Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials."

Transcription

1 Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to your users while making sure desired s are still delivered. With our spam defense tools, you can update your filters, modify your allow and block lists, and view your incoming and outgoing message logs to look for specific s. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials. 2. Once you are signed in, you will redirected to the admin panel. This will bring up the spam filtering dashboard. Here you will see seven task groups to help you manage spam. We ll be discussing each task group in the following sections. page 1 / 27

2 Incoming The incoming task group provides tools for you to deal with incoming and spam. Incoming mail is where most spam occurs, so it has the most tools. Log Search The Log search tool allows you to search for incoming s for a particular account. Click Log search, and then you will be brought to this search page: There are quite a few search options available: Date range: This sets the time and date for which you want to see results. A calendar will pop up if you click in either of these fields. Sender: Enter an address for the desired sender. Recipient: This allows you to set the desired recipient. It will be limited to addresses on your account. Sender IP: Search for a specific sender IP address. Sender host: Search for a specific sender host name. Match: This dropdown menu lets you specify whether you want to match All conditions or Any condition. All conditions requires results to meet ALL the other settings you specify. Any condition requires results to meet just ONE of the settings you specify. Return partial matches: If you check this, partial matches will be included in the results. Classification: This allows you to refine your results based on their delivery status (for example, whether they were marked as spam or not). Include results from the last minutes: This includes all the newest s in the results. page 2 / 27

3 Click the Start search -> button to see the results. Spam Quarantine The Spam quarantine tool lets you view messages that have been quarantined as spam. By default, all messages are shown, although you can also search by subject, sender, and recipient. You can un-quarantine a spam by clicking on the envelope symbol with the green arrow next to it, causing the message to be delivered to the appropriate mailbox. Delivery Queue The Delivery queue tool shows any undelivered s and the reasons for delay (such as the mail server being temporarily unavailable). You can also force a delivery attempt from this queue. Most of the time, it should be empty. page 3 / 27

4 Local Recipients The Local Recipient tool shows a local list of valid recipients. By default, this option is disabled. When you enable the Use local recipients checkbox, the system will only accept for the listed recipients. If you send s to recipients who are not listed in local recipient list then those will be permanently rejected. You can add list of recipient manually into the system. The Add local recipient option enables you to manually enter the desired list of local recipients. page 4 / 27

5 You can also upload a list of local recipients at once or in bulk via the Upload CSV file option. page 5 / 27

6 page 6 / 27

7 page 7 / 27

8 Domain Aliases page 8 / 27

9 The Domain aliases tool enables you to add and delete aliases for a particular domain. When you add a domain alias and switch the mx-records to activate the filtering for this alias domain, mail directed to will be filtered and delivered to page 9 / 27

10 The Add alias option enables you to add alias for the domain. Edit Route The Edit route(s) tool enables you to find the route(s) (destination mail server) and their respective delivery order. You have the option to add and delete routes. Also, the list allows you to dynamically move the order of the routes by drag dropping them to the right position in the list. Domain Statistics The Domain statistics tool enables you to view statistics of a domain for a given timeframe. The statistics are displayed in tabular form as well as graphically. page 10 / 27

11 Filter Settings The Filter Settings tool enables you to control the activation of the quarantine system. On disabling the quarantine system, s detected as spam will not be kept in the quarantine system but will be delivered to your server. Also you can set the subject notation that is added to the subject of s classified as unsure by the filtering system. There are quite a few filter options available: Quarantine enabled: by default, this option is enabled. When this option is enabled, the s detected as spam will be kept in the quarantine system. Quarantine threshold: it is the minimum score that a message must receive in order to be classified as spam by the content analysis portion of the filter. The score ranges from 0.0 (certainly not spam) to 1.0 (certainly spam), so the higher this is set, the more likely you are to receive false page 11 / 27

12 negatives, and the less likely you are to receive false positives. By default, the quarantine threshold value is 0.9. You can increase or decrease the threshold by moving the slider either to left or right. Moving the slider to the right increases the quarantine threshold whereas moving the slider to the left decreases the quarantine threshold value. Tag threshold: it is the minimum score that a message must receive in order to be classified as unsure (and therefore notated) by the content analysis portion of the filter. The score ranges from 0.0 (certainly not spam) to 1.0 (certainly spam). This must be lower than the spam threshold. By default, the tag threshold value is 0.1. You can increase or decrease the threshold by moving the slider either to left or right. Moving the slider to the right increases the quarantine threshold whereas moving the slider to the left decreases the quarantine threshold value. Skip SPF check: SPF is a common technology that allows the sender to indicate which IPs are allowed to deliver for the sender domain. This check can be disabled by ticking this box. It is recommended to keep it enabled to prevent spam. Skip maximum line length check: There are strict regulations on allowed line length in s, which are automatically enforced by the software. Some applications or badly developed scripts do not adhere to the official specifications thereby exceeding the maximum allowed line-length. This option when enabled strictly monitors the maximum line length. This check can be disabled by ticking this box. It is recommended to keep it enabled to block spam. Unsure Notation: Prepend this tag to the subject of messages which the filter could not strongly classify as not spam or spam. Leave it empty, if not to prepend s. Unsure s are considered legitimate s, you can use this tag to have them stand out and to report them as spam/not spam to further improve effectiveness of the filter. Quarantine response: you can either accept or reject the quarantine response. Select the required option from the drop down menu. Once you have configured the required settings, click on the Save button to save the settings. The Reset to defaults button enables you to restore the custom configured settings to the default settings. Report Spam The Report spam tool allows you to upload spam s (in the.eml format only) to the filter to help train it to recognize spam. You can export s as.eml files from many mail client. Drag and drop the spam files from your computer, or use the traditional upload tool. page 12 / 27

13 Report Not Spam The Report not spam tool allows you to upload desired s (in the.eml format only) to the filter to help train it to recognize s that aren t spam. You can export s as.eml files from many mail client programs. Drag and drop the non-spam files from your computer, or use the traditional upload tool. Clear Callout Cache The Callout cache stores information regarding the existing and non-existing recipient addresses for up to two hours. You can manually clear the callout cache via this web interface. page 13 / 27

14 Outgoing The outgoing task group provides tools for you to deal with outgoing and spam. Specifically, it lets you view the outgoing message logs. Log Search The Log search tool allows you to search for incoming s for a particular account. Click Log search, and then you will be brought to this search page: There are quite a few search options available: Date range: This sets the time and date for which you want to see results. A calendar will pop up if you click in either of these fields. Sender: Enter an address for the desired sender. Recipient: This allows you to set the desired recipient. It will be limited to addresses on your account. Sender IP: Search for a specific sender IP address. Sender host: Search for a specific sender host name. Match: This dropdown menu lets you specify whether you want to match All conditions or Any condition. All conditions requires results to meet ALL the other settings you specify. Any condition requires results to meet just ONE of the settings you specify. Return partial matches: If you check this, partial matches will be included in the results. Classification: This allows you to refine your results based on their delivery status (for example, whether they were marked as spam or not). page 14 / 27

15 Include results from the last minutes: This includes all the newest s in the results. Click the Start search -> button to see the results. Generate DKIM Certificate The DKIM certificate generator generates DKIM certificate for outgoing s. When an outgoing is signed with DKIM then the recipient will be able to verify that message has been sent from the specified source/sender. It makes sure that the message content (i.e. important headers, like the subject) has not been altered. The DKIM certificate when generated for the outgoing s lowers the probability of the of being detected as spam. Here you can generate a DKIM certificate for your domain. Please fill the form below with the desired selector you've chosen earlier. As a result you will get a value for public key which should be available in your DNS. After successful DKIM generation you should enable the resulting DKIM certificate for each outgoing user using your selector. Manage Users The Manage user tool enables you to manage outgoing users. The SMTP AUTH username will be and the password will be 'Password'. If the 'Username' field is left blank, then the SMTP AUTH username will just be '', and equal to the domain name. If the 'Password' field is left blank, then the 'Username' must be an IP address, and any connection from that IP will be considered authenticated without needing to use SMTP AUTH (note: authorizing IP addresses may be disabled on the system). page 15 / 27

16 Clear Callout Cache The Callout cache stores information regarding the existing and non-existing recipient addresses for up to two hours. You can manually clear the callout cache via this web interface. page 16 / 27

17 Protection Report The protection report fetches spamming statistics for a particular domain and/or website. Multiple types of reports are available. You can configure reporting tool as per your requirements. On Demand Domain Report The On-demand domain report tool enables you to generate protection report for a specified time interval. You can send this report to multiple addresses. Multiple addresses can be added with a comma. The real-time report delivery might take several minutes, depending on the size of the report being generated. A report can be sent as a PDF attachment or as inline HTML. The PDF report outlines a summary of the spam and viruses that the filtering service has protected the domain from receiving, and also includes information about the total volume of mail processed for the said domain. The On-demand domain report has the following filter criteria: Date start: it is the start date for the report generation. Period: you can either select Day or Week. When you select the Day option then report will be generated daily. On selection of Week, the report will be generated weekly. Language: localization is supported by the system. Select the desired language from the drop down menu. Format: select either HTML or PDF. When you select format as PDF then report will be sent as an attachment within an . The HTML format will be sent as an inline content. enter addresses to which report has to be sent. Multiple addresses can be added with a comma separator. Include extra spam table: by default, this option is enabled. You can disable this option if you don t intend to include spam table in the report. page 17 / 27

18 Periodic Domain Report The Periodic domain report tool enables you to control the activation of the protection report, the recipient, the frequency, the language and the format in which the report is presented to you. A report can be sent as a PDF attachment or as inline HTML. The PDF report outlines a summary of the spam and viruses that the filtering service has protected the domain from receiving, and also includes information about the total volume of mail processed for the said domain. The Periodic domain report has the following filter criteria: Report enabled: by default, this checkbox is disabled. Enable this checkbox to enable report generation. Recipient Address: enter address of the recipient. You can add multiple addresses separated by a comma. Report Frequency: you can either select Day or Week. When you select the Day option then report will be generated daily. On selection of Week, the report will be generated weekly. Language: localization is supported by the system. Select the desired language from the drop down menu Format: select either HTML or PDF. When you select format as PDF then report will be sent as an attachment within an . The HTML format will be sent as an inline content. Include extra spam table: by default, this option is enabled. You can disable this option if you don t intend to include spam table in the report. Send report with no quarantined messages: by default, this option is unchecked. If left in unchecked state includes quarantined messages in the report. Disabling it would not include quarantined messages in the report. Periodic User Report page 18 / 27

19 The periodic user report tool enables you to generate protection reports based on users. Users can be added either individually or via importing/uploading.csv file to add users in bulk. Only ASCII characters are supported for the local part. The report in PDF format shows a summary of the spam and viruses that the filtering services has protected the domain from receiving, and also includes information about the total volume of mail processed for the said user. The option Automatically activate for all recipient when enabled automatically adds new users who are vulnerable to spamming in the Periodic User Report. If you want to add a new user individually then click on the Add a recipient option. If you want to add multiple users from a.csv file then click on the Upload CSV file. page 19 / 27

20 Restrictions Blocked Extensions The Blocked Extensions tool enables you to block s based on the type of extension attached in the . You can also add other extensions that are not available in the list of already existing extensions. Tick the checkbox placed against each extension. The containing the selected extensions will then be blocked. To add more extensions, click on the Add extension option. Size Restriction By default there is no limit to the size. When there is no size limit being specified then the system uses the size set by the destination mailserver. To outweigh the potential threat of spam and viruses you can set the maximum size for both incoming and outgoing s to be accepted by the filtering system. page 20 / 27

21 page 21 / 27

22 Whitelist/Blacklist Sender Whitelist In whitelist all spam and virus filtering checks are disabled for the senders. You can either whitelist a particular sending address or a full sending domain. It is recommended to only use sender whitelist if the system would wrongly block from a certain sender. You can either individually enter sender address or upload sender address to whitelist via.csv file. To add a sender s address or a complete domain to whitelist, click on the Add sender option. Enter the address/domain name and click on the Add button. Sender Blacklist The Sender blacklist enables you to add senders address or domains in the blacklist. s will not be sent to the senders addresses or domains that are added in senders blacklist. To blacklist a full domain, simply add the domain name The messages are NOT quarantined. The messages are rejected with a 5xx SMTP error code, so legitimate sending SMTP servers will generate a bounce message to the sender. You can either individually enter sender address or upload sender address to blacklist via.csv file. page 22 / 27

23 Recipient Whitelist All filtering checks are disabled for the addresses and/or domains listed in the whitelist. It is recommended to only use recipient whitelist for exceptional cases such as or recipients. You can either individually enter recipient address or upload sender address to whitelist via.csv file. You can whitelist all recipients by selecting all or required recipient and then clicking the Whitelist all recipients button. Recipient Blacklist Recipients added in the blacklist won t be able to receive any messages. All s to the recipients listed on the blacklist will be rejected automatically. The messages are NOT quarantined. The messages are rejected with a 5xx SMTP error code, so legitimate sending SMTP servers will generate a bounce message to the sender. You can either individually enter recipient address or upload sender address to blacklist via.csv file. You can blacklist all recipients by selecting all or required recipient and then clicking the Blacklist all recipients button. page 23 / 27

24 page 24 / 27

25 Webinterface Users Manage Users The Manage users tool enables you to manage users. The users can sign into the Spampanel with their addresses to see their own quarantine, and manage specific settings. It is recommended that before managing users, make sure that the domain for which you are about to create already exists on the server. While setting the password, the password should have lower case letters, at least on upper case letter or one digit, should not contain any spaces, an must be 6-25 characters long. ASCII characters are only supported for the local part. To add a user, click on the Add option. You need to enter the following details: Username: it is the username of the user at selected domain. Password/Confirm Password: it is the password to be set for the user. Status: a user can be either in Active or Inactive state. Select the required radio button accordingly. Once all details have been entered, click on the Save button. You can upload a Comma Separated Values (CSV) file. Each line in the file must contain at least four columns, the username, the domain, the password and the status. page 25 / 27

26 Manage Permissions The Manage Permissions option enables you to manage permissions for available user s roles. page 26 / 27

27 My Account User's Profile The User s profile option enables you to manage your profile settings. You can update your username, password and settings are per requirements. page 27 / 27 Powered by TCPDF (www.tcpdf.org)

Mail Assure Quick Start Guide

Mail Assure Quick Start Guide Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Antispam Gateway Software Version 2.1

Comodo Antispam Gateway Software Version 2.1 Comodo Antispam Gateway Software Version 2.1 User Guide Guide Version 2.1.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...

More information

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In USER GUIDE This guide walks through the user interface of ContentCatcher, and the features and parameters contained therein. Accessing the User Interface The ContentCatcher user interface is a secure web-based

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

WeCloud Security. Administrator's Guide

WeCloud  Security. Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including

More information

Understanding the Pipeline

Understanding the  Pipeline This chapter contains the following sections: Overview of the Email Pipeline, page 1 Email Pipeline Flows, page 2 Incoming / Receiving, page 4 Work Queue / Routing, page 6 Delivery, page 10 Overview of

More information

Using Your New Webmail

Using Your New Webmail Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...

More information

ISOCNET Quarantine. User s Guide

ISOCNET Quarantine. User s Guide ISOCNET Quarantine User s Guide Contents Logging in... 2 Password... 3 Successful Login... 3 1-Check Mail, Block Address/Domain, and Trust Address... 4 Check Mail... 4 Blocked Senders List... 4 Trusted

More information

Important Information

Important Information May 2014 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Service User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0

Service User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0 Outlook 2003 By SYSCOM (USA) May 7, 2013 Version 2.0 1 Contents 1. How to set up POP3/SMTP for Outlook 2003... 3 2. How to Setup IMAP for Outlook 2003... 10 3. How to Manage Spam Filter... 15 2 1. How

More information

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections:

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections: This chapter contains the following sections: Overview of the, page 1 Local Versus External, page 2 Setting Up the Local, page 2 Setting Up the Centralized, page 3 Edit Page, page 6 Using Safelists and

More information

CLOUD MAIL Administrator User Guide. (Version 1.0)

CLOUD MAIL Administrator User Guide. (Version 1.0) Administrator User Guide () Table of Contents 1. How to Login the Administration Panel... 3 2. How to Update Administrator Information... 4 3. How to Check the Cloud Mail Account Information... 4 4. How

More information

Tracking Messages

Tracking  Messages This chapter contains the following sections: Tracking Service Overview, page 1 Setting Up Centralized Message Tracking, page 2 Checking Message Tracking Data Availability, page 4 Searching for Email Messages,

More information

Untitled Page. Help Documentation

Untitled Page. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Antispam Administration SmarterMail comes equipped with a number

More information

EVRY Security. Administrator's Guide

EVRY  Security. Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security provides a variety of useful features within a user-friendly web console to manage the functions

More information

Spam UF. Use and customization instructions for the Barracuda Spam service at the University of Florida.

Spam UF. Use and customization instructions for the Barracuda Spam service at the University of Florida. Spam Quarantine @ UF Use and customization instructions for the Barracuda Spam service at the University of Florida. Graff, Randy A 10/10/2008 Contents Overview... 2 Getting Started... 2 Actions... 2 Whitelist/Blacklist...

More information

Configuration Section

Configuration Section 8 Configuration Section MailCleaner can be easily customized to fit your needs and your working style. The Configuration menu contains six sections: Interface, Address groups, Address settings, Quarantine

More information

Service User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0

Service User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0 Outlook 2013 By SYSCOM (USA) May 2nd, 2016 Version 1.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2013... 3 2. How to Setup IMAP for Outlook 2013... 14 3. How to Manage Spam Filter... 25 2

More information

Important Information

Important Information February 2017 Important Information The following information applies to Proofpoint Essentials US2 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

Grapevine web hosting user manual. 12 August 2005

Grapevine web hosting user manual. 12 August 2005 Grapevine web hosting user manual 12 August 2005 Grapevine web hosting user manual 2 Contents Contents... 2 Introduction... 4 System features... 4 How it looks... 5 Main navigation... 5 Reports... 6 Web

More information

Service User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0

Service User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0 Outlook 2007 By SYSCOM (USA) May 2, 2013 Version 2.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2007... 3 2. How to Setup IMAP for Outlook 2007... 13 3. How to Manage Spam Filter... 22 2 1.

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 Administrator Guide Guide Version 2.12.112217 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam

More information

SpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam.

SpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam. SpamCheetah manual SpamCheetah is the spam control technique from Gayatri Hitech. SpamCheetah achieves spam control by way of employing an SMTP proxy which invokes various virus scanning, spam control

More information

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message WebMail Help User Manual Index Accessing WebMail Logging In Check your Mail Main Mail Screen Reading Messages Search Sending a new message Address book Spelling Attaching files Html Text Managing addresses

More information

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections: This chapter contains the following sections: Message Tracking Overview, page 1 Enabling Message Tracking, page 1 Searching for Messages, page 2 Working with Message Tracking Search Results, page 4 Checking

More information

Technical description

Technical description www.mailcleaner.net Technical description V2017.8 Rev: 30-08-17 INTERNET SECURITY APPLIANCE PWR SYS AUX CARD RESET USB WAN1 WAN2 OPT LAN1/LAN2/DMZ 1 2 P1 P2 P3 P4 P5 P6 P7 MASTER SLAVE(S) MailCleaner Copyright

More information

TOTAL CONTROL SECURITY END USER GUIDE

TOTAL CONTROL  SECURITY END USER GUIDE TOTAL CONTROL EMAIL SECURITY END USER GUIDE Welcome to the Total Control email security solution, which protects you against spam, viruses, phishing exploits, and other email-borne threats. In this guide,

More information

Advanced Settings. Help Documentation

Advanced Settings. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods

More information

Mimecast Personal Portal (MPP)

Mimecast Personal Portal (MPP) Mimecast Personal Portal (MPP) Mimecast Personal Portal (MPP) Advanced Bounce Viewer Managed Senders Moderated On Hold Personal On Hold Rejection Viewer Calendars Exchange Folders File Archive Logging

More information

Documentation Userinterface

Documentation Userinterface Documentation Userinterface Version 2030 www.reddoxx.com 1 Copyright 2013 by REDDOXX GmbH REDDOXX GmbH Neue Weilheimer Str. 14 D-73230 Kirchheim Fon: +49 (0)7021 92846-0 Fax: +49 (0)7021 92846-99 E-Mail:

More information

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

IBM Express Managed Security Services for  Security. Anti-Virus Administrator s Guide. Version 5.31 IBM Express Managed Security Services for Email Security Anti-Virus Administrator s Guide Version 5.31 Table of Contents 1. Service overview...3 1.1 Welcome... 3 1.2 Anti-Virus (AV) features... 3 1.3 How

More information

MailCleaner Extended FAQ

MailCleaner Extended FAQ MailCleaner Extended FAQ NETHZ Mail Filtering Preferences NETHZ 001 Q: Can I still use my nethz Mail Filtering Preferences? A: The "email Spamfilter" option of the www.passwort.ethz.ch user interface will

More information

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

Defining Which Hosts Are Allowed to Connect Using the Host Access Table Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, page 1 Defining Remote Hosts

More information

Web Mail and e-scout Instructions

Web Mail and e-scout Instructions Web Mail and e-scout Instructions To log into e-scout: visit our home page at www.greenhills.net, click on web mail at the top of the page OR click on the customer center tab and then the webmail button,

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

Introduction. Logging in. WebQuarantine User Guide

Introduction. Logging in. WebQuarantine User Guide Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine

More information

TurnkeyMail 7.x Help. Logging in to TurnkeyMail

TurnkeyMail 7.x Help. Logging in to TurnkeyMail Logging in to TurnkeyMail TurnkeyMail is a feature-rich Windows mail server that brings the power of enterprise-level features and collaboration to businesses and hosting environments. Because TurnkeyMail

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

Step 2 - Deploy Advanced Security for Exchange Server

Step 2 - Deploy Advanced  Security for Exchange Server Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service

More information

Symantec ST0-250 Exam

Symantec ST0-250 Exam Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question

More information

Univention Corporate Server. Cyrus mail server

Univention Corporate Server. Cyrus mail server Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction... 4 2. Installation... 5 3. Management of the mail server data... 6 3.1. Management of mail domains... 6 3.2. Assignment

More information

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0 Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet

More information

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for   Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

Cisco Download Full Version :

Cisco Download Full Version : Cisco 650-153 ESFE Cisco Email Security Specialist Field Engineer Download Full Version : http://killexams.com/pass4sure/exam-detail/650-153 QUESTION: 90 When a message is matched on by a DLP policy, and

More information

Hostopia WebMail Help

Hostopia WebMail Help Hostopia WebMail Help Table of Contents GETTING STARTED WITH WEBMAIL...5 Version History...6 Introduction to WebMail...6 Cookies and WebMail...6 Logging in to your account...6 Connection time limit...7

More information

Notification Preferences

Notification Preferences Notification Preferences Canvas includes a set of default notification preferences you can receive for your courses. Notifications are sent to Canvas contact methods as specified in your account. However,

More information

Account Customer Portal Manual

Account Customer Portal Manual Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP

More information

My MessageMedia User Guide

My MessageMedia User Guide My MessageMedia User Guide Copyright and Trademark Statement 2011 MessageMedia All rights reserved. Apart from any use permitted under the Copyright Act 1968, no part of this publication may be reproduced,

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2017 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Barracuda Security Service User Guide

Barracuda  Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses, worms, phishing, and denial of service attacks.

More information

Enabling and Activating Anti-Spam

Enabling and Activating Anti-Spam Enabling and Activating Anti-Spam NOTE: Anti-Spam does not apply to the SuperMassive 9800. The Anti-Spam > Base Setup page allows you to activate the Anti-Spam feature, configure email threat categories,

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Integrated Migration Tool

Integrated Migration Tool IceWarp Unified Communications Version 12 Published on 9/20/2017 Contents... 4 How It Works... 5 Performing Migration... 5 Set up the Domain in IceWarp Server... 6 Create Migrator Email Account... 8 Configure

More information

2013 edition (version 1.1)

2013 edition (version 1.1) 2013 edition (version 1.1) Contents 1 Introduction... 3 2 Signing in to your Office 365 account... 3 2.1 Acceptable Use Policy and Terms of Use... 4 3 Setting your profile and options... 4 3.1 Settings:

More information

Deliverability Terms

Deliverability Terms Email Deliverability Terms The Purpose of this Document Deliverability is an important piece to any email marketing strategy, but keeping up with the growing number of email terms can be tiring. To help

More information

Monterey County Office of Education Quarantine (Spam ) System - User Guide

Monterey County Office of Education Quarantine (Spam  ) System - User Guide Monterey County Office of Education Quarantine (Spam E-Mail) System - User Guide With the new Spam firewall recently deployed in the MCOE network, e-mail users now have more power and flexibility against

More information

TrendMicro Hosted Security. Best Practice Guide

TrendMicro Hosted  Security. Best Practice Guide TrendMicro Hosted Email Security Best Practice Guide 1 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The names of companies,

More information

SonicWALL Security 6.2 Appliance

SonicWALL  Security 6.2 Appliance Email Security SonicWALL Email Security 6.2 Appliance System Compatibility SonicWALL Email Security 6.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email Security 200 SonicWALL

More information

. Help Documentation. This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc.

. Help Documentation. This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Email Email Overview SmarterMail users can send and receive

More information

Dell SonicWALL Security 8.2. Administration Guide

Dell SonicWALL  Security 8.2. Administration Guide Dell SonicWALL Email Security 8.2 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

PineApp Mail Secure 5.1 User Manual

PineApp Mail Secure 5.1 User Manual PineApp Mail Secure 5.1 User Manual January 20, 2016 The information in this guide is furnished for informational use only, is subject to change without notice and should not be construed as a commitment

More information

Workshare Protect Server 3.8. Solutions Guide

Workshare Protect Server 3.8. Solutions Guide Workshare Protect Server 3.8 Solutions Guide July 2017 Workshare Protect Server 3.8 Solutions Guide Table of Contents Chapter 1: Introducing Workshare Protect Server...5 What is Workshare Protect Server?...

More information

Symantec Hosted Mail Security Console and Spam Quarantine User s Guide

Symantec Hosted Mail Security Console and Spam Quarantine User s Guide Symantec Hosted Mail Security Console and Spam Quarantine User s Guide Copyright 2005 Symantec Corporation and/or its thirdparty licensors. All Rights Reserved. Document Version: RESTRICTION ON USE, PUBLICATION,

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Chapter 9: Internet

Chapter 9: Internet Chapter 9: Internet Email Internet email has become one of the most popular applications on the Internet. An Internet experience is not complete without the usage of email. In this chapter we shall be

More information

Centralized Policy, Virus, and Outbreak Quarantines

Centralized Policy, Virus, and Outbreak Quarantines Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page

More information

Comendo mail- & spamfence

Comendo mail- & spamfence Upgrade Guide Resellers Comendo mail- & spamfence VERSION 10-05-2016 TABLE OF CONTENTS INTRODUCTION... 3 OVERVIEW... 4 1. Preparation... 4 2. Provisioning... 4 3. Upgrade... 4 4. Finalisation... 4 COMPARISON...

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

BBVA Compass Spend Net Payables

BBVA Compass Spend Net Payables User Guide BBVA Compass Spend Net Payables User Guide Vault Services Table of Contents Introduction 2 Technical Requirements 2 Getting started 3 Sign In 3 General Navigation 4 Upload/Create Payment 5

More information

Using Trustwave SEG Cloud with Cloud-Based Solutions

Using Trustwave SEG Cloud with Cloud-Based  Solutions .trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS

More information

Installation & Configuration Guide Enterprise/Unlimited Edition

Installation & Configuration Guide Enterprise/Unlimited Edition Installation & Configuration Guide Enterprise/Unlimited Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...

More information

You can find more information about the service at

You can find more information about the service at Introduction The purpose of this guide is to familiarize you with ExchangeDefender and walk you through the configuration, management and deployment of the service. ExchangeDefender is a transparent, cloud-based

More information

MS2. Modern Traffic Analytics ms2soft.com

MS2. Modern Traffic Analytics ms2soft.com MS2 Modern Traffic Analytics ms2soft.com Updated: October 31, 2014 The Traffic Count Database System (TCDS) module is a powerful tool for the traffic engineer or planner to organize an agency's traffic

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

ENTERPRISE SUBSCRIBER GUIDE

ENTERPRISE SUBSCRIBER GUIDE ENTERPRISE SUBSCRIBER GUIDE Enterprise Subscriber Guide 880 Montclair Road Suite 400 Birmingham, AL 353 www. TABLE OF CONTENTS Table of Contents Introduction...6 Logging In...6 Navigation Bar, Sub-Menu

More information

Barracuda Spam Firewall User's Guide 5.x

Barracuda Spam Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting and blocklisting email addresses, and modify your user preferences using the

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Overview... 3 Dashboard...3 Alerts...4 Logs & Reports... 10 People... 25 Devices... 34 Global Settings...50 Protect Devices...78 Endpoint

More information

CITIC Telecom CPC EPS. Administrator Guide

CITIC Telecom CPC EPS. Administrator Guide CITIC Telecom CPC EPS Revision History Revision Changes Date Revised by 1 Initial Release May-2013 John Zhang Table of Contents 1 Quick Start... 1 1.1 Getting started... 1 1.2 Scheduling of Backup Jobs

More information

Comodo Dome Antispam MSP Software Version 2.12

Comodo Dome Antispam MSP Software Version 2.12 Comodo Dome Antispam MSP Software Version 2.12 Administrator Guide Guide Version 2.12.111017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

OWA 2013 Getting Started

OWA 2013 Getting Started OWA 2013 Getting Started Our mail server has been upgraded to the Exchange 2013 this has created some changes in our webmail environment. Email A new modern style has been applied to web interface to align

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

LDAP Queries. Overview of LDAP Queries. This chapter contains the following sections:

LDAP Queries. Overview of LDAP Queries. This chapter contains the following sections: This chapter contains the following sections: Overview of, page 1 Working with, page 11 Using Acceptance Queries For Recipient Validation, page 18 Using Routing Queries to Send Mail to Multiple Target

More information

Help for Users & Domain Administrators

Help for Users & Domain Administrators Help for Users & Domain Administrators Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Help for Users & Domain

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

Updating Content in Product Manager

Updating Content in Product Manager Updating Content in Product Manager 1. Log in to the system at https://buyers.procserveonline.com/otis/login.html?marketplaceid=2&locale=en_gb, entering username and password. If you have forgotten your

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

BroadCloud PBX Call Recording

BroadCloud PBX Call Recording BroadCloud PBX Call Recording Dashboard Admin User Guide Document Version 1.1 9737 Washingtonian Boulevard, Suite 350 Gaithersburg, MD 20878 Tel +1 301.977.9440 WWW.BROADSOFT.COM BroadWorks Guide Copyright

More information

Security with FailSafe

Security with FailSafe Email Security with FailSafe Anti spam and anti virus protection and email continuity for your mail server Email Security provides comprehensive and highly effective virus, spam and content filtering of

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident

More information

Panda Security. Protection. User s Manual. Protection. Version PM & Business Development Team

Panda Security.  Protection. User s Manual.  Protection. Version PM & Business Development Team Panda Security Email Protection Email Protection PM & Business Development Team User s Manual Version 4.3.2-2 1 Table of Contents Table of Contents... 2 1. Introduction to Email Protection... 3 2. Email

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information