Mail Assure Admin Guide

Total Page:16

File Type:pdf, Size:1020Kb

Mail Assure Admin Guide Mail Assure User Guide - Admin, Domain and Email Level Last Updated: Monday, February 11, 2019 ----------- ©2019 CONTENTS Getting Started 1 Useful Links 1 Accessing Mail Assure 1 User Permissions 3 Timeout Settings 4 Supported Web Browsers 4 Multi-admin control panel access and audit trail 4 Retrieve Log-in Link 6 Existing Account - Forgotten Password 7 Create New Email Account via the Retrieve Log-in Link 7 Send User Customized Link to Reset Password 7 Admin Level Control Panel 7 What do you want to do? 7 Domain Level Control Panel 8 Accessing the Domain Level Control Panel 8 Email Level Control Panel 8 Accessing the Email Level Control Panel 9 What do you want to do? 9 Using the 'Login as' Feature 9 Log in as a Domain user. 9 Log in as an Email User 10 Finish Login as Session 11 Start a Free 30-day Trial with Mail Assure 11 Application Overview 12 Navigating Mail Assure 12 Customize Dashboard 12 Mail Assure Edit Dashboard Panel Group 13 Add a Widget 13 Reset to Default Dashboard Setting 13 Features Preview 14 List of features in Preview mode 14 API Logs (Preview) 14 Archive Usage (Preview) 15 Email Scout Report Templates (Preview) 16 Create Email Scout Report Template 17 View Incoming/Outgoing Reports from a Particular Template 25 On-demand Archive Index 26 What's New 27 New Navigation/Dashboard Feature Mapping 36 Admin Level Mappings 36 Domain Level Mappings 41 Email Level Mappings 45 FAQs 47 Troubleshooting Tips 49 Incoming mail is wrongly blocked 49 Incoming spam is getting through 49 Outgoing mail is wrongly blocked 50 Report Security Related Issues 51 What is Spam and who Sends it? 51 Why do Spammers Spam? 51 Who is Behind Spam? 51 How do I Restrict Direct Delivery of Spam? 52 Delivery Restriction Examples 52 Why was my Message Blocked as Spam? 52 How can I Protect Against Bounce Spam? 54 What Causes Bounce Spam? 54 Catchall Domains 55 SPF / DKIM 55 BATV Signing 55 I get a lot of Unwanted Newsletters - Should I Report These as Spam? 56 How can I Block Dangerous Attachments? 56 Access the Attachment Restrictions page 56 Block Attachments Containing Hidden Executables at Domain Level 56 Block Specific Extension Types 56 Block Password Protected Archives 57 Enable Scanned Link Extensions 57 What Local Issues may Cause Non-delivery of Mail? 57 Intrusion Detection Issues 57 ASA 5505 ESMTP Inspection Problems 57 Outdated Firmware Issues 57 Exchange (On Premise or Online) and Missing Mail Assure Headers 58 Lotus Domino Notes Outbound SSL Issue 58 DNS and HTTP proxy with Custom Host Names 58 DNS Issues 58 How to Count Users/Domains? 58 Incoming 58 Domain count 58 Valid recipient (mailbox) count 59 Outgoing 59 Outbound License usage 59 How to get outbound sender counts 60 Mail Assure Can I Change the Name of a Domain? 60 How do I Request an Export of my Domain? 60 Common questions 60 Why can't I Find a Message in the Quarantine? 61 How can I View Email Headers in Different Email Applications? 61 Gmail 61 Juno Version 4+ 62 Lotus Notes / IBM Notes 62 Microsoft Outlook for Office 365, Outlook 2019, Outlook 2016, Outlook 2013, Outlook 2010, Outlook 2007 62 Microsoft Live Mail / Hotmail 62 Mozilla Thunderbird 62 Newswatcher 62 Opera Mail 62 Pine/Alpine 62 What are Recipient Callouts? 62 5xx destination server rejects 63 Existing recipients 63 Technical details 63 Enable recipient callouts 63 How can I Test the Mail Server is Working Properly? 64 Incoming Mail 64 Outgoing Mail 64 cPanel 64 Can I Blacklist/Whitelist Messages Based on Character Set? 65 Blacklist Messages Based on MIME Language 65 How do I Blacklist/Whitelist Messages by Country/Continent? 66 Blacklist Messages Based on Country 66 Does Mail Assure Use Greylisting? 67 How can an SPF Issue Block a Message? 68 Incoming messages blocked by the filtering server 69 Incoming messages blocked by the destination mail server 69 Webinterface telnet & LDAP sync IPs 69 Mail Assure SMTP delivery IPs 69 Outgoing messages blocked by the destination mail server 69 What is my SMTP Hostname? 69 EU/US/UK/AU/CA-only 70 Branded SPF hostname 70 Why Can't I Upload my Certificate or get an Error when Trying? 70 How do I Enforce TLS? 71 Incoming Filtering 71 Outgoing Filtering - the outgoing user that handled filtering needs to be provided as well 71 Why do my Released Messages not seem to be Getting Trained by the System? 71 How to Enable Exchange Protocol Logging? 72 Can I Query an Office 365 Account with LDAP to Pull in Users to Mail Assure? 72 What Details Should I Include when Opening a Support Ticket? 72 Domain Management 73 What do you want to do? 73 View Domain Overview 73 Add a Domain 74 Check your New Domain can Communicate with the Mail Server 75 Find Destination Server Hostname 76 Office 365 Destination Server Address 76 G Suite Destination Server Address 77 Local Mail Server Address 78 Mail Assure Transfer Domain Between Admin Accounts 78 Domain Transfer 78 Forced Migration 79 Mailboxes Overview 79 What do you want to do? 80 Configuration Tab 80 Outgoing 80 Date/Time options 81 General 81 Incoming 81 Archiving 82 Mailboxes Tab 83 View mailboxes 83 Add mailbox 84 Edit one or multiple mailboxes 84 Switch off Filtering for Specific Mailbox (whitelist recipients) 84 Mailbox Aliases Tab 85 Add a mailbox alias 85 Catch all mail and direct to a single address 85 MX Records 85 Update Your MX Records in Your Domain Provider's DNS Settings 86 MX Verification Tool 87 LDAP Authentication and Synchronization 88 LDAP Authentication 88 LDAP Mailbox Sync 88 Set up LDAP Authentication 88 Configuring LDAP Mailbox Sync 91 Prerequisites for Using LDAP Synchronization 92 Set up LDAP Mailbox Sync Details 92 Set up Custom LDAP Mapping Rules 93 Export List of LDAP Mappings for Your Domains 94 Manage General Settings 95 Available Products 95 Server Settings 95 Default MX Hostnames 95 Incoming Filtering 96 What do you want to do? 96 Filtering Technology 97 SMTP Level Filtering 97 DATA Level Filtering 98 Virus Scanning 98 Pre-virusscan blocks 98 Attachment Filtering 98 Antivirus Engine 98 Sandboxing 99 View Incoming Bandwidth Overview 99 Incoming Log Search 99 Run Custom Log Search 100 Query Rules Panel 100 Actions Available on Log Search Results 103 Regenerate Index 104 Add Customized Action Using Log Search 105 Export Log Search Results 106 Create Email Scout Report 107 Email content 108 Mail Assure Email Scout Report Templates (Preview) 110 View/Edit Email Scout Reports 119 Spam Quarantine 121 Enable the Quarantine 121 Access the Quarantine 122 View Domain Level Incoming Spam Quarantine 122 View Email Level Spam Quarantine 123 View Quarantined Message Content 124 Release Quarantined Messages 126 Release and Train Quarantined Messages 126 Release and Whitelist Quarantined Messages 128 Remove Messages from Quarantine 128 Remove and Blacklist Quarantined Messages 128 Manage Quarantine Filter Settings 129 Manage Domains and IPs with Disabled SPF, DKIM and DMARC Checks 131 Incoming Rejection Classifications 134 Temporarily Rejected (4xx SMTP response) 134 Rejected (5xx SMTP response) 136 Messages that are rejected without being quarantined 140 Accepted (2xx SMTP response) 141 Manage Domain Aliases 142 To add a domain alias: 142 Configure Domain Settings 142 Rejected Local Part Characters 143 Manage Destinations 143 Add Destination 144 Perform Network Checks on Destination Server 145 View Domain Statistics (Incoming) 145 Report Spam 147 Train Spam 147 Train Not Spam 147 Report Spam Using the Thunderbird Add-on 148 To install the Thunderbird add-on 148 Report a Spam Message using Thunderbird 148 Report Spam Using MailApp for Apple OSX 148 Install the SpamReporter tool 149 Report Spam using the Mail App 149 Remove SpamReporter app from OSX Device 149 Report Spam - Forward Email as Attachment 149 Report Spam via IMAP 149 Report Spam via Browser-based Email Client 149 Install Add-on and Script 150 Reporting from Browser-based Email Client 150 Clear Callout Cache - Incoming 150 Customize Actions 150 Add Customized Action 151 Delivery Details 151 Email Restrictions 152 Manage Attachment Restrictions 152 Manage Email Size Restriction 155 Outgoing Filtering 157 What do you want to do? 157 View Outgoing Bandwidth Overview 157 Outbound Spam Monitoring 158 Best Practise for Smarthost Users 158 Mail Assure Managing Outgoing Spam 158 Outgoing Log Search 158 Manually Lock Identity from Outgoing Log Search 159 Outgoing Reports page 160 Manually Lock Identity from the Outgoing Reports Page: 160 Automatic Locking 160 ARF reports 161 ARF parser 161 Manage Identities 161 Manage Lock Templates 162 Manually Add Lock Template 162 Manage Outgoing Users 163 Add an Outgoing User 164 Edit an Outgoing User 167 Outgoing Identity Setup 168 Configure Identity Header Identification Method in Mail Assure and Your MTA 168 Set up Outgoing User Authentication for Multiple Domains Sending from the Same IP Address 171 Generate Outgoing Report 171 Outgoing Blacklist Filtering Rules 172 View Outgoing Blacklist Filtering Rules 172 Add Outgoing Blacklist Filtering Rule 173 Outgoing Log Search 177 DKIM Certificate Generation 177 Why should I use DKIM? 177 How does it work? 177 What do you sign by default? 178 Generate a DKIM certificate in the Mail Assure Control Panel 178 How can I set DKIM up via command line? 178 Prerequisites 178 Create keys 179 Create a DNS record 179 Configure the keys 179 Further reading 180 Manage Outgoing Settings 180 Configure the Abuse Report Address 181 Clear Callout Cache - Outgoing 182 View Domain Statistics - Outgoing 182 Setting up Your SMTP Hostname 182 Setting up SPF 183 To Set up SPF for a Domain 183 Existing
Recommended publications
  • Trendmicro™ Hosted Email Security
    TrendMicro™ Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Complying with all applicable copyright laws is the responsibility of the user. Copyright © 2016 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other brand and product names may be trademarks or registered trademarks of their respective companies or organizations. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Authors : Michael Mortiz, Jefferson Gonzaga Editorial : Jason Zhang Released : June 2016 Table of Contents 1 Best Practice Configurations ................................................................................................................................. 8 1.1 Activating a domain ....................................................................................................................................... 8 1.2 Adding Approved/Blocked Sender ................................................................................................................ 8 1.3 HES order
    [Show full text]
  • Handling Unwanted Email What Are the Main Sources of Junk Email?
    Handling unwanted email Almost entirely based on a presentation by Brian Candler What are the main sources of junk email? · Spam Unsolicited, bulk email Often fraudulent ± penis enlargement, lottery scams, close relatives of African presidents, etc. Low response rate => high volume sent · Viruses, Trojan horses Infected machine sends out mails without the owner 's knowledge · Malicious bounces These are called ªcollateral spamº or ªJoe-jobsº Junk mail is sent with forged MAIL FROM Accepted by some intermediate MTA, but later it bounces Bounces go to innocent third party 1 What are the costs? · Important messages can be accidentally discarded The more junk, the higher the risk · Wasted time Deleting junk Setting up and maintaining ®lters Checking discarded mail for false positives · Wasted bandwidth and disk space Especially for users on modems Viruses and spam attachments can be large · Annoyance, offence, even fraud There are no easy answers! 2 Where can you ®lter? · At the end-user hosts ✓ Each client has full control and customization ✓ Distributes the processing cost ✗ Client must still download each message · On the ISP's mail server ✓ Easier for users ✓ Sometimes can be rejected before receiving the body ✓ Saves disk space on the server ✗ Hard to make ¯exible for users to customize The Joe-job problem · Don't accept a message and then bounce it later If its sender is forged, we are creating a Joe-job · Much better to reject at RCPT TO or DATA stages A real MTA sender will create a bounce Spamware will ignore the rejection · For
    [Show full text]
  • DMARC — Defeating E-Mail Abuse
    CERT-EU Security Whitepaper 17-001 DMARC — Defeating E-Mail Abuse Christos Koutroumpas ver. 1.3 February 9, 2017 TLP: WHITE 1 Preface E-mail is one of the most valuable and broadly used means of communication and most orga- nizations strongly depend on it. The Simple Mail Transport Protocol (SMTP) – the Internet’s underlying email protocol – was adopted in the eighties and is still in use after 35 years. When it was designed, the need for security was not so obvious, and therefore security was not incor- porated in the design of this protocol. As a result, the protocol is susceptible to a wide range of attacks. Spear-phishing campaigns in particular can be more successful by spoofing (altering) the originator e-mail address to imper- sonate a trusted or trustworthy organization or person. This can lead to luring the recipient into giving away credentials or infecting his/her computer by executing malware delivered through the e-mail. While raising user awareness on how to avoid e-mail fraud is recommended, the Verizon Data Breach Investigations Report indicates that more needs to be done. The DBIR report reveals that 30% of all phishing e-mail messages were opened by the recipients and with 12% clicked on the content and executed malicious code. The median time for the first user of a phishing campaign to open the malicious email is 1 minute, 40 seconds. The median time to the first click on the attachment was 3 minutes, 45 seconds. These statistics highlight the risk for an organization on the receiving end of spear-phishing e-mails.
    [Show full text]
  • Delivering Results to the Inbox Sailthru’S 2020 Playbook on Deliverability, Why It’S Imperative and How It Drives Business Results Introduction to Deliverability
    Delivering Results to the Inbox Sailthru’s 2020 Playbook on Deliverability, Why It’s Imperative and How It Drives Business Results Introduction to Deliverability Every day, people receive more than 293 billion Deliverability is the unsung hero of email marketing, emails, a staggering number that only represents ultimately ensuring a company’s emails reach their the tip of the iceberg. Why? The actual number intended recipients. It’s determined by a host of of emails sent is closer to 5.9 quadrillion, with the factors, including the engagement of your subscribers overwhelming majority blocked outright or delivered and the quality of your lists. All together, these factors to the spam folder. result in your sender reputation score, which is used to determine how the ISPs treat your email stream. Something many people don’t realize is that to the Deliverability is also a background player, so far in the major Internet Service Providers (ISPs) — Gmail, shadows that many people don’t think about it, until Yahoo!, Hotmail, Comcast and AOL — “spam” there’s a major issue. doesn’t refer to marketing messages people may find annoying, but rather malicious email filled with That’s why Sailthru’s deliverability team created this scams and viruses. In order to protect their networks guide. Read on to learn more about how deliverability and their customers, the ISPs cast a wide net. If a works on the back-end and how it impacts revenue, message is deemed to be spam by the ISP’s filters, it’s your sender reputation and how to maintain a good dead on arrival, never to see the light of the inbox, as one, and best practices for list management, email protecting users’ inboxes is the top priority of any ISP.
    [Show full text]
  • A Survey of Learning-Based Techniques of Email Spam Filtering
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Unitn-eprints Research A SURVEY OF LEARNING-BASED TECHNIQUES OF EMAIL SPAM FILTERING Enrico Blanzieri and Anton Bryl January 2008 (Updated version) Technical Report # DIT-06-056 A Survey of Learning-Based Techniques of Email Spam Filtering Enrico Blanzieri, University of Trento, Italy, and Anton Bryl University of Trento, Italy, Create-Net, Italy [email protected] January 11, 2008 Abstract vertising pornography, pyramid schemes, etc. [68]. The total worldwide financial losses caused by spam Email spam is one of the major problems of the to- in 2005 were estimated by Ferris Research Analyzer day’s Internet, bringing financial damage to compa- Information Service at $50 billion [31]. nies and annoying individual users. Among the ap- Lately, Goodman et al. [39] presented an overview proaches developed to stop spam, filtering is an im- of the field of anti-spam protection, giving a brief portant and popular one. In this paper we give an history of spam and anti-spam and describing major overview of the state of the art of machine learn- directions of development. They are quite optimistic ing applications for spam filtering, and of the ways in their conclusions, indicating learning-based spam of evaluation and comparison of different filtering recognition, together with anti-spoofing technologies methods. We also provide a brief description of and economic approaches, as one of the measures other branches of anti-spam protection and discuss which together will probably lead to the final victory the use of various approaches in commercial and non- over email spammers in the near future.
    [Show full text]
  • Detecting Phishing in Emails Srikanth Palla and Ram Dantu, University of North Texas, Denton, TX
    1 Detecting Phishing in Emails Srikanth Palla and Ram Dantu, University of North Texas, Denton, TX announcements. The third category of spammers is called Abstract — Phishing attackers misrepresent the true sender and phishers. Phishing attackers misrepresent the true sender and steal consumers' personal identity data and financial account steal the consumers' personal identity data and financial credentials. Though phishers try to counterfeit the websites in account credentials. These spammers send spoofed emails and the content, they do not have access to all the fields in the lead consumers to counterfeit websites designed to trick email header. Our classification method is based on the recipients into divulging financial data such as credit card information provided in the email header (rather than the numbers, account usernames, passwords and social security content of the email). We believe the phisher cannot modify numbers. By hijacking brand names of banks, e-retailers and the complete header, though he can forge certain fields. We credit card companies, phishers often convince the recipients based our classification on three kinds of analyses on the to respond. Legislation can not help since a majority number header: DNS-based header analysis, Social Network analysis of phishers do not belong to the United States. In this paper we and Wantedness analysis. In the DNS-based header analysis, present a new method for recognizing phishing attacks so that we classified the corpus into 8 buckets and used social the consumers can be vigilant and not fall prey to these network analysis to further reduce the false positives. We counterfeit websites. Based on the relation between credibility introduced a concept of wantedness and credibility, and and phishing frequency, we classify the phishers into i) derived equations to calculate the wantedness values of the Prospective Phishers ii) Suspects iii) Recent Phishers iv) Serial email senders.
    [Show full text]
  • Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods*
    Int. J. Communications, Network and System Sciences, 2013, 6, 88-99 http://dx.doi.org/10.4236/ijcns.2013.62011 Published Online February 2013 (http://www.scirp.org/journal/ijcns) Efficient Spam Filtering System Based on Smart * Cooperative Subjective and Objective Methods Samir A. Elsagheer Mohamed1,2 1College of Computer, Qassim University, Qassim, KSA 2Electrical Engineering Department, Faculty of Engineering, Aswan University, Aswan, Egypt Email: [email protected], [email protected] Received September 17, 2012; revised January 16, 2013; accepted January 25, 2013 ABSTRACT Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time con- suming and resource demanding. They are inaccurate and require continuous update to cope with newly invented spammer’s tricks. On the other side, the existing subjective proposals have some drawbacks like the attacks from mali- cious users that make them unreliable and the privacy. In this paper, we propose an efficient spam filtering system that is based on a smart cooperative subjective technique for content filtering in addition to the fastest and the most reliable non-content-based objective methods. The system combines several applications. The first is a web-based system that we have developed based on the proposed technique. A server application having extra features suitable for the enter- prises and closed work groups is a second part of the system. Another part is a set of standard web services that allow any existing email server or email client to interact with the system.
    [Show full text]
  • Presentations Made by Senders
    SES ���� ��� � �� � � � � � � � ������������� DomainKeys ��������� SPF ��������������������� ���������� ����������������� ������������������������������������������������ Contents Introduction 3 Deployment: For Email Receivers 6 Audience 3 Two Sides of the Coin 6 How to Read this White Paper 3 Recording Trusted Senders Who Passed Authentication 6 A Vision for Spam-Free Email 4 Whitelisting Incoming Forwarders 6 The Problem of Abuse 4 What To Do About Forgeries 6 The Underlying Concept 4 Deployment: For ISPs and Enterprises 7 Drivers; or, Who’s Buying It 4 Complementary considerations for ISPs 7 Vision Walkthrough 5 Deployment: For MTA vendors 8 About Sender Authentication 8 Which specification? 8 An Example 8 Conformance testing 8 History 8 Perform SRS and prepend headers when forwarding 8 How IP-based Authentication Works 9 Add ESMTP support for Submitter 8 The SPF record 9 Record authentication and policy results in the headers 8 How SPF Classic Works 9 Join the developers mailing list 8 How Sender ID works 9 Deployment: For MUA vendors 9 How Cryptographic Techniques Work 0 Displaying Authentication-Results 9 Using Multiple Approaches Automatic switching to port 587 9 Reputation Systems Deployment: For ESPs 20 Deployment: For Email Senders 2 Don’t look like a phisher! 20 First, prepare. 2 Delegation 20 Audit Your Outbound Mailstreams 2 Publish Appropriately 20 Construct the record 2 Deployment: For Spammers 2 Think briefly about PRA and Mail-From contexts. 3 Two Types of Spammers 2 Test the record, part 3 Publish SPF and sign with DomainKeys. 2 Put the record in DNS 3 Stop forging random domains. 2 Test the record, part 2 4 Buy your own domains. 2 Keep Track of Violations 4 Reuse an expired domain.
    [Show full text]
  • ITU Botnet Mitigation Toolkit Background Information
    ITU Botnet Mitigation Toolkit Background Information ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector January 2008 Acknowledgements Botnets (also called zombie armies or drone armies) are networks of compromised computers infected with viruses or malware to turn them into “zombies” or “robots” – computers that can be controlled without the owners’ knowledge. Criminals can use the collective computing power and connected bandwidth of these externally-controlled networks for malicious purposes and criminal activities, including, inter alia, generation of spam e-mails, launching of Distributed Denial of Service (DDoS) attacks, alteration or destruction of data, and identity theft. The threat from botnets is growing fast. The latest (2007) generation of botnets such as the Storm Worm uses particularly aggressive techniques such as fast-flux networks and striking back with DDoS attacks against security vendors trying to mitigate them. An underground economy has now sprung up around botnets, yielding significant revenues for authors of computer viruses, botnet controllers and criminals who commission this illegal activity by renting botnets. In response to this growing threat, ITU is developing a Botnet Mitigation Toolkit to assist in mitigating the problem of botnets. This document provides background information on the toolkit. The toolkit, developed by Mr. Suresh Ramasubramanian, draws on existing resources, identifies relevant local and international stakeholders, and
    [Show full text]
  • Combatting Spam Using Mimedefang, Spamassassin and Perl
    Combating Spam Using SpamAssassin, MIMEDefang and Perl Copyright 2003 David F. Skoll Roaring Penguin Software Inc. (Booth #23) Administrivia Please turn off or silence cell phones, pagers, Blackberry devices, etc... After the tutorial, please be sure to fill out an evaluation form and return it to the USENIX folks. 2 Overview After this tutorial, you will: Understand how central mail filtering works. Know how to use MIMEDefang to filter mail. Be able to integrate SpamAssassin into your mail filter. Know how to implement mail filtering policies with MIMEDefang and Perl. Know how to fight common spammer tactics. 3 Outline Introduction to Mail Filtering Sendmail's Milter API MIMEDefang Introduction, Architecture Writing MIMEDefang Filters SpamAssassin Integration Advanced Filter Writing Fighting Common Spammer Tactics Advanced Topics Policy Suggestions 4 Assumptions I assume that you: Are familiar with Sendmail configuration. You don't need to be a sendmail.cf guru, but should know the basics. Are familiar with Perl. Again, you don't need to be able to write an AI program in a Perl one- liner, but should be able to read simple Perl scripts. Are running the latest version of Sendmail 8.12 on a modern UNIX or UNIX-like system. 5 Why Filter Mail? The old reason: to stop viruses. The new reason: to stop spam and inappropriate content. Blocking viruses is easy. Block .exe and similar files, and test against signature databases. Blocking spam is hard, but becoming increasingly important. Organizations can even face lawsuits over inappropriate content. 6 Mail filtering is required for many reasons. In addition to the reasons given on the slide, you might need to filter outgoing mail as well to prevent virus propagation, dissemination of sensitive information, etc.
    [Show full text]
  • M AAWG: Hosting Past, Present & Future
    3 M AAWG: Hosting Past, Present & Future Justin Lane - BlueHost and M3AAWG Hosting Co-Chair Jesse Sowell, PhD and M3AAWG Advisor 5 May 2016 LACNIC 25, La Habana, Cuba www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group Hosting: Not a Big Issue, Right? For many years the Community looked at Hosting Companies like this picture. We where a small area that did not look to be that important. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group A Brief History of Hosting Hosting Companies in the beginning where a small part of the overall environment. Most of the Hosting Companies at the time offered plans that gave their clients 20-50MB of space to use for their websites. ESP’s and ISP’s where much bigger players. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group What Hosting Offers Hosting Companies were able to offer all the services needed to get a company online and ready to service their customers. • Email Services • CMS, and Webdesign • Hardware from Dedicated Servers or Colocation Servers to Shared or Virtual Server Space • Bandwidth for your Business, Dedicated Ips and SSL Services • Access to Hardware that most smaller businesses were not able to afford on their own. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group What is Happening Today? As the community got better at policing ISP’s, ESP’s and other problem areas, the criminal elements began to migrate to the Hosting Platforms. With Hosting Companies these criminal elements were even better positioned to carry out their plans.
    [Show full text]
  • Set up Mail Server Documentation 1.0
    Set Up Mail Server Documentation 1.0 Nosy 2014 01 23 Contents 1 1 1.1......................................................1 1.2......................................................2 2 11 3 13 3.1...................................................... 13 3.2...................................................... 13 3.3...................................................... 13 4 15 5 17 5.1...................................................... 17 5.2...................................................... 17 5.3...................................................... 17 5.4...................................................... 18 6 19 6.1...................................................... 19 6.2...................................................... 28 6.3...................................................... 32 6.4 Webmail................................................. 36 6.5...................................................... 37 6.6...................................................... 38 7 39 7.1...................................................... 39 7.2 SQL.................................................... 41 8 43 8.1...................................................... 43 8.2 strategy.................................................. 43 8.3...................................................... 44 8.4...................................................... 45 8.5...................................................... 45 8.6 Telnet................................................... 46 8.7 Can postfix receive?..........................................
    [Show full text]