59 |
|
|
|
|
|
|
|
| |
| Objectionable Content Filtering | 61 |
|
| |||||
| Actions | 61 |
|
|
|
|
|
|
|
| Notifications | 62 |
|
|
|
|
|
| |
| Upload and Download Filter List | 62 |
| ||||||
| Trusted Senders List | 62 |
|
|
|
| |||
| Adding Trusted Senders | 63 |
|
| |||||
| Spam Quarantine | 64 |
|
|
|
|
| ||
| Spam Quarantine Configuration | 64 |
| ||||||
| User Notification | 65 |
|
|
|
| |||
| Set Redirect Action for | 65 | |||||||
| Enabling User Access on a Network Interface | 66 | |||||||
| Examining the Quarantine |
| 66 |
|
| ||||
| Quarantine and Trusted Senders List Users 67 |
| |||||||
| Upload and Download User Lists | 68 |
| ||||||
| Enabling User Access on a Network Interface | 68 | |||||||
| Advanced | 69 |
|
| |||||
| RBL (Realtime Blackhole List) | 69 |
|
| |||||
| Mail Access/Filtering | 70 |
|
|
|
| |||
|
| 70 |
|
|
|
| |||
|
|
|
|
|
|
|
|
|
|
5 REPORTING |
|
|
|
|
|
|
|
| |
| Generating Reports | 71 |
|
|
|
| |||
| Report Configuration | 72 |
|
|
| ||||
| Report Generation |
| 73 |
|
|
|
| ||
| Report Fields | 74 |
|
|
|
|
|
| |
| System Logs | 77 |
|
|
|
|
|
| |
| Viewing Log Details | 78 |
|
|
|
| |||
| Configuring a Syslog Server | 78 |
|
| |||||
| Email History | 79 |
|
|
|
|
|
| |
| System History | 80 |
|
|
|
|
|
| |
| Event Types | 80 |
|
|
|
|
|
| |
| Configure History Settings | 82 |
|
|
|
6SYSTEM CONFIGURATION
Setup Wizard 83
Change Password 84