Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

1 Introduction
1.1 Using this manual
1.2 Glossary of terms
DNS See Domain Name System
IIS See Internet Information Services
MDAC See Microsoft Data Access Components
MIME See Multipurpose Internet Mail Extensions
NDR See Non Delivery Report
SMTP See Simple Mail Transport Protocol
2 About GFI MailEssentials
2.1 Minimum Requirements & Installation
2.2 How email processing works?
2.3 Description of anti-spam filters and actions
2.4 Licensing
3 Viewing anti-spam processing status
3.1 Using the GFI MailEssentials dashboard
Screenshot 1 - GFI MailEssentials Dashboard: Status tab
Screenshot 2 - GFI MailEssentials Dashboard: Statistics tab
3.2 Email Reports
Screenshot 3 - Spam digest properties/Administrator spam digest
Screenshot 4 - Recipient spam digest
Screenshot 5 - Spam digest recipient list
3.3 Spam status reports
Screenshot 6 - Daily spam report
Screenshot 9 - Domain usage statistics filter dialog
Screenshot 10 - Mail server daily usage statistics filter dialog
Screenshot 11 - The user communications report shows exact email trail
Screenshot 12 - User communications filter dialog
Screenshot 13 - Excluded users dialog
4 Routine Administration
4.1 Using Quarantine
Screenshot 14 - The Quarantine Management page
Screenshot 15 - The Quarantine search
Screenshot 16 -Quarantine search results
Screenshot 17 - Previewing a quarantined email
Screenshot 18 - Quarantine email report
4.2 Using Public folder scanning
4.2.2 Managing legitimate email
4.2.3 Managing spam
5 Configuring anti-spam
5.1 Anti-spam filters
Screenshot 19 - SpamRazer Properties
Screenshot 22 - Automatic anti-phishing updates
Stage 1 - Configuring Directory Harvesting properties
Screenshot 23 - The directory harvesting feature
Stage 2 - Selecting the Directory Harvesting method
Screenshot 24 - Anti-spam ordering dialog
Screenshot 25 - The email blocklist
Screenshot 26 - Adding more IP DNS Blocklists
Screenshot 27 - URI DNS Blocklist properties
Screenshot 28 - Configuring the SPF block level
Screenshot 29 - Configuring the SPF exceptions
Screenshot 30 - Greylist
Screenshot 31 - Email exclusions
Screenshot 32 - Adding email exclusions
Screenshot 33 - IP address exclusions
Screenshot 34 - Header checking general tab
Screenshot 35 - Language detection
Screenshot 36 - Anti-spam keyword checking properties
Screenshot 37 - Adding a condition
Stage 1: Training the Bayesian filter
Screenshot 38 - Supplying ham to the Bayesian filter
Stage 2: Enabling the Bayesian filter
Screenshot 39 - Bayesian analysis properties
Screenshot 40 - Whitelisted domains
Screenshot 41 - Auto Whitelist options
Screenshot 42 - Whitelisting keywords
Screenshot 43 - Whitelisting IPs
Screenshot 44 - New Senders properties
Screenshot 45 - New Senders Exception setup
Sorting anti-spam filters by priority
Screenshot 46 - Assigning filter Priorities
5.2 Spam Actions - What to do with spam email
Screenshot 47 - Configuring the action that should be taken
Screenshot 48 - The other actions tab
Screenshot 49 - Global actions
5.3 Configuring Quarantine
Screenshot 50 - Quarantine settings
Screenshot 51 - User settings
Screenshot 52 - Quarantine email schedule
Screenshot 53 - Selecting the users to receive the quarantine email reports
Screenshot 54 - Configuring advanced quarantine settings
5.4 Public folder scanning
Screenshot 55 - Configuring Public folder scanning
Screenshot 56 - Setting user role
6 Customizing other features
6.1 Disclaimers
Screenshot 57 - Selecting a domain or user disclaimer
Screenshot 61 - Plain text disclaimer
6.2 Auto-replies
Screenshot 62 - Creating a new auto reply
Screenshot 63 - Auto-reply properties
Screenshot 64 - Variables dialog
6.3 List servers
Screenshot 65 - Creating a new newsletter list
Screenshot 66 - Specifying database backend
Screenshot 67 - Mapping custom fields
Screenshot 68 - Newsletter footer properties
Screenshot 69 - Setting permissions to the newsletter
Screenshot 70 - Entering subscribers to the newsletter
6.4 Email monitoring
Screenshot 71 - Enable or disable email monitoring
Screenshot 72 - Add Mail Monitoring rule
Screenshot 73 - Configuring email monitoring
Screenshot 74 - Creating an exception
7 Customizing GFI MailEssentials setup
7.1 Inbound email domains
Screenshot 75 - Adding an inbound email domain
7.2 Administrator email address
Screenshot 76 - Administrator email address
7.3 DNS server settings
Screenshot 77 - DNS server settings
7.4 SMTP Server settings
Screenshot 78 - Perimeter SMTP Server settings
7.5 Automatic updates
Screenshot 79 - Configuring automatic updates
8 Miscellaneous
8.1 Setting up POP3 and dialup downloading
Screenshot 80 - The GFI MailEssentials pop3 downloader
Screenshot 81 - Adding a POP3 mailbox
Screenshot 82 - Dial-up options
Screenshot 83 - Configuring when GFI MailEssentials should pick up email
8.2 Synchronizing configuration data
8.2.1 Anti-spam synchronization agent
Screenshot 84 - Configuring a master server
8.2.4 Step 3: Configure slave servers
Screenshot 85 - Configuring a slave server
Screenshot 86 - Upload / download hourly interval setting
8.3 Exporting and importing GFI MailEssentials settings
Exporting via user interface
Screenshot 87 - GFI MailEssentials Configuration Export/Import Tool
Exporting settings via the command line
Screenshot 88 - Exporting settings via command line
Importing via user interface
Importing via the command line
Screenshot 89 - Importing settings via command line
8.4 Selecting the SMTP Virtual Server to bind GFI MailEssentials
Screenshot 90 - SMTP Virtual Server Bindings
8.5 Disabling/Enabling email processing
Screenshot 91 - The GFI MailEssentials Switchboard: Troubleshooting
8.6 Tracing
Screenshot 92 - Tracing
8.7 Remote commands
Screenshot 93 - Remote commands configuration
Screenshot 94 - Adding an email address to the blocklist and keywords
Screenshot 95 - Specifying the same commands more than once
Screenshot 96 - Adding spam to the Bayesian filter database
Screenshot 97 - Sending remote commands without security
8.8 Moving spam email to user’s mailbox folders
Screenshot 98 - The GFI MailEssentials Rules Manager
Screenshot 99 - Adding a new rule in Rules Manager
Screenshot 100 - List of rules in Rules Manager
9 Troubleshooting & support
10 Appendix - Bayesian Filtering
Screenshot 101 - Select the Bayesian spam profile to update
Screenshot 102 - Select the legitimate email source
Screenshot 103 - Select the spam source
0 of .
Results for:
No results containing your search query
P. 1
Me 2010 Ac Manual

Me 2010 Ac Manual

Ratings: (0)|Views: 210|Likes:
Published by Aqil Shamsi

More info:

Published by: Aqil Shamsi on Jul 25, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/25/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 20 are not shown in this preview.
You're Reading a Free Preview
Pages 24 to 36 are not shown in this preview.
You're Reading a Free Preview
Pages 40 to 81 are not shown in this preview.
You're Reading a Free Preview
Pages 85 to 143 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->