We’re Extending our Summer Savings Discount on MDaemon Email Server & Security Gateway for Email Servers!

As we endure the heat of the “dog days” of summer here in the northern hemisphere, we start to see tell-tale signs of the approaching end of summer – kids going back to school, the sun setting slightly earlier each night. But not all good things must end in August. Therefore, I’m excited to announce the extension of our 15% off Summer Savings promotion – now through September!

Through September 30, when you make a new purchase of MDaemon or purchase, renew, or upgrade Security Gateway, you’ll automatically receive 15% off the regular price.

Whether you’re tired of the expense and headache of managing Microsoft Exchange Server, or are looking for a secure, affordable alternative to Kerio, IceWarp, or Gmail, MDaemon’s migration tools can help you migrate your business email and groupware data.  Additional migration information and how-to guides for Security Gateway can be found on our Literature page.

Compare MDaemon and Security Gateway for Email Servers with your current solution, or click here to download your free trial!

Phishing Email Uses Google Drive to Get Past Microsoft Security

Phishing, email scams, tips to avoid spear-phishing

This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients.  The email came from Google Drive, but the sender address didn’t match the company’s standard naming convention for email addresses.

Because the message was sent by a legitimate email service, it was able to bypass Microsoft Exchange Online Protection on its way to users’ inboxes.

You can read the full article here.

No Spam Filter or Email Gateway can Block 100% of All Spam

Spam Filters and Email Gateways have proven quite effective at blocking most of the junk email that gets sent by the thousands on a daily basis, but cyber criminals are always looking for new ways to bypass email security measures through social engineering, new strains of malware, and newly-discovered security flaws reported in  Microsoft Exchange Server and cloud email platforms. That’s why user training will continue to be a top priority for all businesses that use  email.

Tips to Avoid Phishing and Business Email Compromise (BEC) Attacks

In a prior post, I listed the following 10 tips to avoid falling victim to phishing emails.. Here’s a brief summary. You can read the entire post here.

10 Tips to Identify a Phishing Email

  1. Watch out for messages disguised as something expected, like a shipment or payment notification.
  2. Watch for messages asking for personal information such as account numbers, Social Security numbers, and other personal information. Legitimate companies will never ask for this over email.
  3. Beware of urgent or threatening messages claiming that your account has been suspended and prompting you to click on a link to unlock your account.
  4. Check for poor grammar or spelling errors.
  5. Hover before you click!
  6. Check the Greeting – Is the message addressed to a generic recipient, such as “Valued customer” or “Sir/Madam?” If so, be careful & think twice!
  7. Check the Email Signature – In addition to the greeting, phishing emails often leave out important information in the signature. Legitimate businesses will always have accurate contact details in their signature, so if a message’s signature looks incomplete or inaccurate, chances are it’s spam.
  8. Don’t download Attachments
  9. Don’t trust the From address –Know the difference between the “envelope From” and the “header From” addresses.
  10. Don’t Enable Macros –  Never trust an email that asks you to enable macros before downloading a Word document.

These 10 tips are explained in more detail in this post.

10 Tips to Protect Against Business Email Compromise (BEC) Email Attacks

Business Email Compromise goes beyond standard spam techniques by exploiting human nature and the trust established between employees and members of the executive team. Scammers use social engineering, CEO impersonation, and a variety of other techniques to trick users in accounting, finance, or other high-power positions into transferring money into the scammer’s accounts. These attacks are well-executed and targeted at specific individuals, and often take more time to plan and launch due to the amount of research that goes into these attacks. Cyber criminals use publicly available information on sites such as LinkedIn, Facebook and even the website of the targeted victim to gain insight into the company’s business practices. They will often study the writing styles of the executive team, allowing them to craft convincing emails that appear authentic to employees.

Because Business Email Compromise attacks are often so well-crafted, they are able to bypass standard security measures. These tips should help you identify a Business Email Compromise attempt if one should slip through your spam filter or email gateway.

