Imail Administrator Help V10

Total Page:16

File Type:pdf, Size:1020Kb

Imail Administrator Help V10 IMail Administrator Help V10 Contents CHAPTER 1 Introduction to IMail Administrator About Help....................................................................................................................................................................10 Web Administrator and Client ...............................................................................................................................12 IMail Administrator Requirements .......................................................................................................................14 New for Version 10 .....................................................................................................................................................15 New Features................................................................................................................................................................15 Accessing the IMail Web Administration ...........................................................................................................20 Using Internet Information Services (IIS) Virtual Directories.......................................................................21 Additional Resources.................................................................................................................................................21 Installing Patches and Upgrades...........................................................................................................................22 Table of Features.........................................................................................................................................................24 Helpful Definitions .....................................................................................................................................................25 File Attachment Settings..........................................................................................................................................26 IMail Processing Order..............................................................................................................................................26 CHAPTER 2 Installing Installing IMail Server Administrator ...................................................................................................................29 Setting the EMail Domain Name (Official Host Name)..................................................................................30 Setting Up an Alias for a Host.................................................................................................................................30 Setting Database Options........................................................................................................................................31 Installing SSL Keys ......................................................................................................................................................31 Folder Permissions and IIS Configuration..........................................................................................................32 IMail Folder Permissions and IIS Configuration IIS Settings.....................................................................................................................................................................35 Using IIS Virtual Directories.....................................................................................................................................36 Changing IIS Virtual Directory names....................................................................................................37 Adding a User During Install...................................................................................................................................37 Installing Patches and Upgrades...........................................................................................................................37 Using the IMail Installation Log File.....................................................................................................................38 CHAPTER 3 Mail Domain (Host) Configuration Domain Properties .....................................................................................................................................................40 Adding a New IMail Domain...................................................................................................................................44 1 Configuring an NT/AD database...........................................................................................................................49 About Virtual Mail Domains (Hosts).....................................................................................................................49 LDAP Settings...............................................................................................................................................................50 Inbound Delivery Rules for IMail Domains ........................................................................................................51 Bouncing Spam Messages using Rules ..................................................................................................52 Outbound Delivery Rules for IMail Domains.....................................................................................................53 Default Service Ports..................................................................................................................................................54 Setting up a Dial-up Internet Connection .........................................................................................................55 Method 2 Example.........................................................................................................................................57 Using ETRN to Retrieve Mail on a Dial-up Connection. ....................................................................57 Method 3 Example.........................................................................................................................................58 Changing the IP Address of a Host.......................................................................................................................58 Setting Up a Mail Gateway ......................................................................................................................................59 Setting up IMail Server as a Backup Mail Spooler ...........................................................................................60 CHAPTER 4 User Mail Accounts Creating User Database............................................................................................................................................63 Using the Windows NT/Active Directory Database ...........................................................................63 Importing Windows NT Users....................................................................................................................64 Using the IMail Database.............................................................................................................................65 Creating External User Database for a Mail Domain .........................................................................65 Working with Individual User Accounts .............................................................................................................67 Vacation Message for IMail User...............................................................................................................68 About Beeper/Pager Aliases.......................................................................................................................68 Customizing the Full Mailbox Notification Message.........................................................................68 Full Mailbox Notify Example.......................................................................................................................69 CHAPTER 5 System System Settings...........................................................................................................................................................71 DNS Black Lists (Server Level Options)................................................................................................................72 Understanding DNS Black Lists .................................................................................................................74 How Black Lists Work ....................................................................................................................................75 Add/Edit the DNS Black List........................................................................................................................76 View Queue...................................................................................................................................................................77 Managing Messages in the View Queue Page.....................................................................................79 Cleaning the Spool Directory (Isplcln.exe)............................................................................................79 File Extensions of Files in the Queue.......................................................................................................80 Beginning Character of Files in the Queue ...........................................................................................80
Recommended publications
  • VI. Lotus Domino
    Le groupware - 1 / 60 - Sommaire I. Introduction ................................................................................................ 2 A. Histoire (Source : Michel Alberganti) ................................................................................ 2 B. Définition................................................................................................................... 2 C. L'offre....................................................................................................................... 2 1. Intranet / Internet................................................................................................. 2 2. Messagerie........................................................................................................... 3 II. Les clients de messagerie ............................................................................... 3 A. Windows Messaging : Msmail........................................................................................... 4 1. Installer et administrer un bureau de poste .................................................................. 4 2. Propriétés du client MAPI......................................................................................... 7 B. Utiliser Outlook ......................................................................................................... 15 1. Les options .........................................................................................................15 2. Envoi de messages ................................................................................................20
    [Show full text]
  • Set up Mail Server Documentation 1.0
    Set Up Mail Server Documentation 1.0 Nosy 2014 01 23 Contents 1 1 1.1......................................................1 1.2......................................................2 2 11 3 13 3.1...................................................... 13 3.2...................................................... 13 3.3...................................................... 13 4 15 5 17 5.1...................................................... 17 5.2...................................................... 17 5.3...................................................... 17 5.4...................................................... 18 6 19 6.1...................................................... 19 6.2...................................................... 28 6.3...................................................... 32 6.4 Webmail................................................. 36 6.5...................................................... 37 6.6...................................................... 38 7 39 7.1...................................................... 39 7.2 SQL.................................................... 41 8 43 8.1...................................................... 43 8.2 strategy.................................................. 43 8.3...................................................... 44 8.4...................................................... 45 8.5...................................................... 45 8.6 Telnet................................................... 46 8.7 Can postfix receive?..........................................
    [Show full text]
  • Concept of Mail Protocols Format of an Email Email Addressing
    Concept of Mail Protocols Format of an Email Email Addressing A unique addressing system ,has two parts in addressing. Local part defines user mailbox and domain name mention the destination [email protected] Email alias:Create a group email to send email to many people like multicast. Email message fields Here are the meanings of the fields to be filled in when you send an email: ● From: this is your email address; most of the time you will not have to fill in this field, because it is generally set by the email client according to your preferences. ● To: This field is used for the recipient's email address. ● Subject: this is the title that your recipients will see when they want to read the email ● Cc (carbon copy): this allows an email to be send to a large number of people by writing their respective addresses separated by commas ● Bcc (blind carbon copy): This is a Cc, except that the recipient does not see the list of people in the Bcc field ● Message: This is the body of your message Other email functions are: ● Attached Files, Attachments: A file can be attached to an email by specifying its location on the hard drive. ● Signature: If the email client allows it, you are often able to set a signature, meaning a few lines of text which will be added to the end of the document. Email Delivery Queue Unlike ftp/http it is not necessarily to deliver email in real time.Delivery not instantaneous ,It will wait in the queue of outgoing,incoming ,intermediate MTA message queue.
    [Show full text]
  • PERSONAL EMAIL MANAGER USER HELP Websense® Email Security Gateway
    PERSONAL EMAIL MANAGER USER HELP Websense® Email Security Gateway v7.8.x ©2014 Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R051478x Published May 2014 Printed in the United States of America and Ireland. The products and/or methods of use described in this document are covered by U.S. Patent Numbers 6,606,659 and 6,947,985 and other patents pending. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent in writing from Websense Inc. Every effort has been made to ensure the accuracy of this manual. However, Websense Inc., makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Websense Inc. shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Trademarks Websense, the Websense Logo, Threatseeker and the YES! Logo are registered trademarks of Websense, Inc. in the United States and/or other countries. Websense has numerous other unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners. Contents Topic 1 Overview . 1 What is Personal Email Manager? . 1 Personal Email Manager Help overview . 2 Topic 2 Working with Notification Messages . 5 Notification message format. 5 Notification message actions . 5 Not Spam. 6 Deliver.
    [Show full text]
  • GO!Notifysync Pre-Purchase Checklist
    GO!NotifySync Pre-Purchase Checklist Prior to purchasing GO!NotifySync you will need to identify the following configuration information. Consult your Mail Server Administrator, if necessary, to obtain this information. Mail Server Administrators can also reference, Guidelines for Administrators. My Mail Server Type is GO!NotifySync supports ActiveSync protocol versions 2.5, 12.0, or 12.1. GO!NotifySync is certified against the following versions of ActiveSync servers: GroupWise 8.0.2 HP2, 8.0.2 HP3, 2012, or 2014 with Novell Data Synchronizer or Novell Mobility Services 2.0 Microsoft Exchange 2010 Microsoft Exchange 2007 Microsoft Exchange 2003 Below is a list of additional ActiveSync servers. If these systems adhere to the supported ActiveSync protocol versions (2.5, 12.0, or 12.1), GO!NotifySync has a high probability of working as designed: AXIGEN Messaging CommuniGate Pro Google Hotmail IBM Lotus Notes Traveler v8.5.2.1 IceWarp Server Ipswitch IMail Server Kerio MailServer Office 365 Open-Xchange Scalix Zarafa Zimbra Collaboration Suite My Email Domain is The text after the @ sign in your Email address is your Email Domain. If your Email address is: [email protected], your Email Domain is: mycompany.com GO!NotifySync Pre-Purchase Checklist 1 My Mail/ActiveSync Server Address is This is the external address of your Mail/ActiveSync server. Information that may help you identify the ActiveSync Server Address: Your best source for this information is your Mail Server Administrator. What address is used to log into Web mail? That would be the ActiveSync Server address. Ask: What is the address I would use to connect to the ActiveSync Server? My Domain is Domain refers to a group of servers on a network that are administered as a unit.
    [Show full text]
  • Spam Filtering (Domain Level)
    • ------=---~ IPS WIT CH II L..--..../ J------I IMai I Server Contents CHAPTER 1 Introduction to IMail Administrator About Help ...........................................................................................................................1 Web Administrator and Client ..............................................................................................3 IMail Administrator Requirements........................................................................................5 New for Version 11...............................................................................................................6 Accessing the IMail Web Administration............................................................................12 Using Internet Information Services (IIS) Virtual Directories..............................................13 Additional Resources .........................................................................................................14 Installing Patches and Upgrades .......................................................................................15 Table of Features...............................................................................................................16 Helpful Definitions ..............................................................................................................17 File Attachment Settings ....................................................................................................18 IMail Processing Order.......................................................................................................18
    [Show full text]
  • Setting up Imail Server As a Backup Mail Spooler
    • ------=---~ IPS WIT CH II L..--..../ J------I IMai I Server Contents CHAPTER 1 Introduction to IMail Administrator About Help .......................................................................................................................... 1 Web Administrator and Client ............................................................................................. 3 IMail Administrator Requirements ....................................................................................... 5 System Requirements ......................................................................................................... 6 New for Version 11.01 ....................................................................................................... 11 Accessing the IMail Web Administration ........................................................................... 19 Using Internet Information Services (IIS) Virtual Directories ............................................. 20 Additional Resources ........................................................................................................ 20 IMail Getting Started Guide Links ..................................................................................... 22 Installing Patches and Upgrades ...................................................................................... 23 Table of Features .............................................................................................................. 23 Helpful Definitions ............................................................................................................
    [Show full text]
  • Imail V12 Administrator Help
    Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©2011 Ipswitch, Inc. All rights reserved. IMail Server – Administration Help This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History December 2011 v12 April 2011 v11.5 October 2010 v11.03 May 2010 v11.02 Contents CHAPTER 1 Introduction to IMail Administrator About Help .....................................................................................................................................................................
    [Show full text]
  • Abstract GEGICK, MICHAEL CHARLES. Analyzing Security
    Abstract GEGICK, MICHAEL CHARLES. Analyzing Security Attacks to Generate Signatures from Vulnerable Architectural Patterns. (Under the direction of Dr. Laurie Williams.) Current techniques for software security vulnerability identification include the use of abstract, graph-based models to represent information about an attack. These models can be in the form of attack trees or attack nets and can be accompanied with a supporting text- based profile. Matching the abstract models to specific system architectures for effective vulnerability identification can be a challenging process. This thesis suggests that abstract regular expressions can be used to represent events of known attacks for the identification of security vulnerabilities in future applications. The process of matching the events in the regular expression to a sequence of components in a system design may facilitate the means of identifying vulnerabilities. Performing the approach in the design phase of a software process encourages security to be integrated early into a software application. Students in an undergraduate security course demonstrated a strong ability to accurately match regular expressions to a system design. The identification of vulnerabilities is limited to known attacks of other systems and does not offer descriptions of what new attacks are possible to a future application. Extending the approach to incorporate new attacks is an avenue of future work. Analyzing Security Attacks to Generate Signatures from Vulnerable Architectural Patterns by Michael Charles
    [Show full text]
  • Email Reputation Services Stops Email Threats Before the Gateway
    Securing Your Web World ANTI-SPAM ANTI-PHISHING Trend Micro™ Email Reputation Services Stops Email Threats Before the Gateway Email-based threats are rising dramatically. Spam, spyware, phishing, botnets, SERVICES zombies, targeted email attacks, and blended-threat attacks not only sap Protection Points employee productivity, they endanger company networks. At the same time, • Gateway administrative resources and budgets are overtaxed and existing security systems are stretched to the limit. Threat Protection • Spam Trend Micro Email Reputation Services stop up to 80 percent of spam and other email threats at • Phishing their source–before they can hit the gateway and flood messaging infrastructure. Email Reputation • Bots and botnets 1 Services has the highest catch rate for standalone email reputation services and is the only solution • Zombies to offer an administration console, which gives access to reports and provides the option to actively • Blended Threats manage spam and blended email threats. As a highly effective first layer of security with extensive MTA support, the services complement your current email security and greatly reduce spam’s impact on the gateway, allowing your messaging security to run at optimal efficiency. KEY ADVANTAGES • Stops spam at its source, catching up to 80 percent with almost zero false positives KEY FEATURES • Features simple set up, high scalablility, Complements your current messaging security and low maintenance costs • Offers a choice of deployment options to meet your needs • Provides easy
    [Show full text]
  • DISTRIBUTED SYSTEMS CONTENTS 1.0 Aim And
    UNIT – I LESSON 1: DISTRIBUTED SYSTEMS CONTENTS 1.0 Aim and Objectives 1.1. Introduction 1.2. Organization 1.3. Goals and Advantages 1.4. Disadvantages 1.5. Architecture 1.6. Concurrency 1.7. Languages 1.8. Let us Sum UP 1.9. Lesson-End Activities 1.10. Points for Discussion 1.11. References 1.0. AIM AND OBJECTIVES At the end of this Lesson you will be able to understand the concept of Distributed Computing, organization of Distributed Computing, advantages and limitations of Distributed Computing 1.1. INTRODUCTION Distributed computing is a method of computer processing in which different parts of a program are run simultaneously on two or more computers that are communicating with each other over a network. Distributed computing is a type of segmented or parallel computing, but the latter term is most commonly used to refer to processing in which different parts of a program run simultaneously on two or more processors that are part of the same computer. While both types of processing require that a program be segmented—divided into sections that can run simultaneously, distributed computing also requires that the division of the program take into account the different environments on which the different sections of the program will be running. For example, two computers are likely to have different file systems and different hardware components. An example of distributed computing is BOINC, a framework in which large problems can be divided into many small problems which are distributed to many computers. Later, the small results are reassembled into a larger solution.
    [Show full text]
  • PVS Plugin Family
    SecurityCenter 4 TENABLE NETWORK SECURITY INC., COPYRIGHT © 2012 TENABLE NETWORK SECURITY PVS Plugin Family March 13, 2012 at 3:04pm CDT Dave Breslin [dlbreslin] Confidential: The following report contains confidential information. Do not distribute, email, fax, or transfer via any electronic mechanism unless it has been approved by the recipient company's security policy. All copies and backups of this document should be saved on protected storage at all times. Do not share any of the information contained within this report with anyone unless they are authorized to view the information. Violating any of the previous instructions is grounds for termination. PVS Plugin Family SecurityCenter 4 TENABLE NETWORK SECURITY INC., COPYRIGHT © 2012 Table of Contents Plugin Family Summary ...............................................................................................................1 Backdoors .....................................................................................................................................................2 CGI .........................................................................................................................................................................3 Data Leakage ............................................................................................................................................ 5 Database .........................................................................................................................................................7 DNS
    [Show full text]