Setting up Imail Server As a Backup Mail Spooler

Total Page:16

File Type:pdf, Size:1020Kb

Setting up Imail Server As a Backup Mail Spooler • ------=---~ IPS WIT CH II L..--..../ J------I IMai I Server Contents CHAPTER 1 Introduction to IMail Administrator About Help .......................................................................................................................... 1 Web Administrator and Client ............................................................................................. 3 IMail Administrator Requirements ....................................................................................... 5 System Requirements ......................................................................................................... 6 New for Version 11.01 ....................................................................................................... 11 Accessing the IMail Web Administration ........................................................................... 19 Using Internet Information Services (IIS) Virtual Directories ............................................. 20 Additional Resources ........................................................................................................ 20 IMail Getting Started Guide Links ..................................................................................... 22 Installing Patches and Upgrades ...................................................................................... 23 Table of Features .............................................................................................................. 23 Helpful Definitions ............................................................................................................. 26 File Attachment Settings ................................................................................................... 26 IMail Processing Order ...................................................................................................... 27 CHAPTER 2 Installing Installing IMail Server Administrator .................................................................................. 29 Setting the E-Mail Domain Name (Official Host Name) ..................................................... 30 Setting Up an Alias for a Host ........................................................................................... 30 Setting Database Options ................................................................................................. 31 Installing SSL Keys ........................................................................................................... 32 Folder Permissions and IIS Configuration ......................................................................... 32 IIS Settings ........................................................................................................................ 35 Using IIS Virtual Directories .............................................................................................. 37 Changing IIS Virtual Directory names .................................................................... 37 Installing Patches and Upgrades ...................................................................................... 37 Using the IMail Installation Log File .................................................................................. 38 CHAPTER 3 Mail Domain (Host) Configuration Domain Properties ............................................................................................................ 41 Adding a New IMail Domain .............................................................................................. 47 Configuring an NT/AD database ....................................................................................... 52 Example of Active Directory "built-in" ....................................................................... 52 About Virtual Mail Domains (Hosts) .................................................................................. 53 LDAP Settings ................................................................................................................... 54 Bouncing Spam Messages using Rules ............................................................................ 55 i Setting up a Dial-up Internet Connection .......................................................................... 57 Method 2 Example ................................................................................................... 59 Using ETRN to Retrieve Mail on a Dial-up Connection. .......................................... 59 Method 3 Example ................................................................................................... 60 Changing the IP Address of a Host ................................................................................... 60 Setting Up a Mail Gateway ................................................................................................ 61 Setting up IMail Server as a Backup Mail Spooler ............................................................ 62 CHAPTER 4 User Mail Accounts Creating User Database .................................................................................................... 65 Using the Windows NT/Active Directory Database .................................................. 65 Importing Windows NT Users .................................................................................. 66 Using the IMail Database ......................................................................................... 68 Creating External User Database for a Mail Domain ............................................... 68 Working with Individual User Accounts ............................................................................. 70 Vacation Message ................................................................................................... 70 Customizing the Full Mailbox Notification Message ................................................. 71 Full Mailbox Notify Example ..................................................................................... 71 CHAPTER 5 System Administration System Settings ................................................................................................................ 73 Archiving (If Installed) .............................................................................................. 75 System Trailer ................................................................................................................... 76 HTML Online Editor ................................................................................................. 76 System WebMail Message ................................................................................................ 78 Microsoft Exchange ActiveSync ........................................................................................ 78 Synchronizing With Microsoft Exchange ActiveSync ............................................... 80 DomainKeys / DKIM .......................................................................................................... 82 System Selector List (Signatures) ............................................................................ 83 DNS Black Lists (Server Level) ......................................................................................... 89 Understanding DNS Black Lists ............................................................................... 90 How Black Lists Work .............................................................................................. 91 Add/Edit DNS Black List .......................................................................................... 92 Spool Manager .................................................................................................................. 94 Managing Spool Manager ........................................................................................ 95 Cleaning the Spool Directory (Isplcln.exe) ............................................................... 96 File Extensions of Files in the Spool ........................................................................ 96 Beginning Character of Files in the Spool ................................................................ 97 ii System Default User Settings ........................................................................................... 98 System Default Web Mail Preferences ............................................................................ 101 Registry Backup .............................................................................................................. 105 Back Up IMail Registry ........................................................................................... 105 Restoring IMail Registry ......................................................................................... 106 Backing Up IMail Server System Files ................................................................... 107 Backing Up User Mail ............................................................................................ 107 CHAPTER 6 Domain Administration System Administrator ...................................................................................................... 109 Domain (Host) Administrator ........................................................................................... 110 Domains .......................................................................................................................... 110 Domain Properties ................................................................................................. 111 User Administration
Recommended publications
  • VI. Lotus Domino
    Le groupware - 1 / 60 - Sommaire I. Introduction ................................................................................................ 2 A. Histoire (Source : Michel Alberganti) ................................................................................ 2 B. Définition................................................................................................................... 2 C. L'offre....................................................................................................................... 2 1. Intranet / Internet................................................................................................. 2 2. Messagerie........................................................................................................... 3 II. Les clients de messagerie ............................................................................... 3 A. Windows Messaging : Msmail........................................................................................... 4 1. Installer et administrer un bureau de poste .................................................................. 4 2. Propriétés du client MAPI......................................................................................... 7 B. Utiliser Outlook ......................................................................................................... 15 1. Les options .........................................................................................................15 2. Envoi de messages ................................................................................................20
    [Show full text]
  • GO!Notifysync Pre-Purchase Checklist
    GO!NotifySync Pre-Purchase Checklist Prior to purchasing GO!NotifySync you will need to identify the following configuration information. Consult your Mail Server Administrator, if necessary, to obtain this information. Mail Server Administrators can also reference, Guidelines for Administrators. My Mail Server Type is GO!NotifySync supports ActiveSync protocol versions 2.5, 12.0, or 12.1. GO!NotifySync is certified against the following versions of ActiveSync servers: GroupWise 8.0.2 HP2, 8.0.2 HP3, 2012, or 2014 with Novell Data Synchronizer or Novell Mobility Services 2.0 Microsoft Exchange 2010 Microsoft Exchange 2007 Microsoft Exchange 2003 Below is a list of additional ActiveSync servers. If these systems adhere to the supported ActiveSync protocol versions (2.5, 12.0, or 12.1), GO!NotifySync has a high probability of working as designed: AXIGEN Messaging CommuniGate Pro Google Hotmail IBM Lotus Notes Traveler v8.5.2.1 IceWarp Server Ipswitch IMail Server Kerio MailServer Office 365 Open-Xchange Scalix Zarafa Zimbra Collaboration Suite My Email Domain is The text after the @ sign in your Email address is your Email Domain. If your Email address is: [email protected], your Email Domain is: mycompany.com GO!NotifySync Pre-Purchase Checklist 1 My Mail/ActiveSync Server Address is This is the external address of your Mail/ActiveSync server. Information that may help you identify the ActiveSync Server Address: Your best source for this information is your Mail Server Administrator. What address is used to log into Web mail? That would be the ActiveSync Server address. Ask: What is the address I would use to connect to the ActiveSync Server? My Domain is Domain refers to a group of servers on a network that are administered as a unit.
    [Show full text]
  • Spam Filtering (Domain Level)
    • ------=---~ IPS WIT CH II L..--..../ J------I IMai I Server Contents CHAPTER 1 Introduction to IMail Administrator About Help ...........................................................................................................................1 Web Administrator and Client ..............................................................................................3 IMail Administrator Requirements........................................................................................5 New for Version 11...............................................................................................................6 Accessing the IMail Web Administration............................................................................12 Using Internet Information Services (IIS) Virtual Directories..............................................13 Additional Resources .........................................................................................................14 Installing Patches and Upgrades .......................................................................................15 Table of Features...............................................................................................................16 Helpful Definitions ..............................................................................................................17 File Attachment Settings ....................................................................................................18 IMail Processing Order.......................................................................................................18
    [Show full text]
  • Imail V12 Administrator Help
    Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©2011 Ipswitch, Inc. All rights reserved. IMail Server – Administration Help This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History December 2011 v12 April 2011 v11.5 October 2010 v11.03 May 2010 v11.02 Contents CHAPTER 1 Introduction to IMail Administrator About Help .....................................................................................................................................................................
    [Show full text]
  • Abstract GEGICK, MICHAEL CHARLES. Analyzing Security
    Abstract GEGICK, MICHAEL CHARLES. Analyzing Security Attacks to Generate Signatures from Vulnerable Architectural Patterns. (Under the direction of Dr. Laurie Williams.) Current techniques for software security vulnerability identification include the use of abstract, graph-based models to represent information about an attack. These models can be in the form of attack trees or attack nets and can be accompanied with a supporting text- based profile. Matching the abstract models to specific system architectures for effective vulnerability identification can be a challenging process. This thesis suggests that abstract regular expressions can be used to represent events of known attacks for the identification of security vulnerabilities in future applications. The process of matching the events in the regular expression to a sequence of components in a system design may facilitate the means of identifying vulnerabilities. Performing the approach in the design phase of a software process encourages security to be integrated early into a software application. Students in an undergraduate security course demonstrated a strong ability to accurately match regular expressions to a system design. The identification of vulnerabilities is limited to known attacks of other systems and does not offer descriptions of what new attacks are possible to a future application. Extending the approach to incorporate new attacks is an avenue of future work. Analyzing Security Attacks to Generate Signatures from Vulnerable Architectural Patterns by Michael Charles
    [Show full text]
  • Email Reputation Services Stops Email Threats Before the Gateway
    Securing Your Web World ANTI-SPAM ANTI-PHISHING Trend Micro™ Email Reputation Services Stops Email Threats Before the Gateway Email-based threats are rising dramatically. Spam, spyware, phishing, botnets, SERVICES zombies, targeted email attacks, and blended-threat attacks not only sap Protection Points employee productivity, they endanger company networks. At the same time, • Gateway administrative resources and budgets are overtaxed and existing security systems are stretched to the limit. Threat Protection • Spam Trend Micro Email Reputation Services stop up to 80 percent of spam and other email threats at • Phishing their source–before they can hit the gateway and flood messaging infrastructure. Email Reputation • Bots and botnets 1 Services has the highest catch rate for standalone email reputation services and is the only solution • Zombies to offer an administration console, which gives access to reports and provides the option to actively • Blended Threats manage spam and blended email threats. As a highly effective first layer of security with extensive MTA support, the services complement your current email security and greatly reduce spam’s impact on the gateway, allowing your messaging security to run at optimal efficiency. KEY ADVANTAGES • Stops spam at its source, catching up to 80 percent with almost zero false positives KEY FEATURES • Features simple set up, high scalablility, Complements your current messaging security and low maintenance costs • Offers a choice of deployment options to meet your needs • Provides easy
    [Show full text]
  • DISTRIBUTED SYSTEMS CONTENTS 1.0 Aim And
    UNIT – I LESSON 1: DISTRIBUTED SYSTEMS CONTENTS 1.0 Aim and Objectives 1.1. Introduction 1.2. Organization 1.3. Goals and Advantages 1.4. Disadvantages 1.5. Architecture 1.6. Concurrency 1.7. Languages 1.8. Let us Sum UP 1.9. Lesson-End Activities 1.10. Points for Discussion 1.11. References 1.0. AIM AND OBJECTIVES At the end of this Lesson you will be able to understand the concept of Distributed Computing, organization of Distributed Computing, advantages and limitations of Distributed Computing 1.1. INTRODUCTION Distributed computing is a method of computer processing in which different parts of a program are run simultaneously on two or more computers that are communicating with each other over a network. Distributed computing is a type of segmented or parallel computing, but the latter term is most commonly used to refer to processing in which different parts of a program run simultaneously on two or more processors that are part of the same computer. While both types of processing require that a program be segmented—divided into sections that can run simultaneously, distributed computing also requires that the division of the program take into account the different environments on which the different sections of the program will be running. For example, two computers are likely to have different file systems and different hardware components. An example of distributed computing is BOINC, a framework in which large problems can be divided into many small problems which are distributed to many computers. Later, the small results are reassembled into a larger solution.
    [Show full text]
  • PVS Plugin Family
    SecurityCenter 4 TENABLE NETWORK SECURITY INC., COPYRIGHT © 2012 TENABLE NETWORK SECURITY PVS Plugin Family March 13, 2012 at 3:04pm CDT Dave Breslin [dlbreslin] Confidential: The following report contains confidential information. Do not distribute, email, fax, or transfer via any electronic mechanism unless it has been approved by the recipient company's security policy. All copies and backups of this document should be saved on protected storage at all times. Do not share any of the information contained within this report with anyone unless they are authorized to view the information. Violating any of the previous instructions is grounds for termination. PVS Plugin Family SecurityCenter 4 TENABLE NETWORK SECURITY INC., COPYRIGHT © 2012 Table of Contents Plugin Family Summary ...............................................................................................................1 Backdoors .....................................................................................................................................................2 CGI .........................................................................................................................................................................3 Data Leakage ............................................................................................................................................ 5 Database .........................................................................................................................................................7 DNS
    [Show full text]
  • Nessus Plugin Family
    SecurityCenter 4 TENABLE NETWORK SECURITY INC., COPYRIGHT © 2012 ITS DEPT Nessus Plugin Family March 5, 2012 at 6:15pm CST [third] Confidential: The following report contains confidential information. Do not distribute, email, fax, or transfer via any electronic mechanism unless it has been approved by the recipient company's security policy. All copies and backups of this document should be saved on protected storage at all times. Do not share any of the information contained within this report with anyone unless they are authorized to view the information. Violating any of the previous instructions is grounds for termination. Nessus Plugin Family SecurityCenter 4 TENABLE NETWORK SECURITY INC., COPYRIGHT © 2012 Table of Contents Plugin Family Summary ...............................................................................................................1 AIX Local Security Checks .......................................................................................................3 Backdoors .....................................................................................................................................................4 CentOS Local Security Checks ...........................................................................................6 CGI abuses .................................................................................................................................................. 7 CGI abuses : XSS ...............................................................................................................................
    [Show full text]
  • O'reilly Network Security Assessment
    SECOND EDITION Network Security Assessment Chris McNab Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Network Security Assessment, Second Edition by Chris McNab Copyright © 2008 Chris McNab. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Tatiana Apandi Indexer: Lucie Haskins Production Editor: Sarah Schneider Cover Designer: Karen Montgomery Copyeditor: Amy Thomson Interior Designer: David Futato Proofreader: Sarah Schneider Illustrator: Robert Romano Printing History: March 2004: First Edition. October 2007: Second Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Network Security Assessment, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. This book uses RepKover™, a durable and flexible lay-flat binding. ISBN-10: 0-596-51030-6 ISBN-13: 978-0-596-51030-5 [M] Table of Contents Foreword .
    [Show full text]
  • TBS Internet API Reference Documentaiton
    API TBS XML-RPC The content of this manual is the property of TBS INTERNET, all rights reserved. All reproduction, copy or mirroring prohibited. V1.2.1 IPv4 Operations Base URL : https://apisandbox6.or2.clust2.tbs-internet.net (IPv6 Sandbox) Application : api-operations.php Methodes : Name: Purpose: achat order renouvellement renew refabrication reissue revocation revocation dcvEmailRenvoyer Email DCV Resending dcvCodeValidation Email DCV Code Validation Information Base URL : https://apisandbox6.or2.clust2.tbs-internet.net (IPv6 Sandbox) Application : api-infos.php Methodes : Name: Purpose: statut Status solde Balance enSommeil Asleep reference Reference dcvAdresses DCV Addresses IPv4 Operations Base URL : https://apisandbox4.or2.clust2.tbs-internet.net:1443 (Sandbox IPv4) Application : api-operations.php Methodes : Name: Purpose: achat order renouvellement renew refabrication reissue revocation revocation dcvEmailRenvoyer Email DCV Resending dcvCodeValidation Email DCV Code Validation Information Base URL : https://apisandbox4.or2.clust2.tbs-internet.net:1443 (Sandbox IPv4) Application : api-infos.php Methodes : Name: Purpose: statut Status solde Balance enSommeil Asleep reference Reference dcvAdresses DCV Addresses Page 1 API xml-rpc 3 methods : achat(order), renouvellement(renew), refabrication(reissue) Achat/Order Parameters Descriptions Mandatory Type Default identification user, Password Yes Struct demande For bulk purchases, one structure per request Yes Struct Renouvellement/Renew Parameters Descriptions Mandatory Type Default
    [Show full text]
  • Trend Micro Email Reputation Services
    Securing Your Web World ANTI-SPAM ANTI-PHISHING Trend Micro™ Email Reputation Services Stoppt E-Mail-Bedrohungen vor dem Gateway Über E-Mail verbreitete Bedrohungen nehmen dramatisch zu. Spam, Spyware, SERVICES Phishing, Bot-Netze, Zombies, gezielte E-Mail-Angriffe und kombinierte Angriffe Geschützte Punkte beeinträchtigen nicht nur die Produktivität der Mitarbeiter, sondern stellen auch • Gateway eine ernsthafte Gefahr für Unternehmensnetzwerke dar. Gleichzeitig werden verwaltungstechnische Ressourcen und Budgets über Gebühr beansprucht und Schutzumfang vorhandene Sicherheitssysteme stoßen an ihre Leistungsgrenzen. • Spam • Phishing Trend Micro Email Reputation Services stoppen bis zu 80 Prozent von Spam und anderen E-Mail- • Bots und Bot-Netze Bedrohungen an der Quelle – bevor sie den Gateway erreichen und die Messaging-Infrastruktur • Zombies überschwemmen. Email Reputation Services haben die höchste Auffangrate für Standalone E-Mail • Komplexe Bedrohungen Reputation Services1 und ist die einzige Lösung, die eine Verwaltungskonsole zum Abrufen von Berichten und zur aktiven Verwaltung von Spam- und kombinierten E-Mail-Bedrohungen bietet. Die Services stellen eine höchst wirksame erste Sicherheitsebene mit umfassender MTA-Unterstützung dar und ergänzen Ihre bestehenden E-Mail-Sicherheitsmechanismen, indem sie Spam bereits am ENTSCHEIDENDE VORTEILE Gateway abwehren – somit ist höchste Effizienz in punkto Messaging-Sicherheit gewährleistet. • Stoppt Spam an der Quelle und fängt bis zu 80 Prozent mit sehr hoher Trefferquote ab • Einfache
    [Show full text]