  1. Train Users to recognize these Common Impersonation Tactics used by Cybercriminals
    • Domain Name Spoofing
    • Display Name Spoofing
    • Lookalike Domain Spoofing
    • Compromised Account
  2. Secure your Domain by registering similar domains.
  3. Don’t Over-share on Social Media
  4. Use SPF, DKIM & DMARC to protect your domain from spoofing.
  5. Use Two-Factor Authentication
  6. Use Strong Passwords
  7. Don’t trust unknown sources
  8. Establish strict processes for wire transfers
  9. Provide regular end-user training
  10. Run antivirus software often

You can learn more on how to avoid Business Email Compromise attacks here.

No business is too big or too small to fall victim to email-borne scams. In fact, cyber criminals often target smaller businesses based on the assumption that smaller companies are less likely to have the latest security systems in place. MDaemon Email Server and Security Gateway for Email Servers include a variety of features to protect businesses from spam, malware, and leaks of sensitive business data.

15% discount during August, 2019 for MDaemon Email Server and Security Gateway for Email Servers

Looking for a secure, affordable email and collaboration server or email security gateway for your business? This month, we’re offering a 15% discount off the price of MDaemon Email Server (new purchases), and Security Gateway for Email Servers (new, renewal, and upgrades).

Comments? Question? Let us know. We’re here to help!


Security Gateway’s Built-in Archiving and Cloud-Based Email Integration Just got a Major Update!

fSecurity Gateway for Email Servers version 6.1. release with archiving, legal hold, and data retentionWhen it comes to email archiving, businesses require features that go beyond simple message replication in order to meet expanding regulations. And because every email solution, whether it’s on-premises or in the cloud, needs strong anti-spam/anti-malware filtering, it makes sense to combine archiving and security into a single product. To address the growing demand for a combined email security/archiving solution, archiving was added to Security Gateway for Email Servers in version 6.0.

Security Gateway’s Integrated Archiving Just Got a Lot Better!

With Security Gateway 6.1, the integrated archiving feature received a major upgrade with these new features for legal compliance and cloud email integration:

  • Legal Hold

Security Gateway’s new Legal Hold feature will prevent emails from being deleted from the archive, regardless of any other settings, user permissions, or retention periods.

Legal Hold - Security Gateway for Email Servers
Legal Hold – Security Gateway for Email Servers
  • Minimum Archive Retention Period

Businesses must meet a variety of data retention laws, and these laws vary by country or region. In the United States, many businesses must store archived emails in compliance with the following laws and retention policies:

  • IRS Regulations (for all companies) – 7 Years
  • Sarbanes Oxley Act (SOX – For all public companies) – 7 Years
  • Freedom of Information Act (FOIA – Federal, state & local agencies) – 3 Years
  • Department of Defense Regulations (for contractors) – 3 Years
  • Health Insurance Portability and Accountability Act (HIPAA) – 7 Years

To meet these and other growing regulations, administrators can assign a minimum retention period for all archived email messages. During this time, archived messages cannot be deleted regardless of any other settings or user permissions.

Email Retention Period - Security Gateway for Email Servers
Email Retention Period – Security Gateway for Email Servers

Improved Cloud/Hosted Email Integration for Microsoft Office 365 & Azure

Security Gateway’s automatic user creation feature helps reduce administrator workload by verifying whether an email sent to or from a local domain contains a valid email address, and then automatically adding the account once the email address has been verified.  With Security Gateway 6.1, this process has gotten much easier for businesses using cloud email services, with a new option to verify users by querying Microsoft Office 365 or Azure Active Directory.

Office 365 & Azure User Verificatioin - Security Gateway for Email Servers
Office 365 & Azure User Verification – Security Gateway for Email Servers

Other New Features

Other new features for Security Gateway include:

  • Whitelist & Blacklist Search – A search field was added to the Whitelist and Blacklist screens to help administrators find listed email addresses more easily.
  • Quarantine reports can now be sorted by score. This makes it easier to identify false-positives, which will likely have lower scores.

For the complete list of updates, please see the Security Gateway release notes.

If you aren’t yet protecting your business email with Security Gateway for Email Servers, visit the Security Gateway product page for an overview of its features, or visit the Download page to download a free trial!

Security Gateway Hosted/Cloud services are also available.

Summer Savings Going on Right Now!

I’ve got some exciting news! Summer is the season of savings, and this month, you can save big bucks on MDaemon Email Server and Security Gateway for Email Servers products!

During the entire month of August, we’re offering 15% OFF the price of NEW MDaemon and 15% OFF Security Gateway for Email Servers (NEW, Renewal, and Upgrades).

MDaemon and Security Gateway both ranked high in G2 Crowd’s summer reports for user satisfaction. Compare them with your current email or gateway solution, or download a free trial to get started!

MDaemon Email Server and Security Gateway Rank High in G2 Crowd’s Summer Reports

MDaemon Email Server and Security Gateway for Email - Higth Performers on G2 CrowdMDaemon Email Server and Security Gateway customers have made it clear – MDaemon Technologies delivers safe, secure email solutions that fit their unique business needs at a great price.

Users voiced their opinions on G2 Crowd this past quarter, earning both products a number of awards on the peer-to-peer review site. Recognition is based solely on customer reviews, with users rating products on what they like, what they dislike, and what problems the particular product solves.

MDaemon Email Server earned a 4.7 out of 5 star rating, netting the #2 slot in both the Highest Rated and Easiest to Use categories. In addition, customers’ positive comments also gave MDaemon Email Server the “High Performer” and “Users Love Us” badges.

Top Email Servers - G2 Crowd
Top Email Servers – G2 Crowd

Reviews of MDaemon Email Server praise the security and stability of the tool, ease of use and management, amount of control and customization, affordability, and value of customer support.

Meanwhile, Security Gateway also performed well against other email gateway products. Scoring 4.4 stars out of 5, Security Gateway placed third in the Easiest to Use group, and among the top 5 in the Highest Rated division. Security Gateway also garnered a “High Performer” badge for both the on premise and cloud Email Security Gateway solution.

Security Gateway for Email Servers - Ranking on G2 Crowd
Security Gateway for Email Servers – Ranking on G2 Crowd

Security Gateway users lauded the easy setup and management, robust security features, reporting capability, and the ability to customize the tool to fit their needs.

Where do your email solutions rank? View the G2 Grids for Best Email Software and Best Secure Email Gateway Software.

Looking for an Alternative Email Client to Microsoft Outlook? eM Client – Email and Collaboration that Works Well with MDaemon Email Server!

If you’re like me, you want an email client that’s easy to set up, easy to use, and easy on the eyes, and if it works well with MDaemon, then that’s a huge plus!

An email client that fits these criteria quite nicely is eM Client, a full-featured email client that supports email, contacts, calendars and tasks, and works on a variety of platforms and devices. Its touch-friendly design makes eM Client the ideal messaging and collaboration tool for smartphones and tablets.

eM Client is simple, elegant, customizable and easy to set up. Its built-in calendar works seamlessly with MDaemon’s free/busy server to help users avoid scheduling conflicts when planning meetings and events.

It even integrates nicely with MDaemon’s XMPP chat server for convenient instant messaging and file sharing using the integrated chat bar.

There’s even a Mac OS version!

An Email Client that’s Easy to Install and Configure. No hassles!

MDaemon users will find eM Client to be a viable alternative to Microsoft Outlook and other mail clients. Simple, hassle-free setup means users can be up and running in less than a minute by simply entering their email address and password. eM Client takes care of the rest!

To get started, download eM Client and then simply follow these steps.

  1. Launch the installer file & click Agree on the license agreement.eM Client License Agreement
  2. Click the Install button.

    eM Client Install Button
    eM Client Install Button
  3. Leave the boxes checked if you’d like to set eM Client as the default email application, run at Windows startup, and launch eM Cleint after setup, and then click on Finish.

    eM Client Install Startup Options
    eM Client Install Startup Options
  4. Enter your email address, and then click Start Now.

    eM Client Email Address
    eM Client Email Address
  5. Enter your password, and then click Continue.

    eMClient - Enter Password
    eMClient – Enter Password
  6. Verify your name and account name (your full email address), and then click Next.

    eM Client Verify Account
    eM Client Verify Account
  7. By default, email, calendars and contacts are automatically synced, and instant messaging via XMPP is enabled. Click on Finish to continue.

    eM Client Sync Calendars and Contacts
    eM Client Sync Calendars and Contacts

That’s it! You can now begin using eM Client with MDaemon!


Expiring Support for Older Software: Renew & Upgrade for the Latest Features & Improved Security!

As our products have evolved over the years, with new features added regularly, older versions of our software are eventually no longer supported.

Effective July 30, 2019, technical support will be discontinued for the following product versions:

  • MDaemon – Versions 14.5.x and below
  • Security Gateway – Versions 4.5.x and below
  • Outlook Connector – Versions 4.5.x and below
  • SecurityPlus – Versions 5.0.x and below

For continued support, this is a great opportunity to renew your license and upgrade to most recent versions of our software to take advantage of the latest features! As a current user we offer an automatic 30% discount off the price of a new purchase!

Upgrade MDaemon today and get these exciting new features:

MDaemon, webmail, chat, IM, collaboration
Integrated instant messaging in MDameon Webmail

Check out our MDaemon Features by Version page to see what you could be missing!

After July 30, 2019, supported versions of MDaemon will include MDaemon 15 & up.

Upgrade Security Gateway for Email Servers today and get these exciting new features:

When you upgrade to the latest release of Security Gateway, you can take advantage of these new features:

Archiving Features in Security Gateway
Archiving Features in Security Gateway

More information on these new features can be found on our Security Gateway Product Page.

MDaemon Connector for Outlook (formerly Outlook Connector for MDaemon) has new features, too!

MDaemon Connector for Outlook Client Settings
Control MDaemon Connector for Outlook client settings from the MDaemon console

Outlook Connector has been re-branded as MDaemon Connector for Outlook, and, beginning with MDaemon 18,  is now included with MDaemon as a licensed feature (via purchase of separate license).


Therefore, in the latest version of MDaemon, a separate download is not required on the MDaemon server. Simply enter your MDaemon Connector license key via Help | Register your MDaemon Products to activate MDaemon Connector for Outlook. Features introduced after version 4.5 include:

  • “Expired password” or “password change required” notification for end users
  • Administrator control over which Outlook add-ins are allowed or disabled
  • Junk Email folder / Blocked Senders support
  • S/MIME support for message signing and encryption
  • MDaemon Connector configuration reports for administrators, with Outlook send/receive schedules for all accounts.
  • Centrally-managed send/receive schedules
  • Nearing/over quota alerts for end users
  • New database management tools to help administrators maintain optimal performance

Visit the MDaemon Connector for Outlook product page to learn more!

MDaemon Antivirus – with Cyren AV and Mailbox Scanning

SecurityPlus has been rebranded as MDaemon Antivirus, and beginning with MDaemon 18,  is also now a licensed feature of MDaemon that no longer requires a separate download.

Recent versions of MDaemon Antivirus include these new features:

  • Mailbox scanning
  • Cyren AV (The Kaspersky AV engine was replaced by Cyren in October, 2017)
  • ClamAV antivirus plugin
  • Exclusions for password-protected files for approved senders or recipients

Visit the MDaemon Antivirus page to learn more.

MDaemon Antivirus - Mailbox Scanning
MDaemon Antivirus – Mailbox Scanning

Would  you like to take advantage of these new features? Click here to upgrade or renew your product license today and receive the latest security and administration updates as they become available for the duration of your license term!


Keep your Mail Server Running Smoothly with Today’s MDaemon Maintenance Update

MDaemon Email Server UpdateTo ensure MDaemon and its plugins provide the most up-to-date security and best performance, we often provide maintenance updates to help our customers get the most out of their business email and collaboration server.

Today, we’ve released MDaemon 19.0.2. With this update, we’ve squashed a few minor bugs and updated MDaemon Connector for Outlook to version 6.0.2.

More information on what’s included in these updates can be found in the MDaemon release notes.

Are you running an older version of MDaemon? If so, you could be missing out on many features we’ve recently added, including integrated chat and saved searches in MDaemon Webmail, new ways to share your MDaemon calendars, Message Snooze, and much more.

Visit the MDaemon Download page to download the best ever version of MDaemon!

Not Today, Scammer! Today’s Phishing Attempt

A brief glance through my Spam folder in MDaemon Webmail today reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. Because businesses have already lost millions of dollars to these scams and continue to fall victim every day, it bears repeating that, while spam filters and secure email gateways continue to improve, no solution is 100% fool-proof.

