Imail V12 Administrator Help

Total Page:16

File Type:pdf, Size:1020Kb

Imail V12 Administrator Help Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©2011 Ipswitch, Inc. All rights reserved. IMail Server – Administration Help This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History December 2011 v12 April 2011 v11.5 October 2010 v11.03 May 2010 v11.02 Contents CHAPTER 1 Introduction to IMail Administrator About Help ...................................................................................................................................................................... 1 Web Administrator and Client ................................................................................................................................. 3 IMail Administrator Requirements ......................................................................................................................... 5 System Requirements ................................................................................................................................................. 6 New for Version 12 ..................................................................................................................................................... 12 Accessing the IMail Web Administration ........................................................................................................... 20 Using Internet Information Services (IIS) Virtual Directories ....................................................................... 21 Additional Resources ................................................................................................................................................. 21 IMail Getting Started Guide Links ......................................................................................................................... 23 Installing Patches and Upgrades ........................................................................................................................... 24 Table of Features ......................................................................................................................................................... 24 Helpful Definitions ..................................................................................................................................................... 27 File Attachment Settings.......................................................................................................................................... 28 IMail Processing Order .............................................................................................................................................. 28 CHAPTER 2 Installing Installing IMail Server Administrator ................................................................................................................... 31 Setting the E-Mail Domain Name (Official Host Name) ................................................................................ 35 Setting Up an Alias for a Host ................................................................................................................................. 35 Setting Database Options ........................................................................................................................................ 36 Installing SSL Keys ...................................................................................................................................................... 36 Folder Permissions and IIS Configuration .......................................................................................................... 37 IMail Folder Permissions and IIS Configuration ............................................................................................... 37 IIS Settings ..................................................................................................................................................................... 38 Using IIS Virtual Directories ..................................................................................................................................... 39 Changing IIS Virtual Directory names ................................................................................................. 39 Installing Patches and Upgrades ........................................................................................................................... 39 Using the IMail Installation Log File ..................................................................................................................... 40 CHAPTER 3 Mail Domain (Host) Configuration Domain Properties ..................................................................................................................................................... 42 Adding a New IMail Domain ................................................................................................................................... 48 Configuring an NT/AD database ........................................................................................................................... 55 Example of Active Directory "built-in" .................................................................................................... 55 About Virtual Mail Domains (Hosts) ..................................................................................................................... 56 LDAP Settings ............................................................................................................................................................... 57 i Bouncing Spam Messages using Rules ............................................................................................................... 58 Setting up a Dial-up Internet Connection ......................................................................................................... 59 Method 2 Example ......................................................................................................................................... 62 Using ETRN to Retrieve Mail on a Dial-up Connection. .................................................................... 62 Method 3 Example ......................................................................................................................................... 63 Changing the IP Address of a Host ....................................................................................................................... 63 Setting Up a Mail Gateway ...................................................................................................................................... 64 Setting up IMail Server as a Backup Mail Spooler ........................................................................................... 65 CHAPTER 4 User Mail Accounts Creating User Database ............................................................................................................................................ 67 Using the Windows NT/Active Directory Database ........................................................................... 67 Importing Windows NT Users .................................................................................................................... 68 Using the IMail Database ............................................................................................................................. 70 Creating External User Database for a Mail Domain ......................................................................... 70 Working with Individual User Accounts ............................................................................................................. 72 Vacation Message .......................................................................................................................................... 72 Customizing the Full Mailbox Notification Message ......................................................................... 73 Full Mailbox Notify Example ....................................................................................................................... 73 CHAPTER 5 System Administration Licensing .......................................................................................................................................................................
Recommended publications
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • Understanding Post Office Protocol (POP3)
    Understanding Post Office Protocol (POP3) Author: Conrad Chung, 2BrightSparks Introduction Most Internet users with email accounts would have used some form of “client” software (Outlook, Thunderbird etc.) to access and manage their email at one point or another. To retrieve emails, these email clients may require the configuration of Post Office Protocol (or POP3) before messages can be downloaded from the server. This article will help readers understand what POP3 is and how it works. What is Post Office Protocol? The Post Office Protocol (POP3) is an Internet standard protocol used by local email software clients to retrieve emails from a remote mail server over a TCP/IP connection. Since the first version was created in 1984, the Post Office Protocol (currently at Version 3) has since became one of the most popular protocols and is used by virtually every email client to date. Its popularity lies in the protocol’s simplicity to configure, operate and maintain. Email servers hosted by Internet service providers also use POP3 to receive and hold emails intended for their subscribers. Periodically, these subscribers will use email client software to check their mailbox on the remote server and download any emails addressed to them. Once the email client has downloaded the emails, they are usually deleted from the server, although some email clients allow users to specify that mails be copied or saved on the server for a period of time. Email clients generally use the well-known TCP port 110 to connect to a POP3 server. If encrypted communication is supported on the POP3 server, users can optionally choose to connect either by using the STLS command after the protocol initiation stage or by using POP3S, which can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on TCP port 995 to connect to the server.
    [Show full text]
  • Imail V12 Web Client Help
    Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©2011 Ipswitch, Inc. All rights reserved. IMail Server – Web Client Help This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History December 2011 v12 April 2011 v11.5 October 2010 v11.03 May 2010 v11.02 Contents CHAPTER 1 Introduction to IMail Web Client About Ipswitch Web Messaging Help ..................................................................................................................
    [Show full text]
  • VI. Lotus Domino
    Le groupware - 1 / 60 - Sommaire I. Introduction ................................................................................................ 2 A. Histoire (Source : Michel Alberganti) ................................................................................ 2 B. Définition................................................................................................................... 2 C. L'offre....................................................................................................................... 2 1. Intranet / Internet................................................................................................. 2 2. Messagerie........................................................................................................... 3 II. Les clients de messagerie ............................................................................... 3 A. Windows Messaging : Msmail........................................................................................... 4 1. Installer et administrer un bureau de poste .................................................................. 4 2. Propriétés du client MAPI......................................................................................... 7 B. Utiliser Outlook ......................................................................................................... 15 1. Les options .........................................................................................................15 2. Envoi de messages ................................................................................................20
    [Show full text]
  • Uninstalling Imail Server
    Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©1995-2011 Ipswitch, Inc. All rights reserved. IMail Server Getting Started Guide This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History March 2005 v8.2 November 2005 v2006 January 2006 v2006.02 April 2006 v2006.04 July 2006 v2006.1 February 2007 v2006.2 October 2007 v2006.22 February 2008 v10 November 2008 v10.02 April 2009 v11 November 2009 v11.01 May 2010 v11.02 October 2010 v11.03 April 2011 v11.5 November 2011 v12 Contents CHAPTER 1 Getting Started with IMail Server About Getting Started................................................................................................................................................
    [Show full text]
  • The BG News October 20, 2008
    Bowling Green State University ScholarWorks@BGSU BG News (Student Newspaper) University Publications 10-20-2008 The BG News October 20, 2008 Bowling Green State University Follow this and additional works at: https://scholarworks.bgsu.edu/bg-news Recommended Citation Bowling Green State University, "The BG News October 20, 2008" (2008). BG News (Student Newspaper). 7979. https://scholarworks.bgsu.edu/bg-news/7979 This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. This Article is brought to you for free and open access by the University Publications at ScholarWorks@BGSU. It has been accepted for inclusion in BG News (Student Newspaper) by an authorized administrator of ScholarWorks@BGSU. ESTABLISHED 1920 A daily independent student press serving THE BG NEWS the campus and surrounding community Monday October 20,2008 Volume 103. Issue 42 WWWBGNEWSCOM Guest speakers at GSS meeting Edward Whipple and billing off the old Deanne Snavely spoke at the most recent GSS meeting, encouraging campus involvement label once and for al as well as expressing concerns pertaining to graduate education | Page 3 CHRISTINA MCGINNIS !■■; I.,'. CAMPAIGNING: Republican presidential nominee John McCain promised the residents Make use of of the Toledo aiea to focus on the needs of the average citizen at his rally yesterday. the privacy controls! Columnist Greg Chick McCain ILLUSTRATION BY JENN1FIR WALKED "~> responds to last week's article detailing the University's creation BGSU rises in Trojan sexual health rankings from 100 to 33 of a Web page aiming 'straight talks' to educate students on what information By Alexandria CUrk to hide or provide Reporter TROJAN SEXUAL HEALTH REPORT CARD on social-networking pages, believing that to Toledo Those who attend the 2008: 2007 DATA: students just need to University are probably famil- use the privacy options By K ri Itan Vasal of the failing economy.
    [Show full text]
  • Mailarchiva Enterprise Edition V1.9
    MailArchiva Enterprise Edition Administration Guide Willkommen Bienvenidos Welkom Bienvenue Welcome MailArchiva Enterprise Edition v1.9 INSTALLATION AND AMINISTRATION GUIDE For Windows / Linux MailArchiva Enterprise Edition Administration Guide 1 INDEX 1 INDEX ............................................................................................................. 2 2 IMPORTANT NOTICE ....................................................................................... 4 3 CONTACT INFORMATION ................................................................................. 4 TECHNICAL REQUIREMENTS .................................................................................. 5 4 OVERVIEW ...................................................................................................... 6 5 HIGH-LEVEL FEATURES ................................................................................... 7 6 ARCHITECTURE ............................................................................................... 9 7 INSTALLATION .............................................................................................. 10 7.1 EXCHANGE SERVER CONFIGURATION .................................................................... 11 7.2 SERVER INSTALLATION (ON WINDOWS ) ................................................................ 14 7.3 SERVER INSTALLATION (ON LINUX ) ..................................................................... 15 7.4 MICROSOFT EXCHANGE ...................................................................................
    [Show full text]
  • 1. Introduction Webmail Light Is a New Way to Access Lotus Notes (LN) Mail Via the Web
    Introduction to Webmail Light Page 1 of 2 1. Introduction Webmail Light is a new way to access Lotus Notes (LN) Mail via the web. It has been designed to be "light and simple", and therefore does not have the full functionality of LN mail. However, you can read, reply and forward emails much quicker with Webmail Light than with Webmail. It is recommended to use Webmail Light for basic tasks and remote services for full access to Lotus Notes. 2. Accessing Webmail Light To access your emails using Webmail Light, two things must take place: 1. You must have a Lotus Notes web password. Send your request if you do not currently have a Lotus Notes web password. From UNOV Portal or FO Portal, select 2. You need to request a Webmail Light account by sending an email to Helpdesk. Once you have a Lotus Notes Webmail password and a Webmail Light account, you are ready to use Webmail Light. You may access Webmail Light directly, if you know the web address to Webmail Light. Alternatively you can access it through the menu structure in the UNODC Home page. 2.1 Quick way to access Webmail Light 1. At a web browser, type webmaillight.unodc.org 2. At Login screen, enter your Username (firstname.lastname) and Password (Webmail password) and then click Login. 2.2 Access to Webmail Light from UNODC website 1. At a web browser, type www.unodc.org 2. Click on top right hand corner of UNODC Home Page. 3. At the login screen, enter your Username (firstname.lastname) and Password (Webmail password) and then click Login.
    [Show full text]
  • Set up Mail Server Documentation 1.0
    Set Up Mail Server Documentation 1.0 Nosy 2014 01 23 Contents 1 1 1.1......................................................1 1.2......................................................2 2 11 3 13 3.1...................................................... 13 3.2...................................................... 13 3.3...................................................... 13 4 15 5 17 5.1...................................................... 17 5.2...................................................... 17 5.3...................................................... 17 5.4...................................................... 18 6 19 6.1...................................................... 19 6.2...................................................... 28 6.3...................................................... 32 6.4 Webmail................................................. 36 6.5...................................................... 37 6.6...................................................... 38 7 39 7.1...................................................... 39 7.2 SQL.................................................... 41 8 43 8.1...................................................... 43 8.2 strategy.................................................. 43 8.3...................................................... 44 8.4...................................................... 45 8.5...................................................... 45 8.6 Telnet................................................... 46 8.7 Can postfix receive?..........................................
    [Show full text]
  • Concept of Mail Protocols Format of an Email Email Addressing
    Concept of Mail Protocols Format of an Email Email Addressing A unique addressing system ,has two parts in addressing. Local part defines user mailbox and domain name mention the destination [email protected] Email alias:Create a group email to send email to many people like multicast. Email message fields Here are the meanings of the fields to be filled in when you send an email: ● From: this is your email address; most of the time you will not have to fill in this field, because it is generally set by the email client according to your preferences. ● To: This field is used for the recipient's email address. ● Subject: this is the title that your recipients will see when they want to read the email ● Cc (carbon copy): this allows an email to be send to a large number of people by writing their respective addresses separated by commas ● Bcc (blind carbon copy): This is a Cc, except that the recipient does not see the list of people in the Bcc field ● Message: This is the body of your message Other email functions are: ● Attached Files, Attachments: A file can be attached to an email by specifying its location on the hard drive. ● Signature: If the email client allows it, you are often able to set a signature, meaning a few lines of text which will be added to the end of the document. Email Delivery Queue Unlike ftp/http it is not necessarily to deliver email in real time.Delivery not instantaneous ,It will wait in the queue of outgoing,incoming ,intermediate MTA message queue.
    [Show full text]
  • You Can Configure Microsoft Outlook to Access Your Office 365 Account by Setting up an Exchange Connection
    You can configure Microsoft Outlook to access your Office 365 account by setting up an Exchange connection. An Exchange connection provides access your email, calendar, contacts, and tasks in Outlook. You can also set up Outlook to access your email by using IMAP. However, if you use IMAP you can only access your email from Outlook, not your calendar, contacts, and tasks. Notes: ▪ Office 365 is designed to work with any version of Microsoft Office in mainstream support. Get Outlook for Windows Outlook is included with Microsoft Office 365. Faculty and staff with a Thiel ID and undergraduate students with an Office 365 account can download Microsoft Office for Windows via webmail for free. Please visit the Solution Center webpage for more information. Configure Outlook for Windows 1. Open Outlook. 2. At the Welcome screen, click Next. 3. When asked if you want to set up Outlook to connect to an email account, select Yes and then click Next. 4. The Auto Account Setup wizard opens. Enter your name, your email address using your ID#@thiel.edu, and your Thiel ID network password. Then, click Next 5. Outlook will complete the setup for your account, which might take several minutes. When you are notified that your account was successfully configured, click Finish. 6. You may need to restart Outlook for the changes to take effect. Change offline access setting You can use Outlook on your laptop or desktop computer when you’re not connected to the Internet. Email, calendar, and other items are kept in an Outlook data file on your computer so you can work offline.
    [Show full text]
  • Before You Begin
    This document will walk you through the process of migrating your existing mail, contacts, and calendar from WOU’s Webmail system to the WOU Gmail system. If you are not interested in migrating your mail, contacts, and calendar please go to Step C from the Before You Begin section. Once you are finished with this tutorial, visit http://www.wou.edu/ucs/google_apps_tutorial.php and proceed to phase 3 for mobile device and desktop client configuration. NOTE: Please read each step and all notes in these instructions carefully as not all steps include accompanying pictures. Before You Begin: A. Complete Phase 1 a. Make sure that you have activated your WOU Gmail account by completing Phase 1 on http://www.wou.edu/ucs/google_apps_tutorial.php B. Unsubscribe from Webmail calendars a. Log into WOU’s webmail client at www.wou.edu/webmail b. Open your calendar from the left menu pane c. For each of you subscribed calendars: i. Select the calendar by clicking on the name ii. Click on the delete button iii. Click Remove C. Setting up your Gmail account a. Log into your Gmail account at http://gmail.mail.wou.edu b. Click on Settings in the upper right-hand corner of the screen c. Click on the Accounts tab d. Click on Add another email address you own e. Enter your name and WOU email address and click Next Step f. Click Send Notification g. Return to your inbox h. You should have an email with the subject “Western Oregon University Confirmation - Send Mail as [email protected].” If you do not see this email, wait 2 minutes and refresh your inbox.
    [Show full text]