Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011



Similar documents
Exim4U. Server Solution For Unix And Linux Systems

Core Protection Suite

Avira Managed Security AMES FAQ.

Core Filtering Admin Guide

Fighting Spam in an ISP Environment:

Symantec Hosted Mail Security Getting Started Guide

A D M I N I S T R A T O R V 1. 0

Microsoft Exchange 2003

Service Launch Guide (US Customer) SEG Filtering

Migration Manual (For Outlook Express 6)

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Anti-Spam Configuration in Outlook 2003 INDEX. Webmail settings Page 2. Client settings Page 6. Creation date Version 1.2

Solutions IT Ltd Virus and Antispam filtering solutions

escan SBS 2008 Installation Guide

Articles Fighting SPAM in Lotus Domino

Xerox Multifunction Devices. Network Configuration. Domain 2. Domino Server 2. Notes. MIME to Notes. Port. Domino. Server 1.

Gateways Using MDaemon 6.0

Migration Project Plan for Cisco Cloud Security

Feature Comparison Guide

Serial Deployment Quick Start Guide

Migration Manual (For Outlook 2010)

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

SonicWALL Security Quick Start Guide. Version 4.6

Important Information

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

1 Introduction About this manual Terms and conventions used in this manual 11

Services Deployment. Administrator Guide

Guardian Digital Secure Mail Suite Quick Start Guide

1 You will need the following items to get started:

Barracuda Spam Firewall

Deployment Guide. For the latest version of this document please go to:

TTAsia Secure Over the Cloud

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

1 Introduction About this manual Terms and conventions used in this manual 12


FortiMail Filtering Course 221-v2.2 Course Overview

1 Introduction About this manual Terms and conventions used in this manual 12

Antispam Security Best Practices

Visendo Suite a reliable solution for SMBs

1 Accessing accounts on the Axxess Mail Server

Security. Help Documentation

Configuring Your Gateman Server

GFI Product Manual. GFI MailEssentials Administrator Guide

INLINE INGUARD GUARDIAN

XGENPLUS SECURITY FEATURES...

Migration Quick Reference Guide for Administrators

MailFoundry Users Manual. MailFoundry User Manual Revision: MF Copyright 2005, Solinus Inc. All Rights Reserved

Setting up Microsoft Office 365

Configuration Information

Technical Note. FORTIMAIL Configuration For Enterprise Deployment. Rev 2.1

How to set up a multifunction device or application to send using Office 365

Setting up Microsoft Office 365

Configuration Information

POP3 Connector for Exchange - Configuration

Comprehensive Anti-Spam Service

MailFoundry User Manual. Page 1 of 86. Revision: MF Copyright 2007, Solinus Inc. All Rights Reserved. Page 1 of 86

GFI Product Manual. Getting Started Guide

Norman Protection

IRMACS Setup. Your IRMACS is available internally by the IMAP protocol. The server settings used are:

Load-Balanced Merak Mail Server

SESA Securing with Cisco Security Appliance Parts 1 and 2

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

How to Configure edgebox as an Server

Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP

Installing GFI MailEssentials

Installing Policy Patrol with Lotus Domino

Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 ( /5049/5050) Course KC Days OVERVIEW COURSE OBJECTIVES AUDIENCE

ASAV Configuration Advanced Spam Filtering

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Mail Server Scenarios and Configurations

SPAM FILTER Service Data Sheet

Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers

OpenSRS Service DNS Configuration Guide

one million mails a day: open source software to deal with it Charly Kühnast Municipal Datacenter for the Lower Rhine Area Moers, Germany

CanIt-PRO End-User s Guide Roaring Penguin Software Inc. 9 September 2005

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

Firewall, Mail and File server solution

MDaemon Vs. Microsoft Exchange Server 2013 Standard

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration

GFI Product Manual. Administration and Configuration Manual

What is a Mail Gateway?... 1 Mail Gateway Setup Peering... 3 Domain Forwarding... 4 External Address Verification... 4

Quick Start Policy Patrol Spam Filter 5

Quick Start Policy Patrol Spam Filter 9

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

Mithi Connect Server deployment options

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

MDaemon configuration recommendations for dealing with spam related issues

Configuring -to-Feed in MangoApps

Talk-101 User Guides Mailgate Administration Guide

Transcription:

Hosted CanIt Roaring Penguin Software Inc. 26 April 2011

1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to use it effectively. Hosted CanIt is Software as a Service. Our CanIt anti-spam software runs on our servers, scanning your inbound e-mail. Clean e-mail is delivered to your mail servers, while suspect e-mail is held in a quarantine for you to review. You get the benefits of world-class spam and virus scanning without having to run your own servers, maintain your own software, or handle the bandwidth of massive amounts of unwanted e-mail. 2 Principles of Operation Hosted CanIt works as follows: You tell Hosted CanIt the host names or IP addresses of your real mail servers. You set the MX records for your domain to point to the Hosted CanIt scanner rather than your real mail servers. (Optional, but highly recommended) You block your real mail server from accepting SMTP connections from all external hosts except for the Hosted CanIt server. It s as simple as that! Figure 1 summarizes the way Hosted CanIt works: (a) shows your unprotected mail server receiving all mail from the. (b) shows Hosted CanIt protecting your mail server. Note that there is no direct path for unwanted mail to enter your server. (c) shows what happens if you allow external access to your real mail server. Spammers can make an end-run around Hosted CanIt. For this reason, you should not publish your real mail server as an MX record, and should firewall off port 25 except from the Hosted CanIt servers.

2 (a) Your Mail Server (b) Hosted CanIt Filter Your Mail Server NOT RECOMMENDED (c) Hosted CanIt Filter Your Mail Server Figure 1: Hosted CanIt Operation 3 Preparing to use Hosted CanIt In order to use Hosted CanIt, you must meet the following prerequisites: You must have your own domain name. We cannot filter personal Hotmail or GMail mail (for example). You must have your own SMTP server. Hosted CanIt does not offer POP3, IMAP or Webmail access. It merely acts as a relay, accepting SMTP in and delivering clean mail via SMTP.

3 Your SMTP server should validate recipients. That is, if it receives an SMTP RCPT command for a nonexistent recipient, it must return a failure code. If this is not the case, you will have to work with Roaring Penguin support personnel to come up with a way to validate recipients. You should turn off all SMTP anti-spam countermeasures such as greylisting, greet-delays, tarpitting, etc. These only serve to slow down Hosted CanIt for no benefit. You must be able to disable these countermeasures (at least for the Hosted CanIt server) to be eligible to use Hosted CanIt. You must also disable SPF on the back-end server; any necessary SPF checks will be made by Hosted CanIt.

4 4 Gathering Information For Roaring Penguin to configure Hosted CanIt, we require the information in the first three rows of the following table. (This information was likely entered into the Hosted CanIt Request Form; you can print a copy of this page and write in the information for your records.) Roaring Penguin will supply the information in the rest of the table. The IP addresses of our filtering machines are given to you so you can adjust your firewall rules to only allow SMTP traffic from Hosted CanIt. E-Mail Address of Contact Person: Domain Name: Host Name or IP Address to route mail to: Hosted CanIt MX Record #1: Hosted CanIt MX Record #2: Hosted CanIt Login URL: Hosted CanIt User Name: Hosted CanIt Password: IP Address of Hosted Filter 1: 72.1.205.163 IP Address of Hosted Filter 2: 70.38.114.81 IP Address of Hosted Filter 3: 174.142.25.1