UP & DOMAIN ADMINISTRATION GUIDE

Size: px
Start display at page:

Download "UP & DOMAIN ADMINISTRATION GUIDE"

Transcription

1 DOMAIN GROUP & DOMAIN ADMINISTRATION GUIDE Security Service MPS 6 for Hosted Service Providers MPS 6 for Hosted Enterprises MPS 6 for Service Providers MPS 6 for Enterprises

2 Disclaimer The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation. This documentation is intended for the use of AnubisNetworks customers and partners only for the purposes of the agreement under which the document is submitted, and no part of it may be used, reproduced, modified or transmitted in any form or means without the prior written permission of AnubisNetworks. The documentation has been prepared to be used by professional personnel, and the customer assumes full responsibility when using it. The information or statements given in this documentation concerning the suitability, capacity, or performance of the mentioned hardware or software products are given as is and all liability arising in connection with such hardware or software products shall be defined conclusively and finally in a separate agreement between AnubisNetworks and the customer. AnubisNetworks has made all reasonable efforts to ensure that the instructions contained in the document are adequate and free of material errors and omissions. AnubisNetworks will explain, if necessary, issues that may not be covered by the document. AnubisNetworks welcomes customer comments as part of the process of continuous development and improvement of the documentation. AnubisNetworks will correct errors in this documentation as soon as possible. IN NO EVENT WILL ANUBISNETWORKS BE LIABLE FOR ERRORS IN THIS DOCUMENTATION OR FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDIRECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR DATA,THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN IT. This documentation and the product it describes are considered protected by copyrights and other intellectual property rights according to the applicable laws. AnubisNetworks brand and logo are trademarks of NSEC Sistemas Informáticos, S.A. Other product names mentioned in this document may be trademarks of their respective owners, and they are mentioned for identification purposes only. Copyright AnubisNetworks All rights reserved version 1.0 Domain Group & Domain Administration guide 2/145 ptempresas.pt

3 Contents 1 About this guide Audience Conventions About MPS System scope System virtual hierarchy Users classification Mail Actions Messages classification Mail tagging Mail discard Actions over Messages Navigation and sections Login and Logout Navigation Account section Logout button System Status section Tabs symbols Tabs menu Hierarchy selection: Scope and Mail Flow selection Representation of hierarchy Main view Dashboard tab Charts section Table (Statistics) section History stats section Business Information section Dashboard tab / Reports Schedule Reports section Current schedule section Description of Reports Domain Activity Report Messages tab Messages search section Searches and Actions Search options Search Results Delete and Release Messages Message details Hierarchy More details Message path Message headers version 1.0 Domain Group & Domain Administration guide 3/145 ptempresas.pt

4 7.3.6 Operations over messages in Message Details Mail Filtering tab Mail Filtering tab / Filtering Anti-Spam section Change Anti-Spam Settings Anti-Virus section Whitelist and Blacklists sections Define Whitelists and Blacklists Current list Order of execution for blacklist and whitelist rules Exceptions Block empty senders (for Blacklists) Import file File Types section File extensions Content Filter section Create a Content Filtering Rule Tagging Rules Regular Expressions Mail Filtering tab / Digest settings Domain Digest section Digest configuration Single user Digest section User List Digest section Mail Control tab Mail Control / Delivery Data Loss Prevention section Create a DLP Rule Rules Regular Expressions Quota Management section Mail Control / Authentication DKIM Signing section Generate DKIM Keys Publish at your DNS the Public DKIM Keys Configure, at MPS, the Public and Private DKIM Keys Mail Control / Mail Routing Virtual Aliases section Mail Control / Mail Notifications Disclaimer section Domains Settings tab The Domains section Domain Mail Delivery section version 1.0 Domain Group & Domain Administration guide 4/145 ptempresas.pt

5 16 Domain Settings tab / Address Lookups Manage Lookups section LDAP Lookups section Address Lists Lookups section Domain Settings tab / Connectors Manage Auth. Bridge section Using LDAP Bind Using LDAP Attribute Using LDAP Indirect Using IMAP and POP Organizational Units Bridges section Hierarchy tab Hierarchy tab / User accounts Notes on Users Users classification (Table of) Registered Users section Users registration Editing Users / Adding User Password policies section Hierarchy tab / Manage Hierarchies (Manage) HSP section Manage HSP (Manage) VSP section (Manage) Domain Group section Manage Domain Groups (Manage) Domain section Manage Domains Subdomains (Manage) Organizational Unit section Manage Organizational units Hierarchy tab / GUI Customization Theme and Logo section Theme creation section Hierarchy tab / GUI Usage control Terms and Conditions section Setting up the terms and conditions Audit Log section Searching the Audit log Messages Filtering the Audit log References, Definitions, and content tables Most common definitions References Table of Tables Table of Figures version 1.0 Domain Group & Domain Administration guide 5/145 ptempresas.pt

6 1 About this guide This is a guide for system Mail Protection Service (MPS), from AnubisNetworks. This guide specifies the administration and handling of the MPS web based administration console (Webgui). This guide also approaches advanced system operations and command line administration. 1.1 Audience This guide is destined to Users of MPS, with special privileges within the organization to handle and supervise this system. The audience must possess active knowledge related to networks, messaging protocols and data transmission. This guide is specifically aimed at MPS Domain Group Administrators. And at MPS Domain Administrators. 1.2 Conventions The following conventions will be used: Bold: Graphical User interface elements like options, menus or buttons; Italic: references topics in this document. Courier: Paths, URL's, text to be typed by the User. <TERM>: Generic terms version 1.0 Domain Group & Domain Administration guide 6/145 ptempresas.pt

7 2 About MPS Mail Protection Service (MPS) is an Security platform, deployed as a service in the cloud, or deployed on premises in the organization s datacenter. The architecture of the platform contains web services connecting to a Web Graphical Interface (GUI). This interface is used by Users and Administrators to manage their scopes within the platform. Mail Protection Service is multitenant, meaning it comprehends an advanced hierarchy system, with several user types. This documentation explores one or more of these Administration roles, as explained in the following chapters version 1.0 Domain Group & Domain Administration guide 7/145 ptempresas.pt

8 3 System scope 3.1 System virtual hierarchy AnubisNetworks has defined a virtual hierarchy for better managing each User, User messages, and inbound and outbound traffic. By setting up a concept of roles hierarchy, based on virtual security domains, the privileges and the administration options are clearly understood and differentiated across the organizations, which interact with this system. A MPS system has the following hierarchy objects: Global: The system platform. Global represents the Webgui console, the shell console and the physical hardware where the system is deployed. Managed by Global Administrators HSP: - Hosted Service Providers - Virtualization of MPS system, with remote access and control of the Webgui. Managed by HSP administrators. VSP: - Virtual Service Providers - Virtualization of MPS system, with remote access and control of the Webgui. Managed by VSP administrators.. Domain Groups and Domains: Two level hierarchy, where each domain can be singled out or aggregated in a group, to share functionalities and definitions. Managed by Domain Group and Domain Administrators, which can be Users with administration privileges. OUs: - Organizational Units LDAP groups within the domains Managed by OU Administrators. Optionally, Helpdesk Users can be created to aid administrators in managing domains. Helpdesk Users can exist in any Administrative level, and can be Supervisors, Viewers and Users. This is a top-down hierarchy, and each of the levels can bypass the one beneath for administration purposes (example: Global Administrators can directly set up Anti-spam options for Domain Administrators) version 1.0 Domain Group & Domain Administration guide 8/145 ptempresas.pt

9 Figure 3-1 Users in the system 3.2 Users classification MPS system differentiates Users by two types: Users included in SMTP domains (therefore, with active mailboxes). Users with administration roles, such as Domain administrators, and Helpdesk roles, who may or may not have accounts, set in a SMTP domain. Users in the system may have the following profiles: version 1.0 Domain Group & Domain Administration guide 9/145 ptempresas.pt

10 Global Administrators have full control of the system, including managing hardware, virtual environments, and all hierarchic levels. HSP Administrators have full control of domains and subdomains on their own hierarchy, and may create any type of User (except Global Admin). VSP Administrators have full control of domains and subdomains on their own hierarchy, and may create any type of User from hierarchic levels below. Domain Group Administrators have full control over one or more domains and its Users (for the domains they own), and can access all functionalities in the group. Domain Administrators have full control over one SMTP domain, its settings and its Users, and can access all functionalities in the domain. OU Administrators: have control over an organization unit inside a SMTP domain. Users are generally Normal Users, with a valid Mailbox in a SMTP domain, who can only access their quarantine, search their message list and change some settings for their profile. Helpdesk Supervisors, Viewers and Users are users who have been granted other administrative tasks, such as setting anti-virus or monitoring mail messages for a particular domain. For further information on all system Users, please refer to Chapter Users, in this document. IMPORTANT NOTE Depending on the MPS version and User type, some of the roles are disabled. For instance, if the User is a Domain Administrator, this User will not be able to see or access any of the information on the upper hierarchies. 3.3 Mail Actions Messages classification The MPS classifies Mail messages into the following categories: Clean: Mail that is considered suitable for delivery at its final destination version 1.0 Domain Group & Domain Administration guide 10/145 ptempresas.pt

11 Spam: Mail that is considered probable spam. High Spam: Mail that is considered spam. Virus: Mail that contains virus, typically found in attachments. Reject: Mail that is rejected for several possible reasons, outlined below. Rejected Spam: Also spam, but rejected prior to entering the filtering system (due to RBL reputation). Policy Blocked: Mail that is classified as Policy Blocked when it triggers defined rules, for example, attachment rules, content policy rules, and others. The incoming Mail is rejected for the following possible reasons: Sender reject: Mail is rejected because sender is invalid. Bad helo: Mail is rejected because an invalid helo (or ehlo) is sent. Domain unknown: The message is sent from a domain without valid DNS record. RCPT reject: Mail is rejected because the recipient address is invalid. User unknown reject: Mail is rejected because the User is unknown. RBL block: Mail is rejected because source IP address has bad reputation Mail tagging Incoming Mail that meets certain system defined rules and policies will be tagged on arrival. Tagging the mail involves either prepending text to the subject field, or appending a specific header to the existing mail header. Tagged mail is forwarded to the intended recipient instead of being discarded or quarantined Mail discard Incoming Mail that meets certain system defined rules and policies will be discarded after processing. Mail is completely removed from the system and cannot be retrieved at a later date Actions over Messages When deciding how to handle messages that match a rule, in particular when setting User policies, three actions can be used when there is a match: Quarantine: Mail is moved to the quarantine. Tag: Mail subject is tagged with a specific message; also a specific header may be appended to the Mail's header. Discard: Mail is removed from the system version 1.0 Domain Group & Domain Administration guide 11/145 ptempresas.pt

12 Note A tagged mail message will not be kept in the system: it will be forwarded. For this reason, tagged messages are not shown in either quarantine or digest version 1.0 Domain Group & Domain Administration guide 12/145 ptempresas.pt

13 4 Navigation and sections 4.1 Login and Logout To perform your login you must type the credentials (Username and Password) which were previously given to you by your system administrator. Note You may change your password later, by using the account settings button. Figure 4-1 Login menu You must also select one of the following session options. Public /shared computer: With this option, your session will expire if you do not perform any action in the web interface (Webgui) during a period of one hour. This option is intended for shared computer accounts and public environments. Private computer: With this option, your session remains active even if you do not perform any action for long periods. This session is intended for owned computers and secure environments. You may also select the desired language, for using in the Webgui. English (USA) language is the default language, and always available. Other languages may also be available, depending on administrative decisions. There are Password policies in MPS, meaning that you are entitled to a certain number of wrong attempts (Configurable) before your account is locked Language preferences are stored in the User and/or domain profile, and are automatically activated in a new login, without the need to select language every time, at login screen. Note You may change your language later, by using the account settings button version 1.0 Domain Group & Domain Administration guide 13/145 ptempresas.pt

14 4.2 Navigation After successfully logging in, the MPS web interface (Webgui) is displayed. Figure 4-2 Wide view of first screen (Overview tab) By default, the Dashboard tab is selected. Please refer to Tabs menu for further details. The interface is organized in the following sections: The Account section. The System Status section. The Tabs menu. The Main view (depending on the item chosen in the Tabs menu) version 1.0 Domain Group & Domain Administration guide 14/145 ptempresas.pt

15 4.2.1 Account section Figure 4-3 The Account section In this section, you have the following options and information: Information on who is the current User of the interface (in the example: admin). The Account Settings options. The Logout button. Information on the current logged in user. Some important messages, such as license validity may appear next to this items. Account settings By clicking in the account sections button, you will access the following screen: Figure 4-4 Account settings This screen is used to change your password and the language used for your Webgui sessions. For changing the password, you must type: 1. Your password (current password) version 1.0 Domain Group & Domain Administration guide 15/145 ptempresas.pt

16 2. New password (the new password you want). 3. Confirm password (repeat the new password inserted before). 4. You must then click on the update password button to enable the changes. For changing the language, 1. You must use the dropdown bar and select one of the available languages. 2. Then you must click update language Logout button To end your current session, use the logout button in the upper right corner of the interface. The Webgui will return to the Login screen System Status section Figure 4-5 Status bar (commented) The system status section can be set visible or not visible by clicking the circle button (1, in figure above). The System Status section on the top will show you a number of statistics. These are: System Load: The system's average load processes using or waiting for the CPU during the last minutes (one, five and fifteen minutes). This information is updated every 60 seconds. Today's Totals: The total number of Received Mail messages, further divided into Good Mail and Bad Mail: o o o Received: Total number of Mail messages received. Good Mail: Number of Mail messages that were considered clean, for example, suited for delivery. Bad Mail: Number of Mail messages that were considered not clean (sum of spam, virus, policy and rejected messages) version 1.0 Domain Group & Domain Administration guide 16/145 ptempresas.pt

17 Daily Average: The information shown here is similar to that of Today's Totals, but it is an average value calculated over a set of at most (the last) 30 days (excluding the current day). These statistics are shown for both Inbound and Outbound flow. You can select which flow by clicking the respective arrow buttons (3, in figure above) Inbound (right-to-left) and Outbound (left-to-right). The status information is not automatically refreshed if the interface is not being used. When actions are being performed through the interface, the status information is updated every minute. You can select refresh the statistics by clicking the revolving circle button (2, in figure above) Tabs symbols Click on the [circle] tab button to respectively unhide and hide the System Status section. Click on the [Question mark] to make appear helping text for some menus. The Helping text is a live assistant for some of the more technical menus. Figure 4-6 Hide/unhide System Status and Online Help buttons version 1.0 Domain Group & Domain Administration guide 17/145 ptempresas.pt

18 Figure 4-7 Example of help activated for Anti-spam submenu Tabs menu The different tabs allow accessing the different functionalities offered by MPS Webgui, which are further explored in the remainder of this document. Figure 4-8 Tabs menu Note Depending on the Administrator / User type, some of the tab options are not available. Notably, the Tab System is only available for Global Administrators Hierarchy selection: Scope and Mail Flow selection The scope section, the magnifier button, and the flow selection allows you to search for a particular user, domain, group in the system. This is the main interface for managing a multitenant system based on a hierarchy model. This Scope Selection appears in every menu version 1.0 Domain Group & Domain Administration guide 18/145 ptempresas.pt

19 Note Depending on the operation, some of the options are not available. For example, Users may not be searchable, and Outbound or Inbound flows may not be available. Figure 4-9 Scope selection (default: Global) This box enables you to select the domain or group for which the information, statistics and charts will be shown. The Target selection box allows you to view the configuration inside a particular scope and to obtain details for that particular scope. You must click the target button (1, in the figure above), to expand an over layer box (2, in the figure above). Alternatively, you can click the magnifier button (3, in the figure above, and exemplified below) for the Find Hierarchy operation, which will find any hierarchy level, by name version 1.0 Domain Group & Domain Administration guide 19/145 ptempresas.pt

20 The Mail Flow Selection (4, in the figure above) allows you to see the Inbound or the Outbound messages Representation of hierarchy As observed in the previous figure, the hierarchy is visible when triggering the Global configuration. If a Global (the globe icon), this section will show the aggregated configuration settings defined for all the virtual domains. If HSP (purple building icon with holding hand) or VSP (the purple building icon) are selected, this section will show the configuration settings defined for these virtual domains. The yellow folder is a Domain Group (aggregation of single Domains) and the envelope is the actual SMTP Domain. The red and grey network is a Organizational Unit. Note The levels of the hierarchic system are only available for the respective Administrator. Depending on the type of User, only the hierarchy that this Administrator manages is visible. For Example, Global level IS NOT visible to HSP Administrators. Global and HSP levels are not visible for VSP Administrators, and so on Main view By choosing an option in the Tabs menu, the main view will change. Initially and by default, the main view is the content of the Dashboard tab. The Following chapter will describe each one of the views/ tabs version 1.0 Domain Group & Domain Administration guide 20/145 ptempresas.pt

21 5 Dashboard tab The Dashboard view is the initial view is the view corresponding to the Dashboard tab. The Dashboard is divided in several sections, such as Overview and Reports The Dashboard tab is selected as illustrated in the following screenshot: Figure 5-1 Dashboard selected in the Tabs bar 5.1 Charts section The charts section shows graphical representations of the classification and volume of data for different periods (last 24 hours, last 30 days and last year are the options available). This section shows four graphics at a time. The graphics always refer to the selected hierarchy scope. For every hierarchy levels the following graphics are available: Message classification Bad Mail breakdown Good Mail vs. bad Mail Filter actions Volume Volume vs. messages How to select the data to view Select the data to view from the left selection box, and the period from the right selection box version 1.0 Domain Group & Domain Administration guide 21/145 ptempresas.pt

22 Message classification Figure 5-2 Message classification chart The Message classification chart, displays how the received messages were classified. Action (color) Other rejections (blue) Policy (grey) Infected (red) Rejected Spam (yellow) Spam (orange) Clean (green) Description Mail that was rejected for several possible reasons, outlined below. Note that the rejection occurs during SMTP transaction, rejected mail is cast out before entering the system (it is never processed). Mail that was classified as Policy Blocked when it triggered one or more defined rules. Mail that contained virus, typically found in attachments. Mail was rejected because it was considered to be High-spam during the Mail header analysis, before entering the system Mail that is considered spam. Spam refers to all messages classified by the anti-spam technologies. Mail that is considered suitable for delivery to its final destination. Table 5-1 Message classification version 1.0 Domain Group & Domain Administration guide 22/145 ptempresas.pt

23 Bad mail breakdown Figure 5-3 Bad Mail breakdown chart The Bad mail breakdown option displays a pie chart that shows how the Bad Mail, which reached the system, is divided. The areas of this chart represent: Bad Mail (color) Spam (orange) Rejected Spam (yellow) Infected (red) Other Rejections (blue) Policy (grey) Description Mail that is considered to be spam. All technologies listed under the anti-spam options are considered here. Mail rejected because it was considered to be High-spam, Mail that contains virus and malware, typically found in attachments. Mail that was rejected for several possible reasons, outlined below. Note that the rejection occurs during analysis of the Mail header - rejected Mail is cast out before entering the system (it is never processed). Mail that is classified as Policy Blocked when it triggered one or more defined rules (for example, attachment rules). Table 5-2 Bad mail breakdown version 1.0 Domain Group & Domain Administration guide 23/145 ptempresas.pt

24 Good mail vs. Bad mail Figure 5-4 Good Mail vs. bad Mail chart The Good mail vs. Bad mail chart shows the percentages of good and bad traffic, which arrived to the system, in the specified period. Good mail includes only the clean mail (orange color). Bad mail includes messages that were considered spam, high spam or virus, messages that were rejected and messages that were blocked by policies (blue color) version 1.0 Domain Group & Domain Administration guide 24/145 ptempresas.pt

25 Filter actions Figure 5-5 Filter Actions chart The Filter actions chart shows the actions that were performed on the mail traffic that reached the filter (rejected traffic does not reach the filter). The possible Actions are summarized in the following table: Action (color) Tagged (grey) Discarded (red) Quarantined (orange) Forwarded (green) Description Mail subject is tagged with a specific message in the subject; also a specific header may be appended to mail's header. Mail that is removed from the system. Mail that is moved to the Quarantine. Mail that is forwarded to the final destination. Table 5-3 Action Field version 1.0 Domain Group & Domain Administration guide 25/145 ptempresas.pt

26 Volume Figure 5-6 Volume chart The Volume chart shows the traffic volume of the received messages Volume vs. Messages Figure 5-7 Volume vs. messages chart version 1.0 Domain Group & Domain Administration guide 26/145 ptempresas.pt

27 The Volume vs. Messages chart shows the traffic volume of the received messages compared to the number of messages received. Under normal circumstances, the two patterns are similar (if the size of each message is regular). 5.2 Table (Statistics) section Figure 5-8 Table section (View: message classification) The statistics section is a table displaying the Mail activity, divided by hours, for your current scope. Three views are possible (selected using the dropdown menu on the right upper corner of the statistics section): Message Classification: Shows the number of clean, rejected, spam, virus and policy messages for the last 24 hours Action Taken: This is similar to Message Classification, but instead of classifying messages by type (clean, spam, and others), it classifies messages according to the way the system acted upon them: quarantined, discarded, tagged or forwarded. Message Statistics: Shows the volume, the total number of messages and the message rate (in messages per second) for the last 24 hours. If the scope is all the system, aggregated values are shown. 5.3 History stats section The History stats section permits to download a CSV, per scope with the History and the Rejections History for a given month. This is used for obtaining old statistics that, for some reason, are useful at the present moment version 1.0 Domain Group & Domain Administration guide 27/145 ptempresas.pt

28 Figure 5-9 History Stats menu To use this functionality, simply input the desired Year / Month and: Click Get History, for downloading a CSV with the statistics for that month. Click Get Rejections History, for downloading a CSV with the Rejected statistics for that month. 5.4 Business Information section Mail Protection Service is actually a multitenant system with a hierarchy consisting of multiple levels, domains, and virtual domains (for further information please refer to the chapter Users). In this menu you can go through the hierarchy tree, click on a certain scope and obtain the following information on that scope: Business Information Member name Admins Accounting Information Number of SMTP domains (live) Number of distinct Description The level in the system s virtual hierarchy. For more information please refer to the initial chapters of this document The current administrators created in this level. Description The number of SMTP domains which are UNDER the chosen scope Or No information (if the scope is an SMTP domain) Note that the Live definition for a domain means that this domain must have received s in the previous 30 days to be considered live. The number of distinct addresses is a value based on the different mailboxes which have received and/or sent at least one in the previous month version 1.0 Domain Group & Domain Administration guide 28/145 ptempresas.pt

29 addresses (last month) Table 5-4 Business information If you click refresh the data will be re-generated. Below, two examples of obtained information: Figure 5-10 Business Information: Domain view version 1.0 Domain Group & Domain Administration guide 29/145 ptempresas.pt

30 Figure 5-11 Business Information: Other hierarchies' view version 1.0 Domain Group & Domain Administration guide 30/145 ptempresas.pt

31 6 Dashboard tab / Reports Under the Reports section, you can configure periodic or one-time reports. These allow you to analyze what kind of your Mail server receives, through graphical depictions of that data. These reports are divided into two main types: Domain Activity Reports: Display data pertaining to all or some domains activity configured in a given MPS installation You can send a Domain report to a given recipient, by setting up the following parameters: Friendly Name: name for the report Scope: all domains /selected domains Timezone: The timezone related to the statistics. Run: o o now (immediate report); daily, weekly, monthly (scheduled report) Period: Time frame covered by report stats Data: data included on the report Recipient address: a mail address for the report receiver. You then must click generate to produce and send the report. Note The language in the Generated report will be the same as the language set in the account settings. 6.1 Schedule Reports section It is possible to either generate a report on demand, or configure the system to automatically generate the reports on a daily, weekly or monthly basis. The following table describes the report properties you can modify to increase the usefulness of your reports. Option Friendly Name Description The name by which the report will be known to the User. This is not a unique identifier, rather its aim is to help the User identify the reports both when they are received and when they are shown in the Current version 1.0 Domain Group & Domain Administration guide 31/145 ptempresas.pt

32 Option Scope Description Schedule pane. The criteria for choosing the friendly name is at the sole discretion of the User. For domain reports, whether the report should include information about all configured domains, or just a selection. If you click on the selected radio button, scope selection will appear to select one or more scopes. For System reports, whether the report includes information for all nodes or just some nodes. The User can choose the nodes for which data should be gathered. Domain Nodes Mailflow Timezone Type Data Include CSV Recipient address The aforementioned domain selection box / Hierarchy tree. Multiple domain selection is possible by selecting and clicking Add button. The aforementioned nodes selection box. Multiple node selection is possible: press the Control key, and whilst keeping it pressed, left-click the nodes you want to select. If the report is intended for Inbound our Outbound traffic. The Timezone that will be used to generate the reports. When the report should be generated. And which time scope will it contain. If daily, weekly, monthly or yearly are selected a scheduled report will be generated that will send the saved report, respectively, daily, weekly, monthly, or yearly, for this same activity period. Types of data to display in the report. In order to successfully schedule the report, at least one kind of data must be selected. The different data types (which correspond to the different kinds of graphics included in the reports) is described further on this document. You can choose to Select all the Data to be included in the report. You can choose to receive an attached CSV file. Mail address to which the report will be sent. Several addresses can be added by input the and click Add. To remove any address simply click on the (x) button. Schedule [button] You must click this button to schedule the report to be sent at the chosen time version 1.0 Domain Group & Domain Administration guide 32/145 ptempresas.pt

33 Option Download [button] Description This button will generate a onetime report, downloaded as PDF, and removed from the report queue afterwards. The CSV file cannot be downloaded. Table 6-1 Reports options The period of the report depends on the periodicity. For example, daily reports include data from the previous day, and similarly for weekly and monthly reports. Figure 6-1 Domain report to be sent to recipient 6.2 Current schedule section Current schedule displays a tabular layout showing detailed info of the report queue. The reports shown here will be either one-time reports waiting to be processed (for example, removed from queue and sent), or periodic reports, which remain on queue until manually deleted. To edit a report, click on the edit link in the Actions column To delete a report, click on the delete link in the Actions column version 1.0 Domain Group & Domain Administration guide 33/145 ptempresas.pt

34 Figure 6-2 Example of Current Schedule table 6.3 Description of Reports Alongside the report header, a table with the numeric totals for each of the message classes is shown. A short description follows: Option Total Messages Received Classified as Clean Classified as Spam Classified as Infected Rejected by User Policy Rejected by Server Description Number of messages that were processed, for the given period. This excludes rejections. Number of processed messages that were classified as clean Number of processed messages that were classified as spam Number of processed messages that were classified as infected Number of messages rejected due to User policy settings Number of messages rejected due to server policy settings. Please refer to topic Message Classification. Table 6-2 Domain reports header table options version 1.0 Domain Group & Domain Administration guide 34/145 ptempresas.pt

35 6.3.1 Domain Activity Report Figure 6-3 Domain Activity Report Chart: Message Classification The following chart shows the number of messages grouped by their classification, on a per time interval basis. The data concerns all the domains listed in Scope. Figure 6-4 Chart Message Classification Chart: Filter Actions version 1.0 Domain Group & Domain Administration guide 35/145 ptempresas.pt

36 The following chart shows the proportion of received legitimate (Ham) versus unsolicited (Spam and Rejected Spam) Mail. If there was Mail blocked due to other reasons (e.g. virus), the corresponding percentage will be shown as well. One chart will be shown with the global stats of all domains in Scope. Figure 6-5 Chart Ham vs. Spam Chart: Message Volume The following chart shows the mail message volume on a per time interval basis. Figure 6-6 Chart Message Volume Table: Mail Tops Mail Tops contains data on the Top Senders and Recipients, for the selected scope version 1.0 Domain Group & Domain Administration guide 36/145 ptempresas.pt

37 Figure 6-7 Mail Tops Figure 6-8 Glossary version 1.0 Domain Group & Domain Administration guide 37/145 ptempresas.pt

38 7 Messages tab The Messages tab shows a list of all the messages that have reached the system but were not rejected. For more information about searching rejected messages please refer to section Rejected messages. Entries are shown in a different color depending on their classification: clean, spam, high spam, infected or policy blocked. Messages are kept in the list for a period (8 days, by default), and then message records will be deleted. Figure 7-1 Messages Tab The MPS classifies Mail messages into the following categories: Clean (green): Mail that is considered suitable for delivery at its final destination. Spam (orange): Mail that is considered probable spam. High Spam (pink): Mail that is considered spam. Infected (red): Mail that is infected for several possible reasons. Policy Blocked (grey): Mail is classified as Policy Blocked when it triggers defined rules, for example, anti-spam or attachment rules version 1.0 Domain Group & Domain Administration guide 38/145 ptempresas.pt

39 7.1 Messages search section In the first messages screen, Filtered menu is selected. You can view messages divided by status (Filtered, Quarantined, Outbound and Rejected) You can then apply one or multiple filters to search for messages. Figure 7-2 Messages menu (Global view) On the left side of the messages screen, you can choose to view messages according to one of the following message status: All messages (default view) All messages that are in the system. Quarantined Messages that have been quarantined. Discarded Messages that have been removed from the system. Outbound Messages sent from the system. Quarantined and Rejected are pre-applied filters to contain only this type of messages. The Outbound (messages sent) lists the messages that where sent from networks authorized to relay mail through MPS. You can change all views by applying certain filters. Note About Rejected: The Rejected filter lists the messages that were rejected before the Mail filters and therefore are incomplete or malformed, being unable to attribute to a given user or domain. Only the Global Administrator has access to this list version 1.0 Domain Group & Domain Administration guide 39/145 ptempresas.pt

40 7.2 Searches and Actions When the Filter tab is selected, the default behavior is to show an empty messages table. You need to click the Search button to view the last messages that entered the system. To perform a more advanced search, one or more filters must be added as search criteria. You can: Select the Scope for which you want to search messages Select the Mail flow: You can view the received (Inbound) or the sent (Outbound) messages Search by time frames by using the Time Filter Previously added filters can be removed by clicking the cross sign on the left of the filter or by clicking the clear filters button, which will remove all configured filters at once. After setting up the desired search criteria, click the search button to perform the actual search operation. The results are then shown in the Messages list. In case there are no records matching the selected criteria, a message specifying "No results" will appear in the results pane. Note You must always click the search button for activate the list Search options Criteria Scope Mail Flow When performing a search, the following criteria are available: Objective Where, in the hierarchy, does a user belong to. For searching received (Inbound) or sent (Outbound) messages Table 7-1 Scope Selection and Mail Flow selection criteria Criteria Time Objective The Date and time the mail was received. Table 7-2 Time filter criteria version 1.0 Domain Group & Domain Administration guide 40/145 ptempresas.pt

41 Criteria To To domain From From domain From IP Subject Classification Action From hostname Objective Mail address of the recipient. Mail domain of the recipient. Mail address of the sender. Mail domain of the sender. The IP address of the Server that delivered the message. The contents of the message subject line. The result that is applied to the message after all the filtering takes place. The action that is applied to messages after all the filtering takes place. PTR (also known as reverse DNS). Table 7-3 Other filters criteria Note 1 Some of the search criteria are not available for other levels of hierarchy. For instance, for inbound traffic, the End User cannot search by To and To domain. Note 2 Integrity in file systems takes precedence over real time message search and display. This means that MPS enforces operation time outs when there are resource starvation while performing queries to the messages database. For instance, if the Subject search is not very complete and or the system contains very large data, the operation may not be concluded Scope criteria and Mail flow criteria This criteria permit to search for messages to or from a given scope. Meaning that, if you are filtering per inbound or outbound, and input a hierarchy level on the scope, all messages sent to or received for that scope (or under it) will be visible ( if you have permissions to see the message) Time criteria This criteria is very straightforward: It will search for messages after, before or at a given date, and will search for messages in the last hour, day, etc.. For example, Before (1999/01/01 12) will give results of messages received before 12h00 of January 1 st 1999) version 1.0 Domain Group & Domain Administration guide 41/145 ptempresas.pt

42 to and from criteria The to and from fields only accept an mail address as an option. For example, to domain and from domain criteria The to domain and from domain fields only accept an mail domain as an option. For example, domain.com from ip criteria The from ip field only accepts a valid IPv4 address as an option. For example, Subject criteria The subject field accepts one or more strings of characters. There is a match if the specified strings match the message's subject line. The minimum number of letters to search for is 4. Example Happy Birthday Happy Birthday Subject searches works with wildcards, as shown in the following table: Description Searches for the words Happy and Birthday anywhere in the subject field. Searches for the sentence Happy Birthday anywhere in the subject field. Table 7-4 Examples of search options for the Subject criteria Classification criteria Classification Clean Spam High-spam Infected Policy blocked Not scanned When selecting the Classification Search criteria, the following options are available: Description Mail that is considered clean and suitable for delivery to its final destination. Mail that is considered probable spam. Mail that is considered spam. Mail that contains virus, typically found in attachments. Mail is classified as Policy Blocked when it triggers defined rules, for example, attachment rules. Mail is larger than a pre-defined size (By default, this value is 512 Kb) and/or sender is Whitelisted version 1.0 Domain Group & Domain Administration guide 42/145 ptempresas.pt

43 Table 7-5 Available search options for classification criteria Action criteria Action Forwarded Quarantined Tagged Discarded Released For the Action Search criteria, the following options are available: Description Mail that is forwarded to the final destination. Mail that is moved to the Quarantine. Mail subject is tagged with a specific message in the subject; also a specific header may be appended to mail's header. Mail that is removed from the system. Mail that after entering the quarantined was released. Table 7-6 Available search options for the action criteria From hostname criteria This criteria permit to search for messages sent from a particular hostname: IP addresses or PTR are allowed. All queries are treated as limited wildcards, meaning you can search by a complete segment of a hostname. For instance: searching by domain1.com will also return my.domain1.com. For the same result, you cannot search by ain1.com Search Results Figure 7-3 Add filter criteria and Search result version 1.0 Domain Group & Domain Administration guide 43/145 ptempresas.pt

44 The search results list is always sorted by date in descending order. It is possible to define the number of records displayed per page: the available options are twenty, fifty or one hundred records per page. The information displayed for each message that matches the search criteria is summarized in the following tables: Column Date From To Subject Report Action Description Date and time the mail was received Mail address of the sender. Mail address of the recipient. Contents of the message subject line. The reason for the action performed, such as a high spam score, the sender is on a blacklist or the message has been identified as a virus. The action taken on the message. Table 7-7 Search columns Report column actions Report The different values the report column takes are presented in the following table: Classified by ImageCheck HashDB Match Blacklisted URI Bad Reputation Score Clean Infected Infected <virus name> Not scanned Whitelisted CPF Match Description Message is considered spam by the ImageCheck technology. Message is considered spam by the fingerprinting technology. Message is considered spam because the message contains a bad URL. Message is considered spam because of the sender s reputation. Message obtains a certain score, based on heuristics, by the filter engine. Message is considered clean by the heuristics filter (or the heuristics filter is turned off). Messages is infected with a virus. Message that is infected with a virus. Message is bigger than a pre-defined size (by default, this value is 512 Kbytes). Message that was not scanned because the sender/ host/ IP is whitelisted. Message is blocked by a content filtering rule version 1.0 Domain Group & Domain Administration guide 44/145 ptempresas.pt

45 Report Ext block Blacklisted Description Message is blocked by extension. Message is blocked because the sender/ host/ IP is blacklisted. Table 7-8 Report Field Action column actions Action Forwarded Quarantined Tagged Discarded The possible actions displayed in the Action column are: Description Mail that is forwarded to the final destination. Mail that is moved to the Quarantine. Mail subject is tagged with a specific message in the subject; also a specific header may be appended to mail's header. Mail that is removed from the system. Table 7-9 Action Field Delete and Release Messages Figure 7-4 Deleting and releasing messages You can release or delete a message directly from the message list by selecting its check box (first two messages in the figure above) and the release or delete buttons on that page. Note You can only release a message that is quarantined version 1.0 Domain Group & Domain Administration guide 45/145 ptempresas.pt

46 You can release or delete multiple messages simultaneously by selecting their respective check boxes and then clicking the appropriate action button (release or delete). Selecting all displayed messages is also possible by using the check box in the table header. 7.3 Message details Figure 7-5 Message details Click anywhere on a list entry to view that message's information in detail. The message details will appear in a new browser tab or window. You may close this by clicking on the close window button. The message details section is divided in the following parts: message details, more details, message paths and message headers. The message details fields are described in the following table: Detail Date/Time From Recipient Message Subject Message Size Mailer IP Address Scan Result Description The Date and time the mail was received. The address of the sender. The address of the receiver. The contents of the message subject line. The size of the message. The IP address of the Server that delivered the message. The result given to a message after all the filtering takes place version 1.0 Domain Group & Domain Administration guide 46/145 ptempresas.pt

47 Detail Message Status Description The final action that was applied to the message after all the filtering took place. Table 7-10 Message details fields In the message details part it is possible to carry out some useful operations related with the from, recipient and Sender IP address fields, such as adding an address to the sender's white- or blacklist or searching for similar messages in your message list Mailer (From) operations Figure 7-6 Managing whitelists and blacklists from message details Option Add to user recipient whitelist Add to user recipient blacklist Add to domain whitelist Add to domain blacklist Add to global blacklist Add to global whitelist Search A brief explanation of each option can be found in the following table: Description Adds the mailer to the receiver whitelist. Adds the mailer to the receiver blacklist. Adds the mailer to the receiver s domain whitelist. Adds the mailer to the receiver s domain blacklist. Adds the mailer to the global blacklist.* Adds the mailer to the global whitelist.* Will perform a search operation for all the messages received from that mailer s address. Table 7-11 Managing whitelist and blacklist and search options in message version 1.0 Domain Group & Domain Administration guide 47/145 ptempresas.pt

48 * Note The options may vary according to the administrator permissions. For example, only the Global Administrators can add to global blacklist Recipient search button Selecting Search on the right of the recipient field will change to the Search tab and show all the messages that were sent for and from that particular recipient Mailer IP Address search button Note The option is only available for Global Administrators. From the Mailer IP address operations, the IP address can be added to the global blacklist or to the global whitelist. All the messages that were received from a given address can also be searched. Changes to the Search tab and shows all the messages that were sent by this IP address Hierarchy The hierarchy section shows the domain and (parent) hierarchy level that received the message. Depending on the viewer, the full path of the Hierarchy tree may not be available More details Figure 7-7 Message more details In the more details section you access information that is useful for troubleshooting purposes (for example, trying to understand why a particular message was considered spam) version 1.0 Domain Group & Domain Administration guide 48/145 ptempresas.pt

49 Note The output may vary. For instance, the scoring details can consist of only an indication that a HashDB match has occurred. More details Processing Node Message ID Spam Signature Scan Report The possible details are summarized in the following table : Description The node that processed the message. The id of the message. The reasons why the message was considered spam can be found here (shown in spam and clean messages). The virus found (only shown if the message is infected). Table 7-12 More details field Message path Message path (shown in screenshot below) shows the message's hops (IP address and Country, if available) before reaching destination. Figure 7-8 Message path example Message headers Message headers (shown in screenshot below) show the messages complete message headers. Analyzing message headers can be very helpful when troubleshooting filter problems version 1.0 Domain Group & Domain Administration guide 49/145 ptempresas.pt

50 Figure 7-9 Message headers (example) Operations over messages in Message Details The available operations are: Close Release Delete Download message Message tracking Delivery confirmation Figures 7-10 Message details (view according to message type) Click on the close window button to close this window. Click on the release button to release a message for the recipient. The receiver should receive the original messages after a few seconds. Click on the delete button to delete this message from the system. Click on the download button to download the original message to your computer. Click on the delivery confirmation to send to the sender a report showing the details of the message handover and path version 1.0 Domain Group & Domain Administration guide 50/145 ptempresas.pt

51 Note The two buttons release and download are only available if the message is currently quarantined. If the message is to be Encrypted, for security reasons, cannot be downloaded. ATTENTION The contents of messages in your quarantine may damage your system. If you are downloading the message as an EML file, you should open it using a text editor, instead of your web browser or mail client. Message tracking Click on the message tracking button to view graphical information of the flow of a message. This information is only available for clean, quarantined, tagged, released and discarded messages. Figures 7-11 Message tracking box examples version 1.0 Domain Group & Domain Administration guide 51/145 ptempresas.pt

52 Visible columns: SMTP client: The message is sent by the SMTP system of the customer. MTA Layer: The message reaches the MTA layer at a certain node. The MTA Layer is actually divided in two separate roles: The actual layer and its filters. SMTP relay: The message has been forwarded to the relay, for delivery to the final destination server. And possible actions: The message is sent (to User s mailbox, to the MTA, to the SMTP relay). The message is quarantined (this is presented with a T termination) and remains in the system for further actions (delete, forward, etc.) or is discarded. The message is being moved inside the MTA layer. This is represented by loopings. The MTA verifies a message and tests it in the MTA filters. The message was rejected at any of the nodes version 1.0 Domain Group & Domain Administration guide 52/145 ptempresas.pt

53 8 Mail Filtering tab The Mail Filtering tab is where you can access all the options available for configuration. By default, when clicking this tab, the anti-spam settings option is selected. Figure 8-1 Setup menu The Setup section is divided in the following sections: Mail Filtering, Mail Delivery, and Gui Configuration. The Mail Filtering options are the following: Anti-Spam Anti-Virus Whitelist Blacklist File Types Content filter The Digest Settings options are the following: Domain Digest Single User Digest User List Digest version 1.0 Domain Group & Domain Administration guide 53/145 ptempresas.pt

54 9 Mail Filtering tab / Filtering Mail Filtering Policies Anti-Spam Anti-virus Whitelist Blacklist File Types Content filter The following table details each configurable filtering policy. Description Allows you to define anti-spam settings such as the engines used and the thresholds and actions. Anti-Spam settings can be defined globally, per hierarchy level, per User and for Outbound. Allows you to enable or disable the anti-virus and define global, domain, User and Outbound anti-virus settings. Allows you to define whitelists based on the sender s mail address or domain and on the IP/CIDR or hostname of the sending server. Whitelists can be defined globally, per hierarchy level, per User and for Outbound. Allows you to define blacklists based on the sender s mail address or domain and on the IP/CIDR or hostname of the sending server. Whitelists can be defined globally, per hierarchy level, per User and for Outbound. Extensions policies are defined here. Attachment policies can be defined globally, per hierarchy level, per User and for Outbound. Allows you to define content rules, using regular expressions that will be applied to the body, subject, header or attachment file names. Content policies can be defined globally, per hierarchy level, per User and for Outbound. Table 9-1 Filtering Policies Overview 9.1 Anti-Spam section In the anti-spam settings section it is possible to configure the behavior of the AnubisNetworks anti-spam filter. It uses five different engines to deal with spam: Heuristic filtering. Image analysis. Signature database. Reputation database. URI database. The anti-spam settings defined here are only applied to the messages that pass the MTA anti-spam technologies and reach the AnubisNetworks' anti-spam filter version 1.0 Domain Group & Domain Administration guide 54/145 ptempresas.pt

55 9.1.1 Change Anti-Spam Settings In the hierarchy, select the level and/or domain and/or User for which you would like to edit the Antispam settings. To edit the Antispam settings for all Users in a domain, first select the domain and on Users field select All Users. To edit the Antispam settings for an existing User, select that User s domain and then select the User. To define new Antispam settings for a User that does not show up in the list, after selecting the domain select other User, enter the new User s address and click select. After domain and User selection, three forms will be shown: active engines, thresholds and actions. To use the recommended settings for each of the options, click the recommended settings button and confirm the settings update (by clicking the yes/no button). You can also activate Domain defaults, to match the user s or hierarchy level s settings with own domain version 1.0 Domain Group & Domain Administration guide 55/145 ptempresas.pt

56 Figure 9-1 Anti-spam configuration options It is possible to decide which engines the AnubisNetworks filter will use to analyze the Mail contents. By default, all engines are enabled, but any particular engine can be disabled by clicking on the corresponding checkbox. Use the thresholds options to define which messages are to be classified as spam or High-spam. About the thresholds Remember the more aggressive a Spam threshold is, the more accurate it is the spam capture, but this increases the probability of false positives (clean messages caught as spam). If the Spam threshold is less aggressive, some spam may pass through to the mailboxes, but the false positives will not occur. Note Only the Spam and High-spam classifications rely on the defined thresholds. There are no thresholds associated with image spam and HashDB hits and these may be considered probable or certain. Next, in the Actions field, it is possible to define the behavior of the anti-spam engines: You can configure which action should be performed on each message, depending on its previous classification. The available actions are discard, quarantine and tag. These actions are described in the following table: Action Quarantine Tag Discard Description Mail is moved to the Quarantine. To the Mail subject is pre appended a specific tag message; also a specific header may be appended to mail's header. Mail is removed from the system. Table 9-2 Anti-spam actions When you finish setting up, click the update settings button for your changes to take effect. To use the recommended settings for each of the options, click the recommended settings button and confirm the settings update (by clicking the yes/no button). You can also activate Domain defaults, to match the user s or hierarchy level s settings with own domain version 1.0 Domain Group & Domain Administration guide 56/145 ptempresas.pt

57 Heuristic filtering Each message that passes through the Mail Protection Service heuristic filter is assigned a score, which reflects the probability of a message being spam. You can set two different thresholds for the system to take distinct actions on messages that have a high (spam) or very-high (high-spam) probability of being spam. Based on this score the Mail Protection Service forwards, tags, quarantines, or blocks the message Signature database There are messages that do not go through the heuristic filter. Before reaching this filter, these messages are evaluated using different algorithms, which may consider them as image spam, or match them against some entry in the AnubisNetworks spam message signature database. These messages will be classified as HashDB, respectively. 9.2 Anti-Virus section In the hierarchy, select the level and/or domain and/or User for which you would like to edit the Anti-Virus settings. To edit the Anti-Virus settings for all Users in a domain, first select the domain and on Users field select All Users. To edit the Anti-Virus settings for an existing User, select that User s domain and then select the User. To define new Anti-Virus settings for a User that does not show up in the list, after selecting the domain select other User, enter the new User s address and click select. After the domain and User selection, the virus actions form will show up. Figure 9-2 Virus actions form version 1.0 Domain Group & Domain Administration guide 57/145 ptempresas.pt

58 The default (and highly recommended) action is to discard the messages that contain viruses, but you can also have the system quarantine or tag it. You can also decide which Antivirus engine will be running by selecting (or deselecting) them. The MPS usually has ClamAV and Sophos as the running Antivirus software. Tagging It is possible to configure the message tag. The header textbox defines an extra field to be included in the mail's header, should it be classified as spam. In a similar fashion, the subject textbox allows to configure the text (usually it will be just a word) that will be prepended to the subject of an mail message deemed to be spam. Note You can create rules in many clients to place tagged messages in a separate folder. For example, when your Users receive spam messages with a subject containing a [SPAM] tag, you can configure their Mail clients to move these messages to the Junk Mail folder. When you finish setting up, click the update settings button for your changes to take effect. To use the recommended settings for each of the options, click the recommended settings button and confirm the settings update (by clicking the yes/no button). You can also activate Domain defaults, to match the user s or hierarchy level s settings with own domain. Note Depending on your Organization, your system may have other Anti-Virus. 9.3 Whitelist and Blacklists sections Whitelists enable you to establish the reception of messages based on the sender's address, domain, IP, networks or sender server hostname (PTR record). Whitelisting applies only to the anti-spam (post queue) and policy filters. Blacklists enable blocking the reception of messages based on the sender's address, domain, IP address, networks or sender server hostname (PTR record). Whitelists and Blacklist can be defined globally, for a particular hierarchy level (for instance, a domain) or User version 1.0 Domain Group & Domain Administration guide 58/145 ptempresas.pt

59 9.3.1 Define Whitelists and Blacklists Whitelists and Blacklists can be of type Mail, IP/CIDR or Hosts. Blacklists per Mail can be by Sender and by Recipient. An explanation of the different types can be found in the following tables: WL Type Description Sender address Mail The Mail address of the sender. Sender Domain Mail The Mail domain of the sender. Sender IP Sender CIDR Sender Hostname IP/CIDR IP/CIDR Hosts The IP address of the Server that delivered the message. The CIDR range of the Server that delivered the message. The PTR record of the server that delivered the message. Table 9-3 Whitelist options BL Type Description Sender address Mail The Mail address of the sender. Sender Domain Mail The Mail domain of the sender. Recipient address Recipient Domain Sender IP Sender CIDR Sender Hostname Mail Mail IP/CIDR IP/CIDR Hosts The Mail address of the recipient. The Mail domain of the recipient The IP address of the Server that delivered the message. The CIDR range of the Server that delivered the message. The PTR record of the server that delivered the message. Table 9-4 Blacklist options The following formats are accepted for each of these fields: Whitelist and Blacklists Accepted formats Mail version 1.0 Domain Group & Domain Administration guide 59/145 ptempresas.pt

60 Whitelist and Blacklists Accepted formats IP/CIDR x.x.x.x xxx.xxx/xx xxx.xxx.xxx/xx xxx.xxx.xxx.xxx/xx Hosts (Sender Hostname) * *.tld *.domain.tld *domain.tld *.subdomain.domain.tld host.* Table 9-5 Whitelist/ Blacklist accepted formats Whitelists and Blacklists can be defined globally, for a particular hierarchy level (for instance, a domain) or User. To create/update a Whitelist or a Blacklist: 1. Choose the option Whitelist or Blacklist from the Setup tab 2. On the Hierarchy select the scope to whom this exception will be applied. 3. Select the list type: Mail, IP/CIDR, Hosts. 4. On the Sender add the sender hostname, domain, IP, etc.. 5. Press the add button To remove an entry, select it from the current list by clicking on it, then click remove. The Ctrl and Shift keys can be used to select multiple entries from the list version 1.0 Domain Group & Domain Administration guide 60/145 ptempresas.pt

61 You can also activate Domain defaults, to match the user s or hierarchy level s settings with own domain. Note The addresses and domains that appear as From and To in the Search or Quarantine sections of the administration interface may be different from the ones that appear in your Mail client software (Outlook, Thunderbird, etc.), as these are easily forged Current list Two types of entries are observed in the list: Own entries The entries created by the User. System entries The entries inherited by the User. Remember this is a hierarchic system, and security settings created by an Administrator apply to the domains under the administrator s responsibilities. For further explanations, please view chapter Users, on this document Order of execution for blacklist and whitelist rules The order by which blacklist and whitelist rules are executed is the following: 1. Blacklist IP/CIDR 2. Whitelist IP/CIDR 3. Blacklist Hosts 4. Whitelist Hosts 5. Mail Blacklist 6. Mail Whitelist Exceptions The exceptions mechanism was designed to provide a quick way to create exceptions to the whitelist or blacklist. It works in a similar manner to update whitelist or update blacklist. Whitelist/ Blacklist Target Mail, IP/CIDR, Hosts Type GLOBAL The mail address of the sender. Mail version 1.0 Domain Group & Domain Administration guide 61/145 ptempresas.pt

62 Whitelist/ Blacklist Target Mail, IP/CIDR, Hosts Type The mail domain of the sender. Or recipient (for Blacklists) Mail XXX.XXX.XXX.XXX The IP address of the Server that delivered the message. IP/CIDR Table 9-6 Whitelist and Blacklist Samples It is possible to add any exception type (Mail, IP/CIDR, Hosts) to the whitelists; for example, if your organization wants to accept all Mail from the domain customer.com except if the is sent from a particular network, such a rule can be specified in the Exceptions section. Anti-Spam exceptions can be requested for external partners / entities server hostnames using Hosts whitelists. Hosts Whitelists enable you to bypass all filters (except for Anti-virus) based on the sender's server name Block empty senders (for Blacklists) It is possible to block all empty senders (messages without a visible sender s mail address), by ticking this box Import file It is possible to insert multiple addresses at the same time (one entry per line), by using Import File option. To do so, select the file, which contains the address list after clicking browse, then click submit. The mail addresses, domains, IP/CIDRs and hosts to be added should be in the format explained in Whitelist accepted formats table version 1.0 Domain Group & Domain Administration guide 62/145 ptempresas.pt

63 Figure 9-3 Blacklists view (Mail tab) version 1.0 Domain Group & Domain Administration guide 63/145 ptempresas.pt

64 Figure 9-4 Blacklist section (IP/CIDR) tab 9.4 File Types section These Attachment rules apply restrictions to an attachment kind. In the hierarchy, select the level and/or domain and/or User for which you would like to edit the attachment policy. To edit the attachment policy for all Users in a domain, first select the domain and on Users field select All Users. To edit the attachment policy for an existing User, select that User s domain and then select the User. To define a new attachment policy for a User that does not show up in the list, after selecting the domain select other User, enter the new User s address and click select version 1.0 Domain Group & Domain Administration guide 64/145 ptempresas.pt

65 After domain and User selection, the file Categories form will appear. Figure 9-5 File Types policy options You can configure how your extensions list will be used with the options what to block and action when blocking. This list functions so that only the selected categories will be blocked. This list is expandable, and you can click the + sign to expand the tree and select second level categories. At the first level, categories group are identified by: o o o Blank box: No categories have been selected. Grey box: Some categories have been selected. Ticked box: All categories have been selected. You can tick the box Block Unknown file types, to block every file type which is not on the previous list version 1.0 Domain Group & Domain Administration guide 65/145 ptempresas.pt

66 To use the recommended settings for each of the options, click the recommended settings button and confirm the settings update (by clicking the Yes/No button). You can also activate Parent settings, to match the user s or hierarchy level s settings with own domain. To conclude the task you must click the Update settings button File extensions The extensions currently listed are show in selected. To add a new extension use the extension text box, then click add. You should include the initial dot in the extension name (for example,.ext). For the changes to take effect, click update settings on the bottom of the page. You can also add a number of extensions with just one click using the common file extensions list above the selected option. Click the desired list box and then select the button add to append those extensions to your list. Predefined list types are Dangerous, Documents, Graphics, Audio, Video, Archive, Web Content and System files: Type Dangerous Extensions access add-in access project apple application basic script cgi script compiled help dos batch dos command executable flash application html appplication html help internet naming service internet shortcut ms scrap files security certificate service provider settings vbscript version 1.0 Domain Group & Domain Administration guide 66/145 ptempresas.pt

67 Type Document Audio Extensions vbscript encoded windows console script windows console snap-in windows control panel windows installer package windows installer patch windows installer transform windows library windows registry windows screensaver windows script windows script component windows script host settings windows setup information windows shortcut windows shortcut (old) csv excel lotus 123 pdf powerpoint quarkxpress rtf word word (openxml) word perfect works aac aiff flac m3u midi mp3 wave version 1.0 Domain Group & Domain Administration guide 67/145 ptempresas.pt

68 Type Image Archive Suspicious Extensions 3d studio 3d studio max adobe illustrator adobe indesign adobe photoshop bitmap cad image cursor gif jpeg paint shop pro png postscript quickdraw rhino 3d svg tiff 7zip arj bzip2 gzip ice ms cabinet rar stuffit tar zip access 2007 database access database access extension crash dump debian package driver log version 1.0 Domain Group & Domain Administration guide 68/145 ptempresas.pt

69 Type Video Web Extensions sql system file 3gp 3gp2 asf avi flash video mkv mp4 mpeg quicktime realmedia asp page css stylesheet html javascript javascript encoded jsp page php page xml Table 9-7 Predefined file extensions Action When Blocking Available actions to apply to the , when attachment to block is detected, are discard, quarantine and tag. These are described in the table below. Action Quarantine Tag Discard Description Mail is moved to the Quarantine. Mail subject pre-appended to a specific message tag; also a specific field may be appended to Mail's header. Mail is removed from the system. Table 9-8 Actions when blocked version 1.0 Domain Group & Domain Administration guide 69/145 ptempresas.pt

70 9.5 Content Filter section The content filter tab provides a wide range of filters that enhance the default spam and virus detection capabilities. These filters support the use of regular expressions. Content filter can be applied to Inbound messages. For more information on using these, refer to section Regular Expressions Create a Content Filtering Rule In the hierarchy, select the level and/or domain and/or User for which you would like to edit the Content Filtering Rules. To edit the Content Filtering Rules for all Users in a domain, first select the domain and on Users field select All Users. To edit the Content Filtering Rules for an existing User, select that User s domain and then select the User. To define new Content Filtering Rules for a User that does not show up in the list, after selecting the domain select other User, enter the new User s address and click select. Figure 9-6 Creating a content filtering rule for a new mail address The Existing Rules list will be displayed. To delete an existing rule please select it and click Remove selected. To create a rule, please select the Create rule bar: After you select the Create rule, the Create new rule screen appears version 1.0 Domain Group & Domain Administration guide 70/145 ptempresas.pt

71 Figure 9-7 Create new rule options The options available are explained in the following table. Rule Options Rule Name Text Applies to Applies to Header Description Friendly name of the rule. Regular expression to be matched. Choose if the rule applies to the header, subject, body (includes subject) or attachment name of a message. When selecting the header of the message, you can then select one or more parts of the header to apply the rule: From Reply-to To Sender CC Message-ID version 1.0 Domain Group & Domain Administration guide 71/145 ptempresas.pt

72 Subject Return-path Received Custom * (*) If you select Custom, a new text box will appear to add a regular expression See below to understand the Regular Expression Rules. Action The action that is applied to a message that matches the rule. Possible actions are: discard, quarantine and tag. Table 9-9 Rule Options Tagging You can add a sentence to the Header and/or the Subject of the Messages that have been quarantined by Content filters Rules Multiple Matches Rules All rules are processed for a message using the following order: 1. Body 2. Subject 3. Headers a. From b. Reply-to c. To d. Sender e. CC f. Message-ID g. Subject h. Return-path i. Received j. Custom * 4. Attachments In case more than one rule is matched, all the hits are mentioned in the scan report version 1.0 Domain Group & Domain Administration guide 72/145 ptempresas.pt

73 Multiple Actions Rules In case there are multiple rule matches with different actions defined, the action that prevails is the one with the most weight. The weights of these actions, from the most significant to the least, are: Drop Quarantine Tag For example, if a message matches two rules, one with action tag, and another with drop defined, the final action will be drop Regular Expressions The MPS allows you to use regular expressions in content filtering rules. Regular expressions allow you to flexibly describe text so that a wide range of possibilities can be matched. Note Regular expressions are case sensitive. The following table summarizes the available regular expressions: Expression Description Operators * Zero or more occurrences of the character immediately preceding + One or more occurrences of the character immediately preceding? Zero or one occurrence of the character immediately preceding Either of the characters on each side of the pipe ( ) Characters between the parenthesis as a group Character Classes. Any character except new line [ac] Letter 'a' or letter 'c' [^ac] Anything but letter 'a' or letter 'c' [a-z] Letters 'a' through 'z' [a-za-z\.] Letters 'a' through 'z' or 'A' through 'Z' or a dot [a-z\\] Letters 'a' through 'z' or a backslash \d Digit, shortcut for [0-9] [^\d] Non-digit \w Word character: shortcut for [A-Za-z0-9_] version 1.0 Domain Group & Domain Administration guide 73/145 ptempresas.pt

74 Expression Description [^\w] Non-word character (note the W is uppercase) \s Space character: shortcut for [ \n\r\t] [^\s] Non-space character (note the S is uppercase) Miscellaneous ^ Beginning of line $ End of line \b Word boundary \t Tab character Note that matches are case sensitive. Table 9-10 Regular Expressions Example Means Sex Sex \d+ One or more digits: 2, 45, 119 ^money Word money at the beginning of a line v[i1]agra viagra or v1agra v\ agra v agra \*SEX\* *SEX* \*SEX\* V.*GRA *SEX* VIAGRA, *SEX* VABCGRA, etc. Table 9-11 Regular Expressions examples Meta-characters The following characters have a special meaning in regular expressions and should be escaped with a backslash, when you want them interpreted literally: Meta-characters Name. period or dot $ dollar sign [ opening square bracket ] closing square bracket ( opening round bracket version 1.0 Domain Group & Domain Administration guide 74/145 ptempresas.pt

75 Meta-characters Name ) closing round bracket { opening curly bracket } closing curly bracket \ backslash vertical bar or pipe symbol * asterisk or star ^ caret? question mark + plus sign Table 9-12 Meta-characters version 1.0 Domain Group & Domain Administration guide 75/145 ptempresas.pt

76 10 Mail Filtering tab / Digest settings The message digest is a periodic mail report, containing a list of messages that were quarantined for a domain. This report will be sent to a mail address, and enables the receiver to check the quarantine for false positives, and release them if necessary, without having to log onto the system. The digest configuration for a particular domain can be configured per User or per domain. If it is configured per User then the digest will be sent just to the Users that have explicitly configured it. Note To receive the digest per domain, the domain must have a pre-configured address lookup. Address Lookups is the configuration for the type of verification to be done for every Domain. It can be manual input (Address Lists) or Automatic verification (LDAP connection to AD, for instance). Release Host The platform must have a Release Host configured in order to make the digest function. This functionality can only be performed by Global Administrators. You must go to Domain Digest and Select the Global Scope. The following menu will appear: Figure 10-1 Digest Settings > Release Host (Global) version 1.0 Domain Group & Domain Administration guide 76/145 ptempresas.pt

77 10.1 Domain Digest section Figure 10-2 Message digest options for a domain If the digest is configured by domain then some additional settings need to be configured: Digest Options Domain Digest Digest Schedule Release from digest Digest messages Description Allows you to define the standard setting for a certain Scope (domain). If you choose No, you can still set individual digests per User and per User list. Send the message digest: daily (every day at 6:00), weekly (Mondays, at 6:00) or custom schedule: The custom schedule allows you to decide at which hours and days the Digest per domain will be created. The digest can only be delivered twice a day. Allows you to enable or disable the release option from the digests, which enables end Users to release messages without having an account on the system. Enable, except for policy blocked messages allows the messages to be released except if the message was blocked for policy reasons. Allows selecting if discarded messages (discarded messages cannot be released) and policy blocked message are shown on the digests. Table 10-1 Listing Domains Options version 1.0 Domain Group & Domain Administration guide 77/145 ptempresas.pt

78 Figure 10-3 Digest (message) settings You may configure if and how often the selected User will receive the quarantine message digest, and whether the digest should include the messages that were discarded or policy blocked by the system. If the User prefers to receive the digest in a different mail address, this can be configured through the digest destination address option Digest configuration You can configure the following items: Receive Digest: If you want to receive a digest and the schedule for receiving the digest. Release from Digest: If the messages can be released from digest, by clicking on a link, at the digest. Include Discarded Messages: If discarded messages are included in the digest. Include Policy Blocked Messages: If blocked messages are included in the digest. Disable Whitelisting: This option determines if a user can automatically add a sender to the User s whitelist, at the Digest. When scheduling the digest, you can decide not to receive it or receive it : version 1.0 Domain Group & Domain Administration guide 78/145 ptempresas.pt

79 In the same frequency as the rest of the domain (for user settings). Daily (every day at 6:00 a.m.). Weekly (every Monday, at 6:00 a.m.). Custom schedule: After choosing this option, a set table appears to tick the corresponding week hours for the digest to be sent (as exemplified by the previous figure). In this case, the digest is limited to two times per day Single user Digest section Digest settings can be set for Single Users (Manage Single User) and multiple Users (Manage User list). The message digest is a periodic report containing a list of messages that were quarantined, policy blocked and discarded, for each User. This report will be sent to an mail address, and enables the receiver to check the quarantine for false positives, and release these messages if necessary, without having to log onto the system. The message digest creates and compiles the list of quarantine messages when it is active. 1. First, select the domain, by searching it in the tree. 2. Then, select the User (from the dropdown menu) for which you would like to configure the message digest. To configure the message digest for a User that does not show up on the list, select other User, enter the new User address and click select. After domain and User selection, the digest settings will appear. Figure 10-4 Choosing option Per User This Menu only allows to set a Message Digest to be done by User version 1.0 Domain Group & Domain Administration guide 79/145 ptempresas.pt

80 10.3 User List Digest section Each domain configured in the system can have multiple Users, with different access levels. To upload a list of Users that will receive the message digest, select the domain of the Users to upload from the domains list. After selecting the file, click on submit button to upload the chosen file. The text file uploaded should contain one User per line, in the format User@domain.tld. These Users will be configured in the system to receive a custom message digest, sent to the uploaded mail address. It is possible to upload a list for an entire domain. In that case, a specific User is not needed to be selected. Figure 10-5 Manage User List version 1.0 Domain Group & Domain Administration guide 80/145 ptempresas.pt

81 11 Mail Control tab The mail Control Tab menu aims at administering all the settings related to control of , and not necessarily Security, in the strict sense. Figure 11-1 Mail Control tab version 1.0 Domain Group & Domain Administration guide 81/145 ptempresas.pt

82 12 Mail Control / Delivery 12.1 Data Loss Prevention section This new functionality permits to apply content rules to the Outbound . The DLP tab provides a wide range of filters that enhance the default spam and virus detection capabilities. These filters support the use of regular expressions. Content filter can be applied to Outbound messages. For more information on using these, refer to section Regular Expressions Create a DLP Rule In the hierarchy, select the level and/or domain and/or User for which you would like to edit the Content Filtering Rules. To edit the DLP Rules for all Users in a domain, first select the domain and on Users field select All Users. To edit the DLP Rules for an existing User, select that User s domain and then select the User. To define new DLP Rules for a User that does not show up in the list, after selecting the domain select other User, enter the new User s address and click select. Figure 12-1 Creating a content filtering rule for a new mail address The Existing Rules list will be displayed. To delete an existing rule please select it and click Remove selected. To create a rule, please select the Create rule bar: version 1.0 Domain Group & Domain Administration guide 82/145 ptempresas.pt

83 After you select the Create rule, the Create new rule screen appears. Figure 12-2 Create new rule options The options available are explained in the following table. Rule Options Rule Name Text Applies to Applies to Header Description Friendly name of the rule. Regular expression to be matched. Choose if the rule applies to the header, subject, body (includes subject) or attachment. When selecting the header of the message, you can then select one or more parts of the header to apply the rule: From Reply-to To Sender CC Message-ID Subject Return-path Received version 1.0 Domain Group & Domain Administration guide 83/145 ptempresas.pt

84 Rule Options Description Custom * (*) If you select Custom, a new text box will appear to add a regular expression See below to understand the Regular Expression Rules. Action The action that is applied to a message that matches the rule. Possible actions are: discard, quarantine. Table 12-1 Rule Options Rules Multiple Matches Rules All rules are processed for a message using the following order: 5. Body 6. Subject 7. Headers a. From b. Reply-to c. To d. Sender e. CC f. Message-ID g. Subject h. Return-path i. Received j. Custom * 8. Attachments In case more than one rule is matched, all the hits are mentioned in the scan report Regular Expressions The MPS allows you to use regular expressions in content filtering rules. Regular expressions allow you to flexibly describe text so that a wide range of possibilities can be matched version 1.0 Domain Group & Domain Administration guide 84/145 ptempresas.pt

85 Note Regular expressions are case sensitive. The following table summarizes the available regular expressions: Expression Description Operators * Zero or more occurrences of the character immediately preceding + One or more occurrences of the character immediately preceding? Zero or one occurrence of the character immediately preceding Either of the characters on each side of the pipe ( ) Characters between the parenthesis as a group Character Classes. Any character except new line [ac] Letter 'a' or letter 'c' [^ac] Anything but letter 'a' or letter 'c' [a-z] Letters 'a' through 'z' [a-za-z\.] Letters 'a' through 'z' or 'A' through 'Z' or a dot [a-z\\] Letters 'a' through 'z' or a backslash \d Digit, shortcut for [0-9] [^\d] Non-digit \w Word character: shortcut for [A-Za-z0-9_] [^\w] Non-word character (note the W is uppercase) \s Space character: shortcut for [ \n\r\t] [^\s] Non-space character (note the S is uppercase) Miscellaneous ^ Beginning of line $ End of line \b Word boundary \t Tab character Note that matches are case sensitive. Table 12-2 Regular Expressions version 1.0 Domain Group & Domain Administration guide 85/145 ptempresas.pt

86 Example Means Sex Sex \d+ One or more digits: 2, 45, 119 ^money Word money at the beginning of a line v[i1]agra viagra or v1agra v\ agra v agra \*SEX\* *SEX* \*SEX\* V.*GRA *SEX* VIAGRA, *SEX* VABCGRA, etc. Table 12-3 Regular Expressions examples Meta-characters The following characters have a special meaning in regular expressions and should be escaped with a backslash, when you want them interpreted literally: Meta-characters Name. period or dot $ dollar sign [ opening square bracket ] closing square bracket ( opening round bracket ) closing round bracket { opening curly bracket } closing curly bracket \ backslash vertical bar or pipe symbol * asterisk or star ^ caret? question mark + plus sign Table 12-4 Meta-characters version 1.0 Domain Group & Domain Administration guide 86/145 ptempresas.pt

87 12.2 Quota Management section The Quota Management functionality aims at defining the limits for sending (outbound), per scope. The system permits setting a limit (in hours or in bytes) for a certain time period (Hour or Day). The system also permits to send out notifications before the limit is reached. When the limit is reached, the User cannot send more until that period ends. As observed in the following example, every user for a given scope, will be blocked when sends 300 bytes per day. That user will receive a notification when reaches 60% (of 300 bytes) and 80% (of 300 bytes) of the set limit. In the example, the notifications are sent to the Sender. Figure 12-3 Quota management example To configure the Quota Management for a given scope or User: 1. Select the desired scope. 2. Set the limit value in the User(s) quota box. a. Value is Messages (number) or Bytes (accumulated) b. Value is per Hour or Day 3. Set one or two Notifications, by moving the horizontal scroll bar. If you move the toggle to the left, you will disable that toggle. 4. Select where the notifications should be sent. By default, the account is the Sender. You can insert another in the Notification Recipients box and click Add version 1.0 Domain Group & Domain Administration guide 87/145 ptempresas.pt

88 5. Click Update settings to make the configuration effective version 1.0 Domain Group & Domain Administration guide 88/145 ptempresas.pt

89 13 Mail Control / Authentication 13.1 DKIM Signing section MPS Allows for DKIM Signing to be activated and deactivated in s Sent outbound. This Module is based on the OpenDKIM community and technology processes. To Sign your Domain with DKIM keys, you will need to: 1. Generate DKIM Keys 2. Publish at your DNS the Public DKIM Keys 3. Configure, at MPS, the Public and Private DKIM Keys. As an alternative, you can use the key generation form, on the internet: Generate DKIM Keys 1. Install OpenSSL (Windows version: Generated output: ### openssl genrsa -out dkim-private.pem outform PEM Generating RSA private key, 1024 bit long modulus ### cat dkim-private.pem -----BEGIN RSA PRIVATE KEY----- [PRIVATE KEY HERE] -----END RSA PRIVATE KEY----- ### openssl rsa -in dkim-private.pem -out dkim-public.pem -pubout -outform PEM version 1.0 Domain Group & Domain Administration guide 89/145 ptempresas.pt

90 writing RSA key ### cat dkim-public.pem -----BEGIN PUBLIC KEY----- [PUBLIC KEY HERE] -----END PUBLIC KEY Publish at your DNS the Public DKIM Keys To publish your keys you must creat a text file (.TXT) with the following fomat: Selector._domainkey IN TXT "v=dkim1;k=rsa; p=[public KEY HERE];" And then you must confirm that the DNS changes have been propagated: Windows based systems: # nslookup > set type=txt > server Selector._domainkey.xpto.pt Unix based systems: host -t TXT google._domainkey.anubisnetworks.com google._domainkey.anubisnetworks.com descriptive text "v=dkim1\; k=rsa\; p=[public KEY HERE]" Configure, at MPS, the Public and Private DKIM Keys. Go to the respective tab and copy paste the following sections: Selector Public Key Private Key Then, you must click Update to activate the DKIM signing version 1.0 Domain Group & Domain Administration guide 90/145 ptempresas.pt

91 Figure 13-1 DKIM signing tab version 1.0 Domain Group & Domain Administration guide 91/145 ptempresas.pt

92 Mail Control / Mail Routing 13.2 Virtual Aliases section With virtual aliases, messages sent to an address can be forwarded to another address. 1. First, you must choose the SMTP domain for the addresses, 2. Second you need to input the recipient s original address and the other address (Forwarded to field) where all the should be delivered. Then click add. The virtual alias list contains all the s receiving the messages from an original . You can add and remove addresses of this list. Figure 0-1 Virtual Aliases When you click Submit, the Virtual Alias(es) for a particular address will be created. It can then be edited or deleted version 1.0 Domain Group & Domain Administration guide 92/145 ptempresas.pt

93 14 Mail Control / Mail Notifications The following table details each configurable filtering policy. Mail Delivery Disclaimer Description Allows you to add a disclaimer text to the bottom of sent messages. Table 14-1 Filtering Policies Overview 14.1 Disclaimer section Disclaimers are texts (Text and HTML) which can be added to the bottom of messages. To add a disclaimer, for a particular domain or User, first, you must select the scope by using the tree list: When selecting a specific domain, it is then possible to apply to all Users or to a specific mail address. After dealing with the scope selection, in the Disclaimer settings screen, the next step is to select on which direction the disclaimer should be applied. It is possible to set a disclaimer for both inbound and outbound messages depending on whether you select the inbound or outbound tab above in the disclaimer details version 1.0 Domain Group & Domain Administration guide 93/145 ptempresas.pt

94 Figure 14-1 Disclaimer settings Note The maximum size for the disclaimer is 8Kb and/or 5000 characters. A summary of the disclaimer settings is shown in the following table: Disclaimer Options Activate Text Disclaimer HTML Disclaimer Description Determines whether the disclaimer is attached to the messages The disclaimer to be attached to text/ascii-based messages The disclaimer to be attached to HTML-based messages Table 14-2 Disclaimer Options Server timeout - The timeout for each LDAP server specified. 10 seconds or less is recommended. Ldap password - The password of the new connector. You must then click the Update button to activate the connector changes. By clicking Back you will return to the list of connectors version 1.0 Domain Group & Domain Administration guide 94/145 ptempresas.pt

95 15 Domains Settings tab 15.1 The Domains section An Administrator account can be used to manage multiple domains and Organizational Units. These accounts are initially configured by the system Global Admin, but each domain's settings are editable using the administration console, for any User with the correct admin credentials. Figure 15-1 Domain Settings menu 15.2 Domain Mail Delivery section version 1.0 Domain Group & Domain Administration guide 95/145 ptempresas.pt

96 Figure 15-2 Mail delivery You can configure the mail delivery of an existing domain, You must first select a domain and then fill in the fields according to the following table: Domain Settings MTA Group Lookup Type Mail Server TCP Port MX Hostname MX port Description Choose the MTA group used for delivery. (if you did not create a MTA Group, only the default group will appear). Select if the mail will be delivered using a smart host (Server Address) or a MX hostname. The server to which the Mail for the domain will be delivered. The port on the Mail server to which the Mail for the domain will be delivered. Domain used for MX lookups. Port used by domain. Table 15-1 Fields for Mail delivery You must click Update to apply the settings To check if the settings were updated, click test delivery - a test check will be made to that domain version 1.0 Domain Group & Domain Administration guide 96/145 ptempresas.pt

97 16 Domain Settings tab / Address Lookups 16.1 Manage Lookups section Figure 16-1 Address lookups This menu is used for selecting which type of lookup is used for a given domain. You can select LDAP lookups configured for this domain and, add address list lookups (local lists). IMPORTANT NOTE MPS system ALWAYS performs a lookup based on the Sender. If your system uses addresses not confirmed by the SMTP server, messages will not be delivered. This SMTP connector verifies the existence of the sender. And other lookups (LDAP, manually) can be used to replace the SMTP connector in the verification LDAP Lookups section You can visualize the list of relative connections, or connections that are shared by other system Users: version 1.0 Domain Group & Domain Administration guide 97/145 ptempresas.pt

98 Figure 16-2 Connectors list example You can create a new connector, or select an existing connector and: Delete selected or, in actions column, view further info on the connection, edit, or test the connection. (This table permits selecting all existing LdapConnectors by ticking the top box and clicking Delete selected). To use any of the available LDAP connectors, you must activate the adequate options for each domain version 1.0 Domain Group & Domain Administration guide 98/145 ptempresas.pt

99 Figure 16-3 LDAP Connector settings Create and Edit LDAP Connectors Click in Create New to start configuring a new connector. Or click on Actions -> Edit to edit an existing Connector. The available options are the following: Connector name Name by which the connector will be known in the system. Admins The administrators for the LDAP connector LDAP connector host list A LDAP Connector can be configured to be used with a list of hosts. You must define the host servers, used protocols, port and hostname. Secure Connections - The type of protocol to be used in the connection. Servers - Servers to be selected from a list of available servers. Move servers - When multiple servers are provided, allows to change the order preference Host Name - The Host name for the connection. Port - The TCP port used for the connection with the LDAP server. The default port is LDAP server certificates You can insert certificates for the configured connection. There are two types of server connections: LDAP and LDAPS. The certificate is used by the client, in the connection, for recognition. Verify Certificate - If this option is ticked yes, the LDAP queries are only performed if the certificate is valid. If the option is no, then Certificate verification is disabled. Certificates (PEM format) - A PEM format Certificate must be copy-pasted in the proper box. This certificate is used exclusively for LDAPS connections LDAP Connector configuration All servers will be searched, until a positive answer is received. Search base - Is the search base to be used in the LDAP query, e.g. dc=domain,dc=tld. Bind dn - Is the LDAP query bind DN, e.g. cn=admin,dc=domain,dc=tld. Leave empty string for anonymous bind. Query filter - The filter to use in the LDAP query, e.g. proxyaddresses=smtp:%s version 1.0 Domain Group & Domain Administration guide 99/145 ptempresas.pt

100 The variables %s, %u and %d will be replaced by the full mail address, the user part and the domain part of the addresses, respectively. Refer to RFC 2254 for information on query formats. Result attribute - The attribute that will be retrieved from LDAP, e.g. mail. This attribute will have to exist for the query to be considered successful. Ldap version - The LDAP protocol version to use Address Lists Lookups section You can choose a domain address to accept mail from, by adding the address to the Address list version 1.0 Domain Group & Domain Administration guide 100/145 ptempresas.pt

101 Figure 16-4 Add address lists Preferences: Maximum addresses allowed menu permits to decide how many Addresses can total the address lists. If you input the value 0 no limit will be applied Note that this filed is not available for Domain Group and Domain administrators. Address lists: You can: Add a Single address by writing it (and clicking Add) or Upload a list of addresses by browsing and uploading a txt file with a list of addresses (one per line) version 1.0 Domain Group & Domain Administration guide 101/145 ptempresas.pt

102 Replace the current list by the upload list or Append the upload list to the current list. Current list: You can view the current list of addresses in a domain. This list only shows the first 100 entries. To delete addresses from a domain: You can select all (by clicking the select all button) and then click delete or Click on a single address and the click delete. You can also search for an entry in the Current list. Available buttons are Search to activate the search, and Clear search, to empty the search box. To download a list or purge it, click the respective button on the end of the view version 1.0 Domain Group & Domain Administration guide 102/145 ptempresas.pt

103 17 Domain Settings tab / Connectors 17.1 Manage Auth. Bridge section You can create an authentication bridge for a Domain, using LDAP (Binding, Attribute and Indirect), IMAP and POP3. IMPORTANT NOTE When using Authentication Bridges: If MPS is deployed using a single node configuration, every Authenticated message is assumed to have been sent in Outbound mode. If MPS is deployed in multi node configuration, Messages can reach MTAs for inbound and outbound and, therefore, message search will be appended to these Search options. Please reach your System Administrator for further information Using LDAP Bind You can create an Authentication Bridge using an LDAP (with Bind for authentication). The required fields are the following: Protocol: If it is regular LDAP or LDAP over a secure SSL connection (LDAPS). Server: The LDAP server. Port: The server s port. Timeout: Timeout for the connection retry (LDAP) Version: available versions are 2 and 3. User Format: The underlying format for LDAP bind authentication This format can be specified using special substitution variables: o o o o o o %username% - The user name used in login. %user% - The user name part used in login. %domain% - The domain used in login. %dc_path% - Transforms the domain part into a LDAP dc path %pass% - The password used in login. %md5pass% - The md5 hash of the password used in login version 1.0 Domain Group & Domain Administration guide 103/145 ptempresas.pt

104 o %md5simplepass% - The md5 hash of the password used in login. Use GUI: If the Users will have access to the WebGUI Use SMTP Outbound: If the Users are authorized to use authenticated SMTP Outbound If the User Format is empty, we assume that the remote LDAP server supports addresses as the UPN (User Principal Name) for the LDAP Bind authentication. Log in (username) User Format Underlying result alice@domain.tld uid=%user%,dc=%domain% uid=alice,dc=domain.tld bob@somewhere.tld (Zimbra Compatible LDAP Example) trudy@mail.tld (MS Active Directory compatible) megan@here.net (NT / Windows Server LDAP Example) uid=%user%,ou=people,%dc_ path% <empty> here\%user% uid=bob,ou=people,dc=somewhere,dc =tld trudy@mail.tld here\megan Table 17-1 Common user Formats version 1.0 Domain Group & Domain Administration guide 104/145 ptempresas.pt

105 Figure 17-1 Authentication Bridge details: LDAP Bind You must click Create Bridge to activate the created authentication bridge Using LDAP Attribute You can create an Authentication Bridge using an LDAP specific attribute. The required fields are the following: Protocol: If it is regular LDAP or LDAP over a secure SSL connection (LDAPS). Server: The LDAP server. Port: The server s port. Timeout: Timeout for the connection retry (LDAP) Version: available versions are 2 and 3. Base DN: The DN (Distinguished name) path base for LDAP search operations Scope (One or Subtree): o o One - searching all entries one level under the base DN Subtree - searching of all entries at all levels under and including the specified base DN. Authentication o Bind username / password: Bind operation credentials for authenticating the client in the server. Search Configuration: o o Search filter: The search filter format for finding the User account. Attribute and Attribute value: The entry attribute value return format. The Search filter can be specified using special substitution variables: %username% - The user name used in login. %user% - The user name part used in login. %domain% - The domain used in login. %dc_path% - Transforms the domain part into a LDAP dc path %pass% - The password used in login. %md5pass% - The md5 hash of the password used in login. Use GUI: If the Users will have access to the WebGUI Use SMTP Outbound: If the Users are authorized to use authenticated SMTP Outbound version 1.0 Domain Group & Domain Administration guide 105/145 ptempresas.pt

106 Username Password Search Filter Format Attribute value format Attribute value response Ma tld (YES) cn=%username% or % pw=%md5pas s% pwd=5f4dcc3b5a a765d61d8327de b882cf99 (Y ld (YES) (&(cn=%username%)(us ertype=ispuser)(pwd= %pass%)) usertype=isp User usertype=corpu ser (N Table 17-2 Common user formats You must click Create Bridge to activate the created authentication bridge. Figure 17-2 Authentication Bridge details: LDAP Attribute version 1.0 Domain Group & Domain Administration guide 106/145 ptempresas.pt

107 Using LDAP Indirect You can create an Authentication Bridge using an LDAP Indirect. The required fields are the following: Protocol: If it is regular LDAP or LDAP over a secure SSL connection (LDAPS). Server: The LDAP server. Port: The server s port. Timeout: Timeout for the connection retry (LDAP) Version: available versions are 2 and 3. Base DN: The DN (Distinguished name) path base for LDAP search operations Scope (One or Subtree): o o One - searching all entries one level under the base DN Subtree - searching of all entries at all levels under and including the specified base DN. Authentication o Bind username / password: Bind operation credentials for authenticating the client in the server. Search Configuration: o o Search filter: The search filter format for finding the User account. Attribute: The entry attribute type. The Search filter can be specified using special substitution variables: %username% - The user name used in login. %user% - The user name part used in login. %domain% - The domain used in login. %dc_path% - Transforms the domain part into a LDAP dc path %pass% - The password used in login. %md5pass% - The md5 hash of the password used in login. Use GUI: If the Users will have access to the WebGUI Use SMTP Outbound: If the Users are authorized to use authenticated SMTP Outbound version 1.0 Domain Group & Domain Administration guide 107/145 ptempresas.pt

108 Figure 17-3 Authentication Bridge details: LDAP Indirect You must click Create Bridge to activate the created authentication bridge Using IMAP and POP3 For both IMAP and POP3 protocols, the required fields to fill in are similar: Server: The IMAP /POP3 server for the Bridge. Port: The server s port. Secure: If the connection is secure. Timeout: Timeout for the connection retry Use GUI: If the Users will have access to the WebGUI Use SMTP Outbound: If the Users are authorized to use authenticated SMTP Outbound version 1.0 Domain Group & Domain Administration guide 108/145 ptempresas.pt

109 Figure 17-4 Authentication Bridge details: POP3 You must click Create Bridge to activate the created authentication bridge Organizational Units Bridges section Organizational Units can be retrieved from an Active Directory system, by establishing a connector for that domain. By doing so, you must select the domain from the hierarchy tree. A new menu will appear: OU LDAP Connector Settings LDAP connector host list version 1.0 Domain Group & Domain Administration guide 109/145 ptempresas.pt

110 Figure 17-5 OU LDAP connectors A LDAP Connector can be configured to be used with a list of hosts. You must define the host servers, protocols used, port and hostname. Secure Connection - The protocol used for the connection (none, TLS or SSL). Servers Servers to be selected from a list of available servers. Host Name - The Host name for the connection. Port - The TCP port used for the connection with the LDAP server. The default port is 389. You can define Hostnames and ports and add these to the Servers list, or select Hostnames from the user list and remove these. All servers will be searched, until a positive answer is received. (Synchronize settings) If the requests are synchronized, the OUs to be checked is the external configuration. Ldap version Protocol version used. By default, the used version is 3. Bind username and Bind password Credentials used for LDAP binding (not mandatory) version 1.0 Domain Group & Domain Administration guide 110/145 ptempresas.pt

111 User Org. Unit Query / Distinct Org. unit Query You must configure the Queries of Request and Response for the communication with the LDAP hostname. These Queries can be for the existing or for distinct Organizational Units. Requests Response Query Search base for LDAP query. For example:.proxyaddresses=smtp:%s. %s, %u e %d will be replaced by the full address, the User and the domain parts, respectively. Search base Search base for LDAP query. Example: dc=domain, dc=tld. Scope Where is the search scope, if at the Base, one-level query or for all the subtree. Return values: o You can input a return attribute and add it to the list, or you can select an attribute in the list and remove it. Type Search base for the response, it can be at DN_LEVEL or ATTRIBUTE_LEVEL. Value Search base for LDAP query (Expect multi-value) if the response contains several values, separated by a proper separator. Separator The separator symbol if multi-values are input Only response type query attribute supports multi entry parsing on the query response. You must then click the Update button to activate the connector changes. Or you can click the Delete button to empty the connector settings version 1.0 Domain Group & Domain Administration guide 111/145 ptempresas.pt

112 Figure 17-6 Distinct Query version 1.0 Domain Group & Domain Administration guide 112/145 ptempresas.pt

113 18 Hierarchy tab IMPORTANT NOTE This tab is available only for Global Admins, HSP Admins, VSPs Admins and Domain Group Admins. Depending on the type of Administrator, permissions to create certain Hierarchy levels may be prohibited (for instance, a VSP Admin can only manage VSPs, and manage and create Domain Groups). In this tab, a Global Admin can manage his own level, all HSPs, VSPs and Domain groups. Figure 18-1 Hierarchy menu version 1.0 Domain Group & Domain Administration guide 113/145 ptempresas.pt

114 19 Hierarchy tab / User accounts 19.1 Notes on Users By setting up a concept of roles hierarchy, based on virtual security domains, the privileges and the administration options are clearly understood and differentiated across the organizations, which interact with this system. A MPS system has the following hierarchy objects: Global: Managed by Global Administrators. HSP: Managed by HSP administrators. VSP: Managed by VSP administrators. Group Domains and Domains: Managed by Users, with Domain administration and/ or Group domain administration privileges. OUs: - Organizational Units Managed by OU Administrators. Optionally, Helpdesk Users can be created to aid administrators in managing domains. Helpdesk Users can exist in any Administrative level, and are divided in Supervisors, viewers and Users. This is a top-down hierarchy, and each of the levels can bypass the one beneath for administration purposes (example: Global Administrators can directly set up Anti-spam options for Normal Users) version 1.0 Domain Group & Domain Administration guide 114/145 ptempresas.pt

115 Figure 19-1 Users in the system Users classification MPS system differentiates Users by two types: Users included in SMTP domains (therefore, with active mailboxes). Users with administration roles, such as Domain administrators, and Helpdesk roles, who may or may not have accounts, set in a SMTP domain. Users in the system may have the following profiles: Global Administrators have full control of the system, including managing hardware, virtual environments, and all hierarchic levels. HSP Administrators have full control of domains and subdomains on their own hierarchy, and may create any type of User (except Global Admin) version 1.0 Domain Group & Domain Administration guide 115/145 ptempresas.pt

116 VSP Administrators have full control of domains and subdomains on their own hierarchy, and may create any type of User from hierarchic levels below. Domain Group Administrators have full control over one or more domains and its Users (for the domains they own), and can access all functionalities in the group. Domain Administrators have full control over one SMTP domain, its settings and its Users, and can access all functionalities in the domain. OU Administrators: have control over an organization unit inside a SMTP domain. Users are generally Normal Users, with a valid Mailbox in a SMTP domain, who can only access their quarantine, search their message list and change some settings for their profile. Helpdesk Supervisors, Viewers and Users are generally Normal Users, who have been granted other administrative tasks, such as setting anti-virus or monitoring mail messages for a particular domain. IMPORTANT NOTE Depending on the MPS version and User type, some of the roles are disabled. For instance, if the User is a Domain Administrator, this User will not be able to see or access any of the information on the upper hierarchies (Table of) Registered Users section If users are available you will access a table like menu for Editing, Impersonating and deleting users. Figure 19-2 Manage Users table version 1.0 Domain Group & Domain Administration guide 116/145 ptempresas.pt

117 Figure 19-3 Options in Actions Using the table You can Add new user and Delete selected (user). To delete a User simply tick the proper square box (first column) and click the Delete selected button (you can select all users by clicking the square box on the header row). Actions The available Actions for every User are Edit, Impersonate and Delete (as seen in the previous figure). By clicking on the Username or selecting Edit from the actions column, will bring up the Edit User interface: This form is similar to the Create User form, described in more detail in the next section. Once you have finished making changes to the User, you can commit them by clicking the Update User button. By clicking Impersonate, you will act as that User, accessing the same environment and options of the User. You can terminate impersonation by clicking in the stop impersonate link, on the top right of the page: Figure 19-4 Stop impersonate By clicking Delete, the User will be deleted from the system Users registration Users registration in this system can be of two types: Registered users - users with credentials for accessing the GUI version 1.0 Domain Group & Domain Administration guide 117/145 ptempresas.pt

118 Users without GUI access - Normal users without GUI access that have customized settings but not credentials for accessing the GUI. These users can be Promoted (to receive access credentials to the GUI) The Registered normal users can be Demoted (settings are maintained but GUI access is revoked) Promoting and Demoting Users You can promote users without GUI access to the status of Registered users (with GUI access) by using the Actions and click Promote. If doing so, a screen, similar to the Edit user screen, will appear, so that you can create a password for this user. If the Registered user is a normal user, the actions button will also present the Demote option. And by clicking this option, that particular user will no longer be able to access the system s GUI. Every settings for this user will however remain intact. Figure 19-5 Demoting a registered user version 1.0 Domain Group & Domain Administration guide 118/145 ptempresas.pt

119 Editing Users / Adding User Figure 19-6 Manage Users By choosing the Edit User option (and choosing a particular user), or the Add new User option, you will be to edit or create a new user. You can change the Username (if you are creating a new user) Real name, Role name (if you are creating a new user) and the Password of a given User. For details on the role name please refer to the top of this section. To change a password you must choose a particular User and then: Decide on the method to create/ change the passwords: Auto-generated: 1. Type your current password. 2. Type the destination mail, where the User will receive the password. 3. Click on the Update password button. Manual: 1. Type your current password. 2. Type the User s new password. 3. Repeat the User s password. 4. Click on the Update password button version 1.0 Domain Group & Domain Administration guide 119/145 ptempresas.pt

120 Other User passwords can be changed by editing their profile. New passwords must have at least eight characters. Note You can change your own password by searching yourself on the list Use this form to add new Users to your system. Users will be able to log into the system using the Username and User password you define here. You may want to create a User if you want it to be able to log in the system and have access to his settings and quarantine. Figure 19-7 Create Users Action Role name Username Real Name Password Create User Description Select if the User to be created is a normal User or an admin of a certain level. Please verify the Chapter Users, for further information. The mail alias of the User you will be granting access to. For normal Users, must be in the format User@domain.. For other users, Username only permits letters and numbers (no spaces or symbols, except - and. ). Friendly name for this User, The User s actual name or a recognizable description. Decide on the method to create/ change the passwords: Auto-generated: Type the destination Mail, where the User will receive the password. Click on the Update password button. Manual: Type the User s new password. Repeat the User s password. Click on the Update password button. Table 19-1 User options version 1.0 Domain Group & Domain Administration guide 120/145 ptempresas.pt

121 Username When you are finished, you must click the create User button to insert the new User into the system. Different types of usernames can be created. In the following table we explain those different types: Username username Description This type of User can only be a normal User of a configured SMTP domain. This type of User can only be an Administrator of one of the existing hierarchy levels. Table 19-2 Username types 19.3 Password policies section The MPS system automatically ensures all users accessing MPS will have a limit of tries to enter authentication credentials. The method for unlocking any account is manual and must be performed by the administrator by: 2. Accessing the Manage Users section 3. Select the user 4. Re-create the User password, either with auto-generated or manual Password creation. You can, however, define the number of attempts permitted, 1. By accessing this section, 2. select a number for the Locked Threshold 3. And Click Update version 1.0 Domain Group & Domain Administration guide 121/145 ptempresas.pt

122 Figure 19-8 Account lock version 1.0 Domain Group & Domain Administration guide 122/145 ptempresas.pt

123 20 Hierarchy tab / Manage Hierarchies Hierarchy is the common designation within to system to describe the scope levels that encompass this multitenant platform. You can visualize the Hierarchy as a tree of levels, each one with several scopes and administrator accounts, each one with visibility top-down, from its own level. Figure 20-1 Different scope views You can refer to initial chapters of this document for a clearer description of this functionality (Manage) HSP section Figure 20-2 Manage HSP version 1.0 Domain Group & Domain Administration guide 123/145 ptempresas.pt

124 HSPs are Hosted Service Providers, which can manage Virtual Service Providers, Domain Groups and Domains. You must be a Global Administrator to create a new HSP. As for any new scope, you must select the Parent level you want to have for your scope on the Hierarchy /Scope selection. But, because HSPs are the 2 nd higher level, the only option available is clicking on the Global Icon. You can define the following settings for a HSP: HSP Settings Name Parent Support contact Timezone Language Description Define the name of the HSP. Only letters, numbers and the symbols - and. can be used for the name. The Global domain is the only level above the HSP. An address for supporting duties. The time zone for this HSP. The default language, used for the hierarchy directly below this HSP. Table 20-1 Create HSP / Manage HSP options Manage HSP By selecting an existing HSP in the Hierarchy / Scope selection, you can update the Support contact, Timezone and/or Language or you can move and/or delete the HSP. Move HSPs You can also select a different parent and move this scope to under the new Parent. Deleting HSPs You can also delete an HSPs by selecting it from the Hierarchy tree and click the Delete button version 1.0 Domain Group & Domain Administration guide 124/145 ptempresas.pt

125 20.2 (Manage) VSP section Figure 20-3 Create VSP VSPs are Virtual Service Providers and can manage Domain Groups and Domains. To create a new VSP, you must select the Parent level you want to have for your scope on the Hierarchy /Scope selection. You can define the following settings for a VSP: VSP Settings Name Parent Support contact Timezone Language Description Define the name of the VSP. Only letters, numbers and the symbols - and. can be used for the name. The Global domain and HSP levels are above the VSP. An address for supporting duties. The time zone for this VSP. The default language, used for the hierarchy directly below this VSP. Table 20-2 Create VSP / Manage VSP options version 1.0 Domain Group & Domain Administration guide 125/145 ptempresas.pt

126 20.3 (Manage) Domain Group section Figure 20-4 Create Domain Group Domain Groups can manage Domains. To create a new Domain group, you must select the Parent level you want to have for your scope on the Hierarchy /Scope selection. Domain Group Settings Name Parent Support contact Timezone Language You can define the following settings for Domain Groups: Description Define the name of the Domain Group. Only letters, numbers and the symbols - and. can be used for the name. The Global domain, HSP and VSP levels are above the Domain Group. An address for supporting duties. The time zone for this Domain Group. The default language, used for the hierarchy directly below this Domain Group. Table 20-3 Create Domain Groups / Manage Domain Group options Manage Domain Groups By selecting an existing Domain group in the Hierarchy / Scope selection, you can update the Support contact, Timezone and/or Language or you can move and/or delete the Domain Group version 1.0 Domain Group & Domain Administration guide 126/145 ptempresas.pt

127 Move Domain Groups You can also select a different parent and move this scope to under the new Parent. Deleting Domains Groups You can also delete a Domain Groups by selecting it from the Hierarchy tree and click the Delete button (Manage) Domain section To create a new Domain, you must select the Parent level you want to have for your scope on the Hierarchy /Scope selection. Figure 20-5 Create Domain A summary of the available settings is shown in the following table: Domain Settings Domain name Parent Allow Subdomains Support Contact Timezone Language Description The SMTP domain (for example, domain.tld) The level of hierarchy owner of the domain If set to YES the MPS will accept mail for subdomains of the configured domain. This setting is set by default to YES. One address, to be used in case customers need technical assistance. The time zone for this domain The default language used for the domain. Table 20-4 Create domain options version 1.0 Domain Group & Domain Administration guide 127/145 ptempresas.pt

128 You must click Create to activate the changes Manage Domains By selecting an existing Domain in the Hierarchy / Scope selection, you can update the Support contact, Timezone and/or Language or you can move and/or delete the Domain. You must click Create / Update to activate the changes. When creating, you can edit all fields, when managing, you cannot edit the Name and owner. Deactivate (Activate) Domain. If you simply want to deactivate or activate it (enabling it to receive and send mail) just click the button Deactivate Domain (or Activate Domain, if you are viewing the settings of an already deactivated domain). Move Domains You can also select a different parent and move this scope to under the new Parent. Deleting Domains You can also delete a Domain by selecting it from the Hierarchy tree and click the Delete button Subdomains When you configure a domain and set the option allow subdomains to yes, the MPS will accept mails for subdomains of the configured domain. When considering activating this option, keep in mind the following: All the settings (for example, antispam, anti-virus and others) applied to subdomains are inherited from the parent configuration. Statistics are collected for the domain but are not collected for the subdomains. If you want a particular subdomain to have different configuration settings than the default settings then you need to explicitly create that subdomain. After the subdomain is created you will have access to the following operations: Defining different settings (e.g. anti-spam, antivirus) Accessing to statistics Accessing to reports Delegating this domain to a different person or team. If you have more than one MTA Group configured in MPS it is possible to select which MTA Groups will have this domain configured version 1.0 Domain Group & Domain Administration guide 128/145 ptempresas.pt

129 Refer to section MTA Groups for more information (Manage) Organizational Unit section Organizational Units are LDAP groups created within a certain SMTP Domain. Management and Creation are similar to Domains. To create a new Organizational Unit, you must select the Parent level you want to have for your scope on the Hierarchy /Scope selection. Please note that the parent level must be a Domain. O.U. Settings Name Owner Support Contact Timezone Language You can define the following settings for OUs: Description The name of the O.U. The Parent domain for the O.U. One address, to be used in case customers need technical assistance. The time zone for this domain The default language used for the domain. Table 20-5 Create/ Edit Organizational Units options Manage Organizational units By selecting an existing OU in the Hierarchy / Scope selection, you can update the Support contact, Timezone and/or Language or you can move and/or delete the OU. Figure 20-6 Creating Org. Unit (example) version 1.0 Domain Group & Domain Administration guide 129/145 ptempresas.pt

130 You must click Create / Update to activate the changes. When creating, you can edit all fields, when managing, you cannot edit the Name and owner. Move Ous You can also select a different parent and move this scope to under the new Parent. Deleting OUs You can also delete an Organizational Unit by selecting it from the Hierarchy tree and click the Delete button version 1.0 Domain Group & Domain Administration guide 130/145 ptempresas.pt

131 21 Hierarchy tab / GUI Customization 21.1 Theme and Logo section You can configure the appearance and branding of the domains you administer, After selecting the Theme and Logo view, you will need to choose which hierarchy level you want to change settings. You can then: Change the theme using a Built-in theme Change the logo which appears on the left top of the Webgui Change the hostname for the MPS s homepage. Figure 21-1 Themes settings Figure 21-2 Logo and Homepage Hostname submenus version 1.0 Domain Group & Domain Administration guide 131/145 ptempresas.pt

132 By default, the current hierarchy level is used for settings. But you can change it by clicking the change button, after the Hierarchy level name. A tree with the system hierarchy will appear. After choosing the Hierarchy level for which you want to change appearance and branding you can customize the following options: Build-in theme: You may choose a theme by clicking in the examples. o Several prebuilt themes are available. Edit theme: By clicking this button, you will be redirected to Theme creation menu, where you can edit the theme. Logo (upload): you can browse and upload a new logo. o The logo must be in.png format and with a maximum size of 250x70 pixels. Homepage hostname: by inserting the hostname for the system, all Users accessing through that homepage will have the theme you set available at login page. Update host: Click on this button to enable changes Theme creation section You can create or edit your own theme (instead of using one of the available ones (Please view Theme & Logo for more information). You can select a scope for the theme, change certain theme settings and then click apply. MPS uses an adapted version of Jquery ThemeRoller CSS3 theme framework. The editable CSS theme settings are: version 1.0 Domain Group & Domain Administration guide 132/145 ptempresas.pt

133 Figure 21-3 Theme creation (divided in two) Header bar- To define the colors of both background and tabs frame. Hide Header Background By ticking off, you can remove the header version 1.0 Domain Group & Domain Administration guide 133/145 ptempresas.pt

134 Header Background color & texture colors and texture for the header (where the tabs bar and the logotype are laid). Background- To define the colors of background. Background color & texture colors and texture for the header (where the tabs bar and the logotype are laid). Left Menu Headers To define the header and menu toolbar. Preview An example of changes made. Background color & texture for the background. Border - for the frame all around the menus. Text - for the text in the menu labels. Icon for the icons in the menus labels. Left Menu Content - To define the content inside the menu frames. Preview An example of changes made. Background color & texture for the background. Border - for the frame inside the menus. Text - for the text in the menus. Icon for the icons inside the frames. Font Settings To define the font in the GUI Family CSS font family. o Example: Verdana, Futura, Times (if Verdana is not available, the system will use Futura and, if not, Times. Weight normal or bold. o Size - Relative font size, in em units.1 em unit is the default size for a given font.. Corner radius the radius for the corners of each menu box. Note ThemeRoller uses CSS3 border-radius for corner rounding, which is not currently supported by Internet Explorer. Clickable: Default state, hover state and active state - To define the behavior of the buttons: default state of the buttons, state when mouse is over the button, and state when clicked version 1.0 Domain Group & Domain Administration guide 134/145 ptempresas.pt

135 Highlight To define the behavior of items when selected or highlighted. Preview An example of changes made. Background color & texture for the item s background. Border - for the frame all around the item. Text - for the text in the item. Icon for the icons in the item. Error - To define the error and warning messages. Preview An example of changes made. Background color & texture for the error frame (default: red). Border - for the frame around the error frames. Text - for the error text. Icon for the icons inside the error frames. Modal Screen for Overlays - To define the aspect of the content which has been superimposed by another item. Preview An example of changes made. Background color & texture for the background. Drop Shadows - To define the content inside the menu frames. Preview An example of changes made. Background color & texture color and texture of the shadow. Shadow Thickness The thickness for the shadow outside the frame. Offset (top and Left) the distance between frame and shadow. Corners the corner radius for the shadows. Icon for the icons inside the frames version 1.0 Domain Group & Domain Administration guide 135/145 ptempresas.pt

136 22 Hierarchy tab / GUI Usage control 22.1 Terms and Conditions section You can set a Terms and Conditions text to appear for the Users in the hierarchy below. A User, in the first login, must accept the Terms and Conditions (if exists). Otherwise, the User will not proceed into the Webgui. Figure 22-1 Accepting Terms and Conditions Setting up the terms and conditions Terms and Conditions are inherited from the parent level. An user, in the first login, must accept the Terms and Conditions (if exist). Otherwise, the user will not proceed into the Webgui. When setting up a Terms and Conditions, and if changes are permitted, you may: Leave blank (Terms and conditions will not be applied). Create a specific Terms and Conditions. Click Update to apply what is in the textbox or click Use parent terms to use inherited Terms and Conditions from the hierarchy level above version 1.0 Domain Group & Domain Administration guide 136/145 ptempresas.pt

137 22.2 Audit Log section Figure 22-2 Audit logs (example without filters applied) This functionality, Audit log, is for Auditing and Monitoring purposes. It allows a view of the operations, performed in the Webgui, by every User of a lower and/or same hierarchy (please view chapter Users, for hierarchy definitions). By accessing this view you can: See the latest operations by clicking the search button. A list of the last operations will be visible. Filtering: You can input any of the filtering fields and click search to obtain filtered results version 1.0 Domain Group & Domain Administration guide 137/145 ptempresas.pt

138 Searching the Audit log Messages A list with the latest Log messages is visible. The columns are: Column Date IP address User name Message Applies to Status code Description The precise time for when the operation happened. The IP address of the User that performed the operation. The Username of the User which performed the operation. The description of the event. The unit affected by the operations. It can be another User, or the system itself. The internal code for each operation. The common codes are: 1000 successful operations 1006 error operations Table 22-1 Audit log messages For a clearer understanding of the operation, you can click on each line for a message to appear, briefly describing the operation. Figure 22-3 Message example Filtering the Audit log Time Filter: Starting date/ending date: the timeframe for the logs. Other filters: User name: the User who performed the action. Applies to: the unit affected by the action. Status code: Operations status code version 1.0 Domain Group & Domain Administration guide 138/145 ptempresas.pt

139 Message: The friendly message of the log IP: the IP address of the origin of the logged action. Note For several reasons, system may not respond to the applied to exact match, since the auditing, for integrity reasons is captured in real time and may not have the ability to translate certain roles. Note Except for Global Administrators, a Username must always be inserted to return results. Figure 22-4 Available filters for audit logs version 1.0 Domain Group & Domain Administration guide 139/145 ptempresas.pt

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In USER GUIDE This guide walks through the user interface of ContentCatcher, and the features and parameters contained therein. Accessing the User Interface The ContentCatcher user interface is a secure web-based

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

WeCloud Security. Administrator's Guide

WeCloud  Security. Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2017 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials. Email Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to

More information

Important Information

Important Information May 2014 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Mail Assure Quick Start Guide

Mail Assure Quick Start Guide Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.7.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...5

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...

More information

Personal Dashboard User Guide

Personal Dashboard User Guide Version 8.1 800-782-3762 www.edgewave.com 2001 2011 EdgeWave. All rights reserved. The Red Condor and EdgeWave logos and brands are trademarks of EdgeWave. All other trademarks and registered trademarks

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

WebAdmin IceWarp WebAdmin Manual

WebAdmin IceWarp WebAdmin Manual WebAdmin IceWarp WebAdmin Manual WWW.ICEWARP.COM 1 WebClient WebAdmin User Manual Guide Contents About IceWarp WebAdmin Manual 3 1/ Login Page 4 2/ 4 Control bar 5 User Account Menu 5 Main Windows 6 Dashboard

More information

MX Control Console. Administrative User Manual

MX Control Console. Administrative User Manual MX Control Console Administrative User Manual This Software and Related Documentation are proprietary to MX Logic, Inc. Copyright 2003 MX Logic, Inc. The information contained in this document is subject

More information

ZENworks Reporting System Reference. January 2017

ZENworks Reporting System Reference. January 2017 ZENworks Reporting System Reference January 2017 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent

More information

Mail Assure. Quick Start Guide

Mail Assure. Quick Start Guide Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up

More information

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0 Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet

More information

Tracking Messages

Tracking  Messages This chapter contains the following sections: Tracking Service Overview, page 1 Setting Up Centralized Message Tracking, page 2 Checking Message Tracking Data Availability, page 4 Searching for Email Messages,

More information

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections: This chapter contains the following sections: Message Tracking Overview, page 1 Enabling Message Tracking, page 1 Searching for Messages, page 2 Working with Message Tracking Search Results, page 4 Checking

More information

Step 2 - Deploy Advanced Security for Exchange Server

Step 2 - Deploy Advanced  Security for Exchange Server Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Cisco TEO Adapter Guide for

Cisco TEO Adapter Guide for Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part

More information

Vendor: Cisco. Exam Code: Exam Name: ESFE Cisco Security Field Engineer Specialist. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: ESFE Cisco  Security Field Engineer Specialist. Version: Demo Vendor: Cisco Exam Code: 650-153 Exam Name: ESFE Cisco Email Security Field Engineer Specialist Version: Demo Question No : 1 In the C-160's factory default configuration, which interface has ssh enabled

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

Parcel Data Exchange PDX Web Application Customer Guide

Parcel Data Exchange PDX Web Application Customer Guide Parcel Data Exchange PDX Web Application Customer Guide Status: Final Version: 12 Date Last Modified: 08/06/2018 08/06/2018 Parcel Data Exchange (PDX) Customer Guide Page 1 of 21 Table of Contents Table

More information

Administrator Manual. Last Updated: 15 March 2012 Manual Version:

Administrator Manual. Last Updated: 15 March 2012 Manual Version: Administrator Manual Last Updated: 15 March 2012 Manual Version: 1.6 http://www.helpdeskpilot.com Copyright Information Under the copyright laws, this manual may not be copied, in whole or in part. Your

More information

To create a few test accounts during the evaluation period, use the Manually Add Users steps.

To create a few test accounts during the evaluation period, use the Manually Add Users steps. Once you complete the Essentials for Office 365 Wizard, the Essentials page displays in Barracuda Cloud Control. Click Set up additional domains to go to the Barracuda Email Security Service Domains page,

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Account Customer Portal Manual

Account Customer Portal Manual Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP

More information

Comodo Antispam Gateway Software Version 2.1

Comodo Antispam Gateway Software Version 2.1 Comodo Antispam Gateway Software Version 2.1 User Guide Guide Version 2.1.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...

More information

Polycom RealAccess, Cloud Edition

Polycom RealAccess, Cloud Edition ADMINISTRATOR GUIDE January 2018 3725-47131-001E Polycom RealAccess, Cloud Edition Copyright 2017, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another

More information

My MessageMedia User Guide

My MessageMedia User Guide My MessageMedia User Guide Copyright and Trademark Statement 2011 MessageMedia All rights reserved. Apart from any use permitted under the Copyright Act 1968, no part of this publication may be reproduced,

More information

Status Node Reference

Status Node Reference IceWarp Unified Communications Status Node Reference Version 10.4 Printed on 23 February, 2012 Contents Status 1 Message Queue... 2 Spam Queues... 3 Quarantine... 3 Whitelist... 4 BlackList... 5 Greylisting...

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

Table of Contents Control Panel Access... 1 Incoming... 6 Outgoing Archive Protection Report Whitelist / Blacklist...

Table of Contents Control Panel Access... 1 Incoming... 6 Outgoing Archive Protection Report Whitelist / Blacklist... User Guide Table of Contents Control Panel Access... 1 Access MxVault Control Panel... 2 Incoming... 6 Incoming Spam Quarantine... 7 Incoming Log Search... 9 Delivery Queue... 12 Report Non-Spam... 16

More information

ELM Server Exchange Edition ArchiveWeb version 5.5

ELM Server Exchange Edition ArchiveWeb version 5.5 ELM Server Exchange Edition ArchiveWeb version 5.5 Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries. All

More information

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

1.1. Agreement means this document together with the Ignite General Terms and Conditions.

1.1. Agreement means this document together with the Ignite General Terms and Conditions. IGNITE SECUREMAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of this product

More information

Virtual Office. Virtual Office Analytics An Overview. Version 1.0. Revision 1.0

Virtual Office. Virtual Office Analytics An Overview. Version 1.0. Revision 1.0 Virtual Office Virtual Office Analytics An Overview Version 1.0 Revision 1.0 Copyright 2015, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the contents hereof

More information

Document Manager. Balance Point Technologies, Inc. Document Manager. User Guide. Certified MAX Integrator

Document Manager. Balance Point Technologies, Inc.  Document Manager. User Guide.  Certified MAX Integrator Balance Point Technologies, Inc. www.maxtoolkit.com Document Manager User Guide 1 P a g e Copyright Manual copyright 2017 Balance Point Technologies, Inc. All Rights reserved. Your right to copy this documentation

More information

Quest ChangeAuditor 5.1 FOR LDAP. User Guide

Quest ChangeAuditor 5.1 FOR LDAP. User Guide Quest ChangeAuditor FOR LDAP 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this

More information

Grapevine web hosting user manual. 12 August 2005

Grapevine web hosting user manual. 12 August 2005 Grapevine web hosting user manual 12 August 2005 Grapevine web hosting user manual 2 Contents Contents... 2 Introduction... 4 System features... 4 How it looks... 5 Main navigation... 5 Reports... 6 Web

More information

1 P age NEXTIVA CALL CENTER. Supervisor User Guide. nextiva.com/support 2015 NEXTIVA, ALL RIGHTS RESERVED

1 P age NEXTIVA CALL CENTER. Supervisor User Guide. nextiva.com/support 2015 NEXTIVA, ALL RIGHTS RESERVED 1 P age NEXTIVA CALL CENTER Supervisor User Guide nextiva.com/support 2015 NEXTIVA, ALL RIGHTS RESERVED 2 P age Creating Employees... 3 Creating an Employee... 3 Assigning Licenses to Employees... 7 Schedules...

More information

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

This Guide. Junk Box Management. About this Guide. Guide Conventions. Logging In to Your Junk Box

This Guide. Junk Box Management. About this Guide. Guide Conventions. Logging In to Your Junk Box This Guide About this Guide Welcome to the SonicWall Email Security User Guide. This document provides instructions for basic configuration for users of the SonicWall Email Security product, including

More information

Transform AP for EnterpriseOne User's Guide

Transform AP for EnterpriseOne User's Guide Transform AP for EnterpriseOne User's Guide Transform AP for EnterpriseOne User s Guide Version 1.0 Copyright 2008 Bottomline Technologies, Inc. All rights reserved. Information in this document is subject

More information

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for   Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

EVRY Security. Administrator's Guide

EVRY  Security. Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security Administrator's Guide EVRY Email Security provides a variety of useful features within a user-friendly web console to manage the functions

More information

Parcel Data Exchange PDX Web Application Customer Guide

Parcel Data Exchange PDX Web Application Customer Guide Parcel Data Exchange PDX Web Application Customer Guide Status: Final Version: 09 Date Last Modified: 09/05/2017 09/05/2017 Parcel Data Exchange (PDX) Customer Guide Page 1 of 22 Table of Contents Table

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and

More information

Spam Quarantine. Overview of the Spam Quarantine. Local Versus External Spam Quarantine. This chapter contains the following sections:

Spam Quarantine. Overview of the Spam Quarantine. Local Versus External Spam Quarantine. This chapter contains the following sections: This chapter contains the following sections: Overview of the, page 1 Local Versus External, page 1 Setting Up the Centralized, page 2 Edit Page, page 7 Using Safelists and Blocklists to Control Email

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Important Information

Important Information February 2017 Important Information The following information applies to Proofpoint Essentials US2 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

SOFTWARE LICENSE LIMITED WARRANTY

SOFTWARE LICENSE LIMITED WARRANTY ANALYTICAL TOOL GUIDE VERSION: 5..0..6 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any

More information

Integrate Barracuda Spam Firewall

Integrate Barracuda Spam Firewall Integrate Barracuda Spam Firewall Publication Date: November 10, 2015 Abstract This guide provides instructions to configure Barracuda Spam Firewall to send the events to EventTracker. Scope The configurations

More information

The following topics describe how to work with reports in the Firepower System:

The following topics describe how to work with reports in the Firepower System: The following topics describe how to work with reports in the Firepower System: Introduction to Reports Introduction to Reports, on page 1 Risk Reports, on page 1 Standard Reports, on page 2 About Working

More information

Proofpoint Essentials: Part of the Proofpoint Family... 5 Proofpoint Essentials Overview Best Practices... 10

Proofpoint Essentials: Part of the Proofpoint Family... 5 Proofpoint Essentials Overview Best Practices... 10 June 2015 Preface... 4 About this Guide... 4 Intended Audience and Prerequisite Knowledge... 4 Other Sources of Information... 4 Contacting Proofpoint Essentials Support... 4 Knowledge Base... 5 Support

More information

Univention Corporate Server. Cyrus mail server

Univention Corporate Server. Cyrus mail server Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction... 4 2. Installation... 5 3. Management of the mail server data... 6 3.1. Management of mail domains... 6 3.2. Assignment

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

CA Output Management Web Viewer

CA Output Management Web Viewer CA Output Management Web Viewer User Guide Release 12.1.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Using the Control Panel

Using the Control Panel Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox

More information

Partner Management Console Administrator's Guide

Partner Management Console Administrator's Guide Partner Management Console Administrator's Guide Partner Management Console Administrator's Guide Documentation version: November 17, 2017 Legal Notice Copyright 2017 Symantec Corporation. All rights reserved.

More information

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes

More information

Administrator Manual. Last Updated: 15 March 2012 Manual Version:

Administrator Manual. Last Updated: 15 March 2012 Manual Version: Administrator Manual Last Updated: 15 March 2012 Manual Version: 1.6 http://www.happyfox.com Copyright Information Under the copyright laws, this manual may not be copied, in whole or in part. Your rights

More information

Spam Quarantine. Overview of the Spam Quarantine. Local Versus External Spam Quarantine

Spam Quarantine. Overview of the Spam Quarantine. Local Versus External Spam Quarantine This chapter contains the following sections: Overview of the, on page 1 Local Versus External, on page 1 Setting Up the Local, on page 2 Using Safelists and Blocklists to Control Email Delivery Based

More information

Getting Started Guide moduscloud

Getting Started Guide moduscloud Getting Started Guide moduscloud Hi and welcome to moduscloud! If this is your first time using moduscloud, here s a great way to start. We ll walk you through the essential first steps so your team can

More information

Centralized Policy, Virus, and Outbreak Quarantines

Centralized Policy, Virus, and Outbreak Quarantines Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page

More information

Working with Reports

Working with Reports The following topics describe how to work with reports in the Firepower System: Introduction to Reports, page 1 Risk Reports, page 1 Standard Reports, page 2 About Working with Generated Reports, page

More information

BlackBerry AtHoc Networked Crisis Communication. User Guide: Enterprise

BlackBerry AtHoc Networked Crisis Communication. User Guide: Enterprise BlackBerry AtHoc Networked Crisis Communication User Guide: Enterprise Release 7.3, October 2017 Copyright 2016 2017 BlackBerry Limited. All Rights Reserved. This document may not be copied, disclosed,

More information

On the Surface. Security Datasheet. Security Datasheet

On the Surface.  Security Datasheet.  Security Datasheet Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record

More information

Quick Start Guide for Administrators and Operators Cyber Advanced Warning System

Quick Start Guide for Administrators and Operators Cyber Advanced Warning System NSS Labs Quick Start Guide for Administrators and Operators Cyber Advanced Warning System Introduction to the Cyber Advanced Warning System and RiskViewer... 1 Activating Your Account... 2 Adding a New

More information

BlackBerry AtHoc Networked Crisis Communication. User Guide

BlackBerry AtHoc Networked Crisis Communication. User Guide BlackBerry AtHoc Networked Crisis Communication User Guide Release 7.0.0.1, April 2017 Copyright 2016 2017 AtHoc Inc., a Division of BlackBerry Limited. All Rights Reserved. This document may not be copied,

More information

Vision 360 Administration User Guide

Vision 360 Administration User Guide Vision 360 Vision 360 Administration User Guide 1.0 Copyright INPS Ltd The Bread Factory, 1A Broughton Street, Battersea, London, SW8 3QJ T: +44 (0) 207 501700 F:+44 (0) 207 5017100 W: www.inps.co.uk Copyright

More information

Tenant Administration

Tenant Administration vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections:

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections: This chapter contains the following sections: Overview of the, page 1 Local Versus External, page 2 Setting Up the Local, page 2 Setting Up the Centralized, page 3 Edit Page, page 6 Using Safelists and

More information

Mail Assure. User Guide - Admin, Domain and Level

Mail Assure. User Guide - Admin, Domain and  Level Mail Assure User Guide - Admin, Domain and Email Level Last Updated: Friday, June 15, 2018 ----------- 2018 CONTENTS Getting Started 1 Useful Links 1 What's New 1 Accessing Mail Assure 6 User Permissions

More information

Comodo Unknown File Hunter Software Version 2.1

Comodo Unknown File Hunter Software Version 2.1 rat Comodo Unknown File Hunter Software Version 2.1 Administrator Guide Guide Version 2.1.061118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

FileCruiser. Administrator Portal Guide

FileCruiser. Administrator Portal Guide FileCruiser Administrator Portal Guide Contents Administrator Portal Guide Contents Login to the Administration Portal 1 Home 2 Capacity Overview 2 Menu Features 3 OU Space/Team Space/Personal Space Usage

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

Enterprise Protection for the Administrator

Enterprise Protection for the Administrator Enterprise Protection for the Administrator Overview The Proofpoint Protection course covers the protection tools that are available as part of the Proofpoint Suite, including our newest module, Targeted

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony Fabric Integration Service Admin Console User Guide On-Premises Release V8 SP1 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the

More information

Wholesale Lockbox User Guide

Wholesale Lockbox User Guide Wholesale Lockbox User Guide August 2017 Copyright 2017 City National Bank City National Bank Member FDIC For Client Use Only Table of Contents Introduction... 3 Getting Started... 4 System Requirements...

More information

MDaemon Vs. IceWarp Unified Communications Server

MDaemon Vs. IceWarp Unified Communications Server Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

RCT Express. Administrator Training Manual. Version 4.3

RCT Express. Administrator Training Manual. Version 4.3 RCT Express Administrator Training Manual Version 4.3 Copyright 2016 CoreLogic. All rights reserved. ii Contents Introduction 1 System Requirements... 1 Tools 2 Administration 3 Manage Agencies... 3 Manage

More information

SpamPanel Level Manual 1 Last update: 2015/02/03 SpamPanel

SpamPanel  Level Manual 1 Last update: 2015/02/03 SpamPanel SpamPanel Email Level Manual 1 Last update: 2015/02/03 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam... 9 Report Spam...

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

Administration Guide. Lavastorm Analytics Engine 6.1.1

Administration Guide. Lavastorm Analytics Engine 6.1.1 Administration Guide Lavastorm Analytics Engine 6.1.1 Lavastorm Analytics Engine 6.1.1: Administration Guide Legal notice Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS

More information

RealPresence Media Manager

RealPresence Media Manager RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 USER GUIDE Software 6.7 January 2015 3725-75302-001A RealPresence Media Manager Polycom, Inc. 1 Copyright 2015, Polycom, Inc. All rights

More information

Message Manager Administrator Guide for ZA

Message Manager Administrator Guide for ZA Message Manager Administrator Guide for ZA Documentation version: 2.0 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Assessment Data Online: Admin Guide

Assessment Data Online: Admin Guide Assessment Data Online: Admin Guide Welcome to Assessment Data Online. This Admin Guide is intended to help you understand the functionality of the website with respect to administrative privileges. It

More information

Integrate Cisco IronPort Security Appliance (ESA)

Integrate Cisco IronPort  Security Appliance (ESA) Integrate Cisco IronPort Email Security Appliance (ESA) Publication Date: January 4, 2017 Abstract This guide provides instructions to configure Cisco IronPort Email Security Appliance (ESA) to send the

More information

Introduction to Cognos

Introduction to Cognos Introduction to Cognos User Handbook 7800 E Orchard Road, Suite 280 Greenwood Village, CO 80111 Table of Contents... 3 Logging In To the Portal... 3 Understanding IBM Cognos Connection... 4 The IBM Cognos

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

HTTP Errors User Guide

HTTP Errors User Guide Version 3.8 Published: 2016-03-28 Copyright 2016, Cisco Systems, Inc. Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information