This menu of WebAdmin is primarily used for the configuration of the SMTP server itself. This allows you to set the minimal TLS version for both the inbound and outbound connections using any supported versions. Starting in version 9.4 of Kerio Connect, you also have access to defining your default TLS version via the TLS options tab. See Configuring Anti-Spoofing in Kerio Connect for more information on setting up the feature. This can act as the first line of defense against spammers that might spoof your email domain. Anti-Spoofing implements Sender Identify(via your SPF DNS Record ), which users must authenticate with to send an email using any of the local domains. The Sender Policy tab provides you with anti-spoofing protection options. You can define the user authentication requirements for connecting to the server, the authentication mechanisms to be used when secured connections are used, and refine the Login Guessing Protection settings. The Security Policy tab provides the bulk of the authentication-related settings available. You can review more about using these within Securing Kerio Connect. Note that many of these may play into your SMTP workflow - namely, the authentication methods selected. This menu provides the bulk of the non-SMTP-related standard security components (except for the special features such as AntiSpam, AntiVirus, etc., detailed later on). You can configure Kerio Connect’s fundamental security features from these two menus. Two main sections within WebAdmin provide you with several security-related settings - The Security menu and the SMTP Server menu. Local Authentication (Internal User Database). ![]() These can often prevent many potential attack vectors before attackers can leverage vulnerabilities. While the network’s overall security should not rely entirely on the built-in utilities, several security options are available within Kerio Connect that admins can use to alleviate unauthorized access, spamming, and other malicious activity. Mail Servers are a common target for malicious activity due to the ability of attackers to leverage the SMTP functionality within their future actions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |