Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials."

Transcription

1 Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to your users while making sure desired s are still delivered. With our spam defense tools, you can update your filters, modify your allow and block lists, and view your incoming and outgoing message logs to look for specific s. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials. 2. Once you are signed in, you will redirected to the admin panel. This will bring up the spam filtering dashboard. Here you will see seven task groups to help you manage spam. We ll be discussing each task group in the following sections. page 1 / 27

2 Incoming The incoming task group provides tools for you to deal with incoming and spam. Incoming mail is where most spam occurs, so it has the most tools. Log Search The Log search tool allows you to search for incoming s for a particular account. Click Log search, and then you will be brought to this search page: There are quite a few search options available: Date range: This sets the time and date for which you want to see results. A calendar will pop up if you click in either of these fields. Sender: Enter an address for the desired sender. Recipient: This allows you to set the desired recipient. It will be limited to addresses on your account. Sender IP: Search for a specific sender IP address. Sender host: Search for a specific sender host name. Match: This dropdown menu lets you specify whether you want to match All conditions or Any condition. All conditions requires results to meet ALL the other settings you specify. Any condition requires results to meet just ONE of the settings you specify. Return partial matches: If you check this, partial matches will be included in the results. Classification: This allows you to refine your results based on their delivery status (for example, whether they were marked as spam or not). Include results from the last minutes: This includes all the newest s in the results. page 2 / 27

3 Click the Start search -> button to see the results. Spam Quarantine The Spam quarantine tool lets you view messages that have been quarantined as spam. By default, all messages are shown, although you can also search by subject, sender, and recipient. You can un-quarantine a spam by clicking on the envelope symbol with the green arrow next to it, causing the message to be delivered to the appropriate mailbox. Delivery Queue The Delivery queue tool shows any undelivered s and the reasons for delay (such as the mail server being temporarily unavailable). You can also force a delivery attempt from this queue. Most of the time, it should be empty. page 3 / 27

4 Local Recipients The Local Recipient tool shows a local list of valid recipients. By default, this option is disabled. When you enable the Use local recipients checkbox, the system will only accept for the listed recipients. If you send s to recipients who are not listed in local recipient list then those will be permanently rejected. You can add list of recipient manually into the system. The Add local recipient option enables you to manually enter the desired list of local recipients. page 4 / 27

5 You can also upload a list of local recipients at once or in bulk via the Upload CSV file option. page 5 / 27

6 page 6 / 27

7 page 7 / 27

8 Domain Aliases page 8 / 27

9 The Domain aliases tool enables you to add and delete aliases for a particular domain. When you add a domain alias and switch the mx-records to activate the filtering for this alias domain, mail directed to will be filtered and delivered to page 9 / 27

10 The Add alias option enables you to add alias for the domain. Edit Route The Edit route(s) tool enables you to find the route(s) (destination mail server) and their respective delivery order. You have the option to add and delete routes. Also, the list allows you to dynamically move the order of the routes by drag dropping them to the right position in the list. Domain Statistics The Domain statistics tool enables you to view statistics of a domain for a given timeframe. The statistics are displayed in tabular form as well as graphically. page 10 / 27

11 Filter Settings The Filter Settings tool enables you to control the activation of the quarantine system. On disabling the quarantine system, s detected as spam will not be kept in the quarantine system but will be delivered to your server. Also you can set the subject notation that is added to the subject of s classified as unsure by the filtering system. There are quite a few filter options available: Quarantine enabled: by default, this option is enabled. When this option is enabled, the s detected as spam will be kept in the quarantine system. Quarantine threshold: it is the minimum score that a message must receive in order to be classified as spam by the content analysis portion of the filter. The score ranges from 0.0 (certainly not spam) to 1.0 (certainly spam), so the higher this is set, the more likely you are to receive false page 11 / 27

