A D M I N I S T R A T O R V 1. 0
|
|
|
- Madison Hawkins
- 10 years ago
- Views:
Transcription
1 A D M I N I S T R A T O R F A Q V 1. 0
2 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is prohibited. MailCleaner is a registered trademark of Fastnet SA. All other trade names and trademarks cited in this manual are the properties of their respective owners. 2
3 SUMMARY 1 Introduction 4 2 Infrastructure planning 5 Network environment... 5 Typical MailCleaner Installation... 6 Typical MailCleaner Installation with Firewall and DMZ... 6 Network configuration... 7 Configuring a domain MailCleaner Configuration FAQ 9 General settings: defaults... 9 General settings: company Domains: general Domains: delivery Domains: address verification Domains: authentication SMTP: SMTP checks SMTP: resources control SMTP: TLS/SSL SMTP: greylisting Anti-Spam: global settings Anti-Spam: TrustedSources Anti-Spam: NiceBayes Content protection: Global settings Services: Web interfaces Services: Database Services: API MailCleaner Summary
4 C H A P T E R 1 1 Introduction Welcome to a world where the you get is the you want. Thank you for your interest in the MailCleaner Security Gateway. This document will provide you through Frequently Asked Questions, the efficient way of securing your infrastructure within minutes. All information s refer to the MailCleaner Administration interface. MailCleaner is an antivirus and anti-spam system that is extremely powerful and easy to setup. Based on the latest generation of filtering technologies, MailCleaner acts at the highest technical level of the network infrastructure of your company, organization or ISP. Placed before your mail server in the messaging path, MailCleaner will protect your mailboxes from any potentially dangerous and unwanted content and prevent useless messages from reaching your internal network. MailCleaner Security Gateway is designed to handle large-scale attacks. Its balance of simplicity and robustness makes it a perfect fit as the main network entry point for your messaging system. 4 MailCleaner Introduction
5 C H A P T E R 2 2 Infrastructure planning MailCleaner in your network Network environment Please have on hand an IP address and a hostname to be dedicated to your MailCleaner. The hostname must be resolvable via DNS. MailCleaner also needs Internet access on a number of ports. Make sure the firewall allows the following traffic: From the Internet to MailCleaner: 25 TCP (SMTP, from ANY or potentially from a specific gateway). 80 and 443 TCP (HTTP(S), optional but required for user and administrative interfaces). If your MailCleaner is in a private subnet behind a firewall, please do not forget to configure the necessary NAT rules to forward traffic from the WAN to your MailCleaner server. From MailCleaner to the Internet: 25 TCP (SMTP, to ANY or to a specific smtp gateway). 22 TCP (SSH, Mailcleaner updates, limited to /24 and /24). 80 and 443 TCP (HTTP(S), to ANY or to a specific gateway). 7 and 2703 TCP (Razor, to ANY) UDP (Pyzor, to ANY) UDP (DCC, to ANY). 5 MailCleaner Infrastructure planning
6 C H A P T E R 2 Typical MailCleaner Installation Typical MailCleaner Installation with Firewall and DMZ 6 MailCleaner Infrastructure planning
7 C H A P T E R 2 Network configuration From the main administration menu, click on the Base system entry, under the Configuration section, as shown in figure 5-2. Figure 5-2 Network configuration menu entry On figure 5-3, you will see the network configuration panel. Enter the different parameters that match your network topology and then click on Submit button to activate your changes. You can optionally configure the second physical network interface available on the unit as well.. Important: You may be disconnected after applying network changes. If so, reconnect your browser to the new IP address in order to return to the MailCleaner administration web-based interface. Figure 5-3 Network configuration panel 7 MailCleaner Infrastructure planning
8 C H A P T E R 2 Configuring a domain The second important step before your MailCleaner can start filtering mail is to provide the list of mail domains it will be accepting, filtering and the relaying mail for. Click on the Configuration entry under the domain section in the main navigation menu, as shown in figure 5-4. Figure 5-4 Domain configuration menu entry with New domain Click on the New domain link to open the new domain panel on the right. Two values are required: the domain name and the destination server(s). 8 MailCleaner Infrastructure planning
9 3 MailCleaner Configuration FAQ This section will guide you into the configuration menus of your system, through common and typical questions. General settings: defaults False negative / positive reporting address - We assume that these need to be our addresses? - How are these used? - If someone sends a message to one of these addresses how do we take action on it? These are addresses where users can send filtering errors that MailCleaner can potentially do. False negatives are real spam that wasn't correctly detected as spam. False positives are valid messages that were incorrectly detected as spam by MailCleaner. These mistakes can be forwarded to these addresses for further analysis and filter correction by our services. You can either put your own addresses here, so that you can have a look and some checks on what is actually sent to our analysis center (in case of privacy concerns for example), or you can directly setup our analysis center addresses if you don't want any control on this. Our analysis center addresses are: [email protected] for false negatives [email protected] for false positives If you choose to use your own addresses, make sure to forward us the valid requests so that we can actually adapt the filtering or provide help to avoid further mistakes. You can find more information on this in the MailCleaner User Manual, available in the help section of the Web User Interface. 9 MailCleaner Configuration FAQ
10 General settings: company How is the contact address used? These information s are purely informative and can be left empty. They are aimed at providing information on the people to contact or who are responsible for the system. i.e. in case the sysadmin has change. Domains: general - The top three options (System mail sender address, false negative reporting address, false positive reporting address) are all set in General Settings: defaults. Do these need to be entered again? - The last two options are set in General Settings: company. Do these need to be set again? No, if you leave these empty, the default configured in the General settings will be used. You can however fill them with specific addresses, if you want only one domain to be monitored for privacy measures. Domains: delivery - Use MX resolution. What does this do? The MX resolution option means that MailCleaner, instead of delivering to the host defined in the destination server, will do a MX resolution to find out where to deliver mail. This option can be useful in case you have some address rewriting in front of the MailCleaner in order to have a dynamic destination server resolution. This is however a quite rare case and should not be used in other cases because it can lead to delivery loops (as the MX record is likely to be the MailCleaner itself). 10 MailCleaner Configuration FAQ
11 Domains: address verification - Callout connectors. What is a Callout connector and what does it do? The callout is a functionality that allows MailCleaner to dynamically validate the existence of the destination address. When a new connection happens to the MailCleaner, the sending server provides MailCleaner with the sender address and the recipient address (your user). At this moment, and before accepting the remaining part of the message, MailCleaner will do a call to your destination server (or to the callout server if different) to ask if this destination address exists or not. If the destination server accepts the address, then MailCleaner will accept the message. If it refuses it (with a 550 user unknown error for example), MailCleaner will refuse the message. This is really handy in order to avoid dictionary attacks and useless filtering of invalid users. MailCleaner can currently do this call with two different protocols. The SMTP callout is the most efficient one as it is fast and very stable. All it does is effectively "mimic" the SMTP dialog MailCleaner receives, to the destination server. If it gets a 550 error code, then the message is refused. Otherwise the message is accepted and processed. The only requirement is that the destination server must refuse invalid recipient during the SMTP dialog. Almost all mail servers do that by default, but some still don't. Exchange is the main example of that. Fortunately, it is quite easy to enable this behavior. You should check the following document if you need to do so: The LDAP/AD connector will do a LDAP call to the callout server. This is a heavier protocol and thus is only advise of there is no other solution. Also, it is a bit more difficult to configure. Domains: authentication - What are the benefits of using POP3 vs IMAP vs SMTP vs Local authentication? - What is Local authentication and how is it used? - User name modifier. Is this applicable to a MailCleaner server? - How can Address Lookup be used best in a situation with 100 different domains? The POP3, IMAP and SMTP authentication connectors are remote. This means that the credentials are note stored on the MailCleaner, but on the authentication server (usually your mail server). MailCleaner will then forward the authentication to this server allowing users to use the same login information as for their mail (or desktop). This also has the advantage of being completely dynamic, which means that you don't need to create/update/delete accounts on the MailCleaner. Once a new account has been created on the authentication server (or mail server), it will be immediately available on MailCleaner. 11 MailCleaner Configuration FAQ
