Quarantine Management with WorldClient Private Email

WorldClient Private Email makes spam management easy by providing users with the email and collaboration features found in WorldClient, MDaemon’s webmail client, and the security and spam filtering features found in SecurityGateway. This tutorial video covers the following topics:

  • How to allow users to manage their own quarantines in SecurityGateway
  • Quarantine management via the Quarantine Summary Email, and how often this email is sent to users
  • When to whitelist or blacklist the sender, and when & how to release a message from quarantine
  • Quarantine management via the SecurityGateway interface
  • Feeding the Bayesian spam and non-spam database – to improve the spam filter’s accuracy

Spam doesn’t have to be an overwhelming nuisance. When these practices are followed, spam is kept under control so you can spend less time dealing with spam and more time focusing on your business.

If you are interested in our WorldClient Private Email hosted email service, click here for pricing and features, or click here to sign up!

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

New MDaemon Tutorials Added to YouTube

If you haven’t seen our YouTube channel lately, you’re missing out on some valuable information that can be used to help you manage MDaemon and SecurityGateway. Recently, we’ve added several new MDaemon tutorial videos. Here are a few that might interest you.

MDaemon Graphical User Interface (GUI) Overview

In this video, we provide a tour of MDaemon’s graphical user interface. We show you where to find key security, administration, and account management settings, how to navigate your way through the mail queues, and how to find information in the mail routing, security and spam filter logs using the tabs across the bottom of the MDaemon interface.

MDaemon’s File Structure

One of the benefits of MDaemon that make it easy to troubleshoot and administer is its file structure. All key settings are stored in configuration files located in the MDaemon/App directory, and user email messages are stored in the Users directory. This flat-file structure makes MDaemon very easy to backup and restore using simple drag & drop.

How to Enable and Use Two-Factor Authentication in WorldClient

Two-factor authentication is a security feature found in WorldClient, MDaemon’s webmail client, which requires users to submit two forms of identifying data – a password, and a special code or token, before they are able to login. Two-factor authentication helps prevent accounts from being hijacked by someone who manages to guess the account’s password. A potential hacker would have to know the second authenticating factor in order to access the account.

Enabling Do Not Disturb to Establish Work/Life Balance for Employees

MDaemon’s Do-Not-Disturb feature allows administrators to set a time during which certain users are not allowed to check for or send new email messages. In an age where we’re all constantly connected via mobile devices, this helps foster better work-life balance for your users.

These are just a few of the tutorial videos on our YouTube channel. Visit our YouTube channel for other tutorials, product overview videos, webinars, and more. If you haven’t tried MDaemon yet, click here to download your free trial and see how easy MDaemon is to use!

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Quarantine Management in SecurityGateway

SecurityGateway quarantine management best practicesSecurityGateway can be configured to handle spam in various ways. Messages can be refused, quarantined, or accepted, and their spam scores can be adjusted accordingly. When messages are quarantined and held on the server, the administrator can determine whether, and how often, to send the user an emailed quarantine summary report. The administrator can also grant users permissions to view and manage their own quarantine folders in the SecurityGateway interface. The quarantine summary email allows users to release the message from quarantine, and whitelist or blacklist the sender. When the quarantine is viewed in the SecurityGateway interface, users have additional options, such as the ability to feed messages to SecurityGateway’s Bayesian spam learning engine.

We generally recommend using the Bayesian feature to mark a message as spam, rather than blacklisting the sender. Thus, to avoid any confusion, we’ve put together a new best practices guide on quarantine management in SecurityGateway.

Click here to view the new SecurityGateway Quarantine Management guide.

Following the suggestions outlined in this guide will help ensure that you receive the messages you want, and block the messages you don’t want.

If you have questions, let us know in the comments section below!

 

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Is Slow Outlook Performance Making you Pull Your Hair Out?

If you’ve used Microsoft Outlook for an extended period of time, you may have noticed that it doesn’t run quite as smoothly as it used to. Outlook’s performance is affected by many things, including the amount of data it has to keep track of, any add-ons that are installed, how often it checks for new mail (checking more frequently can improve performance), and various other factors. Whether you use POP, IMAP, ActiveSync or Outlook Connector, you can perform various tasks to improve Outlook’s performance. Follow the steps outlined below to keep Outlook running like a well-oiled machine.