12 negatives, and the less likely you are to receive false positives. By default, the quarantine threshold value is 0.9. You can increase or decrease the threshold by moving the slider either to left or right. Moving the slider to the right increases the quarantine threshold whereas moving the slider to the left decreases the quarantine threshold value. Tag threshold: it is the minimum score that a message must receive in order to be classified as unsure (and therefore notated) by the content analysis portion of the filter. The score ranges from 0.0 (certainly not spam) to 1.0 (certainly spam). This must be lower than the spam threshold. By default, the tag threshold value is 0.1. You can increase or decrease the threshold by moving the slider either to left or right. Moving the slider to the right increases the quarantine threshold whereas moving the slider to the left decreases the quarantine threshold value. Skip SPF check: SPF is a common technology that allows the sender to indicate which IPs are allowed to deliver for the sender domain. This check can be disabled by ticking this box. It is recommended to keep it enabled to prevent spam. Skip maximum line length check: There are strict regulations on allowed line length in s, which are automatically enforced by the software. Some applications or badly developed scripts do not adhere to the official specifications thereby exceeding the maximum allowed line-length. This option when enabled strictly monitors the maximum line length. This check can be disabled by ticking this box. It is recommended to keep it enabled to block spam. Unsure Notation: Prepend this tag to the subject of messages which the filter could not strongly classify as not spam or spam. Leave it empty, if not to prepend s. Unsure s are considered legitimate s, you can use this tag to have them stand out and to report them as spam/not spam to further improve effectiveness of the filter. Quarantine response: you can either accept or reject the quarantine response. Select the required option from the drop down menu. Once you have configured the required settings, click on the Save button to save the settings. The Reset to defaults button enables you to restore the custom configured settings to the default settings. Report Spam The Report spam tool allows you to upload spam s (in the.eml format only) to the filter to help train it to recognize spam. You can export s as.eml files from many mail client. Drag and drop the spam files from your computer, or use the traditional upload tool. page 12 / 27

13 Report Not Spam The Report not spam tool allows you to upload desired s (in the.eml format only) to the filter to help train it to recognize s that aren t spam. You can export s as.eml files from many mail client programs. Drag and drop the non-spam files from your computer, or use the traditional upload tool. Clear Callout Cache The Callout cache stores information regarding the existing and non-existing recipient addresses for up to two hours. You can manually clear the callout cache via this web interface. page 13 / 27

14 Outgoing The outgoing task group provides tools for you to deal with outgoing and spam. Specifically, it lets you view the outgoing message logs. Log Search The Log search tool allows you to search for incoming s for a particular account. Click Log search, and then you will be brought to this search page: There are quite a few search options available: Date range: This sets the time and date for which you want to see results. A calendar will pop up if you click in either of these fields. Sender: Enter an address for the desired sender. Recipient: This allows you to set the desired recipient. It will be limited to addresses on your account. Sender IP: Search for a specific sender IP address. Sender host: Search for a specific sender host name. Match: This dropdown menu lets you specify whether you want to match All conditions or Any condition. All conditions requires results to meet ALL the other settings you specify. Any condition requires results to meet just ONE of the settings you specify. Return partial matches: If you check this, partial matches will be included in the results. Classification: This allows you to refine your results based on their delivery status (for example, whether they were marked as spam or not). page 14 / 27

15 Include results from the last minutes: This includes all the newest s in the results. Click the Start search -> button to see the results. Generate DKIM Certificate The DKIM certificate generator generates DKIM certificate for outgoing s. When an outgoing is signed with DKIM then the recipient will be able to verify that message has been sent from the specified source/sender. It makes sure that the message content (i.e. important headers, like the subject) has not been altered. The DKIM certificate when generated for the outgoing s lowers the probability of the of being detected as spam. Here you can generate a DKIM certificate for your domain. Please fill the form below with the desired selector you've chosen earlier. As a result you will get a value for public key which should be available in your DNS. After successful DKIM generation you should enable the resulting DKIM certificate for each outgoing user using your selector. Manage Users The Manage user tool enables you to manage outgoing users. The SMTP AUTH username will be and the password will be 'Password'. If the 'Username' field is left blank, then the SMTP AUTH username will just be '', and equal to the domain name. If the 'Password' field is left blank, then the 'Username' must be an IP address, and any connection from that IP will be considered authenticated without needing to use SMTP AUTH (note: authorizing IP addresses may be disabled on the system). page 15 / 27

16 Clear Callout Cache The Callout cache stores information regarding the existing and non-existing recipient addresses for up to two hours. You can manually clear the callout cache via this web interface. page 16 / 27

17 Protection Report The protection report fetches spamming statistics for a particular domain and/or website. Multiple types of reports are available. You can configure reporting tool as per your requirements. On Demand Domain Report The On-demand domain report tool enables you to generate protection report for a specified time interval. You can send this report to multiple addresses. Multiple addresses can be added with a comma. The real-time report delivery might take several minutes, depending on the size of the report being generated. A report can be sent as a PDF attachment or as inline HTML. The PDF report outlines a summary of the spam and viruses that the filtering service has protected the domain from receiving, and also includes information about the total volume of mail processed for the said domain. The On-demand domain report has the following filter criteria: Date start: it is the start date for the report generation. Period: you can either select Day or Week. When you select the Day option then report will be generated daily. On selection of Week, the report will be generated weekly. Language: localization is supported by the system. Select the desired language from the drop down menu. Format: select either HTML or PDF. When you select format as PDF then report will be sent as an attachment within an . The HTML format will be sent as an inline content. enter addresses to which report has to be sent. Multiple addresses can be added with a comma separator. Include extra spam table: by default, this option is enabled. You can disable this option if you don t intend to include spam table in the report. page 17 / 27

18 Periodic Domain Report The Periodic domain report tool enables you to control the activation of the protection report, the recipient, the frequency, the language and the format in which the report is presented to you. A report can be sent as a PDF attachment or as inline HTML. The PDF report outlines a summary of the spam and viruses that the filtering service has protected the domain from receiving, and also includes information about the total volume of mail processed for the said domain. The Periodic domain report has the following filter criteria: Report enabled: by default, this checkbox is disabled. Enable this checkbox to enable report generation. Recipient Address: enter address of the recipient. You can add multiple addresses separated by a comma. Report Frequency: you can either select Day or Week. When you select the Day option then report will be generated daily. On selection of Week, the report will be generated weekly. Language: localization is supported by the system. Select the desired language from the drop down menu Format: select either HTML or PDF. When you select format as PDF then report will be sent as an attachment within an . The HTML format will be sent as an inline content. Include extra spam table: by default, this option is enabled. You can disable this option if you don t intend to include spam table in the report. Send report with no quarantined messages: by default, this option is unchecked. If left in unchecked state includes quarantined messages in the report. Disabling it would not include quarantined messages in the report. Periodic User Report page 18 / 27

19 The periodic user report tool enables you to generate protection reports based on users. Users can be added either individually or via importing/uploading.csv file to add users in bulk. Only ASCII characters are supported for the local part. The report in PDF format shows a summary of the spam and viruses that the filtering services has protected the domain from receiving, and also includes information about the total volume of mail processed for the said user. The option Automatically activate for all recipient when enabled automatically adds new users who are vulnerable to spamming in the Periodic User Report. If you want to add a new user individually then click on the Add a recipient option. If you want to add multiple users from a.csv file then click on the Upload CSV file. page 19 / 27

20 Restrictions Blocked Extensions The Blocked Extensions tool enables you to block s based on the type of extension attached in the . You can also add other extensions that are not available in the list of already existing extensions. Tick the checkbox placed against each extension. The containing the selected extensions will then be blocked. To add more extensions, click on the Add extension option. Size Restriction By default there is no limit to the size. When there is no size limit being specified then the system uses the size set by the destination mailserver. To outweigh the potential threat of spam and viruses you can set the maximum size for both incoming and outgoing s to be accepted by the filtering system. page 20 / 27

21 page 21 / 27

22 Whitelist/Blacklist Sender Whitelist In whitelist all spam and virus filtering checks are disabled for the senders. You can either whitelist a particular sending address or a full sending domain. It is recommended to only use sender whitelist if the system would wrongly block from a certain sender. You can either individually enter sender address or upload sender address to whitelist via.csv file. To add a sender s address or a complete domain to whitelist, click on the Add sender option. Enter the address/domain name and click on the Add button. Sender Blacklist The Sender blacklist enables you to add senders address or domains in the blacklist. s will not be sent to the senders addresses or domains that are added in senders blacklist. To blacklist a full domain, simply add the domain name The messages are NOT quarantined. The messages are rejected with a 5xx SMTP error code, so legitimate sending SMTP servers will generate a bounce message to the sender. You can either individually enter sender address or upload sender address to blacklist via.csv file. page 22 / 27

23 Recipient Whitelist All filtering checks are disabled for the addresses and/or domains listed in the whitelist. It is recommended to only use recipient whitelist for exceptional cases such as or recipients. You can either individually enter recipient address or upload sender address to whitelist via.csv file. You can whitelist all recipients by selecting all or required recipient and then clicking the Whitelist all recipients button. Recipient Blacklist Recipients added in the blacklist won t be able to receive any messages. All s to the recipients listed on the blacklist will be rejected automatically. The messages are NOT quarantined. The messages are rejected with a 5xx SMTP error code, so legitimate sending SMTP servers will generate a bounce message to the sender. You can either individually enter recipient address or upload sender address to blacklist via.csv file. You can blacklist all recipients by selecting all or required recipient and then clicking the Blacklist all recipients button. page 23 / 27

24 page 24 / 27

25 Webinterface Users Manage Users The Manage users tool enables you to manage users. The users can sign into the Spampanel with their addresses to see their own quarantine, and manage specific settings. It is recommended that before managing users, make sure that the domain for which you are about to create already exists on the server. While setting the password, the password should have lower case letters, at least on upper case letter or one digit, should not contain any spaces, an must be 6-25 characters long. ASCII characters are only supported for the local part. To add a user, click on the Add option. You need to enter the following details: Username: it is the username of the user at selected domain. Password/Confirm Password: it is the password to be set for the user. Status: a user can be either in Active or Inactive state. Select the required radio button accordingly. Once all details have been entered, click on the Save button. You can upload a Comma Separated Values (CSV) file. Each line in the file must contain at least four columns, the username, the domain, the password and the status. page 25 / 27

26 Manage Permissions The Manage Permissions option enables you to manage permissions for available user s roles. page 26 / 27

27 My Account User's Profile The User s profile option enables you to manage your profile settings. You can update your username, password and settings are per requirements. page 27 / 27 Powered by TCPDF (www.tcpdf.org)

Mail Assure Quick Start Guide

Mail Assure Quick Start Guide Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Antispam Gateway Software Version 2.1

Comodo Antispam Gateway Software Version 2.1 Comodo Antispam Gateway Software Version 2.1 User Guide Guide Version 2.1.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...

More information

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In USER GUIDE This guide walks through the user interface of ContentCatcher, and the features and parameters contained therein. Accessing the User Interface The ContentCatcher user interface is a secure web-based

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

WeCloud Security. Administrator's Guide

WeCloud  Security. Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including

More information

Service User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0

Service User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0 Outlook 2003 By SYSCOM (USA) May 7, 2013 Version 2.0 1 Contents 1. How to set up POP3/SMTP for Outlook 2003... 3 2. How to Setup IMAP for Outlook 2003... 10 3. How to Manage Spam Filter... 15 2 1. How

More information

Using Your New Webmail

Using Your New Webmail Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...

More information

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections:

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections: This chapter contains the following sections: Overview of the, page 1 Local Versus External, page 2 Setting Up the Local, page 2 Setting Up the Centralized, page 3 Edit Page, page 6 Using Safelists and

More information

ISOCNET Quarantine. User s Guide

ISOCNET Quarantine. User s Guide ISOCNET Quarantine User s Guide Contents Logging in... 2 Password... 3 Successful Login... 3 1-Check Mail, Block Address/Domain, and Trust Address... 4 Check Mail... 4 Blocked Senders List... 4 Trusted

More information

EVRY Security. Administrator's Guide

EVRY  Security. Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security provides a variety of useful features within a user-friendly web console to manage the functions

More information

Configuration Section

Configuration Section 8 Configuration Section MailCleaner can be easily customized to fit your needs and your working style. The Configuration menu contains six sections: Interface, Address groups, Address settings, Quarantine

More information

Service User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0

Service User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0 Outlook 2013 By SYSCOM (USA) May 2nd, 2016 Version 1.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2013... 3 2. How to Setup IMAP for Outlook 2013... 14 3. How to Manage Spam Filter... 25 2

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

Service User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0

Service User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0 Outlook 2007 By SYSCOM (USA) May 2, 2013 Version 2.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2007... 3 2. How to Setup IMAP for Outlook 2007... 13 3. How to Manage Spam Filter... 22 2 1.

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 Administrator Guide Guide Version 2.12.112217 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam

More information

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections: This chapter contains the following sections: Message Tracking Overview, page 1 Enabling Message Tracking, page 1 Searching for Messages, page 2 Working with Message Tracking Search Results, page 4 Checking

More information

TOTAL CONTROL SECURITY END USER GUIDE

TOTAL CONTROL  SECURITY END USER GUIDE TOTAL CONTROL EMAIL SECURITY END USER GUIDE Welcome to the Total Control email security solution, which protects you against spam, viruses, phishing exploits, and other email-borne threats. In this guide,

More information

Technical description

Technical description www.mailcleaner.net Technical description V2017.8 Rev: 30-08-17 INTERNET SECURITY APPLIANCE PWR SYS AUX CARD RESET USB WAN1 WAN2 OPT LAN1/LAN2/DMZ 1 2 P1 P2 P3 P4 P5 P6 P7 MASTER SLAVE(S) MailCleaner Copyright

More information

Advanced Settings. Help Documentation

Advanced Settings. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods

More information

Mimecast Personal Portal (MPP)

Mimecast Personal Portal (MPP) Mimecast Personal Portal (MPP) Mimecast Personal Portal (MPP) Advanced Bounce Viewer Managed Senders Moderated On Hold Personal On Hold Rejection Viewer Calendars Exchange Folders File Archive Logging

More information

Documentation Userinterface

Documentation Userinterface Documentation Userinterface Version 2030 www.reddoxx.com 1 Copyright 2013 by REDDOXX GmbH REDDOXX GmbH Neue Weilheimer Str. 14 D-73230 Kirchheim Fon: +49 (0)7021 92846-0 Fax: +49 (0)7021 92846-99 E-Mail:

More information

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

IBM Express Managed Security Services for  Security. Anti-Virus Administrator s Guide. Version 5.31 IBM Express Managed Security Services for Email Security Anti-Virus Administrator s Guide Version 5.31 Table of Contents 1. Service overview...3 1.1 Welcome... 3 1.2 Anti-Virus (AV) features... 3 1.3 How

More information

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

Defining Which Hosts Are Allowed to Connect Using the Host Access Table Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, page 1 Defining Remote Hosts

More information

Univention Corporate Server. Cyrus mail server

Univention Corporate Server. Cyrus mail server Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction... 4 2. Installation... 5 3. Management of the mail server data... 6 3.1. Management of mail domains... 6 3.2. Assignment

More information

Web Mail and e-scout Instructions

Web Mail and e-scout Instructions Web Mail and e-scout Instructions To log into e-scout: visit our home page at www.greenhills.net, click on web mail at the top of the page OR click on the customer center tab and then the webmail button,

More information

MailCleaner Extended FAQ

MailCleaner Extended FAQ MailCleaner Extended FAQ NETHZ Mail Filtering Preferences NETHZ 001 Q: Can I still use my nethz Mail Filtering Preferences? A: The "email Spamfilter" option of the www.passwort.ethz.ch user interface will

More information

Symantec ST0-250 Exam

Symantec ST0-250 Exam Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0 Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2017 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

Notification Preferences

Notification Preferences Notification Preferences Canvas includes a set of default notification preferences you can receive for your courses. Notifications are sent to Canvas contact methods as specified in your account. However,

More information

Barracuda Security Service User Guide

Barracuda  Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses, worms, phishing, and denial of service attacks.

More information

Enabling and Activating Anti-Spam

Enabling and Activating Anti-Spam Enabling and Activating Anti-Spam NOTE: Anti-Spam does not apply to the SuperMassive 9800. The Anti-Spam > Base Setup page allows you to activate the Anti-Spam feature, configure email threat categories,

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Account Customer Portal Manual

Account Customer Portal Manual Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

TrendMicro Hosted Security. Best Practice Guide

TrendMicro Hosted  Security. Best Practice Guide TrendMicro Hosted Email Security Best Practice Guide 1 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The names of companies,

More information

Hostopia WebMail Help

Hostopia WebMail Help Hostopia WebMail Help Table of Contents GETTING STARTED WITH WEBMAIL...5 Version History...6 Introduction to WebMail...6 Cookies and WebMail...6 Logging in to your account...6 Connection time limit...7

More information

Dell SonicWALL Security 8.2. Administration Guide

Dell SonicWALL  Security 8.2. Administration Guide Dell SonicWALL Email Security 8.2 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Centralized Policy, Virus, and Outbreak Quarantines

Centralized Policy, Virus, and Outbreak Quarantines Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page

More information

Integrated Migration Tool

Integrated Migration Tool IceWarp Unified Communications Version 12 Published on 9/20/2017 Contents... 4 How It Works... 5 Performing Migration... 5 Set up the Domain in IceWarp Server... 6 Create Migrator Email Account... 8 Configure

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

My MessageMedia User Guide

My MessageMedia User Guide My MessageMedia User Guide Copyright and Trademark Statement 2011 MessageMedia All rights reserved. Apart from any use permitted under the Copyright Act 1968, no part of this publication may be reproduced,

More information

PineApp Mail Secure 5.1 User Manual

PineApp Mail Secure 5.1 User Manual PineApp Mail Secure 5.1 User Manual January 20, 2016 The information in this guide is furnished for informational use only, is subject to change without notice and should not be construed as a commitment

More information

Using Trustwave SEG Cloud with Cloud-Based Solutions

Using Trustwave SEG Cloud with Cloud-Based  Solutions .trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS

More information

Barracuda Spam Firewall User's Guide 5.x

Barracuda Spam Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting and blocklisting email addresses, and modify your user preferences using the

More information

Comodo Dome Antispam MSP Software Version 2.12

Comodo Dome Antispam MSP Software Version 2.12 Comodo Dome Antispam MSP Software Version 2.12 Administrator Guide Guide Version 2.12.111017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

ENTERPRISE SUBSCRIBER GUIDE

ENTERPRISE SUBSCRIBER GUIDE ENTERPRISE SUBSCRIBER GUIDE Enterprise Subscriber Guide 880 Montclair Road Suite 400 Birmingham, AL 353 www. TABLE OF CONTENTS Table of Contents Introduction...6 Logging In...6 Navigation Bar, Sub-Menu

More information

Configuring SharePoint 2007

Configuring SharePoint 2007 26636.book Page 77 Thursday, February 14, 2008 4:38 PM Chapter 3 Configuring SharePoint 2007 MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Manage Administration Manage Central Admin UI Manage the

More information

CITIC Telecom CPC EPS. Administrator Guide

CITIC Telecom CPC EPS. Administrator Guide CITIC Telecom CPC EPS Revision History Revision Changes Date Revised by 1 Initial Release May-2013 John Zhang Table of Contents 1 Quick Start... 1 1.1 Getting started... 1 1.2 Scheduling of Backup Jobs

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Overview... 3 Dashboard...3 Alerts...4 Logs & Reports... 10 People... 25 Devices... 34 Global Settings...50 Protect Devices...78 Endpoint

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account

More information

OWA 2013 Getting Started

OWA 2013 Getting Started OWA 2013 Getting Started Our mail server has been upgraded to the Exchange 2013 this has created some changes in our webmail environment. Email A new modern style has been applied to web interface to align

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

Updating Content in Product Manager

Updating Content in Product Manager Updating Content in Product Manager 1. Log in to the system at https://buyers.procserveonline.com/otis/login.html?marketplaceid=2&locale=en_gb, entering username and password. If you have forgotten your

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

This document contains information that will help you to create and send graphically-rich and compelling HTML s through the Create Wizard.

This document contains information that will help you to create and send graphically-rich and compelling HTML  s through the Create  Wizard. This document contains information that will help you to create and send graphically-rich and compelling HTML emails through the Create Email Wizard. or warranty by AT&T and is subject to change. 1 Contents

More information

MS2. Modern Traffic Analytics ms2soft.com

MS2. Modern Traffic Analytics ms2soft.com MS2 Modern Traffic Analytics ms2soft.com Updated: October 31, 2014 The Traffic Count Database System (TCDS) module is a powerful tool for the traffic engineer or planner to organize an agency's traffic

More information

ProofPoint Protection Perimeter Security Daily Digest and Configuration Guide. Faculty/Staff Guide

ProofPoint  Protection  Perimeter Security Daily Digest and Configuration Guide. Faculty/Staff Guide ProofPoint Email Protection Email Perimeter Security Daily Digest and Configuration Guide Faculty/Staff Guide Contents Introduction and ProofPoint Overview... 2 Daily Email Digest... 3 ProofPoint Portal

More information

WEBSENSE PERSONAL MANAGER

WEBSENSE PERSONAL  MANAGER WEBSENSE PERSONAL EMAIL MANAGER Personal Email Manager is a facility for managing email that has been blocked by Websense Email Security. Websense Email Security filters email to protect you and your organization

More information

HOW-TO GUIDE. How to Optimize Your s for Deliverability

HOW-TO GUIDE. How to Optimize Your  s for Deliverability HOW-TO GUIDE How to Optimize Your Emails for Deliverability The Problem Email Reputation Your ability to market to your audience is based on sending emails from your Email Service Provider, or ESP. ESPs

More information

indicating the mail user access, and the four icons, each representing different mail account types. They are: Mailbox Redirects Mail Group Mail Autor

indicating the mail user access, and the four icons, each representing different mail account types. They are: Mailbox Redirects Mail Group Mail Autor How do I manage e-mail in the Plesk control panel? Plesk uses the qmail system. You can create and manage email boxes for individuals within a domain, or your client can manage the email accounts via domain

More information

Validating Recipients Using an SMTP Server

Validating Recipients Using an SMTP Server This chapter contains the following sections: Overview of SMTP Call-Ahead Recipient Validation, page 1 SMTP Call-Ahead Recipient Validation Workflow, page 1 How to Validate Recipients Using an External

More information

Working with Mail (Qmail)

Working with Mail (Qmail) Working with Mail (Qmail) TM Control Panel User Guide Working with Qmail 1 The Mail service provides the means of creating and managing mail services at the domain. That includes creating mail user Accounts,

More information

Red Hat CloudForms 4.0 Monitoring, Alerts, and Reporting

Red Hat CloudForms 4.0 Monitoring, Alerts, and Reporting Red Hat CloudForms 4.0 Monitoring, Alerts, and Reporting Creating and managing reports, feeds, and widgets in CloudForms Management Engine Red Hat CloudForms Documentation Team Red Hat CloudForms 4.0

More information

USER GUIDE. EBMS SECURE MailGate

USER GUIDE. EBMS SECURE  MailGate USER GUIDE EBMS SECURE EMAIL MailGate USER REGISTRATION When a secure email is sent to a new user, Secure Mailbox generates a notification and sends it to their email account. The notification contains

More information

Outlook GroupWare Connector User Guide

Outlook GroupWare Connector User Guide Merak Email Server Outlook GroupWare Connector User Guide Version 9.0 Printed on 6 June, 2007 i Contents Introduction 1 Installation 2 Pre-requisites... 2 Running the install... 2 Add Account Wizard...

More information

Administrator Manual v5.0

Administrator Manual v5.0 Administrator Manual v5.0 SecurityGateway for Email Servers Administrator Manual Products that are referred to in this document may be trademarks and/or registered trademarks of the respective owners.

More information

Ethical Hacking and. Version 6. Spamming

Ethical Hacking and. Version 6. Spamming Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How

More information

PROTECTION. ENCRYPTION. LARGE FILES.

PROTECTION. ENCRYPTION. LARGE FILES. NoSpamProy PROTECTION. ENCRYPTION. LARGE FILES. All features at a glance With its three modules PROTECTION, ENCRYPTION, and LARGE FILES, NoSpamProy offers reliable protection from spam and malware, secure

More information

anti-spam techniques beyond Bayesian filters

anti-spam techniques beyond Bayesian filters anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based

More information

1 Setting Up GroupWise to Work with

1 Setting Up GroupWise to Work with 1 Setting Up GroupWise to Work with POP3 Mailboxes Overview If you use domain mail forwarding, incoming Internet e-mail for your organization can be handled by a program called the POP Forwarding Agent

More information

MYINBOX YOUR ONLINE MESSAGING CENTRE USER GUIDE Issue March 30, 2009

MYINBOX YOUR ONLINE MESSAGING CENTRE USER GUIDE Issue March 30, 2009 MYINBOX YOUR ONLINE MESSAGING CENTRE USER GUIDE Issue 1.1.0 - March 30, 2009 1 CONTENTS 1 INTRODUCTION TO MYINBOX... 4 1.1 OVERVIEW... 4 1.2 ADDITIONAL FEATURES... 5 1.3 NAVIGATING MYINBOX... 6 2 EMAIL

More information

Getting Started With Outlook Express For Windows 2000/XP Author Marcie Matsuo Revised by Darren Kato

Getting Started With Outlook Express For Windows 2000/XP Author Marcie Matsuo Revised by Darren Kato WIN9X015 November 2005 Getting Started With Outlook Express For Windows 2000/XP Author Marcie Matsuo Revised by Darren Kato Introduction...1 What is Outlook Express...1 Requirements...2 Where do I get

More information

User Manual RouteSms SmsPlus Desktop. Version 1.0

User Manual RouteSms SmsPlus Desktop. Version 1.0 User Manual RouteSms SmsPlus Desktop Version 1.0 1. Content : 1 INTRODUCTION...... 3 2 LOGIN... 4 3 WELCOME PAGE...... 5 4 SEND SMS...... 6 4.1 SINGLE SMS:... 6 4.2 BULK SMS:... 7 4.3 PERSONALIZED BULK

More information

Security by Any Other Name:

Security by Any Other Name: Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San

More information

SonicWALL Security 6.0 Software

SonicWALL  Security 6.0 Software Email Security SonicWALL Email Security 6.0 Software Attention: Licensing has changed in Email Security 6.0. Be sure to read the Dynamic Licensing section in this Release Note before upgrading, and see

More information

Webmail Which Webmail applications are available?

Webmail Which Webmail applications are available? Mail FAQ Webmail Which Webmail applications are available? Why is the Webmail application that I want to use missing? Can I reconfigure access to Webmail from http://example.com/webmail to webmail.example.com?

More information

AT&T Voice DNA Receptionist User Guide

AT&T Voice DNA Receptionist User Guide AT&T Voice DNA Receptionist User Guide Page 2 of 28 Table of Contents About Receptionist... 3 Start Receptionist... 4 Use Receptionist the First Time... 4 Use Receptionist After the First Time... 7 The

More information

Office 365: Secure configuration

Office 365: Secure  configuration Office 365: Secure email configuration Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

WebAdmin IceWarp WebAdmin Manual

WebAdmin IceWarp WebAdmin Manual WebAdmin IceWarp WebAdmin Manual WWW.ICEWARP.COM 1 WebClient WebAdmin User Manual Guide Contents About IceWarp WebAdmin Manual 3 1/ Login Page 4 2/ 4 Control bar 5 User Account Menu 5 Main Windows 6 Dashboard

More information

Configuration Guide. Version 1.5.9

Configuration Guide. Version 1.5.9 Configuration Guide Version 1.5.9 Copyright TeamExpand 22/07/2015 1. Overview 2 Table of contents 1. Overview... 3 1.1 Purpose... 3 1.2 Preconditions... 3 1.3 Applying changes... 5 1.3.1 Sync via UI...

More information

Tutorial for Horde . Contents

Tutorial for Horde  . Contents Tutorial for Horde email Contents Basics 1. Starting Horde 2. Reading emails 3. Replying / Forwarding 4. New email 5. Attachments 6. Save as Draft 7. Address books Adding contact details and accessing

More information

Webmail 7.0 is an online client which runs in your web browser. Webmail 7.0 allows you to access your , contact list, and calendar from

Webmail 7.0 is an online  client which runs in your web browser. Webmail 7.0 allows you to access your  , contact list, and calendar from Webmail 7.0 is an online email client which runs in your web browser. Webmail 7.0 allows you to access your email, contact list, and calendar from any computer with an internet connection and a web browser.

More information

G-Lock EasyMail7. Startup Guide. Client-Server Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit

G-Lock EasyMail7. Startup Guide. Client-Server  Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit G-Lock EasyMail7 Client-Server Email Marketing Solution for Windows Startup Guide 1 Table of Contents This document is your startup guide for G-Lock EasyMail7 product. It is designed to provide you with

More information

Mail Services SPAM Filtering

Mail Services SPAM Filtering Table of Contents Subject Page Getting Started 2 Logging into the system 2 Your Home Page 2 Junk Mail Digests 3 Digest Scheduling 3 Using Your Digest 3 Messaging Features 4 Your Message Queue 4 View Queued

More information

ZLD Series - Anti-Spam

ZLD Series - Anti-Spam ZLD Series - Anti-Spam Anti-Spam Setup for 4.XX Firmware version and higher What is Anti-Spam Anti-Spam is a feature that allows the USG to check incoming mail and mark it as spam. This is a licensed service

More information

Barracuda Security Gateway User 's Guide 6 and Above

Barracuda  Security Gateway User 's Guide 6 and Above Barracuda Email Security Gateway User 's Guide 6 and Above This guide describes how you can use the Barracuda Email Security Gateway web interface to: Check your quarantined messages Classify messages

More information

10/31/2016 Spark US 2016 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any

10/31/2016 Spark  US 2016 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any Email Guide 10/31/2016 Spark Email US 2016 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including

More information

Acronis Monitoring Service

Acronis Monitoring Service Acronis Monitoring Service PRODUCT DOCUMENTATION Table of contents 1 About the Acronis Monitoring Service...4 2 Software Requirements...4 3 Understanding basic concepts...5 4 Getting started...7 4.1 Setting

More information

Your . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU

Your  . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU fuzzylime WE KNOW DESIGN WEB DESIGN AND CONTENT MANAGEMENT 19 Kingsford Avenue, Glasgow G44 3EU 0141 416 1040 hello@fuzzylime.co.uk www.fuzzylime.co.uk Your email A setup guide Last updated March 7, 2017

More information

How to Use the Greymail Spam Filter

How to Use the Greymail Spam Filter How to Use the Greymail Spam Filter This guide will show you the basics of how to view messages flagged as spam, and how to recover them, if improperly flagged. For a full overview of the New Greymail

More information

Office of Help Desk/Training Services Wharton County Junior College

Office of Help Desk/Training Services Wharton County Junior College Wharton County Junior College Table of Contents Note: The items in this table are linked. Click the item to access that section of the document. Click the Return to TOC link to return to this page. Folder

More information