Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

Size: px
Start display at page:

Download "Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials."

Transcription

1 Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to your users while making sure desired s are still delivered. With our spam defense tools, you can update your filters, modify your allow and block lists, and view your incoming and outgoing message logs to look for specific s. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials. 2. Once you are signed in, you will redirected to the admin panel. This will bring up the spam filtering dashboard. Here you will see seven task groups to help you manage spam. We ll be discussing each task group in the following sections. page 1 / 27

2 Incoming The incoming task group provides tools for you to deal with incoming and spam. Incoming mail is where most spam occurs, so it has the most tools. Log Search The Log search tool allows you to search for incoming s for a particular account. Click Log search, and then you will be brought to this search page: There are quite a few search options available: Date range: This sets the time and date for which you want to see results. A calendar will pop up if you click in either of these fields. Sender: Enter an address for the desired sender. Recipient: This allows you to set the desired recipient. It will be limited to addresses on your account. Sender IP: Search for a specific sender IP address. Sender host: Search for a specific sender host name. Match: This dropdown menu lets you specify whether you want to match All conditions or Any condition. All conditions requires results to meet ALL the other settings you specify. Any condition requires results to meet just ONE of the settings you specify. Return partial matches: If you check this, partial matches will be included in the results. Classification: This allows you to refine your results based on their delivery status (for example, whether they were marked as spam or not). Include results from the last minutes: This includes all the newest s in the results. page 2 / 27

3 Click the Start search -> button to see the results. Spam Quarantine The Spam quarantine tool lets you view messages that have been quarantined as spam. By default, all messages are shown, although you can also search by subject, sender, and recipient. You can un-quarantine a spam by clicking on the envelope symbol with the green arrow next to it, causing the message to be delivered to the appropriate mailbox. Delivery Queue The Delivery queue tool shows any undelivered s and the reasons for delay (such as the mail server being temporarily unavailable). You can also force a delivery attempt from this queue. Most of the time, it should be empty. page 3 / 27

4 Local Recipients The Local Recipient tool shows a local list of valid recipients. By default, this option is disabled. When you enable the Use local recipients checkbox, the system will only accept for the listed recipients. If you send s to recipients who are not listed in local recipient list then those will be permanently rejected. You can add list of recipient manually into the system. The Add local recipient option enables you to manually enter the desired list of local recipients. page 4 / 27

5 You can also upload a list of local recipients at once or in bulk via the Upload CSV file option. page 5 / 27

6 page 6 / 27

7 page 7 / 27

8 Domain Aliases page 8 / 27

9 The Domain aliases tool enables you to add and delete aliases for a particular domain. When you add a domain alias and switch the mx-records to activate the filtering for this alias domain, mail directed to user1@alias.ext will be filtered and delivered to user1@maindomain.ext. page 9 / 27

10 The Add alias option enables you to add alias for the domain. Edit Route The Edit route(s) tool enables you to find the route(s) (destination mail server) and their respective delivery order. You have the option to add and delete routes. Also, the list allows you to dynamically move the order of the routes by drag dropping them to the right position in the list. Domain Statistics The Domain statistics tool enables you to view statistics of a domain for a given timeframe. The statistics are displayed in tabular form as well as graphically. page 10 / 27

11 Filter Settings The Filter Settings tool enables you to control the activation of the quarantine system. On disabling the quarantine system, s detected as spam will not be kept in the quarantine system but will be delivered to your server. Also you can set the subject notation that is added to the subject of s classified as unsure by the filtering system. There are quite a few filter options available: Quarantine enabled: by default, this option is enabled. When this option is enabled, the s detected as spam will be kept in the quarantine system. Quarantine threshold: it is the minimum score that a message must receive in order to be classified as spam by the content analysis portion of the filter. The score ranges from 0.0 (certainly not spam) to 1.0 (certainly spam), so the higher this is set, the more likely you are to receive false page 11 / 27

12 negatives, and the less likely you are to receive false positives. By default, the quarantine threshold value is 0.9. You can increase or decrease the threshold by moving the slider either to left or right. Moving the slider to the right increases the quarantine threshold whereas moving the slider to the left decreases the quarantine threshold value. Tag threshold: it is the minimum score that a message must receive in order to be classified as unsure (and therefore notated) by the content analysis portion of the filter. The score ranges from 0.0 (certainly not spam) to 1.0 (certainly spam). This must be lower than the spam threshold. By default, the tag threshold value is 0.1. You can increase or decrease the threshold by moving the slider either to left or right. Moving the slider to the right increases the quarantine threshold whereas moving the slider to the left decreases the quarantine threshold value. Skip SPF check: SPF is a common technology that allows the sender to indicate which IPs are allowed to deliver for the sender domain. This check can be disabled by ticking this box. It is recommended to keep it enabled to prevent spam. Skip maximum line length check: There are strict regulations on allowed line length in s, which are automatically enforced by the software. Some applications or badly developed scripts do not adhere to the official specifications thereby exceeding the maximum allowed line-length. This option when enabled strictly monitors the maximum line length. This check can be disabled by ticking this box. It is recommended to keep it enabled to block spam. Unsure Notation: Prepend this tag to the subject of messages which the filter could not strongly classify as not spam or spam. Leave it empty, if not to prepend s. Unsure s are considered legitimate s, you can use this tag to have them stand out and to report them as spam/not spam to further improve effectiveness of the filter. Quarantine response: you can either accept or reject the quarantine response. Select the required option from the drop down menu. Once you have configured the required settings, click on the Save button to save the settings. The Reset to defaults button enables you to restore the custom configured settings to the default settings. Report Spam The Report spam tool allows you to upload spam s (in the.eml format only) to the filter to help train it to recognize spam. You can export s as.eml files from many mail client. Drag and drop the spam files from your computer, or use the traditional upload tool. page 12 / 27

13 Report Not Spam The Report not spam tool allows you to upload desired s (in the.eml format only) to the filter to help train it to recognize s that aren t spam. You can export s as.eml files from many mail client programs. Drag and drop the non-spam files from your computer, or use the traditional upload tool. Clear Callout Cache The Callout cache stores information regarding the existing and non-existing recipient addresses for up to two hours. You can manually clear the callout cache via this web interface. page 13 / 27

14 Outgoing The outgoing task group provides tools for you to deal with outgoing and spam. Specifically, it lets you view the outgoing message logs. Log Search The Log search tool allows you to search for incoming s for a particular account. Click Log search, and then you will be brought to this search page: There are quite a few search options available: Date range: This sets the time and date for which you want to see results. A calendar will pop up if you click in either of these fields. Sender: Enter an address for the desired sender. Recipient: This allows you to set the desired recipient. It will be limited to addresses on your account. Sender IP: Search for a specific sender IP address. Sender host: Search for a specific sender host name. Match: This dropdown menu lets you specify whether you want to match All conditions or Any condition. All conditions requires results to meet ALL the other settings you specify. Any condition requires results to meet just ONE of the settings you specify. Return partial matches: If you check this, partial matches will be included in the results. Classification: This allows you to refine your results based on their delivery status (for example, whether they were marked as spam or not). page 14 / 27

15 Include results from the last minutes: This includes all the newest s in the results. Click the Start search -> button to see the results. Generate DKIM Certificate The DKIM certificate generator generates DKIM certificate for outgoing s. When an outgoing is signed with DKIM then the recipient will be able to verify that message has been sent from the specified source/sender. It makes sure that the message content (i.e. important headers, like the subject) has not been altered. The DKIM certificate when generated for the outgoing s lowers the probability of the of being detected as spam. Here you can generate a DKIM certificate for your domain. Please fill the form below with the desired selector you've chosen earlier. As a result you will get a value for public key which should be available in your DNS. After successful DKIM generation you should enable the resulting DKIM certificate for each outgoing user using your selector. Manage Users The Manage user tool enables you to manage outgoing users. The SMTP AUTH username will be 'Username'@thegreatchain.com, and the password will be 'Password'. If the 'Username' field is left blank, then the SMTP AUTH username will just be '', and equal to the domain name. If the 'Password' field is left blank, then the 'Username' must be an IP address, and any connection from that IP will be considered authenticated without needing to use SMTP AUTH (note: authorizing IP addresses may be disabled on the system). page 15 / 27

16 Clear Callout Cache The Callout cache stores information regarding the existing and non-existing recipient addresses for up to two hours. You can manually clear the callout cache via this web interface. page 16 / 27

17 Protection Report The protection report fetches spamming statistics for a particular domain and/or website. Multiple types of reports are available. You can configure reporting tool as per your requirements. On Demand Domain Report The On-demand domain report tool enables you to generate protection report for a specified time interval. You can send this report to multiple addresses. Multiple addresses can be added with a comma. The real-time report delivery might take several minutes, depending on the size of the report being generated. A report can be sent as a PDF attachment or as inline HTML. The PDF report outlines a summary of the spam and viruses that the filtering service has protected the domain from receiving, and also includes information about the total volume of mail processed for the said domain. The On-demand domain report has the following filter criteria: Date start: it is the start date for the report generation. Period: you can either select Day or Week. When you select the Day option then report will be generated daily. On selection of Week, the report will be generated weekly. Language: localization is supported by the system. Select the desired language from the drop down menu. Format: select either HTML or PDF. When you select format as PDF then report will be sent as an attachment within an . The HTML format will be sent as an inline content. enter addresses to which report has to be sent. Multiple addresses can be added with a comma separator. Include extra spam table: by default, this option is enabled. You can disable this option if you don t intend to include spam table in the report. page 17 / 27

18 Periodic Domain Report The Periodic domain report tool enables you to control the activation of the protection report, the recipient, the frequency, the language and the format in which the report is presented to you. A report can be sent as a PDF attachment or as inline HTML. The PDF report outlines a summary of the spam and viruses that the filtering service has protected the domain from receiving, and also includes information about the total volume of mail processed for the said domain. The Periodic domain report has the following filter criteria: Report enabled: by default, this checkbox is disabled. Enable this checkbox to enable report generation. Recipient Address: enter address of the recipient. You can add multiple addresses separated by a comma. Report Frequency: you can either select Day or Week. When you select the Day option then report will be generated daily. On selection of Week, the report will be generated weekly. Language: localization is supported by the system. Select the desired language from the drop down menu Format: select either HTML or PDF. When you select format as PDF then report will be sent as an attachment within an . The HTML format will be sent as an inline content. Include extra spam table: by default, this option is enabled. You can disable this option if you don t intend to include spam table in the report. Send report with no quarantined messages: by default, this option is unchecked. If left in unchecked state includes quarantined messages in the report. Disabling it would not include quarantined messages in the report. Periodic User Report page 18 / 27

19 The periodic user report tool enables you to generate protection reports based on users. Users can be added either individually or via importing/uploading.csv file to add users in bulk. Only ASCII characters are supported for the local part. The report in PDF format shows a summary of the spam and viruses that the filtering services has protected the domain from receiving, and also includes information about the total volume of mail processed for the said user. The option Automatically activate for all recipient when enabled automatically adds new users who are vulnerable to spamming in the Periodic User Report. If you want to add a new user individually then click on the Add a recipient option. If you want to add multiple users from a.csv file then click on the Upload CSV file. page 19 / 27

20 Restrictions Blocked Extensions The Blocked Extensions tool enables you to block s based on the type of extension attached in the . You can also add other extensions that are not available in the list of already existing extensions. Tick the checkbox placed against each extension. The containing the selected extensions will then be blocked. To add more extensions, click on the Add extension option. Size Restriction By default there is no limit to the size. When there is no size limit being specified then the system uses the size set by the destination mailserver. To outweigh the potential threat of spam and viruses you can set the maximum size for both incoming and outgoing s to be accepted by the filtering system. page 20 / 27

21 page 21 / 27

22 Whitelist/Blacklist Sender Whitelist In whitelist all spam and virus filtering checks are disabled for the senders. You can either whitelist a particular sending address or a full sending domain. It is recommended to only use sender whitelist if the system would wrongly block from a certain sender. You can either individually enter sender address or upload sender address to whitelist via.csv file. To add a sender s address or a complete domain to whitelist, click on the Add sender option. Enter the address/domain name and click on the Add button. Sender Blacklist The Sender blacklist enables you to add senders address or domains in the blacklist. s will not be sent to the senders addresses or domains that are added in senders blacklist. To blacklist a full domain, simply add the domain name The messages are NOT quarantined. The messages are rejected with a 5xx SMTP error code, so legitimate sending SMTP servers will generate a bounce message to the sender. You can either individually enter sender address or upload sender address to blacklist via.csv file. page 22 / 27

23 Recipient Whitelist All filtering checks are disabled for the addresses and/or domains listed in the whitelist. It is recommended to only use recipient whitelist for exceptional cases such as or recipients. You can either individually enter recipient address or upload sender address to whitelist via.csv file. You can whitelist all recipients by selecting all or required recipient and then clicking the Whitelist all recipients button. Recipient Blacklist Recipients added in the blacklist won t be able to receive any messages. All s to the recipients listed on the blacklist will be rejected automatically. The messages are NOT quarantined. The messages are rejected with a 5xx SMTP error code, so legitimate sending SMTP servers will generate a bounce message to the sender. You can either individually enter recipient address or upload sender address to blacklist via.csv file. You can blacklist all recipients by selecting all or required recipient and then clicking the Blacklist all recipients button. page 23 / 27

24 page 24 / 27

25 Webinterface Users Manage Users The Manage users tool enables you to manage users. The users can sign into the Spampanel with their addresses to see their own quarantine, and manage specific settings. It is recommended that before managing users, make sure that the domain for which you are about to create already exists on the server. While setting the password, the password should have lower case letters, at least on upper case letter or one digit, should not contain any spaces, an must be 6-25 characters long. ASCII characters are only supported for the local part. To add a user, click on the Add option. You need to enter the following details: Username: it is the username of the user at selected domain. Password/Confirm Password: it is the password to be set for the user. Status: a user can be either in Active or Inactive state. Select the required radio button accordingly. Once all details have been entered, click on the Save button. You can upload a Comma Separated Values (CSV) file. Each line in the file must contain at least four columns, the username, the domain, the password and the status. page 25 / 27

26 Manage Permissions The Manage Permissions option enables you to manage permissions for available user s roles. page 26 / 27

27 My Account User's Profile The User s profile option enables you to manage your profile settings. You can update your username, password and settings are per requirements. page 27 / 27 Powered by TCPDF (

Table of Contents Control Panel Access... 1 Incoming... 6 Outgoing Archive Protection Report Whitelist / Blacklist...

Table of Contents Control Panel Access... 1 Incoming... 6 Outgoing Archive Protection Report Whitelist / Blacklist... User Guide Table of Contents Control Panel Access... 1 Access MxVault Control Panel... 2 Incoming... 6 Incoming Spam Quarantine... 7 Incoming Log Search... 9 Delivery Queue... 12 Report Non-Spam... 16

More information

SpamPanel Level Manual 1 Last update: 2015/02/03 SpamPanel

SpamPanel  Level Manual 1 Last update: 2015/02/03 SpamPanel SpamPanel Email Level Manual 1 Last update: 2015/02/03 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam... 9 Report Spam...

More information

Mail Assure Quick Start Guide

Mail Assure Quick Start Guide Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Mail Assure. User Guide - Admin, Domain and Level

Mail Assure. User Guide - Admin, Domain and  Level Mail Assure User Guide - Admin, Domain and Email Level Last Updated: Friday, June 15, 2018 ----------- 2018 CONTENTS Getting Started 1 Useful Links 1 What's New 1 Accessing Mail Assure 6 User Permissions

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Mail Assure. Quick Start Guide

Mail Assure. Quick Start Guide Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up

More information

Comodo Antispam Gateway Software Version 2.1

Comodo Antispam Gateway Software Version 2.1 Comodo Antispam Gateway Software Version 2.1 User Guide Guide Version 2.1.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...

More information

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In USER GUIDE This guide walks through the user interface of ContentCatcher, and the features and parameters contained therein. Accessing the User Interface The ContentCatcher user interface is a secure web-based

More information

MX Control Console. Administrative User Manual

MX Control Console. Administrative User Manual MX Control Console Administrative User Manual This Software and Related Documentation are proprietary to MX Logic, Inc. Copyright 2003 MX Logic, Inc. The information contained in this document is subject

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

MxVault Questions and Answers

MxVault Questions and Answers Table of Contents INCOMING SERVICE... 2 1. INCOMING FILTERING SERVICE... 2 2. DOMAIN ALIASING... 5 3. ENCRYPTION TLS... 6 4. REPORTING SPAM... 6 5. ERROR CODE 500... 8 6. GREYLISTING... 8 7. MESSAGE QUEUING...

More information

WeCloud Security. Administrator's Guide

WeCloud  Security. Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including

More information

Documentation for the new Self Admin

Documentation for the new Self Admin Documentation for the new Self Admin The following documentation describes the structure of the new Self Admin site along with the purpose of each site section. The improvements that have been made to

More information

Admin Guide Defense With Continuity

Admin Guide  Defense With Continuity Admin Guide Email Defense With Continuity DOCUMENT REVISION DATE: April, 2010 Email Defense with Continuity--Admin Guide / Table of Contents Page 2 of 41 Table of Contents QUICK STAR T CHECKLIST... 3 USE

More information

Welcome to ContentCatcher 3.0! If this is your first time using ContentCatcher 3.0, here s a great way to start. We ll walk you through the essential

Welcome to ContentCatcher 3.0! If this is your first time using ContentCatcher 3.0, here s a great way to start. We ll walk you through the essential Welcome to ContentCatcher 3.0! If this is your first time using ContentCatcher 3.0, here s a great way to start. We ll walk you through the essential first steps so your team can work efficiently and productively

More information

ISOCNET Quarantine. User s Guide

ISOCNET Quarantine. User s Guide ISOCNET Quarantine User s Guide Contents Logging in... 2 Password... 3 Successful Login... 3 1-Check Mail, Block Address/Domain, and Trust Address... 4 Check Mail... 4 Blocked Senders List... 4 Trusted

More information

CLOUD MAIL Administrator User Guide. (Version 1.0)

CLOUD MAIL Administrator User Guide. (Version 1.0) Administrator User Guide () Table of Contents 1. How to Login the Administration Panel... 3 2. How to Update Administrator Information... 4 3. How to Check the Cloud Mail Account Information... 4 4. How

More information

Important Information

Important Information May 2014 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Using Your New Webmail

Using Your New Webmail Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...

More information

Service User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0

Service User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0 Outlook 2003 By SYSCOM (USA) May 7, 2013 Version 2.0 1 Contents 1. How to set up POP3/SMTP for Outlook 2003... 3 2. How to Setup IMAP for Outlook 2003... 10 3. How to Manage Spam Filter... 15 2 1. How

More information

Spam Quarantine. Overview of the Spam Quarantine. Local Versus External Spam Quarantine. This chapter contains the following sections:

Spam Quarantine. Overview of the Spam Quarantine. Local Versus External Spam Quarantine. This chapter contains the following sections: This chapter contains the following sections: Overview of the, page 1 Local Versus External, page 1 Setting Up the Centralized, page 2 Edit Page, page 7 Using Safelists and Blocklists to Control Email

More information

Spam Quarantine. Overview of the Spam Quarantine. Local Versus External Spam Quarantine

Spam Quarantine. Overview of the Spam Quarantine. Local Versus External Spam Quarantine This chapter contains the following sections: Overview of the, on page 1 Local Versus External, on page 1 Setting Up the Local, on page 2 Using Safelists and Blocklists to Control Email Delivery Based

More information

Understanding the Pipeline

Understanding the  Pipeline This chapter contains the following sections: Overview of the Email Pipeline, page 1 Email Pipeline Flows, page 2 Incoming / Receiving, page 4 Work Queue / Routing, page 6 Delivery, page 10 Overview of

More information

On the Surface. Security Datasheet. Security Datasheet

On the Surface.  Security Datasheet.  Security Datasheet Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record

More information

Anti-Spam Processing at UofH

Anti-Spam Processing at UofH Anti-Spam Processing at UofH The university's email system is protected by an anti-spam device that helps stop spam from being delivered to your mailbox. Features are: Allows you to choose whether or not

More information

Spam UF. Use and customization instructions for the Barracuda Spam service at the University of Florida.

Spam UF. Use and customization instructions for the Barracuda Spam service at the University of Florida. Spam Quarantine @ UF Use and customization instructions for the Barracuda Spam service at the University of Florida. Graff, Randy A 10/10/2008 Contents Overview... 2 Getting Started... 2 Actions... 2 Whitelist/Blacklist...

More information

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections:

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections: This chapter contains the following sections: Overview of the, page 1 Local Versus External, page 2 Setting Up the Local, page 2 Setting Up the Centralized, page 3 Edit Page, page 6 Using Safelists and

More information

Tracking Messages

Tracking  Messages This chapter contains the following sections: Tracking Service Overview, page 1 Setting Up Centralized Message Tracking, page 2 Checking Message Tracking Data Availability, page 4 Searching for Email Messages,

More information

Grapevine web hosting user manual. 12 August 2005

Grapevine web hosting user manual. 12 August 2005 Grapevine web hosting user manual 12 August 2005 Grapevine web hosting user manual 2 Contents Contents... 2 Introduction... 4 System features... 4 How it looks... 5 Main navigation... 5 Reports... 6 Web

More information

Getting Started Guide moduscloud

Getting Started Guide moduscloud Getting Started Guide moduscloud Hi and welcome to moduscloud! If this is your first time using moduscloud, here s a great way to start. We ll walk you through the essential first steps so your team can

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

Using the Control Panel

Using the Control Panel Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox

More information

EVRY Security. Administrator's Guide

EVRY  Security. Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security provides a variety of useful features within a user-friendly web console to manage the functions

More information

An Overview of Webmail

An Overview of Webmail An Overview of Webmail Table of Contents What browsers can I use to view my mail? ------------------------------------------------------- 3 Email size and storage limits -----------------------------------------------------------------------

More information

Configuration Section

Configuration Section 8 Configuration Section MailCleaner can be easily customized to fit your needs and your working style. The Configuration menu contains six sections: Interface, Address groups, Address settings, Quarantine

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 Administrator Guide Guide Version 2.12.112217 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam

More information

Service User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0

Service User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0 Outlook 2013 By SYSCOM (USA) May 2nd, 2016 Version 1.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2013... 3 2. How to Setup IMAP for Outlook 2013... 14 3. How to Manage Spam Filter... 25 2

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

Untitled Page. Help Documentation

Untitled Page. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Antispam Administration SmarterMail comes equipped with a number

More information

Personal Dashboard User Guide

Personal Dashboard User Guide Version 8.1 800-782-3762 www.edgewave.com 2001 2011 EdgeWave. All rights reserved. The Red Condor and EdgeWave logos and brands are trademarks of EdgeWave. All other trademarks and registered trademarks

More information

Technical description

Technical description www.mailcleaner.net Technical description V2017.8 Rev: 30-08-17 INTERNET SECURITY APPLIANCE PWR SYS AUX CARD RESET USB WAN1 WAN2 OPT LAN1/LAN2/DMZ 1 2 P1 P2 P3 P4 P5 P6 P7 MASTER SLAVE(S) MailCleaner Copyright

More information

SpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam.

SpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam. SpamCheetah manual SpamCheetah is the spam control technique from Gayatri Hitech. SpamCheetah achieves spam control by way of employing an SMTP proxy which invokes various virus scanning, spam control

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.7.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...5

More information

Service User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0

Service User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0 Outlook 2007 By SYSCOM (USA) May 2, 2013 Version 2.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2007... 3 2. How to Setup IMAP for Outlook 2007... 13 3. How to Manage Spam Filter... 22 2 1.

More information

MailCore Pro User Guide

MailCore Pro User Guide Welcome to your MailCore Pro Account MailCore Pro is a powerful collection of email and collaboration tools that add enterpriselevel features to regular group email. The following guide will take you through

More information

The Multi Domain Administrator account can operate with Domain Administrator privileges on all associated Domain Administrator users.

The Multi Domain Administrator account can operate with Domain Administrator privileges on all associated Domain Administrator users. User Management Libra Esva users can manage and access the system. With Libra Esva you can enable per-user quarantine and the system will create user accounts to enable access to quarantine settings and

More information

Important Information

Important Information February 2017 Important Information The following information applies to Proofpoint Essentials US2 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

TOTAL CONTROL SECURITY END USER GUIDE

TOTAL CONTROL  SECURITY END USER GUIDE TOTAL CONTROL EMAIL SECURITY END USER GUIDE Welcome to the Total Control email security solution, which protects you against spam, viruses, phishing exploits, and other email-borne threats. In this guide,

More information

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message WebMail Help User Manual Index Accessing WebMail Logging In Check your Mail Main Mail Screen Reading Messages Search Sending a new message Address book Spelling Attaching files Html Text Managing addresses

More information

Anti-Spoofing. Inbound SPF Settings

Anti-Spoofing. Inbound SPF Settings Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging

More information

Advanced Settings. Help Documentation

Advanced Settings. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods

More information

UP & DOMAIN ADMINISTRATION GUIDE

UP & DOMAIN ADMINISTRATION GUIDE DOMAIN GROUP & DOMAIN ADMINISTRATION GUIDE Email Security Service MPS 6 for Hosted Service Providers MPS 6 for Hosted Enterprises MPS 6 for Service Providers MPS 6 for Enterprises Disclaimer The information

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...

More information

Admin Quick Start Guide Protection Service Anti-Virus & Anti-Spam

Admin Quick Start Guide  Protection Service Anti-Virus & Anti-Spam Admin Quick Start Guide Email Protection Service Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: January, 2010 Email Protection Admin Quick Start Guide / Table of Contents Page 2 of 17 Table of Contents

More information

AccessMail Users Manual for NJMLS members Rev 6

AccessMail Users Manual for NJMLS members Rev 6 AccessMail User Manual - Page 1 AccessMail Users Manual for NJMLS members Rev 6 Users Guide AccessMail User Manual - Page 2 Table of Contents The Main Menu...4 Get Messages...5 New Message...9 Search...11

More information

Orbital provide a secure (SSL) Mailserver to protect your privacy and accounts.

Orbital provide a secure (SSL) Mailserver to protect your privacy and  accounts. Email Configuration This document is designed to help our clients in setting up email accounts on popular devices and email client software. Orbital provide a secure (SSL) Mailserver to protect your privacy

More information

Proofpoint Essentials: Part of the Proofpoint Family... 5 Proofpoint Essentials Overview Best Practices... 10

Proofpoint Essentials: Part of the Proofpoint Family... 5 Proofpoint Essentials Overview Best Practices... 10 June 2015 Preface... 4 About this Guide... 4 Intended Audience and Prerequisite Knowledge... 4 Other Sources of Information... 4 Contacting Proofpoint Essentials Support... 4 Knowledge Base... 5 Support

More information

Schema for Gmail logs in BigQuery

Schema for Gmail logs in BigQuery Schema for Gmail logs in BigQuery Contents Schema for Gmail logs in BigQuery Field descriptions Sender Service and Selector Destination Service and Selector Action types Message set types Error codes SMTP

More information

To create a few test accounts during the evaluation period, use the Manually Add Users steps.

To create a few test accounts during the evaluation period, use the Manually Add Users steps. Once you complete the Essentials for Office 365 Wizard, the Essentials page displays in Barracuda Cloud Control. Click Set up additional domains to go to the Barracuda Email Security Service Domains page,

More information

CAMELOT Configuration Overview Step-by-Step

CAMELOT Configuration Overview Step-by-Step General Mode of Operation Page: 1 CAMELOT Configuration Overview Step-by-Step 1. General Mode of Operation CAMELOT consists basically of three analytic processes running in a row before the email reaches

More information

Error Codes have 3 Digits

Error Codes have 3 Digits The top portion covers bounce back messages. The x.x.x The xxx Examples of real Error messages with an explaination. (the email client errors coming in the future) The 2nd half covers email connection

More information

MailCleaner Extended FAQ

MailCleaner Extended FAQ MailCleaner Extended FAQ NETHZ Mail Filtering Preferences NETHZ 001 Q: Can I still use my nethz Mail Filtering Preferences? A: The "email Spamfilter" option of the www.passwort.ethz.ch user interface will

More information

Handling unwanted . What are the main sources of junk ?

Handling unwanted  . What are the main sources of junk  ? Handling unwanted email Philip Hazel Almost entirely based on a presentation by Brian Candler What are the main sources of junk email? Spam Unsolicited, bulk email Often fraudulent penis enlargement, lottery

More information

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections: This chapter contains the following sections: Message Tracking Overview, page 1 Enabling Message Tracking, page 1 Searching for Messages, page 2 Working with Message Tracking Search Results, page 4 Checking

More information

SECTION 5 USING STUDENT

SECTION 5 USING STUDENT SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling

More information

University Information Technology (UIT) Proofpoint Frequently Asked Questions (FAQ)

University Information Technology (UIT) Proofpoint Frequently Asked Questions (FAQ) University Information Technology (UIT) Proofpoint Frequently Asked Questions (FAQ) What is Proofpoint?... 2 What is an End User Digest?... 2 In my End User Digest I see an email that is not spam. What

More information

Introduction. Logging in. WebQuarantine User Guide

Introduction. Logging in. WebQuarantine User Guide Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine

More information

Step 2 - Deploy Advanced Security for Exchange Server

Step 2 - Deploy Advanced  Security for Exchange Server Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service

More information

Health Messenger User Guide

Health Messenger User Guide Health Messenger User Guide V 2.6 3/09/2018 USER GUIDE TABLE OF CONTENTS 1.0 GENERAL INFORMATION 1.1 System Overview 1.2 Support 1.3 Uploading Export Files 1.4 Minimum System Requirements 2.0 GETTING STARTED

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

Documentation Userinterface

Documentation Userinterface Documentation Userinterface Version 2030 www.reddoxx.com 1 Copyright 2013 by REDDOXX GmbH REDDOXX GmbH Neue Weilheimer Str. 14 D-73230 Kirchheim Fon: +49 (0)7021 92846-0 Fax: +49 (0)7021 92846-99 E-Mail:

More information

Barracuda Security Service User Guide

Barracuda  Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses, worms, phishing, and denial of service attacks.

More information

Protection Blocking. Inspection. Web-Based

Protection Blocking. Inspection. Web-Based Protection Blocking Inspection Web-Based Anti-Virus & removal of dangerous attachments. Prevent your server from being used as open-relay. Stop mail-loops. Blocks open relay sources. Isolate known spam

More information

Web Mail and e-scout Instructions

Web Mail and e-scout Instructions Web Mail and e-scout Instructions To log into e-scout: visit our home page at www.greenhills.net, click on web mail at the top of the page OR click on the customer center tab and then the webmail button,

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

Sophos Central Partner. help

Sophos Central Partner. help help Contents About help...1 About...2 Dashboard... 3 Alerts...4 Logs... 5 Audit Logs...5 Sophos Central...7 Sophos Central customers...7 Sophos Central Licenses... 7 Managed Customer Usage... 9 Trial

More information

Status Node Reference

Status Node Reference IceWarp Unified Communications Status Node Reference Version 10.4 Printed on 23 February, 2012 Contents Status 1 Message Queue... 2 Spam Queues... 3 Quarantine... 3 Whitelist... 4 BlackList... 5 Greylisting...

More information

How to Configure Esva for Office365

How to Configure Esva for Office365 How to Configure Esva for Office365 This article addresses configuring Office 365 with Libra Esva as your inbound and/or outbound mail gateway. You can specify the appliance as an inbound mail gateway

More information

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps:// IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : ST0-250 Title : SymantecMessaging Gateway10.5Technical Assessment Version : DEMO 1 / 5 1.What is the

More information

Symantec ST Symantec Messaging Gateway Download Full Version :

Symantec ST Symantec Messaging Gateway Download Full Version : Symantec ST0-199 Symantec Messaging Gateway 10.0 Download Full Version : https://killexams.com/pass4sure/exam-detail/st0-199 QUESTION: 111 When configuring DKIM signing, how should the domain key generated

More information

Administration. STILOG IST, all rights reserved

Administration. STILOG IST, all rights reserved 2 Table of Contents I. Admin Center... 1 1. ACCESS... 1 Starting the Admin Center application... 1 2. General Settings... 2 Home page... 3 Client... 4 Application... 5 VPPortal... 6 3. Password Configuration...

More information

Help for System Administrators

Help for System Administrators Help for System Administrators Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Help for System Administrators

More information

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0 Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet

More information

Preface Introduction to Proofpoint Essentials... 6

Preface Introduction to Proofpoint Essentials... 6 June 2016 Preface... 4 About this Guide... 4 Intended Audience and Prerequisite Knowledge... 4 Important Terms... 4 Contacting Proofpoint Essentials Support... 5 Knowledge Base... 5 Support Contact Information...

More information

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

Defining Which Hosts Are Allowed to Connect Using the Host Access Table Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, on page 1 Defining Remote

More information

TurnkeyMail 7.x Help. Logging in to TurnkeyMail

TurnkeyMail 7.x Help. Logging in to TurnkeyMail Logging in to TurnkeyMail TurnkeyMail is a feature-rich Windows mail server that brings the power of enterprise-level features and collaboration to businesses and hosting environments. Because TurnkeyMail

More information

What's new in Europa?

What's new in Europa? What's new in Europa? Quarantine Search Capabilities ( Managing your quarantined items ) Setting Control level in user level in anti spam Auto White List Outbound Recipients Mode Analysis Sender Profile

More information

Mimecast Personal Portal (MPP)

Mimecast Personal Portal (MPP) Mimecast Personal Portal (MPP) Mimecast Personal Portal (MPP) Advanced Bounce Viewer Managed Senders Moderated On Hold Personal On Hold Rejection Viewer Calendars Exchange Folders File Archive Logging

More information

Training Tracker 6. PC Edition. Copyright Computer Directions, LLC

Training Tracker 6. PC Edition. Copyright Computer Directions, LLC Training Tracker 6 PC Edition Copyright 2014-2016 Computer Directions, LLC Contents What is Training Tracker?... 3 Getting Started... 4 The People Tab... 4 Overview... 4 Adding People... 5 Editing People...

More information

MailCleaner Extended FAQ

MailCleaner Extended FAQ MailCleaner Extended FAQ NETHZ Mail Filtering Preferences NETHZ 001 Q: Can I still use my nethz Mail Filtering Preferences? A: The "email Spamfilter" option of the www.passwort.ethz.ch user interface will

More information

Symantec Hosted Mail Security Console and Spam Quarantine User s Guide

Symantec Hosted Mail Security Console and Spam Quarantine User s Guide Symantec Hosted Mail Security Console and Spam Quarantine User s Guide Copyright 2005 Symantec Corporation and/or its thirdparty licensors. All Rights Reserved. Document Version: RESTRICTION ON USE, PUBLICATION,

More information

My MessageMedia User Guide

My MessageMedia User Guide My MessageMedia User Guide Copyright and Trademark Statement 2011 MessageMedia All rights reserved. Apart from any use permitted under the Copyright Act 1968, no part of this publication may be reproduced,

More information

Integrated Migration Tool

Integrated Migration Tool IceWarp Unified Communications Version 12 Published on 9/20/2017 Contents... 4 How It Works... 5 Performing Migration... 5 Set up the Domain in IceWarp Server... 6 Create Migrator Email Account... 8 Configure

More information

Univention Corporate Server. Cyrus mail server

Univention Corporate Server. Cyrus mail server Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction... 4 2. Installation... 5 3. Management of the mail server data... 6 3.1. Management of mail domains... 6 3.2. Assignment

More information

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

IBM Express Managed Security Services for  Security. Anti-Virus Administrator s Guide. Version 5.31 IBM Express Managed Security Services for Email Security Anti-Virus Administrator s Guide Version 5.31 Table of Contents 1. Service overview...3 1.1 Welcome... 3 1.2 Anti-Virus (AV) features... 3 1.3 How

More information

Getting Started 2 Logging into the system 2 Your Home Page 2. Manage your Account 3 Account Settings 3 Change your password 3

Getting Started 2 Logging into the system 2 Your Home Page 2. Manage your Account 3 Account Settings 3 Change your password 3 Table of Contents Subject Page Getting Started 2 Logging into the system 2 Your Home Page 2 Manage your Account 3 Account Settings 3 Change your password 3 Junk Mail Digests 4 Digest Scheduling 4 Using

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information