Administrator's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Administrator's Guide Kerio Connect Administrator’s Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Connect, version 7.2. All additional modifications and updates reserved. For current versions of the product and related manuals, check http://www.kerio.com/connect/download/. Information regarding registered trademarks and trademarks are provided in appendix A. Contents 1 Introduction .................................................................. 10 1.1 Additional documentation ............................................... 10 1.2 Quick Checklist .......................................................... 10 2 Installation .................................................................... 13 2.1 System requirements .................................................... 13 2.2 Conflicting software ..................................................... 14 2.3 Firewall configuration .................................................... 14 2.4 Installation .............................................................. 15 2.5 Configuration Wizard .................................................... 23 2.6 Upgrade and Uninstallation .............................................. 25 3 Kerio Connect components .................................................... 28 3.1 Kerio Connect Monitor ................................................... 28 3.2 Standalone processes of the server ....................................... 31 4 Kerio Connect administration ................................................. 32 4.1 Kerio Connect Administration ............................................ 32 5 Product Registration and Licensing ............................................ 36 5.1 Product registration at the website ....................................... 36 5.2 Registration with the administration interface ............................ 36 5.3 License information and import of the license key ........................ 40 5.4 Licensing policy ......................................................... 42 6 Services ....................................................................... 43 6.1 Service Parameter Settings ............................................... 45 6.2 Troubleshooting ......................................................... 48 7 Domain and its settings ....................................................... 50 7.1 Initial settings ........................................................... 51 7.2 Definition of Domains ................................................... 52 7.2.1 Primary Domain .................................................. 52 7.3 Footer settings .......................................................... 53 7.4 Restoring deleted items .................................................. 54 7.5 Automated items clean-out ............................................... 55 7.6 Domain alias ............................................................ 58 7.7 Authentication of domain users .......................................... 59 7.8 Rename Domain ......................................................... 62 7.9 Deleting of domains ..................................................... 63 3 7.10 A company with multiple sites ........................................... 64 7.11 Setting up the backup mail server ........................................ 67 8 Users ......................................................................... 70 8.1 Administrator account ................................................... 70 8.2 Creating a user account .................................................. 71 8.3 Editing User Account .................................................... 80 8.4 Editing multiple users ................................................... 81 8.5 Removing user accounts ................................................. 82 8.6 Search ................................................................... 83 8.7 Statistics ................................................................ 83 8.8 Administration of mobile devices ......................................... 84 8.9 Import Users ............................................................ 86 8.10 Exporting domain users to CSV files ...................................... 93 8.11 User Account Templates ................................................. 94 9 User groups ................................................................... 97 9.1 Creating a User Group ................................................... 97 9.2 Exporting group members ............................................. 101 10 Mapping users from directory services ....................................... 103 10.1 Active Directory ....................................................... 103 10.1.1 Setting mapping in the administration interface . 104 10.1.2 Kerio Active Directory Extension ................................. 106 10.2 Apple Open Directory .................................................. 110 10.2.1 Setting mapping in the administration interface . 111 10.2.2 Kerio Open Directory Extension .................................. 114 11 Distributed domain .......................................................... 116 11.1 Recommendations ..................................................... 116 11.2 Distributed domain setting ............................................. 117 11.3 Disconnecting server from distributed domain . 118 11.4 User accounts in distributed domains .................................. 119 11.5 Migration of user mailboxes in distributed domains . 119 12 Sending and Receiving Mail .................................................. 122 12.1 Mail Delivery over the Internet ......................................... 122 12.2 SMTP server ........................................................... 127 12.3 Aliases ................................................................ 133 12.4 remote POP3 mailboxes ................................................ 136 12.5 Receiving Email Using ETRN Command ................................. 141 12.6 Internet Connection ................................................... 143 12.7 Scheduling ............................................................ 144 12.8 Advanced Options ..................................................... 147 4 13 Antispam control of the SMTP server ......................................... 158 13.1 Spam Rating tab ....................................................... 159 13.2 Blacklists tab .......................................................... 161 13.3 Custom Rules ......................................................... 165 13.4 SpamAssassin ......................................................... 171 13.5 Email policy records check ............................................. 173 13.6 Spam repellent ........................................................ 176 13.7 Recommended configuration of antispam tests . 177 13.8 Monitoring of spam filter’s functionality and efficiency . 181 14 Antivirus Control of Email And Attachment Filtering . 184 14.1 Integrated Sophos Anti-Virus ........................................... 185 14.2 Choosing an external module for an antivirus program . 185 14.3 Configuration of external antivirus modules ............................ 186 14.4 Server responses to detection of a virus or a damaged/encrypted attachment ............................................................ 186 14.5 Filtering Email Attachments ............................................ 188 14.6 Antivirus control statistics ............................................. 189 15 Email archiving and backup .................................................. 190 15.1 Archiving .............................................................. 190 15.2 Back-up of user mailboxes and basic server configuration . 193 15.3 Data recovery from back-up ............................................ 198 16 Server’s Certificates .......................................................... 206 16.1 Kerio Connect certificate ............................................... 206 16.2 Install certificates on client stations .................................... 209 17 Kerio WebMail customization ................................................ 214 17.1 Skins .................................................................. 214 17.2 Logo .................................................................. 214 17.2.1 Setting the global logo ........................................... 214 17.2.2 Domain logo customization ...................................... 216 17.3 Language .............................................................. 217 17.4 Keeping sessions between Kerio Connect and Kerio WebMail secure . 219 17.4.1 Setting session protection ........................................ 219 18 Limits and quotas ............................................................ 221 18.1 Message size limits .................................................... 221 18.1.1 Setting limit for messages delivered via SMTP . 221 18.1.2 Setting limit for messages sent by a particular user . 221 18.1.3 Setting limit for messages sent from a domain . 222 18.1.4 Size limit for Kerio WebMail ...................................... 222 5 19 Tools ........................................................................ 224 19.1 IP Address Groups ..................................................... 224 19.2 Time Ranges .......................................................... 225 19.3 Administration Settings ................................................ 228 19.3.1 Administration Account ........................................
Recommended publications
  • DMARC — Defeating E-Mail Abuse
    CERT-EU Security Whitepaper 17-001 DMARC — Defeating E-Mail Abuse Christos Koutroumpas ver. 1.3 February 9, 2017 TLP: WHITE 1 Preface E-mail is one of the most valuable and broadly used means of communication and most orga- nizations strongly depend on it. The Simple Mail Transport Protocol (SMTP) – the Internet’s underlying email protocol – was adopted in the eighties and is still in use after 35 years. When it was designed, the need for security was not so obvious, and therefore security was not incor- porated in the design of this protocol. As a result, the protocol is susceptible to a wide range of attacks. Spear-phishing campaigns in particular can be more successful by spoofing (altering) the originator e-mail address to imper- sonate a trusted or trustworthy organization or person. This can lead to luring the recipient into giving away credentials or infecting his/her computer by executing malware delivered through the e-mail. While raising user awareness on how to avoid e-mail fraud is recommended, the Verizon Data Breach Investigations Report indicates that more needs to be done. The DBIR report reveals that 30% of all phishing e-mail messages were opened by the recipients and with 12% clicked on the content and executed malicious code. The median time for the first user of a phishing campaign to open the malicious email is 1 minute, 40 seconds. The median time to the first click on the attachment was 3 minutes, 45 seconds. These statistics highlight the risk for an organization on the receiving end of spear-phishing e-mails.
    [Show full text]
  • What Is SPF? Introduction
    Valimail White Paper February 2018 What is SPF? Introduction Sender Policy Framework (SPF) is a Work on SPF started in 2003, and domains cornerstone of email authentication, and is the have been deploying it increasingly widely first of several standards established for that since then. SPF was published as RFC 4408 purpose. in 2006, and became an officially proposed Internet standard via RFC 7208 in 2014. In a simplistic sense, SPF lets you create a whitelist for IP addresses. If a mail server SPF is widely used by major and minor with an IP address that’s not on your list tries receivers of email (Google, Microsoft, Yahoo, to send email using your domain, it won’t etc.) as well as all Secure Email Gateways pass the SPF authentication test. (SEGs). How It Works The way SPF works is quite simple in principle: For instance, we examined the SPF records for all 62 sponsors of the 2017 1. Domain owners publish SPF records to RSA Conference. We found 58 who had the Domain Name System (DNS) that spell published SPF records, but 17 of those out the rule sets for their domains. An had records with errors in them. That’s SPF record is plain text, and it can be a nearly 30 percent failure rate — and as simple as a single line listing the IP that’s among security companies. addresses that are allowed to send email on the domain’s behalf. Companies that don’t have a lot of expertise in cybersecurity in general (and email 2. When an email server receives an incoming security in particular) often find SPF email, it examines the domain shown in even more tricky.
    [Show full text]
  • Electronic Mail
    CSECSE 265:265: SystemSystem andand NetworkNetwork AdministrationAdministration ● Electronic Mail – Mail systems – Addressing, mail headers – Client/server philosophy, mail homes – Aliases, mail routing, mailing list software – sendmail – Security – Performance Spring 2016 CSE 265: System and Network Administration ©2004-2016 Brian D. Davison MailMail systemssystems ● Four components – Mail user agent (MUA) to read and compose mail – Mail transport agent (MTA) route messages – Delivery agent that stores messages for later retrieval by users – Optional access agent to connect user agent to message store Spring 2016 CSE 265: System and Network Administration ©2004-2016 Brian D. Davison TheThe bigbig picturepicture Spring 2016 CSE 265: System and Network Administration ©2004-2016 Brian D. Davison UserUser agentsagents ● Provide means to read and compose email – Outlook, Thunderbird, Eudora, pine, elm, IMP, /bin/mail, emacs, web-based gmail, and more ● Often have system-wide and personal configuration files ● Multipurpose Internet Mail Extensions (MIME) encoding for different text formats and attachments Spring 2016 CSE 265: System and Network Administration ©2004-2016 Brian D. Davison TransportTransport agentsagents ● Transport agents accept mail from a user agent, and deliver mail to the correct hosts – PMDF, postfix, smail, Exim, sendmail ● Speak the Simple Mail Transport Protocol (SMTP) or Extended SMTP (ESMTP) ● Run on port 25 (unencrypted) Spring 2016 CSE 265: System and Network Administration ©2004-2016 Brian D. Davison DeliveryDelivery agentsagents – Accepts mail from a transport agent, and delivers to the local recipient – Delivery can be to ● a person's mailbox ● a mailing list ● a file ● a program – Agents include ● /bin/mail for local users ● /bin/sh for programs ● /usr/bin/procmail for user-configurable delivery Spring 2016 CSE 265: System and Network Administration ©2004-2016 Brian D.
    [Show full text]
  • Delivering Results to the Inbox Sailthru’S 2020 Playbook on Deliverability, Why It’S Imperative and How It Drives Business Results Introduction to Deliverability
    Delivering Results to the Inbox Sailthru’s 2020 Playbook on Deliverability, Why It’s Imperative and How It Drives Business Results Introduction to Deliverability Every day, people receive more than 293 billion Deliverability is the unsung hero of email marketing, emails, a staggering number that only represents ultimately ensuring a company’s emails reach their the tip of the iceberg. Why? The actual number intended recipients. It’s determined by a host of of emails sent is closer to 5.9 quadrillion, with the factors, including the engagement of your subscribers overwhelming majority blocked outright or delivered and the quality of your lists. All together, these factors to the spam folder. result in your sender reputation score, which is used to determine how the ISPs treat your email stream. Something many people don’t realize is that to the Deliverability is also a background player, so far in the major Internet Service Providers (ISPs) — Gmail, shadows that many people don’t think about it, until Yahoo!, Hotmail, Comcast and AOL — “spam” there’s a major issue. doesn’t refer to marketing messages people may find annoying, but rather malicious email filled with That’s why Sailthru’s deliverability team created this scams and viruses. In order to protect their networks guide. Read on to learn more about how deliverability and their customers, the ISPs cast a wide net. If a works on the back-end and how it impacts revenue, message is deemed to be spam by the ISP’s filters, it’s your sender reputation and how to maintain a good dead on arrival, never to see the light of the inbox, as one, and best practices for list management, email protecting users’ inboxes is the top priority of any ISP.
    [Show full text]
  • Presentations Made by Senders
    SES ���� ��� � �� � � � � � � � ������������� DomainKeys ��������� SPF ��������������������� ���������� ����������������� ������������������������������������������������ Contents Introduction 3 Deployment: For Email Receivers 6 Audience 3 Two Sides of the Coin 6 How to Read this White Paper 3 Recording Trusted Senders Who Passed Authentication 6 A Vision for Spam-Free Email 4 Whitelisting Incoming Forwarders 6 The Problem of Abuse 4 What To Do About Forgeries 6 The Underlying Concept 4 Deployment: For ISPs and Enterprises 7 Drivers; or, Who’s Buying It 4 Complementary considerations for ISPs 7 Vision Walkthrough 5 Deployment: For MTA vendors 8 About Sender Authentication 8 Which specification? 8 An Example 8 Conformance testing 8 History 8 Perform SRS and prepend headers when forwarding 8 How IP-based Authentication Works 9 Add ESMTP support for Submitter 8 The SPF record 9 Record authentication and policy results in the headers 8 How SPF Classic Works 9 Join the developers mailing list 8 How Sender ID works 9 Deployment: For MUA vendors 9 How Cryptographic Techniques Work 0 Displaying Authentication-Results 9 Using Multiple Approaches Automatic switching to port 587 9 Reputation Systems Deployment: For ESPs 20 Deployment: For Email Senders 2 Don’t look like a phisher! 20 First, prepare. 2 Delegation 20 Audit Your Outbound Mailstreams 2 Publish Appropriately 20 Construct the record 2 Deployment: For Spammers 2 Think briefly about PRA and Mail-From contexts. 3 Two Types of Spammers 2 Test the record, part 3 Publish SPF and sign with DomainKeys. 2 Put the record in DNS 3 Stop forging random domains. 2 Test the record, part 2 4 Buy your own domains. 2 Keep Track of Violations 4 Reuse an expired domain.
    [Show full text]
  • Combatting Spam Using Mimedefang, Spamassassin and Perl
    Combating Spam Using SpamAssassin, MIMEDefang and Perl Copyright 2003 David F. Skoll Roaring Penguin Software Inc. (Booth #23) Administrivia Please turn off or silence cell phones, pagers, Blackberry devices, etc... After the tutorial, please be sure to fill out an evaluation form and return it to the USENIX folks. 2 Overview After this tutorial, you will: Understand how central mail filtering works. Know how to use MIMEDefang to filter mail. Be able to integrate SpamAssassin into your mail filter. Know how to implement mail filtering policies with MIMEDefang and Perl. Know how to fight common spammer tactics. 3 Outline Introduction to Mail Filtering Sendmail's Milter API MIMEDefang Introduction, Architecture Writing MIMEDefang Filters SpamAssassin Integration Advanced Filter Writing Fighting Common Spammer Tactics Advanced Topics Policy Suggestions 4 Assumptions I assume that you: Are familiar with Sendmail configuration. You don't need to be a sendmail.cf guru, but should know the basics. Are familiar with Perl. Again, you don't need to be able to write an AI program in a Perl one- liner, but should be able to read simple Perl scripts. Are running the latest version of Sendmail 8.12 on a modern UNIX or UNIX-like system. 5 Why Filter Mail? The old reason: to stop viruses. The new reason: to stop spam and inappropriate content. Blocking viruses is easy. Block .exe and similar files, and test against signature databases. Blocking spam is hard, but becoming increasingly important. Organizations can even face lawsuits over inappropriate content. 6 Mail filtering is required for many reasons. In addition to the reasons given on the slide, you might need to filter outgoing mail as well to prevent virus propagation, dissemination of sensitive information, etc.
    [Show full text]
  • Account Administrator's Guide
    ePrism Email Security Account Administrator’s Guide - V10.4 4225 Executive Sq, Ste 1600 Give us a call: Send us an email: For more info, visit us at: La Jolla, CA 92037-1487 1-800-782-3762 [email protected] www.edgewave.com © 2001—2016 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The Email Security software and its documentation are copyrighted materials. Law prohibits making unauthorized copies. No part of this software or documentation may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into another language without prior permission of EdgeWave. 10.4 Contents Chapter 1 Overview 1 Overview of Services 1 Email Filtering (EMF) 2 Archive 3 Continuity 3 Encryption 4 Data Loss Protection (DLP) 4 Personal Health Information 4 Personal Financial Information 5 Document Conventions 6 Other Conventions 6 Supported Browsers 7 Reporting Spam to EdgeWave 7 Contacting Us 7 Additional Resources 7 Chapter 2 Portal Overview 8 Navigation Tree 9 Work Area 10 Navigation Icons 10 Getting Started 11 Logging into the portal for the first time 11 Logging into the portal after registration 12 Changing Your Personal Information 12 Configuring Accounts 12 Chapter 3 EdgeWave Administrator
    [Show full text]
  • DMARC: Monitor & Secure Your Email Delivery
    Guide DMARC: Monitor & secure your email delivery Chris Nagele Founder of Wildbit postmarkapp.com Read the web version. Do you know every source of email for your domain? Are spammers trying to spoof your email domain for hacking or fraud opportunities? Are you complying with the best email practices to ensure inbox delivery? These are the questions that DMARC answers, giving you full control of email delivery for your company’s domain. At Postmark, email authentication has been extremely important to us from day one. We believe that anyone should be able to easily send emails with proper infrastructure, tools, and email standards without having to pay enterprise prices. DMARC, and our support of it, is a big part of this mission. 2 What is DMARC? DMARC (Domain-based Message Authentication, Reporting & Conformance) is a standard that prevents spammers from using your domain to send email without your permission — also known as spoofing. Spammers can forge the “From” address on messages so the spam appears to come from a user in your domain. A good example of this is PayPal spoofing, where a spammer sends an email to you pretending to be PayPal in an effort to obtain your account information. DMARC ensures these emails get blocked before you even see them in your inbox. In addition, DMARC gives you great visibility and reports into who is sending email on behalf of your domain, ensuring only legitimate email is received. The good news is that DMARC is open and free for anyone to use, allowing you to secure your domain’s emails and gain control of your email delivery.
    [Show full text]
  • Set up Mail Server Documentation 1.0
    Set Up Mail Server Documentation 1.0 Nosy 2014 01 23 Contents 1 1 1.1......................................................1 1.2......................................................2 2 11 3 13 3.1...................................................... 13 3.2...................................................... 13 3.3...................................................... 13 4 15 5 17 5.1...................................................... 17 5.2...................................................... 17 5.3...................................................... 17 5.4...................................................... 18 6 19 6.1...................................................... 19 6.2...................................................... 28 6.3...................................................... 32 6.4 Webmail................................................. 36 6.5...................................................... 37 6.6...................................................... 38 7 39 7.1...................................................... 39 7.2 SQL.................................................... 41 8 43 8.1...................................................... 43 8.2 strategy.................................................. 43 8.3...................................................... 44 8.4...................................................... 45 8.5...................................................... 45 8.6 Telnet................................................... 46 8.7 Can postfix receive?..........................................
    [Show full text]
  • Messagelabs Email Security Services Administrator Guide
    Email Security Services Administrator Guide For Microsoft Exchange® Environments Licensed Customer Confidential Licensed Customer Confidential Legal Notices Copyright© 1998-2009 Dell MessageOne, Inc. All Rights Reserved. Information in this document is subject to change without notice. All names of companies, organizations, persons, or other entities, and all sample data used in content and examples is fictitious and not meant to represent any real company, organization, person, or actual data. No part of this publication may be reproduced, modified, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written permission of Dell MessageOne, Inc. Reproduction prohibitions do not extend to distribution among the employees of licensed customers or for use in activities conducted by Dell MessageOne partners in the course of sales, marketing, training, or support. MessageOne is a registered trademark and “Business Continuity that makes Business Sense,” EMS, SyncManager, RedirectorSink, RedirectorController, RecoveryManager, and OneSwitch are trademarks of Dell MessageOne, Inc. MessageLabs® and the MessageLabs logo are trademarks of MessageLabs Ltd. Research in Motion, RIM, and BlackBerry are trademarks/registered trademarks of Research in Motion Limited. All other trademarks are the property of their respective owners. This product uses certain third-party software. Relevant licensing information is provided in the MESSAGEONE LICENSE file in the installation directory. Dell
    [Show full text]
  • Using Dmarc to Improve Your Email Reputation Zink
    USING DMARC TO IMPROVE YOUR EMAIL REPUTATION ZINK USING DMARC TO IMPROVE up with ways to mitigate this problem using two primary technologies. YOUR EMAIL REPUTATION Terry Zink 1.1 Terminology Microsoft, USA In email, people naturally thing that the sender of the message is the one in the From: fi eld – the one that they see in their email Email [email protected] client. For example, suppose that you are a travel enthusiast and you receive the email shown in Figure 3. You received the message ‘from’ [email protected], right? Wrong. ABSTRACT In email, there are two ‘From’ addresses: In 2012, the world of email fi ltering created a new tool to combat 1. The SMTP MAIL FROM, otherwise known as the RFC spam and phishing: DMARC [1, 2]. DMARC, or Domain-based 5321.MailFrom [3]. This is the email address to which the Message Authentication, Reporting & Conformance, is a technology that is designed to prevent spammers from From [email protected] <[email protected]> forging the sender, thus making brands more resistant to Subject Receipt for your Payment to Penguin Magic abuse. However, its most powerful feature is the built-in To Me reporting mechanism that lets brand owners know they are being spoofed. June 10, 2014 08:42:54 PDT DMARC has its upsides, and it is very useful for Transaction ID: 8KAHSL918102341 preventing spoofi ng, but it also has some drawbacks – it will fl ag some legitimate email as spam, and it will Hello Terry Zink, cause some short-term pain. You sent a payment of $427.25 USD to Penguin Magic.
    [Show full text]
  • Permanent Email • Spam and Spoofing
    CU eComm Program Permanent Email • Spam and Spoofing We get a lot of inquiries regarding SPAM. As a result, we have compiled a list of the most frequently asked questions with explanations for each. See below. I hope you find this information helpful. SPAM FAQ Is the alumni association sending me spam? No. Neither the alumni association nor Harris Internet Services, who host the Alumni Connections servers that maintain the email forwarding service, are the source of the spam. We respect your privacy and do not sell, or otherwise distribute, alumni email addresses; nor have they been stolen. How did the spammers get my address? Unfortunately, there are many ways that spammers obtain email addresses: addresses compiled by commercial entities from web commerce; web crawlers searching for specific domain names (such as @alumni.anyschool.edu) on any web site where contact information might be listed; and a practice sometimes called "blind spamming" or "dictionary spamming" in which spammers simply guess at the username before the @ sign and send literally thousands of messages. This is why you may see a message addressed to "albert@, allen@, andrew@ ...," etc. The spammers run what is basically a dictionary of usernames against a domain • those that don't immediately bounce are kept and reused. This can give the false impression that the spammer has access to the list of user accounts. Viruses can also generate unwanted email and harvest addresses for spammers. Even if your computer is not infected, if someone else has your address in their address book and their computer becomes infected, viruses will often send multiple messages to everyone in the address book.
    [Show full text]