12 The difference between POP3, IMAP and SMTP is purely convenient for you. It does not make any difference for MailCleaner, but one or the other might be preferable for you (for policy reasons for example). The Ldap/Active Directory connector is also a remote connector but the other advantage of being exhaustive and being able to provide information on the account. This means that MailCleaner will also be able to fetch all addresses and aliases that are linked to a user. The local authentication is advised only for cases where it's absolutely not possible to reach any authentication or mail server, which is a very rare case. It is not advised, otherwise it imposes administrators to manage accounts manually, instead of being dynamic like for the other remote connectors. The username modifier is used by MailCleaner to define the format of the username that is actually sent to the authentication server. Some servers only accepts username with domains (i.e. username@domain) while other only accepts the username (username). This totally depends on the authentication server. As MailCleaner is a full multi-domain solution, and allows each domain to have it's own authentication settings, it has to know for which domain a user is attempting to log in. That way, the user will always need to log in using the username@domain on the MailCleaner. But in the case the authentication server only needs the username, then using the "username only" setting for the domain authentication, will tell MailCleaner to use the correct syntax. The address lookup is used by MailCleaner to either fetch (for exhaustive connectors, like Ldap), or build the addresses that will be added to the user account. For example, in an Active Directory, if a user has many different SMTP addresses, MailCleaner will be able to fetch them using the "fetch addresses from ldap directory" and display the correct quarantines to the user. If this information is not available, then MailCleaner can "build" it by adding the domain to the username (which is generally the case). Please note that this does not have any impact on the filtering, as all addresses accepted by the destination server will still be filtered. But this is only used for the MailCleaner Web User Interface and to correctly display the addresses to the user. Of course, the user can still add/remove/edit the addresses that he needs to see in his quarantine. Concerning the multi-domain, MailCleaner has being built on that purpose. So it is possible to either define a default value for all domains that are being added, or either specify a different authentication scheme for each one (if you have many external domains for which you are only doing the filtering for example). SMTP: SMTP checks We assume that this only applies to mail that is sent using the MailCleaner server as the SMTP server i.e. my client uses mailcleaner.domain.net as its SMTP address? - Is there a way of turning SMTP off so that hosts cannot connect directly to the MailCleaner server to send ? Originally, and by default, MailCleaner is only an Incoming gateway. Which means it is only aimed at receiving external mail for your domains and to deliver them to your mail server. Now, MailCleaner has many features that allow MailCleaner to be also used as an outgoing gateway. There are two ways to allow that: 12 MailCleaner Configuration FAQ
13 - setting allowed IP addresses in the "Configuration -> Connection control -> 'Allow external relaying for these hosts' " field - enabling the "Allow users to use SMTP authentication" in the authentication subpanel of each domain configuration. If none of the above are set, then MailCleaner will never allow messages being relayed to the outside. Only messages for the domains configured will ever be accepted. If this feature is required, then users are advised to use port 587, which is the standard for mail submission. MailCleaner will not apply any RBL check on this port but will only accept messages allowed to relay (either by a specifically allowed IP address, of by users using SMTP if it has been enabled). The settings in the SMTP checks panel are applied for all incoming connections, and only the two last options (Scan relayed and Mask IP address) are for the relayed messages. By default, SMTP relaying is not permitted on the MailCleaner. SMTP: resources control - What does enable per trusted host rate limit do? Is this configurable? All these settings applied to the incoming connection to MailCleaner. This means all messages being sent to your domains. Some hosts might be defined as "trusted", for example if you have some gateway (MX) in front of MailCleaner. The default settings usually are quite good for almost any situation (from low to high load). The rate limiting allows you to restrict the number of connections allowed for a period of time. This can be useful to protect against DoS attacks. These restrictions applied by default to every host connecting to the MailCleaner, but you can setup other (usually less strict) restrictions to the hosts that are defined as "trusted" (either from "Configuration -> Connection control -> 'Allow external relaying for these hosts' ", or from "Configuration -> Anti-spam -> Global Settings -> 'Trusted IPs/Networks' "). As soon as you check the "Enable per host rate limit" or "Enable per trusted host rate limit" option, the settings will appear. 13 MailCleaner Configuration FAQ
14 SMTP: TLS/SSL - What is this? This panel allows you to setup a SSL certificate in order to have the SMTP service of MailCleaner be able to encrypt connections on both incoming and outgoing path. Click on the "Enable SSL/TLS" checkbox to see more configuration options. SMTP: greylisting Avoid greylisting for these domains. This appears to be similar to Global domains settings -> filtering -> enable greylisting. Which screen takes precedence? - We would like to be able to switch off greylisting if we can. This "Avoid greylisting for these domains" option is only for the incoming message. This allows avoiding doing greylisting on certain domains that do not interact correctly with this technique, such as gmail, hotmail and so... By default the greylisting is off, but can be turned "On" on a per domain basis, through the filtering subpanel of the domain configuration. By the way, this technique is not really clean and thus should be avoided whenever possible (this is why it is disabled by default). Generally, the "Configuration -> Domains -> Global domains settings" is the way you can configure the default values for domains that are being added to the system. However, once a domain is created, it has its own setup and then is independent of this configuration panel. Anti-Spam: global settings If we enter a trusted IP or network in this box does this mean that those IP address(es) will not go through the Anti-spam system? - What is the correct notation for a network in this box e.g /27 or What do the enable access to whitelists and enable access to warnlists tick boxes do? 14 MailCleaner Configuration FAQ
15 No, messages sent by the IP addresses in the "Trusted IPs/networks" box will still be scanned. However, MailCleaner will forget the last Received header (the one from this host), and apply all anti-spam check the previous host. This is useful is you have a SMTP gateway in front of MailCleaner which is receiving the messages from the internet and then forwarding them to MailCleaner. That way, MailCleaner will be able to play the anti-spam check in the real external host, and not your internal, trusted system. Of course, if there is no other Received header, meaning that the message was originally issued from the trusted host, then the message will be fully trusted. The syntax is standard CIDR notation, such as /24, one IP or network by line. The whitelist and warnlist flag enable the whole white/warn listing in MailCleaner. Without this check enabled, nobody will be able to access and manage the white/warn lists. If enabled, the whitelists must also be enabled in the domain configuration (subpanel filtering) to be effectively active. We placed these protections because whitelisting is a very dangerous feature. Although it seems something quite common and natural, it is really badly used and thus very dangerous. The fact is that the whitelist is based on information (sender address) that is trivial to forge and fake. This makes it very easy for a spammer to circumvent any filtering by correctly forging the sender address of their spam (which is more and more often the case). This is why we strongly recommend users not to use whitelists. The warnlist is a mitigation of this risk. The principle here is the same as for the whitelist, but instead of letting the message go through (leading the user to believe the filter didn't detect the spam), it will put the message in quarantine and warn the recipient user that a message from this sender has been blocked. Then through a simple link, the user will be able to release and receive the message. Although this is not the ultimate solution, it will help much when a spammer abuses someone's address book in order to bypass all filtering. Anti-Spam: TrustedSources - What does Enable all trusted path detection mean? - What is the effect of entering something into Known good authenticated SMTP servers box? - Should this be a FQDN or an IP address? - What does Authenticated SMTP servers search string mean? - What is the format of the data entered here? The "all trusted path detection" is the way MailCleaner detects that a message is all internal and was not issued by an external host. This generally means that the message can be fully trusted and thus will avoid anti-spam checks. This is a good way to ensure that no internal message will ever be blocked by MailCleaner. On top of that, MailCleaner also has the capacity to detect if a message has been sent through a known and trusted authenticated SMTP server. This may be the case if you have some mobile users which use one of your server to send messages through an authenticated SMTP session. This will also help MailCleaner detect that these are good messages. You should put IP addresses here. 15 MailCleaner Configuration FAQ
16 The "search string" is any string that is present in the header added by the authentication server and which is pretty unique to it. This will help to enforce the check, but is not strictly required. Anti-Spam: NiceBayes Maximum message size. What happens if a message is greater than this size? Is it still filtered? Is it blocked? What happens to the message? This is the maximum size of a message that will be passed to this specific anti-spam module. If a message is greater than that, it will avoid this check, but will be passed to all the other. Even if all anti-spam modules are avoided due to this, the message is still delivered. This is a protection setting against DoS and a way to avoid wasting time and resources with techniques that do not apply on big data. This setting is available to all the modules and should not be modified. This is an advanced setting that will work fine with the default value. Generally, the default settings in the Anti-Spam part are quite fine and are optimized for the best efficiency with the databases provided in the Enterprise Edition of MailCleaner. Whenever we feel, upon your analysis feedback, that these settings should be modified, we will let you know or take appropriate measures. Content protection: Global settings Send notice to administrator. When are these messages sent and what information do they contain? This option will send a message to the specified address each time a virus or a dangerous content is being detected. This option is disabled by default because it usually generates more noise that any precious information. The information contains is the sender/recipient/subject of the message, and the reason why it has been blocked. If the message was quarantined, the release information will also be included. 16 MailCleaner Configuration FAQ
17 Services: Web interfaces Allowed IP ranges. Can we block IP addresses from accessing the web interface? - If we have understood things, then we can allow particular IP addresses. Using the default /0 range, everybody will be able to connect to the web interfaces. This is usually what people want as they need to be able to access it from everywhere. If you want to restrict it to some IP/Networks, then you have to put each exception in the box. If you need more granularity and more advanced firewalling features, this should be applied in the firewall protecting MailCleaner. Services: Database - How does this work? We assume that this allows remote access to a MySQL database? Yes, this allows access to the MySQL database. But this should only be used for very specific cases and only where no other solution can be found. If you need to programmatically interface with MailCleaner, you should definitively go with the API. Accessing the database directly cannot be supported by our support team. Services: API - May we have documentation for this? The API manual can be found here: 17 MailCleaner Configuration FAQ
I N S T A L L A T I O N M A N U A L
I N S T A L L A T I O N M A N U A L 2015 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Installation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
Deploying ModusGate with Exchange Server. (Version 4.0+)
Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php
Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information
Avira Managed Email Security AMES FAQ. www.avira.com
Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change
Configuration Guide for Exchange 2003, 2007 and 2010
Configuration Guide for Exchange 2003, 2007 and 2010 Table of Contents Exchange 2013... 2 Configuring Outbound Smart Host... 2 Configure Access Restriction to Prevent DoS Attacks... 2 Exchange 2007/2010...
How to Configure edgebox as an Email Server
intelligence at the edge of the network www.critical-links.com edgebox V4.5 Introduction: The Email Server panel allows the simple configuration edgebox as an email (Sendmail) server. edgebox uses Smarthost
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow
Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces
MailFoundry User Manual. Page 1 of 86. Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved. Page 1 of 86
MailFoundry User Manual Page 1 of 86 MailFoundry User Manual Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved Page 1 of 86 Table of Contents MailFoundry User Manual Page 2 of 86 Chapter
Security. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with
Service Overview & Installation Guide
Service Overview & Installation Guide Contents Contents... 2 1.0 Overview... 3 2.0 Simple Setup... 4 3.0 OWA Setup... 5 3.1 Receive Test... 5 3.2 Send Test... 6 4.0 Advanced Setup... 7 4.1 Receive Test
Install and Configure Oracle Outlook Connector
Install and Configure Oracle Outlook Connector To install and configure Oracle Outlook Connector for Outlook to send and receive e-mail and to access your TechTime TM calendar, do the following. 1. Run
Avira Managed Email Security (AMES) User Guide
Avira Managed Email Security (AMES) User Guide 1 Product information... 3 1.1 Functionality... 3 1.2 Licensing AMES... 3 2 Getting started with AMES... 4 2.1 Adding a new domain to AMES... 4 2.2 Logging
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Barracuda Spam Firewall Administrator s Guide
Barracuda Spam Firewall Administrator s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license.
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Exim4U. Email Server Solution For Unix And Linux Systems
Email Server Solution For Unix And Linux Systems General Overview, Feature Comparison and Screen Shots Exim4U Email Server Solution For Unix And Linux Systems Version 2.x.x October 12, 2012 Copyright 2009
Installing Policy Patrol with Lotus Domino
Policy Patrol 9 technical documentation May 21, 2013 If you have Lotus Domino R5/6/7/8/9 Mail Server, you must install Policy Patrol on a separate Windows 2003/2008/2012 machine and forward your mails
Email Client configuration and migration Guide Setting up Thunderbird 3.1
Email Client configuration and migration Guide Setting up Thunderbird 3.1 1. Open Mozilla Thunderbird. : 1. On the Edit menu, click Account Settings. 2. On the Account Settings page, under Account Actions,
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Core Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
Email Getting Started Guide Unix Platform
Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
PROOFPOINT - EMAIL SPAM FILTER
416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Microsoft Exchange 2003
Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
Migration Quick Reference Guide for Administrators
Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps
Configuring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
Borderware MXtreme. Secure Email Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware MXtreme Secure Email Gateway QuickStart Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview MXtreme is a hardened appliance with a highly robust
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
eprism Enterprise Tech Notes
eprism Enterprise Tech Notes Utilizing Microsoft Active Directory for eprism s Directory Services Context eprism can integrate with an existing LDAP (Lightweight Directory Access Protocol) directory for
Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.
Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
EFFECTIVE SPAM FILTERING WITH MDAEMON
EFFECTIVE SPAM FILTERING WITH MDAEMON Introduction The following guide provides a recommended method for increasing the overall effectiveness of MDaemon s spam filter to reduce the level of spam received
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
GFI Product Manual. Getting Started Guide
GFI Product Manual Getting Started Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
English Translation of SecurityGateway for Exchange/SMTP Servers
Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose
Best Practices Revision A. McAfee Email Gateway 7.x Appliances
Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
Email Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
Celframe - Easy Linux - Lesson 8 - Email Server
- Easy Linux - Lesson 8 - Email Server October 2007 Contents 1 Summary 2 2 Theoretical presentation 2 2.1 Introduction............................... 2 2.2 SMTP................................... 2 2.3
Ciphermail for BlackBerry Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Quick Start Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. Introduction This guide will explain how to setup and configure a Ciphermail
Important Information
June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com
Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP
Security perimeter white paper Configuring a security perimeter around JEP(S) with IIS SMTP Document control Document name: JEP(S) Security perimeter Author: Proxmea, Proxmea Last update: March 23, 2008
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
Quick Start Policy Patrol Spam Filter 9
Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration
Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration 1.1 How do I access the records of the domain(s) that I administer? To access the domains you administer, you
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Aloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Advanced Settings. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
Norman Email Protection
Quick Install Guide Norman Email Protection version 5.51 Features Email relay gateway with antivirus Email relay with antivirus and antispam Web application Table of Contents Overview... 3 System Requirements...
Quick Start Guide Sendio Hosted
Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Zimbra Open Source Email and Collaboration Suite
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with the Zimbra Open Source Email and Collaboration Suite Table of Contents Table of Contents Deploying the BIG-IP LTM with the Zimbra Open Source
MobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
Cloud Email & Web Security. Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
PineApp Archive-Secure Quick Installation Guide:
PineApp Archive-Secure Quick Installation Guide: The following guide provides setup instructions for Archive-SeCure s quick implementation for your network environment. For further detailing and other
SMTPSWITCH MAILER V6 FEATURES
SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor
MailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
Quick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.
Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved
Email Security 8.0 Administrator s Guide
Email Security 8.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
Talk-101 User Guides Mailgate Administration Guide
Talk-101 User Guides Mailgate Administration Guide Contents Contents... 2 Accessing the Mailgate Interface... 3 Adding a new domain... 3 User Aliases... 7 Update 09/06/2005 Page: 2 of 7 Accessing the Mailgate
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER
USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER Introduction For all Business Domain hosting services, Adam Internet provides the ability to add SPAM and VIRUS filtering. This service reduces the amount
Parallels Plesk Control Panel
Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,
Plesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)
Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with
