MDaemon Has been Updated to Version 17.0.3

Update_stickyAs any software company knows, it’s important to listen to our customers and address any issues that may be reported. With this in mind, our development team has released MDaemon 17.0.3. This minor update includes various improvements to WorldClient Instant Messenger and other minor fixes.

Click here to read the release notes, and click here to download the latest MDaemon.

If you’re not yet an MDaemon user, you can find more product information here, and click here to compare us to your current messaging solution.

Do you have questions or comments? Let us know via the Comments section below!

 

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

MDaemon 16.0.2 Available – with “Remember Me” for Two-Factor Authentication

MDaemon 16.0.2 has been released. This update includes a “remember me” feature for two-factor authentication in WorldClient. With this feature enabled, users will not have to re-enter a verification code for a designated period of time.

Other new features and enhancements include:

  •  Global administrators can now set the Mail Archive path in Remote Administration.
  • The Remote Administration group editor now supports Do Not Disturb scheduling. This allows administrators to schedule a period of time during which email cannot be accessed for all accounts that have been assigned to a group.
  • Administrators can now sort the Active Sessions list in Remote Administration – for an improved view of server activity.
  • Global administrators can now disable two-factor authentication for selected users in Remote Administration.

These are just the highlights for MDaemon 16.0.2. For a complete list of new features and fixes, view the MDaemon release notes. If you’d like to update to MDaemon 16.0.2, you can download MDaemon here.

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Critical MDaemon Update Available

Recently Alt-N discovered a vulnerability in the content filter of MDaemon and MDaemon Private Cloud that could potentially expose the server to malicious attack. The Alt-N development team has built and tested a patch to correct the potential vulnerability.

Click here for more information, and to download the patch to fix this vulnerability.

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •