Security Gateway’s Built-in Archiving and Cloud-Based Email Integration Just got a Major Update!

fSecurity Gateway for Email Servers version 6.1. release with archiving, legal hold, and data retentionWhen it comes to email archiving, businesses require features that go beyond simple message replication in order to meet expanding regulations. And because every email solution, whether it’s on-premises or in the cloud, needs strong anti-spam/anti-malware filtering, it makes sense to combine archiving and security into a single product. To address the growing demand for a combined email security/archiving solution, archiving was added to Security Gateway for Email Servers in version 6.0.

Security Gateway’s Integrated Archiving Just Got a Lot Better!

With Security Gateway 6.1, the integrated archiving feature received a major upgrade with these new features for legal compliance and cloud email integration:

  • Legal Hold

Security Gateway’s new Legal Hold feature will prevent emails from being deleted from the archive, regardless of any other settings, user permissions, or retention periods.

Legal Hold - Security Gateway for Email Servers
Legal Hold – Security Gateway for Email Servers
  • Minimum Archive Retention Period

Businesses must meet a variety of data retention laws, and these laws vary by country or region. In the United States, many businesses must store archived emails in compliance with the following laws and retention policies:

  • IRS Regulations (for all companies) – 7 Years
  • Sarbanes Oxley Act (SOX – For all public companies) – 7 Years
  • Freedom of Information Act (FOIA – Federal, state & local agencies) – 3 Years
  • Department of Defense Regulations (for contractors) – 3 Years
  • Health Insurance Portability and Accountability Act (HIPAA) – 7 Years

To meet these and other growing regulations, administrators can assign a minimum retention period for all archived email messages. During this time, archived messages cannot be deleted regardless of any other settings or user permissions.

Email Retention Period - Security Gateway for Email Servers
Email Retention Period – Security Gateway for Email Servers

Improved Cloud/Hosted Email Integration for Microsoft Office 365 & Azure

Security Gateway’s automatic user creation feature helps reduce administrator workload by verifying whether an email sent to or from a local domain contains a valid email address, and then automatically adding the account once the email address has been verified.  With Security Gateway 6.1, this process has gotten much easier for businesses using cloud email services, with a new option to verify users by querying Microsoft Office 365 or Azure Active Directory.

Office 365 & Azure User Verificatioin - Security Gateway for Email Servers
Office 365 & Azure User Verification – Security Gateway for Email Servers

Other New Features

Other new features for Security Gateway include:

  • Whitelist & Blacklist Search – A search field was added to the Whitelist and Blacklist screens to help administrators find listed email addresses more easily.
  • Quarantine reports can now be sorted by score. This makes it easier to identify false-positives, which will likely have lower scores.

For the complete list of updates, please see the Security Gateway release notes.

If you aren’t yet protecting your business email with Security Gateway for Email Servers, visit the Security Gateway product page for an overview of its features, or visit the Download page to download a free trial!

Security Gateway Hosted/Cloud services are also available.

Summer Savings Going on Right Now!

I’ve got some exciting news! Summer is the season of savings, and this month, you can save big bucks on MDaemon Email Server and Security Gateway for Email Servers products!

During the entire month of August, we’re offering 15% OFF the price of NEW MDaemon and 15% OFF Security Gateway for Email Servers (NEW, Renewal, and Upgrades).

MDaemon and Security Gateway both ranked high in G2 Crowd’s summer reports for user satisfaction. Compare them with your current email or gateway solution, or download a free trial to get started!

MDaemon Email Server and Security Gateway Rank High in G2 Crowd’s Summer Reports

MDaemon Email Server and Security Gateway for Email - Higth Performers on G2 CrowdMDaemon Email Server and Security Gateway customers have made it clear – MDaemon Technologies delivers safe, secure email solutions that fit their unique business needs at a great price.

Users voiced their opinions on G2 Crowd this past quarter, earning both products a number of awards on the peer-to-peer review site. Recognition is based solely on customer reviews, with users rating products on what they like, what they dislike, and what problems the particular product solves.

MDaemon Email Server earned a 4.7 out of 5 star rating, netting the #2 slot in both the Highest Rated and Easiest to Use categories. In addition, customers’ positive comments also gave MDaemon Email Server the “High Performer” and “Users Love Us” badges.

Top Email Servers - G2 Crowd
Top Email Servers – G2 Crowd

Reviews of MDaemon Email Server praise the security and stability of the tool, ease of use and management, amount of control and customization, affordability, and value of customer support.

Meanwhile, Security Gateway also performed well against other email gateway products. Scoring 4.4 stars out of 5, Security Gateway placed third in the Easiest to Use group, and among the top 5 in the Highest Rated division. Security Gateway also garnered a “High Performer” badge for both the on premise and cloud Email Security Gateway solution.

Security Gateway for Email Servers - Ranking on G2 Crowd
Security Gateway for Email Servers – Ranking on G2 Crowd

Security Gateway users lauded the easy setup and management, robust security features, reporting capability, and the ability to customize the tool to fit their needs.

Where do your email solutions rank? View the G2 Grids for Best Email Software and Best Secure Email Gateway Software.

Looking for an Alternative Email Client to Microsoft Outlook? eM Client – Email and Collaboration that Works Well with MDaemon Email Server!

If you’re like me, you want an email client that’s easy to set up, easy to use, and easy on the eyes, and if it works well with MDaemon, then that’s a huge plus!

An email client that fits these criteria quite nicely is eM Client, a full-featured email client that supports email, contacts, calendars and tasks, and works on a variety of platforms and devices. Its touch-friendly design makes eM Client the ideal messaging and collaboration tool for smartphones and tablets.

eM Client is simple, elegant, customizable and easy to set up. Its built-in calendar works seamlessly with MDaemon’s free/busy server to help users avoid scheduling conflicts when planning meetings and events.

It even integrates nicely with MDaemon’s XMPP chat server for convenient instant messaging and file sharing using the integrated chat bar.

There’s even a Mac OS version!

An Email Client that’s Easy to Install and Configure. No hassles!

MDaemon users will find eM Client to be a viable alternative to Microsoft Outlook and other mail clients. Simple, hassle-free setup means users can be up and running in less than a minute by simply entering their email address and password. eM Client takes care of the rest!

To get started, download eM Client and then simply follow these steps.

  1. Launch the installer file & click Agree on the license agreement.eM Client License Agreement
  2. Click the Install button.

    eM Client Install Button
    eM Client Install Button
  3. Leave the boxes checked if you’d like to set eM Client as the default email application, run at Windows startup, and launch eM Cleint after setup, and then click on Finish.

    eM Client Install Startup Options
    eM Client Install Startup Options
  4. Enter your email address, and then click Start Now.

    eM Client Email Address
    eM Client Email Address
  5. Enter your password, and then click Continue.

    eMClient - Enter Password
    eMClient – Enter Password
  6. Verify your name and account name (your full email address), and then click Next.

    eM Client Verify Account
    eM Client Verify Account
  7. By default, email, calendars and contacts are automatically synced, and instant messaging via XMPP is enabled. Click on Finish to continue.

    eM Client Sync Calendars and Contacts
    eM Client Sync Calendars and Contacts

That’s it! You can now begin using eM Client with MDaemon!

 

Expiring Support for Older Software: Renew & Upgrade for the Latest Features & Improved Security!

As our products have evolved over the years, with new features added regularly, older versions of our software are eventually no longer supported.

Effective July 30, 2019, technical support will be discontinued for the following product versions:

  • MDaemon – Versions 14.5.x and below
  • Security Gateway – Versions 4.5.x and below
  • Outlook Connector – Versions 4.5.x and below
  • SecurityPlus – Versions 5.0.x and below

For continued support, this is a great opportunity to renew your license and upgrade to most recent versions of our software to take advantage of the latest features! As a current user we offer an automatic 30% discount off the price of a new purchase!

Upgrade MDaemon today and get these exciting new features:

MDaemon, webmail, chat, IM, collaboration
Integrated instant messaging in MDameon Webmail

Check out our MDaemon Features by Version page to see what you could be missing!

After July 30, 2019, supported versions of MDaemon will include MDaemon 15 & up.

Upgrade Security Gateway for Email Servers today and get these exciting new features:

When you upgrade to the latest release of Security Gateway, you can take advantage of these new features:

Archiving Features in Security Gateway
Archiving Features in Security Gateway

More information on these new features can be found on our Security Gateway Product Page.

MDaemon Connector for Outlook (formerly Outlook Connector for MDaemon) has new features, too!

MDaemon Connector for Outlook Client Settings
Control MDaemon Connector for Outlook client settings from the MDaemon console

Outlook Connector has been re-branded as MDaemon Connector for Outlook, and, beginning with MDaemon 18,  is now included with MDaemon as a licensed feature (via purchase of separate license).

 

Therefore, in the latest version of MDaemon, a separate download is not required on the MDaemon server. Simply enter your MDaemon Connector license key via Help | Register your MDaemon Products to activate MDaemon Connector for Outlook. Features introduced after version 4.5 include:

  • “Expired password” or “password change required” notification for end users
  • Administrator control over which Outlook add-ins are allowed or disabled
  • Junk Email folder / Blocked Senders support
  • S/MIME support for message signing and encryption
  • MDaemon Connector configuration reports for administrators, with Outlook send/receive schedules for all accounts.
  • Centrally-managed send/receive schedules
  • Nearing/over quota alerts for end users
  • New database management tools to help administrators maintain optimal performance

Visit the MDaemon Connector for Outlook product page to learn more!

MDaemon Antivirus – with Cyren AV and Mailbox Scanning

SecurityPlus has been rebranded as MDaemon Antivirus, and beginning with MDaemon 18,  is also now a licensed feature of MDaemon that no longer requires a separate download.

Recent versions of MDaemon Antivirus include these new features:

  • Mailbox scanning
  • Cyren AV (The Kaspersky AV engine was replaced by Cyren in October, 2017)
  • ClamAV antivirus plugin
  • Exclusions for password-protected files for approved senders or recipients

Visit the MDaemon Antivirus page to learn more.

MDaemon Antivirus - Mailbox Scanning
MDaemon Antivirus – Mailbox Scanning

Would  you like to take advantage of these new features? Click here to upgrade or renew your product license today and receive the latest security and administration updates as they become available for the duration of your license term!

 

Keep your Mail Server Running Smoothly with Today’s MDaemon Maintenance Update

MDaemon Email Server UpdateTo ensure MDaemon and its plugins provide the most up-to-date security and best performance, we often provide maintenance updates to help our customers get the most out of their business email and collaboration server.

Today, we’ve released MDaemon 19.0.2. With this update, we’ve squashed a few minor bugs and updated MDaemon Connector for Outlook to version 6.0.2.

More information on what’s included in these updates can be found in the MDaemon release notes.

Are you running an older version of MDaemon? If so, you could be missing out on many features we’ve recently added, including integrated chat and saved searches in MDaemon Webmail, new ways to share your MDaemon calendars, Message Snooze, and much more.

Visit the MDaemon Download page to download the best ever version of MDaemon!

Not Today, Scammer! Today’s Phishing Attempt

A brief glance through my Spam folder in MDaemon Webmail today reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. Because businesses have already lost millions of dollars to these scams and continue to fall victim every day, it bears repeating that, while spam filters and secure email gateways continue to improve, no solution is 100% fool-proof.

Today’s phishing example was scanned by MDaemon, determined to be spam, and placed in my Spam folder for review (MDaemon can also be configured to delete spam instead of placing it in the user’s spam folder).

Most of us will likely be immediately suspicious due to all-caps “REMINDER!!!” at the top of the message, but what other phishing clues can you identify?

Phishing example, spam email
Phishing attempt with malicious file attachment

In this example, the scammer has used display name spoofing  to make the message appear to be from DHL. Most large businesses such as DHL have policies regarding email communications. DHL’s fraud awareness policy, which you can read here on their website, states:

“Please be advised that if you received an email suggesting that DHL is attempting to deliver a package requesting that you open the email attachment in order to affect delivery, this email is fraudulent, the package does not exist and the attachment may be a computer virus.

Please do not open the attachment. This email and attachment does not originate from DHL.”

But for most of us who remain unaware of DHL’s policies, it’s important to know what to look for to avoid becoming the next victim to phishing scams.

Using the DHL example, I’ve labeled the items to look out for when reviewing a suspicious email.

Phishing Example and What to Look For
Phishing Example and What to Look For

No business is too big or too small to educate its users about phishing. After all, it only takes one user to open a malicious attachment and unleash malware vicious enough to take down an entire company. Learn more about how to avoid being the next victim by reviewing these 10 tips to identify a phishing email.

Never Lose an Important Email: How to Track Messages in Security Gateway

Most of our customers are small-to-medium businesses with limited IT budgets across a variety of industries – including healthcare, education, manufacturing, and government. Having a limited IT budget often means having limited staff available for troubleshooting email or tracking down messages, so when considering which email gateway/spam filter you want for your business, one of the main criteria to consider is how easy it is to find messages for your users. Users who are expecting business-critical messages need to know ASAP what happened if that message is not delivered. With Security Gateway, it’s easy to find out if a message was rejected, quarantined or delivered. If it was rejected or quarantined, color-coded transcripts make it easy to determine exactly why the message was not delivered.

At-a-Glance: The Message Log Window

Let’s have a look at the message log and its layout.

Use message list buttons to search messages, view message details, redeliver, whitelist or blacklist, or perform other actions.
Use buttons across the top to search messages, view message details, redeliver, whitelist or blacklist, or perform other actions.

Use the buttons across the top to:

  • Refresh the message list
  • Search for messages. Advanced search options are provided, allowing you to find messages based on a variety of criteria, such as message contents, delivery date, the result of the message delivery attempt, keywords in a message header, and others.
  • View message details (providing the same information as double-clicking the message)
  • Redeliver the message. Note that if the issue that made a message undeliverable still exists then the message will return to the message log with the same status.
  • Whitelist the sender or sender’s domain
  • Blacklist the sender or sender’s domain
Use the blue buttons to enable or disable columns in the SecurityGateway message list
Use the blue buttons to enable or disable columns in the SecurityGateway message list

Press the blue buttons to enable or disable specific columns.

The left & right-facing arrows indicate inbound and outbound messages.
The left & right-facing arrows indicate inbound and outbound messages.

The right-facing blue arrows indicate outbound messages, and the left-facing green arrows indicate inbound messages.

The remaining columns from left-to-right include:

  • Date (notice the arrow indicating sort order)
  • The message sender (From)
  • The message recipient
  • The message subject
  • The result of the message delivery attempt (Delivered, Quarantined, Rejected, etc.)
  • The reason the message was quarantined or rejected (for those that meet these criteria)
  • The message size
  • The final message score based on the total score accumulated by all security tests performed

Viewing message transcripts to determine a message’s fate

Now that we’re familiar with the layout of the message listing, let’s review how to troubleshoot email delivery issues.

Key events in a message’s transcript are color-coded for easy identification. In the following example, the message was scanned by SpamAssassin. During this process, it accumulated 1.7 points. It was then scanned by Outbreak Protection, during which it accumulated an additional 5.5 points. Finally, the total message score was tallied with a final score of 12.2 points and was rejected.

Message tracking with color-coded events for easy troubleshooting
Message tracking with color-coded events for easy troubleshooting

We’ve created the following video to help you become more familiar with message tracking in Security Gateway.

Would you like to learn more about how Security Gateway can protect your business from spam, phishing attempts and malware? Click here to download your free trial!

Introducing MDaemon 19 – with Updates for Security, Reporting, & Webmail

This week, we released version 19 of the MDaemon Email Server, with new features that benefit administrators and end users. The following is a summary of key improvements for email security and productivity. You can view the complete list of new features and updates in the MDaemon release notes.

New MDaemon Email Server Features for Administrators

One of the first things administrators will notice is that the behavior of the “Start MDaemon” Start menu shortcut has changed. When clicked, you’ll now be taken to MDaemon Remote Administration via your browser. If you’d like to launch the MDaemon Email Server console directly, you can use the “Open MDaemon Configuration Session” shortcut, as shown here:MDaemon Email Server Start Menu

Enhanced Integration with Third-Party Plugins

MDaemon’s XML-API has been expanded to include additional capabilities. Folders and their contents can be created, deleted, renamed, and moved using the API. Developers can use these expanded features to display or manipulate the content of user mailboxes.

“External Message” Warning

A new “External Sender” Content Filter condition has been added, along with a new “Add a warning to the top of the message” action. This allows MDaemon administrators to create a rule that will add a custom warning to the top of all email messages originating from external sources – providing extra protection against phishing attempts by alerting users to treat these messages with extra care.

External Message Warning in MDaemon Email Server
External Message Warning

Extnernal Sender Warning

Support for Separate SSL Certificates for Each Host/Domain

MDaemon supports TLS Server Name Indication (SNI). This allows domains and host names to have their own assigned SSL/TLS certificate, rather than having to share a single certificate.

MDaemon - Support for multiple SSL certificates

New Authentication Failure & Frozen Account Reports

MDaemon’s Dynamic Screening feature includes the option to send authentication failure and frozen account reports to end users. When a given number of authentication failures has been reached, or when an account has been frozen, the user is notified so that corrective action can be taken.

MDaemon Authentication Failure Reports
MDaemon Authentication Failure Reports

New MDaemon Email Server Features for End Users

MDaemon Webmail – “All Unread” and “All Flagged” Saved Searches

When logging in for the first time, MDaemon Webmail users will receive a prompt asking if they would like to create an “All Unread” and “All Flagged” saved search for convenient, one-click access to unread or important email messages.

MDaemon Webmail Saved Search - All Unread All Flagged

MDaemon Webmail – Expired Session Indicator

MDaemon Webmail will display (EXPIRED) on the browser tab when a user’s session has expired. This allows users who have multiple browser tabs open to be notified when they have been logged out of MDaemon Webmail without having to switch tabs.

MDaemon Webmail Expired Session Notification
MDaemon Webmail Expired Session Notification

Other MDaemon Email Server Improvements Include:

  • Autodiscover support has been expanded to accommodate a wider variety of connecting email clients (including eM Client, Thunderbird, Outlook, and others). The service can also now be configured to pass a custom host name to the connecting client on a per-service basis (for example: administrators can configure ActiveSync to connect to activesync.domain.com and IMAP to connect to imap.domain.com, etc.).
  • The option “Only send antivirus update notification on failure” is now enabled by default, and when updating to MDaemon 19, it will be enabled the first time MDaemon starts up.
  • MDaemon Remote Administration New Features:
    • Added license management options to the Registration page.
    • Added AntiVirus Updater and Scheduler dialog
    • Added queue counts, process message counts, other process counts, session statistics, and more process states to the Status page.
  • The MDaemon AntiVirus configuration screen has been updated. Both antivirus engines (Cyren and ClamAV) can now be configured from a single screen.
  • When ActiveSync is disabled for a domain, administrators will receive a pop-up asking if they would like to revoke ActiveSync access for users of the selected domain. This makes it easier to revoke access and reduces the usage of ActiveSync licenses.
  • The STARTTLS White List now takes precedence over the STARTTLS Required List and the “SMTP server requires STARTTLS on MSA port” option.
  • New options have been added to Security | Spam Filter | Spam Honeypots and Security | Security Settings | Screening | SMTP Screen to enable/disable the Dynamic Screening notification when an IP is blocked.

These are the main highlights. For a complete list of new features & enhancements in the latest MDaemon Email Server, please see the MDaemon release notes. If you’re not currently using MDaemon and would like to learn more about how MDaemon can save your company time and money, click here to download your free trial!

10 Tips to Identify a Phishing Email

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Modern day email scams are getting more sophisticated, leading to staggering losses for businesses of all sizes. According to the 2018 Verizon Data Breach Investigations Report, phishing was used in 93% of all reported breaches, with email being the main attack vector in 96% of reported cases.

While these figures are staggering, they continue to rise as scammers reap huge payouts from BEC (Business Email Compromise), CEO fraud and other phishing scams.

The real estate industry is a prime target for phishing because large sums of money change hands and there are various weak links in the transaction process. If any step within the transaction process becomes compromised with a successful phishing email, the attacker could gain access to a legitimate email address from which to launch other attacks. The fraudster could then lie in wait, scanning email messages for financial or transaction related details, and then send off fraudulent wire transfer instructions to an unsuspecting buyer, seller, or agent. For example, this happened to a 31 year-old first-time home buyer in San Antonio, Texas. You can read details about this case here, but the short version of the story is that she felt that she was in a time crunch to send in her down payment and finalize other closing tasks, and felt that the title company was dragging its feet. This state of high anxiety made her a prime target for a phishing email she received stating that she had previously been given the wrong wire transfer information, and that she needed to wire her down payment to a new account. With 5 hours left to get everything done, she attempted to contact her title company to confirm the change, but no one responded, so in a panic, she hastily ran to the bank and wire transferred her $52,000 down payment. Unfortunately, she sent her life savings to scammers.

The phishing industry is so lucrative for scammers because the barriers to entry are low relative to potential huge payouts. With botnets-for-hire and Malware as a Service (Maas), spammers have an impressive arsenal of tools at their disposal to propagate their campaigns, so to fight this scourge, an educated user is the best defense against phishing scams. With this in mind, here are my top 10 tips on how to identify and protect yourself from phishing attacks.

  1. Watch out for messages disguised as something expected, like a shipment or payment notification. These often contain links to malware sites. Hover your mouse over any links to make sure they’re safe. Think before you click! Here’s an example using a phishing email I received claiming to come from HSBC.

    Payment notification phishing email
    Watch for unexpected payment or shipment notices
  2. Watch for messages asking for personal information such as account numbers, Social Security numbers, and other personal information. Legitimate companies will never ask for this over email.
  3. Beware of urgent or threatening messages claiming that your account has been suspended and prompting you to click on a link to unlock your account.
  4. Check for poor grammar or spelling errors. While legitimate companies are very strict about emails they send out, Phishing emails often contain poor spelling or grammar.
  5. Hover before you click! Phishing emails often contain links to malware sites. Don’t trust the URL you see! Always hover your mouse over the link to view its real destination. If the link claims to point to a known, reputable site, it’s always safer to manually type the URL into your browser’s address bar.
  6. Check the Greeting – Is the message addressed to a generic recipient, such as “Valued customer” or “Sir/Madam?” If so, be careful & think twice! Legitimate businesses will often use your real first and last name. In our HSBC example, notice the generic greeting.

    Watch for generic greetings in email messages
    Watch for generic greetings in email messages
  7. Check the Signature – In addition to the greeting, phishing emails often leave out important information in the signature. Legitimate businesses will always have accurate contact details in their signature, so if a message’s signature looks incomplete or inaccurate, chances are it’s spam. In our HSBC example, the sender’s name and contact information are missing from the signature.

    Watch for generic signatures in phishing email messages.
    Watch for generic signatures in phishing email messages.
  8. Don’t download Attachments – With the proliferation of Ransomware as a Service (Raas), spammers have an easy mechanism for distributing malware-laden spam messages to thousands of users. And because the payout for ransomware can be quite high, even one successful ransomware infection could net the spammer large amounts of money. If there’s ANY doubt about the identity of the message sender or the contents of an attachment, play it safe and don’t download the attachment.
  9. Don’t trust the From address – Many phishing emails will have a forged sender address. The From address is displayed in two places. The Envelope From is used by mail servers to generate NDR messages, while the Header From is used by the email client to display information in the From field. Both of these headers can be spoofed. MDaemon Webmail has built-in security features to help users identify spoofed emails. Many mail clients hide the From address, only showing the From name, which can be easily spoofed. In MDaemon Webmail, the From address is always displayed, giving users a clearer view into the source of the email and helping them identify spoofed senders. Using our HSBC example, I’ve highlighted the actual sender.
    Phishing email highlighting the actual sending address
    Phishing email highlighting the actual sending address

    MDaemon Webmail will also display information in the Security tag to help users identify messages from verified senders, as shown here.

    MDaemon Webmail - DKIM-Verified Sender
    MDaemon Webmail – DKIM-Verified Sender
  10. Don’t Enable Macros – And while we’re on the subject of ransomware, another common vector for ransomware infections is through macros in Microsoft Word documents. These documents often arrive in phishing emails claiming to have important content from HR, Finance, or another important department, and to trick the user, they request the user to enable macros. Never trust an email that asks you to enable macros before downloading a Word document.

While anti-spam and anti-malware tools are quite effective at filtering out the majority of scams, there’s really no substitute for good old-fashioned user education. Know the potential costs to your business and don’t become the next victim!

If you’re the MDaemon or SecurityGateway administrator and need help with your security settings to help block as much phishing as possible before it reaches your users, give us a call or drop us an email support request.