User Manual
3 Contents MAILGATE SPAM FILTER EXTENSION...1 SPAM FILTER EXTENSION INTRODUCTION...1 INSTALLATION AND CONFIGURATION...2 Spam Filter Installation...2 Rules Tab...3 Patterns Tab...4 Patterns List Dialog...5 Words Tab...6 Words List Dialog...7 Action Tab...8 About Tab...10 Register Dialog...10 USING THE SPAM FILTER...11 How Spam is Filtered...11 TECHNICAL REFERENCE...12 About Rules...12 About Patterns...13 About Words...14 Spam Filter Script Functions...15 Spam Filter Windows Registry...22 Figures FIGURE 1 - RULES TAB...3 FIGURE 2 - PATTERNS TAB...4 FIGURE 3 - EXAMPLE PATTERN DIALOG...5 FIGURE 4 - WORDS TAB...6 FIGURE 5 - EXAMPLE WORDS LIST DIALOG...7 FIGURE 6 - ACTION TAB...8 MailGate Spam Filter User Manual Contents
4 MailGate Spam Filter Extension Spam Filter Extension Introduction What Is Spam In the true sense there are two types of Spam - Unsolicited Commercial (UCE) and Unsolicited Bulk (UBE). This involves the spammer obtaining your address and using it to send you mails you have not asked for, often by using means to hide the origins of the message. For many people though Spam means "any I did not ask for or do not want". Some of this mail could be regarded as solicited because often it is caused by completing on line registrations or by signing up to list servers. Sometimes getting your address de-listed again can be difficult so you continue to receive un-wanted . What is the Spam Filter The MailGate Spam Filter extension is an optional module which will check all mail passing through MailGate against a set of rules to try to filter out Spam s. The filter is designed to identify true Spam by looking for certain characteristics of this type of mail and also can be adjusted to block other un-wanted mails. Some rules are simple checks on the structure or content of the mail, others make use of pattern and word data lists to support the rule. These lists are referenced by individual rules and are fully user maintainable. Once a mail has been identified as potential Spam, the module can be configured to perform user configurable actions. The actions taken can be linked to a certainty or priority associated with each rule. This allows an easily identified Spam mail to be treated differently to a mail that is only maybe Spam. Refer to How Spam is Filtered on page 11 for full details of the filtering process. MailGate Spam Filter User Manual Spam Filter Extension Introduction 1
5 Installation and Configuration Spam Filter Installation To install the MailGate Spam Filter extension, run the self-extracting executable set-up program. This program, after you have read and confirmed your acceptance of the software licence, will install all the necessary components into your MailGate system folder. Once the install process has completed you must access the extension and configure it to your requirements. To configure the extension, highlight it in the MailGate Main Window and select Edit Edit or double click on the icon. When you have completed and saved your settings, stop and restart the MailGate service to initialise the extension. The Spam Filter extension is installed with a full set of pre-defined rules. These are listed in the Rules Tab (see page 3) and you should review which rules you wish to use and adjust the priority flags as required. Some rules reference data lists. These lists are provided with sample data and you should edit them according to your requirements through the Patterns Tab (see page 4) and the Words Tab (see page 6). When the Filter identifies a mail as Spam, it will perform the actions defined in the Action Tab (see page 8) according to the priority level attached to the mail. Use this tab to define the required actions for each priority level used. Like all MailGate software, the Spam Filter extension may be tried for 30 days after installation. If you wish to continue using the module you must purchase a key and install this using the Register option in the About Tab (see page 10). We recommend you read How Spam is Filtered on page 11 before finalising your configuration. This will assist in ensuring you get the best from the module. If you have more than one MailGate extension installed in your system you should consider the sequence in which the extensions load. Using the best sequence can reduce system resource requirements by keeping unnecessary processing to a minimum. See the MailGate User Manual for more details. MailGate Spam Filter User Manual Installation and Configuration 2
6 Rules Tab Figure 1 - Rules Tab The Rules Tab displays a list of the rules used by the Spam Filter when checking the mail traffic. Use the scroll bar to move through the list of rules. In the Rules List you can :- Enable/Disable a rule Click to the left of the rule. Enabled rules are marked with a green check and disabled rules with a red cross. View the rule details and code Left double click on a rule and a pop-up window will display the details and code for the selected rule. See About Rules on page 12 for more details on the rule syntax. Change the rule priority Right click on the current rule priority and a pop-up menu will be displayed. Select the required priority. For more information on the use of priorities see How Spam is Filtered on page 11. Remember to configure actions in the Action Tab (see page 8) for all the priorities you are using. MailGate Spam Filter User Manual Installation and Configuration 3
7 Patterns Tab Figure 2 - Patterns Tab The Patterns Tab displays a list of the installed pattern lists used by individual rules. The Patterns list box (Figure 2) shows the name given to each list and it is this which is used by the rules to reference the appropriate list. Double click on an entry to display the Patterns List Dialog (see page 5). In this dialog the list contents may be viewed or changed. Each Pattern list is stored as a file in the MailGate Spam Filter system folder. The names displayed in this tab are the file names used. See About Patterns on page 13 for more details. MailGate Spam Filter User Manual Installation and Configuration 4
8 Patterns List Dialog Figure 3 - Example Pattern Dialog The Patterns List Dialog displays the contents of a Patterns List. To access the dialog, double click on a list name in the Patterns Tab (see page 4). Patterns may be added to the list in any order according to the following rules :- Each pattern entry must be placed on a new line. The use of wildcards (see the MailGate User Manual Technical Reference section) is allowed. Patterns are not case sensitive. When adding patterns to a list, remember to check which rules use the list and which parts of the mail are being checked for a pattern match. This context may affect the entries you wish to make. When you have finished editing the list, click OK to save your changes. MailGate Spam Filter User Manual Installation and Configuration 5
9 Words Tab Figure 4 - Words Tab The Words Tab displays a list of the installed words lists used by individual rules. The Words list box (Figure 4) shows the name given to each list and it is this which is used by the rules to reference the appropriate list. Double click on an entry to display the Words List Dialog (see page 7). In this dialog the list contents may be viewed or changed. Each Words list is stored as a file in the MailGate Spam Filter system folder. The names displayed in this tab are the file names used. See About Words on page 14 for more details. MailGate Spam Filter User Manual Installation and Configuration 6
10 Words List Dialog Figure 5 - Example Words List Dialog The Words List Dialog displays the contents of a Words List. To access the dialog, double click on a list name in the Words Tab (see page 6). Words may be added to the list in any order according to the following rules :- Each word entry must be separated by spaces. Any number of words may be placed on a line. The use of wildcards is not permitted. Word matching is not case sensitive. When adding words to a list, remember to check which rules use the list and which parts of the mail are being checked for these words. This context may affect the entries you wish to make. When you have finished editing the list, click OK to save your changes. MailGate Spam Filter User Manual Installation and Configuration 7
11 Action Tab Figure 6 - Action Tab The Action Tab is used to define the actions to be taken by the Spam Filter Extension when a mail has been identified as Spam. The tab is divided into two sections. The upper section is used to define what happens to a Spam mail. The lower section sets the general operation of the extension. Action taken when spam is detected When a mail is checked by the Spam Filter and is matched by one of the rules, a priority level is associated with the message. (See How Spam is Filtered on page 11). In this part of the Action Tab you can set what actions you wish to be performed for each priority level. To set the actions, first select the desired priority level using the Action for priority level dropdown (Figure 6). You will now see displayed the current actions for that priority level and you can make any changes required. MailGate Spam Filter User Manual Installation and Configuration 8
12 For each priority level you can:- Have the Spam Filter pass the mail through to its recipient(s) after modifying the subject line, by setting the Allow through modifying 'Subject' (Figure 6) option. The subject can be modified using the MailGate Macro facility. Use the Subject Pattern entry to define how the Spam mail 'Subject' line should be modified. When specifying a pattern you can define fixed text or use the MailGate macro facility. These macros allow data from the original mail to be used in the revised 'Subject'. Example :- A subject pattern setting of "SPAM - %%SUBJECT%%" will add "SPAM - " in front of the original subject. For more details of using the macro facility, please refer to the Technical Reference section in the MailGate User Manual. Have the Spam Filter Archive a copy of the message using the Archive message to (Figure 6) option. The message copy will be added to a daily archive file in the specified folder. The file name format used is SF<yymmdd>.TXT where <yymmdd> is the current date. Have the Spam Filter forward a copy of the message to another mail address using the Forward to address (Figure 6) option. If using this option, the Filter can also be set to modify the subject line for the forwarded copy using the MailGate Macro facility. If the address is a local mailbox then only the mailbox name is required, but a full address may be used. This will be required if the mail is to be forwarded externally. You should review the actions for each of the priority levels you have associated with the rules in the Rules Tab (see page 3). Global settings The Global settings section is used to set the general operation of the extension. By selecting the Send daily report to system report address (Figure 6) you can have the Filter send a daily report of Spam message activity to the system administrator address. This address is the System Reports To address set in the MailGate Setup/ tab. Similar daily reports can be sent to each of the Spam mail target recipients by using the Send daily report to spam recipients (Figure 6) option. If you use either of the daily reports options, you should also set the Reports from (Figure 6) address. When the daily report is created, this address is used as the From: address in the mail. MailGate Spam Filter User Manual Installation and Configuration 9
13 The Tidy archive messages older than (Figure 6) option is used to make the extension remove old archive files automatically. Set the Purge Period to the number of days which archive files are to be kept for. If the Tidy archive option is checked then files older than this setting will be deleted. If not checked, old archive files will be kept indefinitely. In many cases the identification of Spam mail is not an exact science. You should consider making settings that allow you to monitor and review the identification process when you first setup the module and when your rules and list settings are tested you can set your actions with confidence. About Tab The About Tab shows the Spam Filter Extension version and copyright details. This tab also contains the Register button that allows you to enter the extension activation key to licence the module. When you click on this button the Registration dialog will be displayed. Register Dialog The Register dialog is accessed by clicking on the Register button in the About Tab (page 10). To register the Spam Extension Module you need to purchase an activation key. Enter this key into the Activation key field EXACTLY as sent to you. All letters should be upper-case. When you have entered the key, click the OK button to confirm the key is valid and to complete the registration process. Full details on how to purchase a licence key can be found on our web site at MailGate Spam Filter User Manual Installation and Configuration 10
14 Using the Spam Filter How Spam is Filtered The MailGate Spam Mail Filter Extension checks every mail that passes through the system against a set of rules. This is a matching process where the mail is checked against a set of criteria defined by the rule. The rules may be viewed and adjusted in the Rules Tab (see page 3). For details on how the rules work see About Rules on page 12. Some rules need to use variable data to achieve the desired results. Such rules reference data lists which can be reviewed and edited in the Patterns and Words tabs (pages 4 and 6). For full details on these lists see About Patterns on page 13 and About Words on page 14. There are three possible results after each rule is processed :- 1. The mail is matched by the rule and is identified as spam. 2. The mail is matched by the rule and is identified as not spam. 3. The mail is not matched by the rule. Should a match be made, then this match is noted along with the rule priority level. Rule processing continues until either all the rules have been tried or the highest achievable priority level has been reached. Mail messages that fail to be matched by any rules are passed on by the Spam Filter for normal processing. For those mail messages that have been matched, the status of the highest priority level is checked. If this status indicates the mail is not spam then it is also passed on for normal processing. If the status indicates that it is spam, then the filter module will apply the actions defined on the Action Tab (see page 8) for the mail's priority level. When you first use the Spam filter, you should take care with the actions you define. It is advisable to run the system for a while carefully checking you are correctly identifying your spam mails to confirm your settings before using actions to block mail deliveries. MailGate Spam Filter User Manual Using the Spam Filter 11
15 Technical Reference About Rules The Spam Filter is configured with a standard set of rules. When a mail is passed through the extension each rule is processed in turn until the mail is either matched by a rule or all the rules have been tried. See How Spam is Filtered on page 11 for more details. The rules set can be viewed in the Rules Tab (see page 3) and by double clicking on any rule the associated code will be displayed. The rules use an internal scripting language details of which can be found in the MailGate User Manual Technical Reference section under Scripting. The Spam Filter also has a number of special functions (see page 15) available only to the filter rules. The rules are contained in three simple text files, userpre.sfr, system.sfr and userpost.sfr which are located in the spamfltr folder under the MailGate system folder (by default c:\program files\mailgate). When the rules are loaded by the filter the files are read in the above order. The extension is shipped with a standard set of rules contained in system.sfr which should not be changed. If you wish to create your own rules these should be placed in either userpre.sfr or userpost.sfr. To add a new rule you may edit these files with a suitable text editor. The Spam Filter functions are defined using the script language external function directive. The definitions are contained in the file spamfltr.inc. This file is read when the rules are loaded and if you wish to create your own functions, these may be included in this file. Otherwise you should not change this file. Always take a backup copy of your existing files before making any changes. Only edit the files if you are sure you know what you are doing! If you make changes to either of the system files, these must be backed up before re-installing or upgrading the extension module. Your changes may need to be re-done after installing. Rule Location - You should consider carefully the location of your rule. To minimise system resource requirements, rules which are more likely to find a match should be placed to the top of the rules list by using the file userpre.sfr. Rules which are rarely matched may be added to the end of the list by using userpost.sfr. Remember rule processing stops if a high priority match is found. Rule Structure - Each rule starts with the statement - #rule "Rule Name" - where "Rule Name" is the name displayed in the Rules Tab. MailGate Spam Filter User Manual Technical Reference 12
16 Generally this will be followed by a number of comment lines starting with - //. These are used to describe your rule. Next comes the rule code itself using the MailGate scripting language. Finally the rule is terminated with the statement - #endrule The line // is simply included to make reading the file easier. Example #rule "My Example Rule" // // This rule will reject any with 'Spam' in the subject. // field$ = HeaderFieldValue("Subject") if WildcardMatch(field$,"Spam") then IsSpam() endif #endrule // In this example the content of the mail header field 'Subject' is obtained and then it is checked for the word "Spam". If this is found then the mail is marked as being a Spam mail. Note - When you have completed you changes to the rules file you must stop and re-start the MailGate service to register your changes. If you are making many changes at one time, you should work on an off-line copy of the file. About Patterns Spam Filter rules can make use of data lists which may be accessed using either the Patterns or the Words Tabs. In the Patterns Tab (see page 4) you will find a list of all the Patterns lists installed. Each pattern list is contained in a simple text file called <ListName>.lst which is located in the spamfltr folder under the MailGate system folder (by default c:\program files\mailgate). <ListName> is the name you see in the Patterns Tab and also is used by the rules to identify the list. To add a new list, create a text file and give it a name as above. You will need to close and re-open the extension configuration screen for your new list to appear in the Patterns Tab. MailGate Spam Filter User Manual Technical Reference 13
17 List Contents You can edit a list's contents either through the Patterns Tab or by using your text editor. Patterns may be added to the list in any order according to the following rules :- Each Pattern must be placed on a new line. The use of wildcards (see the MailGate User Manual Technical Reference section) is allowed. Patterns are not case sensitive. About Words Spam Filter rules can make use of data lists which may be accessed using either the Patterns or the Words Tabs. In the Words Tab (see page 6) you will find a list of all the Words lists installed. Each words list is contained in a simple text file called <ListName>.wrd which is located in the spamfltr folder under the MailGate system folder (by default c:\program files\mailgate). <ListName> is the name you see in the Words Tab and also is used by the rules to identify the list. To add a new list, create a text file and give it a name as above. You will need to close and re-open the extension configuration screen for your new list to appear in the Words Tab. List Contents You can edit a list's contents either through the Words Tab or by using your text editor. Words may be added to the list in any order according to the following rules :- Each word entry must be separated by spaces. Any number of words may placed on a line. The use of wildcards is not permitted. Word matching is not case sensitive. MailGate Spam Filter User Manual Technical Reference 14
18 Spam Filter Script Functions Script Functions for Spam The Spam Filter extension makes use of the MailGate scripting language. For full details of the use of this language refer to the MailGate User Manual Technical Reference section on scripting. In addition to the standard internal scripting functions, the Spam Filter extension makes available a number of scripting functions specific to the operation of the extension. These functions are defined automatically using the external function directive and are available to all the Spam Filter rules. The available functions are listed below with full details on the following pages. Spam Filter Functions IsOK() IsSpam() HeaderFieldExists(<FieldName>) HeaderFieldValue(<FieldName>) WildcardMatch(<String>,<MatchPattern>) MatchesListItem(<PatternList>,<String>) ParseAddress(<AddressString>) MessageSize() FindWordInString(<WordList>,<String>) FindWordInMessage(<WordList>) GetFirstAddress(<FieldName>) GetNextAddress() IsValidDate(<DateString>) WildcardMatchHeader(<MatchPattern>) WildcardMatchBody(<MatchPattern>) BodyMatchesListItem(<PatternList>) MailGate Spam Filter User Manual Technical Reference 15
19 Function IsOK() Parameters - None Return Type - None Calling this function identifies the current mail as NOT Spam and registers this along with the current rule's priority level. Function IsSpam() Parameters - None Return Type - None Calling this function identifies the current mail as Spam and registers this along with the current rule's priority level. Function HeaderFieldExists(<FieldName>) Parameters - Value Type Description <FieldName> string The header field to look. Do not include the ':' Return Type - Logical Integer Looks for the specified mail header field. Returns True if the field exists otherwise returns False. Example if HeaderFieldExists("From") then <action> endif <Action> is performed if the From: field is found in the mail header. MailGate Spam Filter User Manual Technical Reference 16
20 Function HeaderFieldValue(<FieldName>) Parameters - Value Type Description <FieldName> string The header field whose value is required. Do not include the ':' Return Type - String Returns the value associated with the specified header field. Example if HeaderFieldValue("From") = "Spammer" then IsSpam() endif If the From: field in the mail header exactly matches the string "Spammer" then the mail is identified as Spam. Function WildcardMatch(<String>,<MatchPattern>) Parameters - Value Type Description <String> string The string to search for a pattern match. <MatchPattern> string The wildcard pattern string to search <string1> for. Return Type - Logical Integer Checks <string 1> for a match to <string2> where <string2> can contain wildcard specifiers. Returns True if a match is found otherwise returns False. Example WildcardMatch("ABCDEF","*BCD*") will return True. WildcardMatch("ABCDEF","*BDE*") will return False. Function MatchesListItem(<PatternList>,<String>) Parameters - Value Type Description <PatternList> string The name of the patterns list to use as a string. <String> string The string to be checked for a pattern match. Return Type - Logical Integer Check for a match between <string2> and any of the items in the specified patterns list. Returns True if a match is found otherwise returns False. Example MatchesListItem("My Patterns","String to be Checked") This will return True if there is a pattern in the list "My patterns" which matches to the string "String to be checked". Note that wildcards can be used in the Patterns lists and matching is not case sensitive. MailGate Spam Filter User Manual Technical Reference 17
21 Function ParseAddress(<AddressString>) Parameters - Value Type Description <AddressString> string String from which to extract a valid address. Return Type - String Extracts a valid address from the specified string. In many cases an header field will contain a name along with the address. Example ParseAddress("(Doe, John) <[email protected]>") returns the string [email protected] Function MessageSize() Parameters - None Return Type - Integer Returns the size of the current message in bytes. Function FindWordInString(<WordList>,<String>) Parameters - Value Type Description <WordList> string The words list to use as a string. <String> string The string to check for a word match. Return Type - Logical Integer Checks the words in <string2> for a match against all the words contained in the specified words list. Returns True if a match is found otherwise returns False. Note that wildcards are not permitted in the Words lists so words must exactly match but matching is not case sensitive. Example FindWordInString("My Word List","I am a subject") This will return True if any of the words in "I am a subject" exist in the words list "My Word List". MailGate Spam Filter User Manual Technical Reference 18
22 Function FindWordInMessage(<WordList>) Parameters - Value Type Description <WordList> string The words list to use as a string. Return Type - Logical Integer Checks the words in the entire message for a match against all the words contained in the specified words list. Returns True if a match is found otherwise returns False. Note that wildcards are not permitted in the Words lists so words must exactly match but matching is not case sensitive. Function GetFirstAddress(<FieldName>) Parameters - Value Type Description <FieldName> string The header field to extract the first address from. Do not include the ':' Return Type - String Some mail header fields (particularly the To: and CC: fields) can contain multiple addresses. This function extracts the first valid address from the specified field. Example GetFirstAddress("To") will return the first valid address found in the To: header field. See GetNextAddress() for reading multiple addresses. Function GetNextAddress() Parameters - None Return Type - String Special function used in conjunction with GetFirstAddress() to enable reading of multiple addresses from the To: and CC: header fields. Example addr$ = GetFirstAddress("To") :loop if length(addr$) = 0 then loopend: if <test the address> then goto notspam: addr$ = GetNextAddress() goto loop: :loopend IsSpam() :notspam This example demonstrates the reading of multiple addresses from the To: header field. Using the label jump capability, a loop is defined. The first address is extracted MailGate Spam Filter User Manual Technical Reference 19
23 and the loop entered. An exit from the loop will occur either if the extracted address is 0 length (i.e. there is no address) or the address tests as Not Spam. After the first address has been tested, the next available address is extracted by GetNextAddress() and the looping will continue until GetNextAddress() returns an empty string or an address tests as Not Spam. Note that GetNextAddress() requires GetFirstAddress() to define the header field to read. Function IsValidDate(<DateString>) Parameters - Value Type Description <DateString> string String to check for a valid date. Typically this will be the Date: mail header field. Return Type - Logical Integer Checks the specified string for characters which represent a valid date. Returns True if a valid date is found otherwise returns False. Example IsValidDate("Fri, 6 Oct : (BST)") will return True. Function WildcardMatchHeader(<MatchPattern>) Parameters - Value Type Description <MatchPattern> string The wildcard pattern to look for in the mail header Return Type - Logical Integer Checks the entire mail header for a match against the specified wildcard pattern. Returns True if a match is found otherwise returns False. Example if WildcardMatchHeader("*@spammer.kom*") then IsSpam() endif Identifies the mail as being Spam if "@spammer.kom" is found anywhere in the header. MailGate Spam Filter User Manual Technical Reference 20
24 Function WildcardMatchBody(<MatchPattern>) Parameters - Value Type Description <MatchPattern> string The wildcard pattern to look for in the mail body. Return Type - Logical Integer Checks the entire mail body for a match against the specified wildcard pattern. Returns True if a match is found otherwise returns False. Example if WildcardMatchBody("*make millions*") then IsSpam() endif Identifies the mail as being Spam if the phrase "make millions" is found anywhere in the mail body. Function BodyMatchesListItem(<PatternList>) Parameters - Value Type Description <PatternList> string The name of the patterns list whose items are to be checked against the message body. Return Type - Logical Integer Check for a match between each of the items in the specified Patterns list and the content of the message body. Returns True if any list item matches otherwise returns False. Example if BodyMatchesListItem("Usual spam message phrases") then IsSpam() endif Message is marked as Spam if a pattern match is found between any of the items in the Patterns list "Usual spam message phrases" and the message body content. MailGate Spam Filter User Manual Technical Reference 21
25 Spam Filter Windows Registry Windows Registry The Spam Filter extension stores its configuration in the Windows Registry. All settings are stored under the section:- HKEY_LOCAL_MACHINE Software IDSL MailGate SpamFltr Within the SpamFltr key are found the main configuration settings. There is also a subkey named Priority. This key has an entry for each rule and the value is the rule priority level as defined in the Rules Tab (see page 3). See the following pages for details. MailGate Spam Filter User Manual Technical Reference 22
26 Registry - SpamFltr Most of the Spam Filter extension configuration settings are stored in this Registry key. Some of the settings are in the form <SettingName><n> where n is the value of the priority for an action setting. n is in the range 1 to 5 where 1 = highest priority and 5 = lowest. Value Name (Data Type) Archive<n> (DWORD) ArchivePath<n> (String) DisableRules (Multi-String) Forward<n> (DWORD) ForwardAddress<n> (String) ForwardMacro<n> (String) ForwardSubject<n> (DWORD) LastReportDay (DWORD) LicenceString (String) ReportAddress (String) Subject<n> (DWORD) SubjectMacro<n> (String) SystemReport (DWORD) Tidy (DWORD) TidyDays (DWORD) UserReport (DWORD) Version (String) Description Indicates whether the action should archive a copy of a spam message. 1=Archive Copy. Default=0. Provides the drive and path to use when archiving a spam message An array of the names of all rules that are disabled. Indicates whether the action should forward a copy of a spam message to a given address. 1=Forward Copy. Default=0. The address to forward a copy of a spam message to. The macro to use to modify the subject line for a forwarded spam message. Indicates whether the subject of a forwarded spam message should be modified by the macro string. 1=Modify. Default=0. Used internally to control the daily reports. Contains the Julian day number for the last report. When the extension is registered contains the registration key. The address used as the From: address for the daily reports mails. Indicates whether a spam message should be passed to the recipient with a modified subject line. 1=Pass through. Default=1. The macro to use to modify the subject line for a spam message passed through to the recipient. Indicates if a daily system report should be generated. 1=Generate report. Default=1. Indicates if old archive files should be automatically deleted. 1=Delete. Default=0. The number of days worth of archives to keep when tidying. Default=7. Indicates if a daily user report should be generated. 1=Generate report. Default=1. Gives the version number of the currently installed extension. MailGate Spam Filter User Manual Technical Reference 23
27 Registry - Priority The Registry Key has a value entry for each rule listed in the Rules Tab (see page 3). The rule name is used for the value name and each is of type DWORD. The DWORD value gives the rule priority in the range 1 to 5 where 1 = highest priority and 5 = lowest. MailGate Spam Filter User Manual Technical Reference 24
Archive Add-in User Guide
Archive Add-in User Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential to
SafeGuard PrivateCrypto 2.40 help
SafeGuard PrivateCrypto 2.40 help Document date: September 2009 Contents 1 Introduction... 2 2 Installation... 4 3 SafeGuard PrivateCrypto User Application... 5 4 SafeGuard PrivateCrypto Explorer extensions...
