Zimbra Collaboration Administrator Guide

Total Page:16

File Type:pdf, Size:1020Kb

Zimbra Collaboration Administrator Guide Zimbra Collaboration Administrator Guide Zimbra Collaboration 8.7 Open Source Edition Legal Notices Copyright © 2016 Synacor, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. ZIMBRA is a trademark of Synacor, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Synacor, Inc. 40 La Riviere Drive, Suite 300 Buffalo, New York 14202 www.synacor.com Zimbra Collaboration 8.7 April 2016 Table of Contents 1 Introduction . 13 Audience . 13 Third-Party Components . 13 Support and Contact Information . 13 2 Product Overview . 15 Architectural Overview . 15 Core Email, Calendar and Collaboration Functionality . 16 Zimbra Components . 16 Zimbra Application Packages . 17 Mail Flow—Multi-Server Configuration . 19 Zimbra System Directory Tree . 20 Zimbra Web Clients . 22 Security Measures . 23 Identity and Access Management . 23 Information Security and Privacy . 24 System Logs . 24 3 Licensing . 27 License Types . 27 License Requirements . 28 License Usage by Account Type . 28 License Activation . 29 Automatic License Activation . 29 Manual License Activation . 29 When Licenses are not Installed or Activated . 29 Obtain a License . 30 Managing Licenses . 30 License Information . 30 License Expiration . 31 Renewal . 31 Updating Your License . 32 4 Zimbra Mailbox Server . 33 Mailbox Server . 33 Message Store . 33 Data Store . 34 Index Store . 34 Web Application Server . 35 Mailstore Services . 35 User Interface Services . 35 Web Application Server Split . 35 Installation and Configuration of the Web Application Server Split . 35 Mailbox Server Logs . 36 5 Zimbra LDAP Service . .37 LDAP Traffic Flow . 37 LDAP Directory Hierarchy . 38 Zimbra Collaboration LDAP Schema . 39 Zimbra Collaboration Objects . 40 Account Authentication. 42 Internal Authentication Mechanism . 42 External LDAP and External AD Authentication Mechanism . 42 Custom Authentication . 43 Kerberos5 Authentication Mechanism . 44 Global Address List . 45 Flushing LDAP Cache . 47 Flush the Cache for Themes and Locales . 47 Flush Accounts, Groups, COS, Domains, and Servers . 47 6 Zimbra Mail Transfer Agent . .49 Incoming Mail Routing Overview . 50 Zimbra MTA Deployment . 50 Postfix Configuration Files . 51 SMTP Authentication . 51 SMTP Restrictions . 51 Sending Non Local Mail to a Different Server . 51 Anti-Virus and Anti-Spam Protection . 52 Anti-Virus Protection . 52 Anti-Spam Protection . 53 Receiving and Sending Mail . 66 Message Queues . 67 7 Zimbra Proxy Server . .69 Benefits of Using Zimbra Proxy . 69 Zimbra Proxy Components . 70 Proxy Architecture and Flow . 70 Changing the Zimbra Proxy Configuration . 71 Zimbra Proxy . ..
Recommended publications
  • RH Summit--Zimbra-UWM, Sept 2009
    Freeing the Desktop and your Data Center with a Next Generation Email and Collaboration Platform Andy Pflaum Bruce Maas VP Bus. Development, CIO, Zimbra Univ. of Wisconsin- Milwaukee 1 Red Hat Summit 2009 | Andy Pflaum (Zimbra) & Bruce Maas (UW-Milwaukee) Zimbra Overview The Open Source Leader in Messaging & Collaboration • Mail, Calendar, Contacts, Web Docs, Archiving & Discovery…. • Web services mash-ups with 3rd party applications (VoIP, ERP, CRM etc.) What Differentiates Zimbra • 35-50% better TCO than MS Exchange and Lotus Domino • Best cross-platform support (mobile, desktop, OS, browser….) • Rich integration capabilities • Clear open source leader in the category − 1M+ downloads of Zimbra server; 3M+ Zimbra Desktop downloads − 27,000+ registered community members • Market validation − 3,500+ customers and 52M+ paid mailboxes in 90+ countries − 450 hosting partners and 250 resellers (60% of Zimbra business) − Gartner Rating: ‘Positive’, May 2009, Email Systems Marketscope 2 Red Hat Summit 2009 | Andy Pflaum (Zimbra) & Bruce Maas (UW-Milwaukee) Zimbra App & Client Support iPhone ActiveSync or xHTML Zimbra zSync Server Zimbra Sync ActiveSync phones Ajax Web Client Win Mobile Palm Symbian zSync iSync & MAPI CalDAV IMAP, POP, CalDAV, iCal, RSS MS Outlook Apple Desktop Standards Clients BES BlackBerry 3 Red Hat Summit 2009 | Andy Pflaum (Zimbra) & Bruce Maas (UW-Milwaukee) Zimbra Customers in 90+ Countries Large Business Sinclair Broadcasting SMB & SME Education Service South Providers (Sprint LEC) Africa Australia 4 Red Hat Summit 2009 | Andy Pflaum (Zimbra) & Bruce Maas (UW-Milwaukee) What is Zimbra Desktop? • Provides the same user experience offline & online, cross-browser/OS • 2-way sync of all messages, meetings, contacts etc.
    [Show full text]
  • 2010 Survey Results
    IT SERVICES 2010 Client Satisfaction Survey March, 2010 Acknowledgements The Stanford IT Services Client Satisfaction Team consisted of the following: Jan Cicero, Client Support Alvin Chew, Communication Services Liz Goesseringer, Business Services Tom Goodrich, Client Support Jim Knox, Facilitator, Client Support Phil Reese, Research Computing Nancy Ware, Strategic Planning Bryan Wear, Computing Services Brian McDonald, MOR Associates Chris Paquette, MOR Associates Alexis Bywater, MOR Associates MOR Associates, an external consulting firm, acted as project manager for this effort, analyzing the data and preparing this report. MOR Associates specializes in continuous improvement, strategic thinking and leadership development. MOR Associates has conducted a number of large-scale satisfaction surveys for IT organizations in higher education, including MIT, Northeastern University, the University of Chicago, and others. MOR Associates, Inc. 462 Main Street, Suite 300 Watertown, MA 02472 tel: 617.924.4501 fax: 617.924.8070 morassociates.com Brian McDonald, President [email protected] Contents Introduction. a1 Methodology . a2 Overview.of.the.Results . 1 Reading.the.Charts. 25 Customer.Service.and.Service.Attributes. 29 Research.Computing.and.IT.Services.Priorities. .33 General.Support. .41 Data.Storage.Services .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..51 Email.and.Webmail. 59 Calendaring. 63 Network.Services. 67 Telecommunications.Services. 73 Remote.Access . 83 Mobile.Devices . 87 Software. .89 Security. 93 Web.Services. 99 Appendix.A:.The.Full.Text.of.Written.Comments. .A-1 Appendix.B:.The.Survey.Instrument. B-. 1 Appendix.C:.Other.Observations . .C-1 Stanford Information Technology Services 2010 Client Survey • Introduction | a1 Introduction This report provides a summary of the purposes, the methodology and the results of the client satisfaction survey sponsored by Stanford Information Technology Services in March, 2010.
    [Show full text]
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • Understanding Post Office Protocol (POP3)
    Understanding Post Office Protocol (POP3) Author: Conrad Chung, 2BrightSparks Introduction Most Internet users with email accounts would have used some form of “client” software (Outlook, Thunderbird etc.) to access and manage their email at one point or another. To retrieve emails, these email clients may require the configuration of Post Office Protocol (or POP3) before messages can be downloaded from the server. This article will help readers understand what POP3 is and how it works. What is Post Office Protocol? The Post Office Protocol (POP3) is an Internet standard protocol used by local email software clients to retrieve emails from a remote mail server over a TCP/IP connection. Since the first version was created in 1984, the Post Office Protocol (currently at Version 3) has since became one of the most popular protocols and is used by virtually every email client to date. Its popularity lies in the protocol’s simplicity to configure, operate and maintain. Email servers hosted by Internet service providers also use POP3 to receive and hold emails intended for their subscribers. Periodically, these subscribers will use email client software to check their mailbox on the remote server and download any emails addressed to them. Once the email client has downloaded the emails, they are usually deleted from the server, although some email clients allow users to specify that mails be copied or saved on the server for a period of time. Email clients generally use the well-known TCP port 110 to connect to a POP3 server. If encrypted communication is supported on the POP3 server, users can optionally choose to connect either by using the STLS command after the protocol initiation stage or by using POP3S, which can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on TCP port 995 to connect to the server.
    [Show full text]
  • Zimbra™ Collaboration Suite Multi-Server Installation Guide
    Zimbra™ Collaboration Suite Multi-Server Installation Guide Release 6.0 Network Edition Legal Notices Copyright 2005-2010 Zimbra. All rights reserved. No part of this document may be reproduced, in whole or in part, without the express written permission of Zimbra. Trademark and Licensing MySQL is a registered trademark of MySQL AB in the United States, the European Union and other countries. OpenLDAP is a registered trademark of the OpenLDAP Foundation. Postfix is copyright © 1999 International Business Machines Corporation and others and it was created by Wietse Venema <[email protected]>. SpamAssassin is a trademark of Deersoft, Inc. This product includes software developed by the Apache Software Foundation (http://www.apache.org/). All other marks are the property of their respective owners. Building Better Products within the Open Source Community Zimbra Collaboration Suite leverages many great technologies from the open source community: MySQL, OpenLDAP, Postfix, SpamAssassin, and Apache. Zimbra believes that great products come from contributing to and leveraging open source technologies. We are thankful for the great contributions that led to the creation of MySQL, OpenLDAP, Postfix, SpamAssassin, and Apache software. ------------------------------------------------------------------------------------------------------- Zimbra, a division of VMware, Inc. 3401 Hillview Avenue Palo Alto, California 94304 USA www.Zimbra.com September 2009 ZCS 6.0 Rev 4 (6.0.8) 7/2010 Table of Contents Chapter 1 Introduction . 5 Audience . 5 Zimbra Collaboration Suite License . 5 For More Information . 5 Support and Contact Information . 6 Chapter 2 Planning for the Installation . 7 Zimbra Packages . 7 Configuration Examples . 8 Downloading the Zimbra Software . 9 Zimbra License . 10 Menu-Driven Configuration . 10 Common configuration options .
    [Show full text]
  • Automated IT Service Fault Diagnosis Based on Event Correlation Techniques
    Automated IT Service Fault Diagnosis Based on Event Correlation Techniques Dissertation an der Fakultat¨ fur¨ Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat¨ Munchen¨ vorgelegt von Andreas Hanemann Tag der Einreichung: 22. Mai 2007 1. Berichterstatter: Professor Dr. Heinz-Gerd Hegering, Ludwig-Maximilians-Universit¨at M¨unchen 2. Berichterstatterin: Professor Dr. Gabrijela Dreo Rodosek, Universit¨at der Bundeswehr M¨unchen Automated IT Service Fault Diagnosis Based on Event Correlation Techniques Dissertation an der Fakultat¨ fur¨ Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat¨ Munchen¨ vorgelegt von Andreas Hanemann Tag der Einreichung: 22. Mai 2007 Tag der m¨undlichen Pr¨ufung: 19. Juli 2007 1. Berichterstatter: Professor Dr. Heinz-Gerd Hegering, Ludwig-Maximilians-Universit¨at M¨unchen 2. Berichterstatterin: Professor Dr. Gabrijela Dreo Rodosek, Universit¨at der Bundeswehr M¨unchen Acknowledgments This thesis has been written as part of my work as a researcher at the Leib- niz Supercomputing Center (Leibniz-Rechenzentrum, LRZ) of the Bavarian Academy of Sciences and Humanities which was funded by the German Re- search Network (DFN-Verein) as well as in cooperation with the research group of Prof. Dr. Heinz-Gerd Hegering. Apart from the LRZ, this research group called MNM-Team (Munich Network Management Team) is located at the University of Munich (LMU), the Munich University of Technology (TUM) and the University of Federal Armed Forces in Munich. At first, I would like to thank my doctoral advisor Prof. Dr. Heinz-Gerd Hegering for his constant support and helpful advice during the whole prepa- ration time of this thesis. I would also like to express my special gratefulness to my second advisor, Prof.
    [Show full text]
  • What Is the Difference Between Email Protocols
    What Is The Difference Between Email Protocols Interactions between email servers and users are governed by email protocols. The most common incoming email protocols are POP, and IMAP. Most email applications/programs support one or more of these. This article is to help users understand and choose which protocol should be selected for each user’s situation. Outgoing Incoming POP (Post Office Protocol): IMAP (Internet Message Access Protocol): SSL (Secure Socket Layer): Differences Between POP and IMAP Backups / Email Loss Outgoing SMTP (Simple Mail Transfer Protocol) is the protocol used in sending (outgoing) emails. SMTP is the protocol always used for sending (outgoing) emails. Incoming POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) are two different protocols that do the same thing differently. They are both used in receiving emails from a mail server and can both are available for standard and secure (?) connections. POP (Post Office Protocol): POP is an email accessing protocol used to download emails from a mail server. Applications like Outlook and Outlook Express using POP will download all emails from the server to the user’s computer, and then delete them on the server. Generally POP server uses port 110 to listen to the POP requests or securely using SSL (Secure Socket Layer) (?) POP uses port number 995. The POP protocol assumes that there is only one client/computer that will be connecting to the mailbox. Even though there is an option in most mail applications to leave the copies of the emails in the server, it is not generally used due to various reasons.
    [Show full text]
  • Ii Jacobs Rp316
    !II JACOBS RP316 RACIBORZ FLOOD RESERVOIR Public Disclosure Authorized Resettlement Action Plan Public Disclosure Authorized DRAFT Public Disclosure Authorized Public Disclosure Authorized March 2005 JACOBS Document control sheet Form IP180/B Client: PCU Project: Odra Flood Mitigation Job No: J24201A Title: Draft Resettlement Action Plan Prepared by Reviewed by Approved by ORIGINAL0 NAME NAME NAME P Devitt L J S Attewill see list of authors H Fiedler-Krukowicz J Loch | DATfE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE This report, and infonnabon or advice which it contains, is provided by JacobsGIBB Ltd solely for internal use and reliance by its Cient in performance of JacobsGIBB Ltd's duties and liabilities under its contract with the Client Any advice, opinions, or recomrnendatons within this report should be read and retied upon only in the context of the report as a whole. The advice and opinions in this report are based upon the information nmadeavailable to JacobsGIBB Ltd at the date of this report and on current UK standards, codes, technology and constnuction practices as at the date of this report. Folloving final delvery of this report to the Client, JacobsGIBB Ltd will have no further obligations or duty to advise She Client on any mafters, including developrrient affecting the information or advice provided in ths report This report has been prepared by JacobsGIBB Ltd in their professional capaaty as Consuhing Engineers The contents of the report do not, in any way, purport to include any mranner of legal advice or opinion This report is prepared in accordance wrth the terms and conditions of JacobsGIBB Ltd's contract with the Client.
    [Show full text]
  • Linux Administrators Security Guide LASG - 0.1.1
    Linux Administrators Security Guide LASG - 0.1.1 By Kurt Seifried ([email protected]) copyright 1999, All rights reserved. Available at: https://www.seifried.org/lasg/. This document is free for most non commercial uses, the license follows the table of contents, please read it if you have any concerns. If you have any questions email [email protected]. A mailing list is available, send an email to [email protected], with "subscribe lasg-announce" in the body (no quotes) and you will be automatically added. 1 Table of contents License Preface Forward by the author Contributing What this guide is and isn't How to determine what to secure and how to secure it Safe installation of Linux Choosing your install media It ain't over 'til... General concepts, server verses workstations, etc Physical / Boot security Physical access The computer BIOS LILO The Linux kernel Upgrading and compiling the kernel Kernel versions Administrative tools Access Telnet SSH LSH REXEC NSH Slush SSL Telnet Fsh secsh Local YaST sudo Super Remote Webmin Linuxconf COAS 2 System Files /etc/passwd /etc/shadow /etc/groups /etc/gshadow /etc/login.defs /etc/shells /etc/securetty Log files and other forms of monitoring General log security sysklogd / klogd secure-syslog next generation syslog Log monitoring logcheck colorlogs WOTS swatch Kernel logging auditd Shell logging bash Shadow passwords Cracking passwords John the ripper Crack Saltine cracker VCU PAM Software Management RPM dpkg tarballs / tgz Checking file integrity RPM dpkg PGP MD5 Automatic
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • Exchange Server Is a Microsoft S Messaging D Collaboration System
    What is Exchange Server? Exchange Server is a Microsoft͛s Messaging d collaboration system which provides Industry leading Email, calendaring and unified Messaging Solutions. What are the minimum hardware requirements for Exchange Server 2003? Processor ʹ Pentium 133 MHz Operating System ʹ Windows 2000 SP3 Memory ʹ 256 MB Disk Space ʹ 200 MB for system files and 500 MB where Exchange Server installation. File System ʹ NTFS What are the steps involved in Exchange Server installation? Prerequisites Installation ʹ ASP .Net, IIS, SMTP, NNTP and WWW services Installation Forest Preparation Domain Preparation Exchange Server 2003 Installation What are the differences between Exchange Sever 2003 Standard and Enterprise Editions? Standard Edition : 1 Storage group 2 Database per Storage Group 16 GB Limit per Database. Exchange Cluster is Not Supported. X.400 Connector is not included. Enterprise Edition 4 Storage Group 5 Databases per Storage Group 16 TB or limited to hardware Exchange Clustering is Supported. X.400 Connector is included. 5. What are the main differences between Exchange 5.5 and Exchange 2000/2003? - Exchange 2000 does not uses its own Directory Service as Exchange 5.5 but rely on Active Directory. - Exchange 2000/2003 uses native components of windows (SMTP, NNTP,Asp.net. IIS, W3SVC and many more) for many core functions. - Active/Active Clustering is now supported in Exchange 2000/2003 - It now provided better Conferencing and Instant Messaging Solution. Name a Few Configuration options for Exchange Recipients ? Exchange Recipient parameters are values/attributes which can change exchange recipients message behaviour. 1. MicrosoftExchangeRecipientEmailAddresses: This parameter specifies one or more email address for the same user, maybe internal email associated with external email.
    [Show full text]
  • Ispmail Tutorial for Debian Lenny
    6.10.2015 ISPmail tutorial for Debian Lenny ISPmail tutorial for Debian Lenny Add new comment 223533 reads This tutorial is for the former stable version "Debian Lenny". If you are using "Debian Squeeze" then please follow the new tutorial. A spanish translation of this tutorial is also available ­ courtesy of José Ramón Magán Iglesias. What this tutorial is about You surely know the internet service providers that allow you to rent a domain and use it to receive emails. If you have a computer running Debian which is connected to the internet permanently you can do that yourself. You do not even need to have a fixed IP address thanks to dynamic DNS services like dyndns.org. All you need is this document, a cup of tea and a little time. When you are done your server will be able to... receive and store emails for your users from other mail servers let your users retrieve the email through IMAP and POP3 ­ even with SSL to encrypt to connection receive and forward ("relay") email for your users if they are authenticated offer a webmail interface to read emails in a web browser detect most spam emails and filter them out or tag them License/Copyright This tutorial book is copyrighted 2009 Christoph Haas (email@christoph­haas.de). It can be used freely under the terms of the GNU General Public License. Don't forget to refer to this URL when using it. Thank you. Changelog 17.6.09: Lenny tutorial gets published. 19.6.09: The page on SPF checks is temporarily offline.
    [Show full text]