Today’s phishing example was scanned by MDaemon, determined to be spam, and placed in my Spam folder for review (MDaemon can also be configured to delete spam instead of placing it in the user’s spam folder).

Most of us will likely be immediately suspicious due to all-caps “REMINDER!!!” at the top of the message, but what other phishing clues can you identify?

Phishing example, spam email
Phishing attempt with malicious file attachment

In this example, the scammer has used display name spoofing  to make the message appear to be from DHL. Most large businesses such as DHL have policies regarding email communications. DHL’s fraud awareness policy, which you can read here on their website, states:

“Please be advised that if you received an email suggesting that DHL is attempting to deliver a package requesting that you open the email attachment in order to affect delivery, this email is fraudulent, the package does not exist and the attachment may be a computer virus.

Please do not open the attachment. This email and attachment does not originate from DHL.”

But for most of us who remain unaware of DHL’s policies, it’s important to know what to look for to avoid becoming the next victim to phishing scams.

Using the DHL example, I’ve labeled the items to look out for when reviewing a suspicious email.

Phishing Example and What to Look For
Phishing Example and What to Look For

No business is too big or too small to educate its users about phishing. After all, it only takes one user to open a malicious attachment and unleash malware vicious enough to take down an entire company. Learn more about how to avoid being the next victim by reviewing these 10 tips to identify a phishing email.

Never Lose an Important Email: How to Track Messages in Security Gateway

Most of our customers are small-to-medium businesses with limited IT budgets across a variety of industries – including healthcare, education, manufacturing, and government. Having a limited IT budget often means having limited staff available for troubleshooting email or tracking down messages, so when considering which email gateway/spam filter you want for your business, one of the main criteria to consider is how easy it is to find messages for your users. Users who are expecting business-critical messages need to know ASAP what happened if that message is not delivered. With Security Gateway, it’s easy to find out if a message was rejected, quarantined or delivered. If it was rejected or quarantined, color-coded transcripts make it easy to determine exactly why the message was not delivered.

At-a-Glance: The Message Log Window

Let’s have a look at the message log and its layout.

Use message list buttons to search messages, view message details, redeliver, whitelist or blacklist, or perform other actions.
Use buttons across the top to search messages, view message details, redeliver, whitelist or blacklist, or perform other actions.

Use the buttons across the top to:

  • Refresh the message list
  • Search for messages. Advanced search options are provided, allowing you to find messages based on a variety of criteria, such as message contents, delivery date, the result of the message delivery attempt, keywords in a message header, and others.
  • View message details (providing the same information as double-clicking the message)
  • Redeliver the message. Note that if the issue that made a message undeliverable still exists then the message will return to the message log with the same status.
  • Whitelist the sender or sender’s domain
  • Blacklist the sender or sender’s domain
Use the blue buttons to enable or disable columns in the SecurityGateway message list
Use the blue buttons to enable or disable columns in the SecurityGateway message list

Press the blue buttons to enable or disable specific columns.

The left & right-facing arrows indicate inbound and outbound messages.
The left & right-facing arrows indicate inbound and outbound messages.

The right-facing blue arrows indicate outbound messages, and the left-facing green arrows indicate inbound messages.

The remaining columns from left-to-right include:

  • Date (notice the arrow indicating sort order)
  • The message sender (From)
  • The message recipient
  • The message subject
  • The result of the message delivery attempt (Delivered, Quarantined, Rejected, etc.)
  • The reason the message was quarantined or rejected (for those that meet these criteria)
  • The message size
  • The final message score based on the total score accumulated by all security tests performed

Viewing message transcripts to determine a message’s fate

Now that we’re familiar with the layout of the message listing, let’s review how to troubleshoot email delivery issues.

Key events in a message’s transcript are color-coded for easy identification. In the following example, the message was scanned by SpamAssassin. During this process, it accumulated 1.7 points. It was then scanned by Outbreak Protection, during which it accumulated an additional 5.5 points. Finally, the total message score was tallied with a final score of 12.2 points and was rejected.

Message tracking with color-coded events for easy troubleshooting
Message tracking with color-coded events for easy troubleshooting

We’ve created the following video to help you become more familiar with message tracking in Security Gateway.

Would you like to learn more about how Security Gateway can protect your business from spam, phishing attempts and malware? Click here to download your free trial!