Auto Archiving Folders in Outlook XP
Auto Archiving Folders in Outlook XP Your Outlook email account on the Exchange server is allotted 50 megabytes of storage space on the server. Items in the Inbox, Calendar, Sent Items, Deleted Items,
w e p r o t e c t d i g i t a l w o r l d s ESET NOD32 Antivirus for IBM Lotus Domino Installation
w e p r o t e c t d i g i t a l w o r l d s ESET NOD32 Antivirus for IBM Lotus Domino Installation Copyright ESET, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted
Vodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
User Guide for Kelani Mail
User Guide for Kelani Mail Table of Contents Log in to Kelani Mail 1 Using Kelani Mail 1 Changing Password 2 Using Mail Application 3 Using email system folders 3 Managing Your Mail 4 Using your Junk folder
Aras Corporation. 2005 Aras Corporation. All rights reserved. Notice of Rights. Notice of Liability
Aras Corporation 2005 Aras Corporation. All rights reserved Notice of Rights All rights reserved. Aras Corporation (Aras) owns this document. No part of this document may be reproduced or transmitted in
Auditing manual. Archive Manager. Publication Date: November, 2015
Archive Manager Publication Date: November, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
Outlook Add-in Deployment Guide
Outlook Add-in Deployment Guide Sophos TOC 3 Contents Introduction...4 Prerequisites...4 Installation...4 Downloading the Outlook Add-in...5 Installing the Add-in on a Single Workstation...5 Installing
Sample- for evaluation purposes only! Advanced Outlook. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2012 Advanced Outlook TeachUcomp, Inc. it s all about you Copyright: TeachUcomp, Inc. Phone: (877) 925-8080 Web: http://www.teachucomp.com
Email Archiving. Follow these steps to archive your email:
Email Archiving Archiving is a process by which your email messages and attached files are moved from the database on our email server to a location on your computer. This document contains step-by-step
Intellicus Enterprise Reporting and BI Platform
Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies [email protected] www.intellicus.com Copyright 2014 Intellicus Technologies This
Training Manual. Version 6
Training Manual TABLE OF CONTENTS A. E-MAIL... 4 A.1 INBOX... 8 A.1.1 Create New Message... 8 A.1.1.1 Add Attachments to an E-mail Message... 11 A.1.1.2 Insert Picture into an E-mail Message... 12 A.1.1.3
SMS Database System Quick Start. [Version 1.0.3]
SMS Database System Quick Start [Version 1.0.3] Warning ICP DAS Inc., LTD. assumes no liability for damages consequent to the use of this product. ICP DAS Inc., LTD. reserves the right to change this manual
Archive Add-in Administrator Guide
Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential
Setting up Microsoft Outlook to reject unsolicited email (UCE or Spam )
Reference : USER 191 Issue date : January 2004 Updated : January 2008 Classification : Staff Authors : Matt Vernon, Richard Rogers Setting up Microsoft Outlook to reject unsolicited email (UCE or Spam
Version 2.1.x. Barracuda Message Archiver. Outlook Add-In User's Guide
Version 2.1.x Barracuda Message Archiver Outlook Add-In User's Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Copyright 2005-2009, Barracuda
ESET NOD32 Antivirus for IBM Lotus Domino. Installation
ESET NOD32 Antivirus for IBM Lotus Domino Installation Copyright ESET, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic
Wilkes University Mail Storage & Housekeeping for Students using Outlook 2003
The following instructions apply to those users who have setup Outlook 2003 on their PCs. Email systems are not designed for long term storage. The more mail (especially with attachments) each of us keeps
Microsoft Outlook 2010
Microsoft Outlook 2010 Prepared by Computing Services at the Eastman School of Music July 2010 Contents Microsoft Office Interface... 4 File Ribbon Tab... 5 Microsoft Office Quick Access Toolbar... 6 Appearance
Amicus Link Guide: Outlook/Exchange E-mail
Amicus Link Guide: Outlook/Exchange E-mail Applies to: Amicus Premium 2015 Synchronize your Amicus and Outlook e-mail. Choose a client-side link with your local Microsoft Outlook or a Server-side link
Microsoft Outlook 2003 : Creating an Spam/Junk Mail Filter
The University of Akron Microsoft Outlook 2003 : Creating an Spam/Junk Mail Filter Spam Filter Following are the steps for creating a Junk Mail folder and setting up the filter to move suspect materials
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
exchange@pam MS Outlook AddIn version 3.6
User s Manual for exchange@pam MS Outlook AddIn version 3.6 All Rights Reserved. Including all rights concerning reproduction, copying or any other use or transmission of this document and its contents
Remote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
E-mailing a large amount of recipients
E-mailing a large amount of recipients DO NOT use the TO or CC field! If you have a large list of recipients you need to send an email you, you should never try sending one large email with all of the
REDUCING YOUR MICROSOFT OUTLOOK MAILBOX SIZE
There are several ways to eliminate having too much email on the Exchange mail server. To reduce your mailbox size it is recommended that you practice the following tasks: Delete items from your Mailbox:
How to Manage Email. Guidance for staff
How to Manage Email Guidance for staff 1 Executive Summary Aimed at Note Purpose Benefits staff Necessary skills to All staff who use email This guidance does NOT cover basic IT literacy skills. Staff
Word 2010: Mail Merge to Email with Attachments
Word 2010: Mail Merge to Email with Attachments Table of Contents TO SEE THE SECTION FOR MACROS, YOU MUST TURN ON THE DEVELOPER TAB:... 2 SET REFERENCE IN VISUAL BASIC:... 2 CREATE THE MACRO TO USE WITHIN
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2013. Mastering Outlook Made Easy for Lawyers CPE Edition v.2.
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2013 Mastering Outlook Made Easy for Lawyers CPE Edition v.2.0 TeachUcomp, Inc. it s all about you Copyright: Copyright 2013 by TeachUcomp,
How To Install Outlook Addin On A 32 Bit Computer
Deployment Guide - Outlook Add-In www.exclaimer.com Contents About This Guide... 3 System Requirements... 4 Software... 4 Installation Files... 5 Deployment Preparation... 6 Installing the Add-In Manually...
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
Olathe District Schools 1 of 11 GroupWise 7
Olathe District Schools 1 of 11 GroupWise 7 Creating an email group To create and save a personal group: 1. Click on the toolbar. 2. Click the personal address book you want to add this group to. 3. Click
Configuration Manager
After you have installed Unified Intelligent Contact Management (Unified ICM) and have it running, use the to view and update the configuration information in the Unified ICM database. The configuration
Filtering Spam Using Outlook s Rule
Filtering Spam Using Outlook s Rule No one enjoys receiving spam (unsolicited junk e-mail). However, at Cuesta College we do not delete suspected spam. Instead, to assure the delivery of legitimate e-mail,
Message Archiving User Guide
Message Archiving User Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com RESTRICTION ON USE, PUBLICATION,
Qlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
Upgrading to Document Manager 2.7
Upgrading to Document Manager 2.7 22 July 2013 Trademarks Document Manager and Document Manager Administration are trademarks of Document Logistix Ltd. TokOpen, TokAdmin, TokImport and TokExRef are registered
How to Add HealthCentral to Your Safe Senders List
How to Add HealthCentral to Your Safe Senders List Due to the growing problem of unsolicited and unwanted commercial emails, many web mail services and email applications have taken measures to automatically
Managing Contacts in Outlook
Managing Contacts in Outlook This document provides instructions for creating contacts and distribution lists in Microsoft Outlook 2007. In addition, instructions for using contacts in a Microsoft Word
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
How to Configure Outlook 2003 to connect to Exchange 2010
How to Configure Outlook 2003 to connect to Exchange 2010 Outlook 2003 will install and work correctly on any version of Windows XP, Vista, Windows 7 or Windows 8. These instructions describe how to setup
FrontDesk Installation And Configuration
Chapter 2 FrontDesk Installation And Configuration FrontDesk v4.1.25 FrontDesk Software Install Online Software Activation Installing State Related Databases Setting up a Workstation Internet Transfer
Email Archiving Administrator Guide
Email Archiving Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2012 McAfee, Inc. This document contains information that is proprietary and confidential
INTERMEDIATE GroupWise 7.0
INTERMEDIATE GroupWise 7.0 Distributed by the Administrative Technology User Support Department under the Direction of Dr. Russell Clukey, Executive Director, Support Services. Feel free to contact the
SmartLock Pro Plus Audit View OPERATOR GUIDE
SmartLock Pro Plus Audit View OPERATOR GUIDE January 2015 Page 2 of 24 Table of Contents Introduction... 5 Requirements... 5 Setup... 6 Sharing the Pro Plus Data Folder... 6 Mapping a Network Drive...
File Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
Microsoft Outlook Tips & Tricks
Microsoft Outlook Tips & Tricks Columbia College Technology Services Table of Contents Creating an email signature Page 1 Handling attachments Page 1 Sending an attachment Opening an attachment Page 2
Pentagon Message Exchange Setup Guide: All Devices
Pentagon Message Exchange Setup Guide: All Devices This guide has been sent to you to help you set up Pentagon Message Exchange on your equipment. In this guide, you will find the details required for
Outlook E-Mail. Step 1: Open and Configure Outlook
Outlook E-Mail Step 1: Open and Configure Outlook 1. Click the Microsoft Button in the lower left task bar 2. Select All Programs 3. Select Microsoft Office 4. Select Microsoft Outlook 5. Follow the Start
How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Division of Student Affairs Email Quota Practices / Guidelines
Division of Student Affairs Email Quota Practices / Guidelines Table of Contents Quota Rules:... 1 Mailbox Organization:... 2 Mailbox Folders... 2 Mailbox Rules... 2 Mailbox Size Monitoring:... 3 Using
Lesson 7: Maintenance
Lesson 7: Maintenance This lesson introduces you to processes that will help you with the overall maintenance of Outlook 2007. The processes outlined in this section are: Mailbox Cleanup: Helps you focus
1-Step Appraisals Jewelry Appraisal Software
User Guide for 1-Step Appraisals Jewelry Appraisal Software Version 5.02 Page Table of Contents Installing 1-Step Appraisals... Page 3 Getting Started... Page 4 Upgrading from a Previous Version... Page
GFI Product Manual. Outlook Connector User Manual
GFI Product Manual Outlook Connector User Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no
How to Configure Windows 8.1 to run ereports on IE11
How to Configure Windows 8.1 to run ereports on IE11 Description: Windows 8.1 ships with IE10, but can be updated to IE11. There is a special mode in IE11 called Enterprise Mode that can be used to emulate
Installing Microsoft Exchange Integration for LifeSize Control
Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize
Moving PCLaw Data to Another Location (For LexisNexis PCLaw TM version 8.20 and higher)
Moving PCLaw Data to Another Location (For LexisNexis PCLaw TM version 8.20 and higher) Contents About Moving PCLaw Data Locating the Data, Common, and PCLaw Docs Folders Transferring the Data, Common,
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Don't have Outlook? Download and configure the Microsoft Office Suite (which includes Outlook)!
UVa Exchange Service Outlook 2013 Quickstart Guide Don't have Outlook? Download and configure the Microsoft Office Suite (which includes Outlook)! In this Quickstart Guide, you will learn to: Send and
McAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
Filtering E-mail for Spam: PC
Filtering E-mail for Spam: PC Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What Can You
Outlook 2011 Window. [Day], [Work Week], [Full [Home]. Schedule and plan: Click the [New
MS Outlook 2011 Quick Reference for Macintosh The Ribbon consists a series of tabs giving access to buttons, menus, and dialog boxes in various groups to facilitate locating the tools required for a particular
PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents
1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone
Microsoft Exchange 2010 Email Training. Microsoft Outlook 2007 Outlook Web App
Microsoft Exchange 2010 Email Training Microsoft Outlook 2007 Outlook Web App Table of Contents INTRODUCTION 1.1 What Does Microsoft Exchange Do? 1.2 Advantage/Disadvantage 1.3 Outlook 2007 vs. Outlook
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
Figure 1: Restore Tab
Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup
Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager
Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager The following instructions work for the District provided Blackberrys from Sprint, but I think it should
Outlook Managing Your Items
Course Description Managing your items is essential if you want Outlook to run as efficiently and effectively as possible. As with any filing system the longer you put off doing anything the larger the
Good Practice use of Outlook, Thunderbird and HORDE Webmail
Midwest Data, Inc. Good Practice use of Outlook, Thunderbird and HORDE Webmail This document is merely suggested setups and usage that in MDI s experience works best. For any questions please e-mail [email protected].
Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X
Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos
Lotus Notes Email Archive Guide
Lotus Notes Email Archive Guide For Lotus Notes Client version 5.0.5 File : Lotus Notes Email Archive Guide.doc Page 1 / 10 Printed on : 23/08/05 1. Objective Email archiving is one of the housekeeping
IBM Unica Leads Version 8 Release 6 May 25, 2012. User Guide
IBM Unica Leads Version 8 Release 6 May 25, 2012 User Guide Note Before using this information and the product it supports, read the information in Notices on page 33. This edition applies to version 8,
Outlook 2007: Managing your mailbox
Outlook 2007: Managing your mailbox Find its size and trim it down Use Mailbox Cleanup On the Tools menu, click Mailbox Cleanup. You can do any of the following from this one location: View the size of
PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents
1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2007, 2010 & 2013 for Windows... 3 Outlook for Mac 2011... 5 Mac OS X
Vodafone PC SMS 2010. (Software version 4.7.1) User Manual
Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6
Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0
Manual 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: [email protected] Information in this document is subject to change without
StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core
StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.
Stored Documents and the FileCabinet
Stored Documents and the FileCabinet Introduction The stored document features have been greatly enhanced to allow easier storage and retrieval of a clinic s electronic documents. Individual or multiple
ABOUT THIS COURSE... 3 ABOUT THIS MANUAL... 4 LESSON 1: PERSONALIZING YOUR EMAIL... 5
Table of Contents ABOUT THIS COURSE... 3 ABOUT THIS MANUAL... 4 LESSON 1: PERSONALIZING YOUR EMAIL... 5 TOPIC 1A: APPLY STATIONERY AND THEMES... 6 Apply Stationery and Themes... 6 TOPIC 1B: CREATE A CUSTOM
Help File. Version 1.1.4.0 February, 2010. MetaDigger for PC
Help File Version 1.1.4.0 February, 2010 MetaDigger for PC How to Use the Sound Ideas MetaDigger for PC Program: The Sound Ideas MetaDigger for PC program will help you find and work with digital sound
Webmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
B a r r a c u d a M e s s a g e A r c h i v e r O u t l o o k A d d - I n U s e r G u i d e. V e r si on 3. 1
B a r r a c u d a M e s s a g e A r c h i v e r O u t l o o k A d d - I n U s e r G u i d e V e r si on 3. 1 Barracuda Networks, Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com
Searching your Archive in Outlook (Normal)
Searching your Archive in Outlook (Normal) 1. View the Archive Add in toolbar. In Outlook 2007, the toolbar displays below the standard Outlook toolbars. In Outlook 2010, select the McAfee tab. 2. In the
Install MS SQL Server 2012 Express Edition
Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other
How To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Catholic Archdiocese of Atlanta Outlook 2003 Training
Catholic Archdiocese of Atlanta Outlook 2003 Training Information Technology Department of the Archdiocese of Atlanta Table of Contents BARRACUDA SPAM FILTER... 3 WHAT IS THE SPAM FILTER MS OUTLOOK PLUG-IN?...
Timed Email Organizer User s Manual
Timed Email Organizer User s Manual Quick Start Guide... 3 Welcome... 4 Main Rules Window... 5 Status Bar... 6 Close... 6 Save As... 7 Add/Edit Rules... 7 Conditions... 9 Actions... 12 Delete Rules...
If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
GroupWise to Outlook: How Do I?
Group- Wise GroupWise to Outlook: How Do I? Outlook Function Function How to Proxy Delegate From the File tab, click Account Settings and then Delegate Access from the drop-down menu. In the Delegates
How To Archive Emails On Groupwise On A Pc Or Mac Or Mac (For Mac) On A Mac Or Ipad (For Pc Or Ipa) On An Ipa Or Mac) (For Ipa).Com (For Pb
in GroupWise The primary method for storing messages indefinitely is called archiving. An archived message is not stored in your master mailbox (which is on the GroupWise server); rather it is stored on
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft
Windows Live Mail Setup Guide
Versions Addressed: Windows Live Mail 2011 Document Updated: 11/24/2010 Copyright 2010 Purpose: This document will assist the end user in configuring Windows Live Mail to access a POP3 email account hosted
Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders
Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders Part 1 Install the Personal Folder Backup Utility Note: You should close Outlook and any other applications before installing
Smart Web. User Guide. Amcom Software, Inc.
Smart Web User Guide Amcom Software, Inc. Copyright Version 4.0 Copyright 2003-2005 Amcom Software, Inc. All Rights Reserved. Information in this document is subject to change without notice. The software
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
