If you haven’t seen our YouTube channel lately, you’re missing out on some valuable information that can be used to help you manage MDaemon and SecurityGateway. Recently, we’ve added several new MDaemon tutorial videos. Here are a few that might interest you.
MDaemon Graphical User Interface (GUI) Overview
In this video, we provide a tour of MDaemon’s graphical user interface. We show you where to find key security, administration, and account management settings, how to navigate your way through the mail queues, and how to find information in the mail routing, security and spam filter logs using the tabs across the bottom of the MDaemon interface.
MDaemon’s File Structure
One of the benefits of MDaemon that make it easy to troubleshoot and administer is its file structure. All key settings are stored in configuration files located in the MDaemon/App directory, and user email messages are stored in the Users directory. This flat-file structure makes MDaemon very easy to backup and restore using simple drag & drop.
How to Enable and Use Two-Factor Authentication in WorldClient
Two-factor authentication is a security feature found in WorldClient, MDaemon’s webmail client, which requires users to submit two forms of identifying data – a password, and a special code or token, before they are able to login. Two-factor authentication helps prevent accounts from being hijacked by someone who manages to guess the account’s password. A potential hacker would have to know the second authenticating factor in order to access the account.
Enabling Do Not Disturb to Establish Work/Life Balance for Employees
MDaemon’s Do-Not-Disturb feature allows administrators to set a time during which certain users are not allowed to check for or send new email messages. In an age where we’re all constantly connected via mobile devices, this helps foster better work-life balance for your users.
SecurityGateway can be configured to handle spam in various ways. Messages can be refused, quarantined, or accepted, and their spam scores can be adjusted accordingly. When messages are quarantined and held on the server, the administrator can determine whether, and how often, to send the user an emailed quarantine summary report. The administrator can also grant users permissions to view and manage their own quarantine folders in the SecurityGateway interface. The quarantine summary email allows users to release the message from quarantine, and whitelist or blacklist the sender. When the quarantine is viewed in the SecurityGateway interface, users have additional options, such as the ability to feed messages to SecurityGateway’s Bayesian spam learning engine.
We generally recommend using the Bayesian feature to mark a message as spam, rather than blacklisting the sender. Thus, to avoid any confusion, we’ve put together a new best practices guide on quarantine management in SecurityGateway.
If you’ve used Microsoft Outlook for an extended period of time, you may have noticed that it doesn’t run quite as smoothly as it used to. Outlook’s performance is affected by many things, including the amount of data it has to keep track of, any add-ons that are installed, how often it checks for new mail (checking more frequently can improve performance), and various other factors. Whether you use POP, IMAP, ActiveSync or Outlook Connector, you can perform various tasks to improve Outlook’s performance. Follow the steps outlined below to keep Outlook running like a well-oiled machine.
Outlook Connector Users
Compact the Outlook Connector Local Cache File
Unlike POP, which stores data in a PST file, Outlook Connector stores a local copy of account data in a local cache file. If you are using Outlook Connector, you can compact the local cache file to improve performance. Follow these steps to compact the local cache file:
Make sure Outlook is shut down, and navigate to the Windows control panel.
Click on the Mail control panel.
Click on Email Accounts.
Double-click on your Outlook Connector account.
Click on the Database Management tab.
Locate the Purge Database section and click on the Purge button.
Locate the Compact Database section, and click on the Compact button. You can also check “Compact database on Outlook shutdown” to compact the database each time Outlook is shut down.
NOTE: Outlook Connector includes the option “Download Headers Only” under the Send/Receive tab of the Outlook Connector Client configuration screen. When this option is enabled, Outlook only downloads the information needed to show messages in the message list, and not the full content of each message. When you click on a message, the rest of the message is downloaded for viewing. Users may experience a slight delay in viewing messages in the preview pane when “Download Headers Only” is enabled because Outlook has to download the rest of the message when it is selected. If messages are show to appear in the preview pane or when viewing, try disabling “Download headers only.”
Performing the following housekeeping tasks regularly will help minimize the amount of data that Outlook must process, and will reduce the amount of memory used by the program.
We recommend performing these housekeeping tasks regularly:
Delete any email messages, calendar items, and contacts that are no longer needed.
Empty the Deleted Items folder by right-clicking it and selecting Empty Folder.
Delete unwanted items from the Sent Items folder.
Move items out of the Inbox to other mail folders.
Archive old messages. Mail server administrators can implement a server-wide archiving solution such as MailStore to help cut down on the amount of data stored in user mailboxes.
Having too many Outlook add-ins can bog down Outlook’s performance. When Outlook is installed for the first time, it comes with its own set of add-ins. Not all of these add-ins will be activated, and there may be add-ins enabled that you don’t need. Here is a list of default Outlook add-ins:
Business Connectivity Services Add-in
Microsoft Exchange Add-in
Microsoft Outlook Social Connector / Outlook Social Connector 2013
Microsoft SharePoint Server Colleague Import Add-In
Microsoft Exchange Unified Messaging
OneNote Notes about Outlook Items
Microsoft Access Outlook Add-In for Data Collection and Publishing
Microsoft VBA for Outlook Add-in
Windows Search Email Indexer
This page contains a List of all default Outlook Add-ins, plus other add-ins you might encounter.
In addition, other third-party applications can add their own Outlook add-ins. Fortunately, it’s easy to disable unwanted add-ins.
In Outlook 2007: Go to Tools | Trust Center | Add-ins. In the Manage drop-down list, select which add-ins you’d like to disable. Press Go, and make your changes.
In Outlook 2010, 2013 and 2016: Go to File | Options | Add-ins. Locate the Manage drop-down menu at the bottom, and select Com Add-ins, then click on Go. To disable specific add-ins, simply un-check the items you don’t need, and click on OK. You can also use the Remove button to remove selected items completely. For some add-ins, you may need to restart Outlook for your changes to take effect.
Disable RSS Feeds
If you have a lot of RSS feeds that are synchronized with Outlook, these syncing tasks could bring Outlook to a crawl. If you aren’t using Outlook as an RSS reader, you can disable this feature from Outlook by following these steps:
In Outlook 2007: Go to Tools | Options. Select the Other tab, and then click on Advanced Options. Then, uncheck both options under RSS Feeds.
In Outlook 2010 / 2013 / 2016: Go to File | Options. Click on the Advanced button in the left-hand navigation menu. Under the RSS Feeds section, uncheck both options.
Adjusting the Send/Receive Frequency
Adjusting Outlook’s Send/Receive schedule can often improve performance. If email messages are slow showing up in your Inbox, you can configure Outlook to send/receive messages more frequently so that it doesn’t have to download as much data each time it checks for new messages. If your send/receive schedule is set to check less-frequently, say, every 30 minutes, try changing it to send/receive every 3 minutes.
Outlook 2010, 2013 and 2016 users can find this setting via File | Options | Advanced. Locate the Send/Receive section and click on the Send/Receive button. Then, under Send/Receive Groups | All Accounts, adjust the timing for “Schedule an automatic send/receive every…” as shown here:
POP, IMAP & ActiveSync Users
Compact or Repair PST Files
PST files can be another source of Outlook sluggishness. You can help improve Outlook’s performance by:
Using multiple PST files.
Keeping attachments out of PST files.
Compacting PST files.
To compact a PST file in Outlook 2010, 2013 and 2016:
Delete any items you no longer need, and then empty the Deleted Items folder.
Click on the File tab on the ribbon, and then select the Info tab.
Click on Account Settings, and then click on Account Settings again.
Click on the Data Files tab.
Select your PST file in the list, and then click on Settings.
On the General tab, click on Compact Now.
Click on OK and Close.
To compact a PST file in Outlook 2007:
Delete any items you no longer need, and then empty the Deleted Items folder.
Navigate to Tools | Account Settings.
Select your desired account, and then click on Change.
Click on More Settings.
On the Advanced tab, click on Offline Folder File Settings.
Click on Compact Now.
Sometimes, your PST files can develop errors or data inconsistencies, resulting in unexpected behavior in Outlook. When you suspect that there’s an issue with the integrity of your PST file, you can run Scanpst.exe to repair your PST files.
Scanpst can be tricky to locate. By default, you should be able to find it in the Program Files | Microsoft Office | Office14 folder, but you may need to perform a search if you can’t find it in its default location. This location may vary depending on which version of Outlook you are using. You may also want to create a shortcut to this file on your desktop for easier access.
Before using this tool, we recommend making a backup copy of your PST file in case any errors or file corruptions occur to the original file. This shouldn’t be an issue, however, because if Scanpst finds any errors, it will prompt you to make a backup before attempting to repair the file.
Keep Windows Up-to-Date
Microsoft periodically releases Windows updates and service packs. Having the latest updates and service packs can help improve your computer’s overall performance as well as Outlook’s performance.
Nobody should have to put up with sluggish Outlook performance. Following the above suggestions will help ensure that you spend less time waiting for things to happen, and more time making things happen!
For spammers, the barriers to entry are very low and the potential payoffs are very high relative to the small amounts of effort required to send out lots of spam. Spammers typically look for the “low hanging fruit” of an email system, such as mail servers that are not configured to prevent relaying, or accounts with weak passwords. If a hacker manages to guess an account’s password, he can use that account to send out large amounts of unsolicited spam email messages. This can result in your server winding up on a blacklist. Additionally, if large amounts of spam are sent out before the issue is corrected, your business can suffer lost trust and a reduction in revenue.
MDaemon’s Account Hijack Detection feature can be used to disable the account once a specified number of messages have been sent from an authenticated session within a given period of time. But it would be better to not even let a hacker get that far. Having strong passwords that are difficult to guess would help prevent an account from being hijacked in the first place.
Today, we focus on the issue of weak passwords and how to thwart hackers by implementing strong password policies. These settings are located in MDaemon under the Accounts | Account Settings configuration screen. In today’s video tutorial, we demonstrate how to require strong passwords, how to force accounts with a weak password to change their password, and how to send a Weak Passwords report to a designated email address.
Email is one of the most valuable intellectual property assets a company can have. Protect your email by enacting strong security and password policies & keep the hackers out.
SecurityGateway is a powerful email spam & malware filter & gateway that can be used to protect any type of mail server. It offers a layered approach to security, with protection features including data leak prevention, attachment filtering, heuristic and Bayesian analysis, zero-hour Outbreak Protection, and much more.
In today’s video tutorial, we demonstrate best practices for handling spam in SecurityGateway. Topics covered include:
How to mark a message as spam to teach the Bayesian learning process how to identify junk email messages, which helps to make the spam filter more accurate over time.
There’s a new phishing campaign with a payload of malware that’s been targeting small and mid-sized businesses in Thailand, India, and the United States, as well as a few companies in Israel, Germany, and Canada. Messages sent in this campaign contain a malicious attachment disguised as a Microsoft Word document. When opened, this file loads the HawkEye keylogger software and other remote administration tools to spy on the machine, take control of it, and steal data and files. So far, thousands of passwords, emails, and usernames have been stolen from almost 5000 hosts. Data has been stolen from Outlook, Facebook, Skype, Gmail, Pinterest, Yahoo, LinkedIn, and Twitter, as well as bank accounts. To combat this threat, update your antivirus definitions, and make sure all software patches are up-to-date.
One of the key points to take away from this is that email security is not just a mail server administrator’s job. In addition to configuring the mail server to filter out as much spam, malware, phishing attempts, and viruses as possible, end users must also understand how to recognize spam, phishing attempts, and malicious attachments. Administrators need to educate their users on how to identify these threats. For a review on how to recognize these tactics and how to keep your network safe from email-borne threats, check out my post “Email Safety Tips for End Users.”
In addition to its built-in spam filter, MDaemon includes many other security features that can be used to fight spam. In this webinar, we take you through an in-depth explanation of MDaemon’s spam-fighting features, and discuss recommended settings for best results.
SecurityGateway protects your mail server and end users from email-borne threats such as spam, viruses, malware, phishing attempts, and much more. For best results, SecurityGateway can be configured to perform the following tasks:
Prevent spammers from guessing passwords
Verify that a user is valid before creating an account
Prevent unauthorized account access
Prevent unauthorized mail relaying
Protect your domain with IP Shielding
Encrypt communications with SSL
Prevent backscatter (out-of-office and non-delivery replies (NDRs) sent in response to messages that your users never sent)