Outlook Connector Users

Compact the Outlook Connector Local Cache File

Unlike POP, which stores data in a PST file, Outlook Connector stores a local copy of account data in a local cache file. If you are using Outlook Connector, you can compact the local cache file to improve performance. Follow these steps to compact the local cache file:

  1. Make sure Outlook is shut down, and navigate to the Windows control panel.
  2. Click on the Mail control panel.
  3. Click on Email Accounts.
  4. Double-click on your Outlook Connector account.
  5. Click on the Database Management tab.
  6. Locate the Purge Database section and click on the Purge button.
  7. Locate the Compact Database section, and click on the Compact button. You can also check “Compact database on Outlook shutdown” to compact the database each time Outlook is shut down.
Outlook Connector Options
Outlook Connector Options

NOTE: Outlook Connector includes the option “Download Headers Only” under the Send/Receive tab of the Outlook Connector Client configuration screen. When this option is enabled, Outlook only downloads the information needed to show messages in the message list, and not the full content of each message. When you click on a message, the rest of the message is downloaded for viewing. Users may experience a slight delay in viewing messages in the preview pane when “Download Headers Only” is enabled because Outlook has to download the rest of the message when it is selected. If messages are show to appear in the preview pane or when viewing, try disabling “Download headers only.”

Please see the Outlook Connector for MDaemon – Guidelines page at www.altn.com for more information on getting the best performance out of Outlook Connector.

POP, IMAP, ActiveSync or Outlook Connector Users

Perform Regular Housekeeping

Performing the following housekeeping tasks regularly will help minimize the amount of data that Outlook must process, and will reduce the amount of memory used by the program.

We recommend performing these housekeeping tasks regularly:

  • Delete any email messages, calendar items, and contacts that are no longer needed.
  • Empty the Deleted Items folder by right-clicking it and selecting Empty Folder.
  • Delete unwanted items from the Sent Items folder.
  • Move items out of the Inbox to other mail folders.
  • Archive old messages. Mail server administrators can implement a server-wide archiving solution such as MailStore to help cut down on the amount of data stored in user mailboxes.

Disable Add-Ins

Having too many Outlook add-ins can bog down Outlook’s performance. When Outlook is installed for the first time, it comes with its own set of add-ins. Not all of these add-ins will be activated, and there may be add-ins enabled that you don’t need. Here is a list of default Outlook add-ins:

  • Business Connectivity Services Add-in
  • Microsoft Exchange Add-in
  • Microsoft Outlook Social Connector / Outlook Social Connector 2013
  • Microsoft SharePoint Server Colleague Import Add-In
  • Microsoft Exchange Unified Messaging
  • OneNote Notes about Outlook Items
  • Microsoft Access Outlook Add-In for Data Collection and Publishing
  • Microsoft VBA for Outlook Add-in
  • Windows Search Email Indexer

This page contains a List of all default Outlook Add-ins, plus other add-ins you might encounter.

In addition, other third-party applications can add their own Outlook add-ins. Fortunately, it’s easy to disable unwanted add-ins.

In Outlook 2007: Go to Tools | Trust Center | Add-ins. In the Manage drop-down list, select which add-ins you’d like to disable. Press Go, and make your changes.

In Outlook 2010, 2013 and 2016: Go to File | Options | Add-ins. Locate the Manage drop-down menu at the bottom, and select Com Add-ins, then click on Go. To disable specific add-ins, simply un-check the items you don’t need, and click on OK. You can also use the Remove button to remove selected items completely. For some add-ins, you may need to restart Outlook for your changes to take effect.

Disable Outlook Add-Ins
Disable Outlook Add-Ins

Disable RSS Feeds

If you have a lot of RSS feeds that are synchronized with Outlook, these syncing tasks could bring Outlook to a crawl. If you aren’t using Outlook as an RSS reader, you can disable this feature from Outlook by following these steps:

In Outlook 2007: Go to Tools | Options. Select the Other tab, and then click on Advanced Options. Then, uncheck both options under RSS Feeds.

In Outlook 2010 / 2013 / 2016: Go to File | Options. Click on the Advanced button in the left-hand navigation menu. Under the RSS Feeds section, uncheck both options.

Disable RSS in Outlook
Disabling RSS in Outlook

Adjusting the Send/Receive Frequency

Adjusting Outlook’s Send/Receive schedule can often improve performance. If email messages are slow showing up in your Inbox, you can configure Outlook to send/receive messages more frequently so that it doesn’t have to download as much data each time it checks for new messages. If your send/receive schedule is set to check less-frequently, say, every 30 minutes, try changing it to send/receive every 3 minutes.

Outlook 2010, 2013 and 2016 users can find this setting via File | Options | Advanced. Locate the Send/Receive section and click on the Send/Receive button. Then, under Send/Receive Groups |  All Accounts, adjust the timing for “Schedule an automatic send/receive every…” as shown here:

Outlook Send Receive Schedule
Outlook Send Receive Schedule

POP, IMAP & ActiveSync Users

Compact or Repair PST Files

PST files can be another source of Outlook sluggishness. You can help improve Outlook’s performance by:

  • Using multiple PST files.
  • Keeping attachments out of PST files.
  • Compacting PST files.

To compact a PST file in Outlook 2010, 2013 and 2016:

  • Delete any items you no longer need, and then empty the Deleted Items folder.
  • Click on the File tab on the ribbon, and then select the Info tab.
  • Click on Account Settings, and then click on Account Settings again.
  • Click on the Data Files tab.
  • Select your PST file in the list, and then click on Settings.
  • On the General tab, click on Compact Now.
  • Click on OK and Close.

    Compacting a PST in Outlook
    Compacting a PST in Outlook

To compact a PST file in Outlook 2007:

  • Delete any items you no longer need, and then empty the Deleted Items folder.
  • Navigate to Tools | Account Settings.
  • Select your desired account, and then click on Change.
  • Click on More Settings.
  • On the Advanced tab, click on Offline Folder File Settings.
  • Click on Compact Now.

Sometimes, your PST files can develop errors or data inconsistencies, resulting in unexpected behavior in Outlook. When you suspect that there’s an issue with the integrity of your PST file, you can run Scanpst.exe to repair your PST files.

Scanpst can be tricky to locate. By default, you should be able to find it in the Program Files | Microsoft Office | Office14 folder, but you may need to perform a search if you can’t find it in its default location. This location may vary depending on which version of Outlook you are using. You may also want to create a shortcut to this file on your desktop for easier access.

Before using this tool, we recommend making a backup copy of your PST file in case any errors or file corruptions occur to the original file. This shouldn’t be an issue, however, because if Scanpst finds any errors, it will prompt you to make a backup before attempting to repair the file.

Keep Windows Up-to-Date

Microsoft periodically releases Windows updates and service packs. Having the latest updates and service packs can help improve your computer’s overall performance as well as Outlook’s performance.

Conclusion

Nobody should have to put up with sluggish Outlook performance. Following the above suggestions will help ensure that you spend less time waiting for things to happen, and more time making things happen!

UPDATE: This information can now be found in our new how-to guide on improving Outlook Performance, located on our Literature page. Click here to download the PDF.

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Thwart Hackers with Strong Password Policies

For spammers, the barriers to entry are very low and the potential payoffs are very high relative to the small amounts of effort required to send out lots of spam. Spammers typically look for the “low hanging fruit” of an email system, such as mail servers that are not configured to prevent relaying, or accounts with weak passwords. If a hacker manages to guess an account’s password, he can use that account to send out large amounts of unsolicited spam email messages. This can result in your server winding up on a blacklist. Additionally, if large amounts of spam are sent out before the issue is corrected, your business can suffer lost trust and a reduction in revenue.

MDaemon’s Account Hijack Detection feature can be used to disable the account once a specified number of messages have been sent from an authenticated session within a given period of time. But it would be better to not even let a hacker get that far. Having strong passwords that are difficult to guess would help prevent an account from being hijacked in the first place.

Today, we focus on the issue of weak passwords and how to thwart hackers by implementing strong password policies. These settings are located in MDaemon under the Accounts | Account Settings configuration screen. In today’s video tutorial, we demonstrate how to require strong passwords, how to force accounts with a weak password to change their password, and how to send a Weak Passwords report to a designated email address.

Email is one of the most valuable intellectual property assets a company can have. Protect your email by enacting strong security and password policies & keep the hackers out.

Click here to learn more about MDaemon and why many small-to-medium businesses have migrated to it from Microsoft Exchange Server, or click here to download your free trial!

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

How to Deal with Spam in SecurityGateway

SecurityGateway is a powerful email spam & malware filter & gateway that can be used to protect any type of mail server. It offers a layered approach to security, with protection features including data leak prevention, attachment filtering, heuristic and Bayesian analysis, zero-hour Outbreak Protection, and much more.

In today’s video tutorial, we demonstrate best practices for handling spam in SecurityGateway. Topics covered include:

  • How to mark a message as spam to teach the Bayesian learning process how to identify junk email messages, which helps to make the spam filter more accurate over time.
  • How to use whitelists and blacklists.
  • How to manage messages in your quarantine.
  • How to find specific messages in the Message Log.

If you’d like to learn more about SecurityGateway, then visit our SecurityGateway product page.

Or download your free trial to see how easy it is to use, and let us know if you have questions!

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Grabit Campaign Spead via Phishing Attacks Spies on SMBs

There’s a new phishing campaign with a payload of malware that’s been targeting small and mid-sized businesses in Thailand, India, and the United States, as well as a few companies in Israel, Germany, and Canada. Messages sent in this campaign contain a malicious attachment disguised as a Microsoft Word document. When opened, this file loads the HawkEye keylogger software and other remote administration tools to spy on the machine, take control of it, and steal data and files. So far, thousands of passwords, emails, and usernames have been stolen from almost 5000 hosts. Data has been stolen from Outlook, Facebook, Skype, Gmail, Pinterest, Yahoo, LinkedIn,  and Twitter, as well as bank accounts. To combat this threat, update your antivirus definitions, and make sure all software patches are up-to-date.

Click here to read the original article on the Grabit phishing campaign, posted on ZDNet.

One of the key points to take away from this is that email security is not just a mail server administrator’s job. In addition to configuring the mail server to filter out as much spam, malware, phishing attempts, and viruses as possible, end users must also understand how to recognize spam, phishing attempts, and malicious attachments. Administrators need to educate their users on how to identify these threats. For a review on how to recognize these tactics and how to keep your network safe from email-borne threats, check out my post “Email Safety Tips for End Users.”

 

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

MDaemon Spam Filter Deep-Dive Webinar

In addition to its built-in spam filter, MDaemon includes many other security features that can be used to fight spam. In this webinar, we take you through an in-depth explanation of MDaemon’s spam-fighting features, and discuss recommended settings for best results.

 

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

New How-to Guide: Email Server Settings Best Practices

We’ve added a new how-to / quick-start guide to our Literature page. This guide explains the recommended settings for protecting your mail server from sending outbound spam, and includes tips on how to avoid ending up on a blacklist, how to require SMTP authentication, bandwidth management, prevention of spoofing and abuse, and more. You can find this guide under the How-to Quick-Start Guides section of our Literature page. Click on Email Server Settings: Best Practice How-to Guide.

If you have not yet installed MDaemon, then these documents will help guide you in the deployment process:

 

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

New SecurityGateway How-to Guide – Settings to Protect your Mail Server

SecurityGateway protects your mail server and end users from email-borne threats such as spam, viruses, malware, phishing attempts, and much more. For best results, SecurityGateway can  be configured to perform the following tasks:

  • Prevent spammers from guessing passwords
  • Verify that a user is valid before creating an account
  • Prevent unauthorized account access
  • Prevent unauthorized mail relaying
  • Protect your domain with IP Shielding
  • Encrypt communications with SSL
  • Prevent backscatter (out-of-office and non-delivery replies (NDRs) sent in response to messages that your users never sent)
  • ….and much more.

Click here to view the new SecurityGateway how-to guide.

Scroll down to the SecurityGateway section & click on “Settings to Protect Your Mail Server: How-to Best Practice Guide.”

If you don’t yet have SecurityGateway & would like to try it out, then visit the Downloads page & download your free trial. Let us know if you have questions!

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •