<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:wfw="http://wellformedweb.org/CommentAPI/">
<channel>
<title>Knowledgebase RSS Feed</title>
<link>https://perfectmail.com/</link>
<description>PerfectMail Anti-Spam Solutions</description>
<language>en</language>
<item>
<title>Spam where 'sender' and 'recipient' are the same</title>
<description>Spammers will spoof messages where the sending and recipient addresses are the same. It looks like your users are sending email to themselves. There are some things to check before making changes and there is a specific setting for this situation.

Looking at the message list, can you see what the message Scores are and the Result? You may see relatively high scores and the result of Whitelisted. It's common for people to whitelist their own domains, which can result in this spoofing situation. Worse still, white listing messages affects the filters. The e-mail message structures, sender addresses and message content of whitelisted messages are all trained with the dynamic spam filters. This skews the results of the dynamic filters in the wrong direction. So, if you have whitelisted your own domain, then this situation has to be dealt with along with the spoofing issue.

We have a specific setting to deal with self-sent e-mail. Navigate to ..Filters &gt; Filter Settings &gt; Sender.. and enable the feature to Block Self Sent e-mail.

If these messages were whitelisted, reset the Bayesian filters by navigating to ..Filters &gt; Filter Settings &gt; Bayesian.. navigate to the bottom of the page and click the Reset Bayesian Database button. That should get you back to a normal state.
</description>
<content:encoded><![CDATA[<p><i>Spammers</i> will <b>spoof</b> messages where the <i>sending</i> and <i>recipient</i> addresses are the same. It looks like your users are sending email to themselves. There are some things to check before making changes and there is a specific setting for this situation.</p>

<p>Looking at the message list, can you see what the message <i>Scores</i> are and the <i>Result</i>? You may see relatively high scores and the result of <i>Whitelisted</i>. It's common for people to whitelist their own domains, which can result in this <b>spoofing</b> situation. Worse still, white listing messages affects the filters. The e-mail message structures, sender addresses and message content of whitelisted messages are all trained with the <i>dynamic spam filters</i>. This skews the results of the dynamic filters in the wrong direction. So, if you have whitelisted your own domain, then this situation has to be dealt with along with the spoofing issue.</p>

<p>We have a specific setting to deal with <i>self-sent e-mail</i>. Navigate to ..<br/><br/><b>Filters &gt; Filter Settings &gt; Sender</b><br/><br/>.. and enable the feature to <b>Block Self Sent e-mail</b>.</p>

<p>If these messages were whitelisted, reset the <i>Bayesian</i> filters by navigating to ..<br/><br/><b>Filters &gt; Filter Settings &gt; Bayesian</b><br/><br/>.. navigate to the bottom of the page and click the <i>Reset Bayesian Database</i> button. That should get you back to a normal state.</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/sender_recipient_the_same</link>
<pubDate>Mon, 21 Aug 2023 16:23:08 +0000</pubDate>
<category>Spam</category>
<wfw:commentRss>https://perfectmail.com/kb/sender_recipient_the_same,commentrss</wfw:commentRss>
</item>
<item>
<title>Update Notifications</title>
<description>The best way to get notification of an update is to update your admin settings on the PerfectMail web interface.


Navigate to: Server Admin > Users;
Select your user account;
Ensure your email address is correct under the General tab;
On the Notifications tab enable Notify when there is a software update.


When the server software updates the server will send you a notification message. We will update our website and Twitter feed when there is a general release, but the best way to be notified that an update has occurred is to have your server send the notification message to you directly .
</description>
<content:encoded><![CDATA[<p>The best way to get notification of an update is to update your admin settings on the <em>PerfectMail</em> web interface.</p>

<ol>
<li>Navigate to: <em>Server Admin > Users</em>;</li>
<li>Select your <em>user account</em>;</li>
<li>Ensure your email address is correct under the <em>General</em> tab;</li>
<li>On the <em>Notifications</em> tab enable <em>Notify when there is a software update</em>.</li>
</ol>

<p>When the server software updates the server will send you a <em>notification message</em>. We will update our website and Twitter feed when there is a general release, but the best way to be notified that an update has occurred is to have your server send the notification message to you directly .</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/update_notification</link>
<pubDate>Tue, 08 Jun 2021 16:08:04 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/update_notification,commentrss</wfw:commentRss>
</item>
<item>
<title>PerfectMail Support Requests</title>
<description>A friendly reminder..
All support requests need to be via our online helpdesk portal at: https://helpdesk.perfectmail.com . We provide support for your mail administrator. We do not provide end-user support. Each organization will have a single authorized support contact, who will make support requests through our helpdesk portal.
Creating support tickets helps everyone by ensuring an issue is clearly stated and providing continuity for support staff if the ticket is transferred to another support person. The information contained in support tickets is used as a source for creating Knowledge Base Articles available on our website: http://www.perfectmail.com
Contacting individual staff for support issues is discouraged. ​Staff members may be unavailable to assist you for various reasons. When you create a support ticket notification is sent to all available support staff, giving you a more timely and effective support response.
Before creating a support ticket, search our website to see if we have an available Knowledge Base Article on your issue: http://perfectmail.com/learn
To register an account to receive support:

Visit our helpdesk portal at: https://helpdesk.perfectmail.com
Click the "Register" button to create a new account, filling in your contact information.
A validation message will be sent to the email address you registerd with. Using your mail client, click the validation link contained in that email.

To create a support ticket:

Visit our helpdesk portal at: https://helpdesk.perfectmail.com
Login to the helpdesk portal using the email address and password you used during registration.
Update "My Profile" with your Company/Organization (Important!) and additional contact information, then click "Update".
The helpdesk portal allows you to search a subset of our Knowledge Base. However, our website http://perfectmail.com is a better source for this information. The menu bar provides links to access the Knowledge Base, Submit a Ticket and View Tickets.
Click "Submit a Ticket" to create a support ticket. Fill in the Subject and Description and attach any files. Click "Submit" at the bottom of the page when ready.
You will receive email notification when changes are made to your support ticket.

Make sure the Subject is informative. Subjects like "bug" are not convey much information. Similarly, the description should contain as many details as possible. Describe in as much detail as possible what you were doing at the time of receiving the errors, what might have been happening with your infrastructure and what steps you have taken to resolve the issue. Feel free to include screen shots of errors or log entries. Details help the support team to understand what to look for when replicating the issue.
Support tickets are also the best place to ask usage questions. This lets us convert your question into a Knowledge Base Article so we can provide the great support for the entire PerfectMail community.</description>
<content:encoded><![CDATA[<p><em>A friendly reminder..</em></p>
<p><strong>All support requests</strong> need to be via our online helpdesk portal at: <a href="https://helpdesk.perfectmail.com" target="_blank">https://helpdesk.perfectmail.com</a> . We provide support for your mail administrator. We do not provide end-user support. Each organization will have a single authorized support contact, who will make support requests through our helpdesk portal.</p>
<p><strong>Creating support tickets</strong> helps everyone by ensuring <strong>an issue is clearly stated</strong> and providing continuity for support staff if the ticket is transferred to another support person. The information contained in support tickets is used as a source for creating <strong>Knowledge Base Articles</strong> available on our website: <a href="http://perfectmail.com">http://www.perfectmail.com</a></p>
<p><strong>Contacting individual staff for support issues is discouraged</strong>. ​Staff members <strong>may be unavailable</strong> to assist you for various reasons. When you create a support ticket notification is sent to all available support staff, giving you a more timely and effective support response.</p>
<p>Before creating a support ticket, search our website to see if we have an available <strong>Knowledge Base Article</strong> on your issue: <a href="http://perfectmail.com/learn">http://perfectmail.com/learn</a></p>
<p>To register an account to receive support:</p>
<ol>
<li>Visit our helpdesk portal at: <a style="font-size: 16.0016px;" href="https://helpdesk.perfectmail.com" target="_blank">https://helpdesk.perfectmail.com</a></li>
<li>Click the "Register" button to create a new account, filling in your contact information.</li>
<li>A validation message will be sent to the email address you registerd with. Using your mail client, click the validation link contained in that email.</li>
</ol>
<p>To create a support ticket:</p>
<ol>
<li><strong>Visit our helpdesk</strong> portal at: <a style="font-size: 16.0016px;" href="https://helpdesk.perfectmail.com" target="_blank">https://helpdesk.perfectmail.com</a></li>
<li><strong>Login to the helpdesk</strong> portal using the email address and password you used during registration.</li>
<li>Update "My Profile" with your Company/Organization (Important!) and additional contact information, then click "Update".</li>
<li>The <strong>helpdesk portal</strong> allows you to search a subset of our Knowledge Base. However, our website <a style="font-size: 16.0016px;" href="http://perfectmail.com">http://perfectmail.com</a><span style="font-size: 16.0016px;"> is a better source for this information. The menu bar provides links to access the Knowledge Base, Submit a Ticket and View Tickets.</span></li>
<li>Click "Submit a Ticket" to create a support ticket. Fill in the Subject and Description and attach any files. Click "Submit" at the bottom of the page when ready.</li>
<li>You will receive email notification when changes are made to your support ticket.</li>
</ol>
<p>Make sure the Subject is informative. Subjects like "bug" are not convey much information. Similarly, the description should contain as many details as possible. Describe in as much detail as possible what you were doing at the time of receiving the errors, what might have been happening with your infrastructure and what steps you have taken to resolve the issue. Feel free to include screen shots of errors or log entries. Details help the support team to understand what to look for when replicating the issue.</p>
<p>Support tickets are also the best place to ask usage questions. This lets us convert your question into a Knowledge Base Article so we can provide the great support for the entire PerfectMail community.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/perfectmail_support_requests</link>
<pubDate>Fri, 11 Jan 2019 18:15:16 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/perfectmail_support_requests,commentrss</wfw:commentRss>
</item>
<item>
<title>How do I set up SMTP Recipient Verification with Microsoft Exchange 2013/2016?</title>
<description>Following are the steps to enable recipient verification (recipient filtering) to allow PerfectMail to validate e-mail users for Microsoft Exchange 2013 and later.

Recipient filtering/Recipient verification is the process where inbound messages, from the Internet are verified as being valid on your Exchange server. If this feature is turned off "all e-mail addresses will be accepted" by both Exchange and PerfectMail.

Starting with Exchange 2013, the Exchange FrontEnd Transport service, by default, no longer rejects invalid recipients during the SMTP conversation. For recipient verification to function, the following needs to be done.

Please ensure you have the appropriate permissions to perform this task.



	Ensure the Exchange Anti-Spam Agents are installed. You can check via Exchange Management shell with the following EMS command:
	Get-TransportAgent


	Make sure that Recipient Filter Agent is listed and enabled. If it is not, install it with the following command:
	&amp; $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1


	Ensure that the Recipient Filter Agent is enabled. Use the following command:
	Enable-TransportAgent "Recipient Filter Agent"


	Enable AddressBook. All of your domains need to be using Address Book to check for recipients. To check, run the following command:
	Get-AcceptedDomain | Format-List Name,AddressBookEnabled


    If Address Book is disabled for any domains for which the Exchange server is authoritative, fix that with the following command, once for each such domain:
	Set-AcceptedDomain name_of_domain -AddressBookEnabled $true


    At this point, restart the Microsoft Exchange Transport service.


    Ensure that Recipient Validation is enabled. Run the following command:
	Set-RecipientFilterConfig -RecipientValidationEnabled $true


    Again, restart the transport service.


    Allow access to the Default receive connector. In the Exchange Administrative Center, go to Mail Flow : Receive Connectors.


	Edit the default connector, go to the Security tab and ensure that anonymous users are allowed. This lets PerfectMail use the connector for recipient verification.


    Test that Recipient Filtering works. On the PerfectMail console, go to Tools > SMTP Test. Set the "Server IP" to the IP address of your Exchange server, leave the "From" address blank and put a bogus email address in the "To" field. The Subject and Message fields can be blank. Click "Send". The server responses should be similar to the following:
    
	
[+] Connected to 192.168.1.1
&lt;&lt; myexchange.mydomain.com Microsoft ESMTP MAIL Service ready at...
&gt;&gt; HELO perfectmail.mydomain.com
&lt;&lt; 250 myexchange.mydomain.com Hello ...
&gt;&gt; MAIL FROM: &lt;&gt;
&lt;&lt; 250 2.1.0 &lt;&gt;... Sender ok
&gt;&gt; RCPT TO: &lt;bogus_user_123@mydomain.com&gt;
&lt;&lt; 550 5.1.1 &lt;bogus_user_123@mydomain.com&gt;... User unknown
&gt;&gt; QUIT
[-] Closed connection
	

</description>
<content:encoded><![CDATA[<p>Following are the steps to enable <b>recipient verification</b> (recipient filtering) to allow PerfectMail to validate e-mail users for Microsoft Exchange 2013 and later.</p>

<p>Recipient filtering/Recipient verification is the process where inbound messages, from the Internet are verified as being valid on your Exchange server. If this feature is turned off "all e-mail addresses will be accepted" by both Exchange and PerfectMail.</p>

<p>Starting with Exchange 2013, the Exchange FrontEnd Transport service, by default, no longer rejects invalid recipients during the SMTP conversation. For <b>recipient verification</b> to function, the following needs to be done.</p>

<p>Please ensure you have the appropriate permissions to perform this task.</p>

<ol>
<li>
	Ensure the Exchange Anti-Spam Agents are installed. You can check via Exchange Management shell with the following EMS command:
	<div class="code">Get-TransportAgent</div>
</li>
<li>
	Make sure that Recipient Filter Agent is listed and enabled. If it is not, install it with the following command:
	<div class="code">&amp; $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1</div>
</li>
<li>
	Ensure that the Recipient Filter Agent is enabled. Use the following command:
	<div class="code">Enable-TransportAgent "Recipient Filter Agent"</div>
</li>
<li>
	Enable AddressBook. All of your domains need to be using Address Book to check for recipients. To check, run the following command:
	<div class="code">Get-AcceptedDomain | Format-List Name,AddressBookEnabled</div>
</li>
<li>
    If Address Book is disabled for any domains for which the Exchange server is authoritative, fix that with the following command, once for each such domain:
	<div class="code">Set-AcceptedDomain name_of_domain -AddressBookEnabled $true</div>
</li>
<li>
    At this point, restart the Microsoft Exchange Transport service.
</li>
<li>
    Ensure that Recipient Validation is enabled. Run the following command:
	<div class="code">Set-RecipientFilterConfig -RecipientValidationEnabled $true</div>
</li>
<li>
    Again, restart the transport service.
</li>
<li>
    Allow access to the Default receive connector. In the Exchange Administrative Center, go to <code>Mail Flow : Receive Connectors</code>.
</li>
<li>
	Edit the default connector, go to the Security tab and ensure that anonymous users are allowed. This lets PerfectMail use the connector for recipient verification.
</li>
<li>
    Test that Recipient Filtering works. On the PerfectMail console, go to <code>Tools > SMTP Test</code>. Set the "Server IP" to the IP address of your Exchange server, leave the "From" address blank and put a bogus email address in the "To" field. The Subject and Message fields can be blank. Click "Send". The server responses should be similar to the following:
    
	<div class="code">
[+] Connected to 192.168.1.1
&lt;&lt; myexchange.mydomain.com Microsoft ESMTP MAIL Service ready at...
&gt;&gt; HELO perfectmail.mydomain.com
&lt;&lt; 250 myexchange.mydomain.com Hello ...
&gt;&gt; MAIL FROM: &lt;&gt;
&lt;&lt; 250 2.1.0 &lt;&gt;... Sender ok
&gt;&gt; RCPT TO: &lt;bogus_user_123@mydomain.com&gt;
&lt;&lt; 550 5.1.1 &lt;bogus_user_123@mydomain.com&gt;... User unknown
&gt;&gt; QUIT
[-] Closed connection
	</div>
</ol>
]]></content:encoded>
<link>https://perfectmail.com/kb/exchange_2013_recipient_filtering</link>
<pubDate>Fri, 07 Dec 2018 20:44:39 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/exchange_2013_recipient_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>What does &quot;Deferred: Connection timed out&quot; mean?</title>
<description>Your PerfectMail server has failed to connect to a remote mail server. After a reasonable time (4 minutes) it has given up trying and issued the "Connection timed out" error message. After an hour or so (as configured in Queue Warning, see below), your PerfectMail server will send you a warning message saying there was a problem. Your server will continue trying to send this message for a few days (as configured in Queue Return, see below), after which it send you a notification that it has given up entirely.

So what happened?

Your server failed to open a connection with the remote mail server. The connection is the first step before the servers can exchange any content at all; literally before they can even say "hello". This is a connection level issue, which means this has nothing to do with either the sender/recipient addresses or the message content. There is nothing more that can be recorded in the log files as there would be no more information other than we couldn't even get a connection.

Possible issues:

Your server is blocked by some reputation service, such as https://spamhaus.org;
The remote mail server was experiencing network issues or heavy traffic;
The remote mail server is limiting connections from your server (hourly, daily, greylisting, etc.);
The remote mail server has purposely been configured to not accept a connection from your server.


Solutions:

Check to see if you are on an RBL list, such as https://www.spamhaus.org/lookup;
Wait a little while and try sending again;
Contact the remote mail administrator to see if they are having issues or if your mail server has inadvertently been "black listed".
</description>
<content:encoded><![CDATA[<p>Your PerfectMail server has failed to connect to a remote mail server. After a reasonable time (4 minutes) it has given up trying and issued the "Connection timed out" error message. After an hour or so (as configured in Queue Warning, see below), your PerfectMail server will send you a warning message saying there was a problem. Your server will continue trying to send this message for a few days (as configured in Queue Return, see below), after which it send you a notification that it has given up entirely.</p>

<p>So what happened?</p>

<p>Your server failed to open a connection with the remote mail server. The connection is the first step before the servers can exchange any content at all; literally before they can even say "hello". This is a connection level issue, which means this has nothing to do with either the sender/recipient addresses or the message content. There is nothing more that can be recorded in the log files as there would be no more information other than we couldn't even get a connection.</p>

<p>Possible issues:</p>
<ol>
<li>Your server is blocked by some reputation service, such as <a href="https://spamhaus.org">https://spamhaus.org</a>;</li>
<li>The remote mail server was experiencing network issues or heavy traffic;</li>
<li>The remote mail server is limiting connections from your server (hourly, daily, greylisting, etc.);</li>
<li>The remote mail server has purposely been configured to not accept a connection from your server.</li>
</ol>

<p>Solutions:</p>
<ol style="list-style-type: lower-roman;">
<li>Check to see if you are on an RBL list, such as <a href="https://www.spamhaus.org/lookup">https://www.spamhaus.org/lookup</a>;</li>
<li>Wait a little while and try sending again;</li>
<li>Contact the remote mail administrator to see if they are having issues or if your mail server has inadvertently been "black listed".</li>
</ol>]]></content:encoded>
<link>https://perfectmail.com/kb/deferred_connection_timed_out</link>
<pubDate>Wed, 29 Nov 2017 15:05:18 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/deferred_connection_timed_out,commentrss</wfw:commentRss>
</item>
<item>
<title>accept() returned invalid socket</title>
<description>This advice is for experienced Linux administrators only. For get more help through our HelpDesk.

Using the server console, if you see the message "accept() returned invalid socket" in /var/log/pmlog, this usually indicates the server does not have sufficient memory to service the number of concurrent mail threads.

Example:


Perfectmail: accept() returned invalid socket (Numerical result out of range), try again
Nov 22 19:20:45 myserver last message repeated 10 times


Consider increasing your server memory. A busy PerfectMail server may require 4Gb of memory, or more.</description>
<content:encoded><![CDATA[<p><b>This advice is for experienced Linux administrators only.</b> For get more help through our <a href="https://helpdesk.perfectmail.com">HelpDesk</a>.</p>

<p>Using the server console, if you see the message "accept() returned invalid socket" in /var/log/pmlog, this usually indicates the server does not have sufficient memory to service the number of concurrent mail threads.</p>

<p>Example:</p>

<pre>
Perfectmail: accept() returned invalid socket (Numerical result out of range), try again
Nov 22 19:20:45 myserver last message repeated 10 times
</pre>

<p>Consider increasing your server memory. A busy PerfectMail server may require 4Gb of memory, or more.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/accept_returned_invalid_socket</link>
<pubDate>Wed, 22 Nov 2017 18:40:51 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/accept_returned_invalid_socket,commentrss</wfw:commentRss>
</item>
<item>
<title>error connecting to filter: Connection refused</title>
<description>You may see multiple Milter errors in the Transmission Log...

Milter (pm): error connecting to filter: Connection refused by /var/pm/run/socket
Milter (pm): to error state

This signifies the PerfectMail service is not currently running. Restart the Anti-Spam service on the dashboard using the power icon .

Important: If this occurs when the server is busy it can signify the server has run out of memory. A busy PerfectMail server may require 4Gb of memory, or more.
</description>
<content:encoded><![CDATA[<p>You may see multiple <i>Milter</i> errors in the <i>Transmission Log</i>...</p>
<pre>
Milter (pm): error connecting to filter: Connection refused by /var/pm/run/socket
Milter (pm): to error state
</pre>
<p>This signifies the PerfectMail service is not currently running. Restart the <i>Anti-Spam service</i> on the dashboard using the power icon <img src="/media/power_on.png" alt="power"/>.</p>

<p><b>Important:</b> If this occurs when the server is busy it can signify the server has run out of memory. A busy PerfectMail server may require 4Gb of memory, or more.</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/error_connecting_to_filter</link>
<pubDate>Wed, 22 Nov 2017 18:39:48 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/error_connecting_to_filter,commentrss</wfw:commentRss>
</item>
<item>
<title>How do I know if my server needs more memory?</title>
<description>Your PerfectMail server will have problems functioning if you are short of memory. You may see errors in the Transmission Log saying..


Milter (pm): error connecting to filter: Connection refused by /var/pm/run/socket
Milter (pm): to error state


If you are comfortable with linux, you can also check the /var/log/pmlog file for the following error messages in /var/log/pmlog..


Perfectmail: accept() returned invalid socket (Numerical result out of range), try again
Nov 22 19:20:45 myserver last message repeated 10 times


This usually is accompanied with a periodic restarting of the PerfectMail service, as the server tries to fix itself. Example:


Perfectmail: accept() returned invalid socket (Numerical result out of range), try again
Nov 22 19:20:45 myserver last message repeated 10 times
Nov 22 19:25:08 myserver pmCheck[5391]: Not Running: (0 threads; Load 0.30 1.05 0.97 1/89 32564 0)
Nov 22 19:25:08 myserver pmCheck[5391]: STOPPING
Nov 22 19:25:09 myserver pmCheck[5391]: STARTING


When this happens, the server has insufficient memory to support the number of concurrent threads. A busy PerfectMail server my require 4Gb of memory or more.</description>
<content:encoded><![CDATA[<p>Your PerfectMail server will have problems functioning if you are short of memory. You may see errors in the Transmission Log saying..</p>

<pre>
Milter (pm): error connecting to filter: Connection refused by /var/pm/run/socket
Milter (pm): to error state
</pre>

<p>If you are comfortable with linux, you can also check the /var/log/pmlog file for the following error messages in /var/log/pmlog..</p>

<pre>
Perfectmail: accept() returned invalid socket (Numerical result out of range), try again
Nov 22 19:20:45 myserver last message repeated 10 times
</pre>

<p>This usually is accompanied with a periodic restarting of the PerfectMail service, as the server tries to fix itself. Example:</p>

<pre>
Perfectmail: accept() returned invalid socket (Numerical result out of range), try again
Nov 22 19:20:45 myserver last message repeated 10 times
Nov 22 19:25:08 myserver pmCheck[5391]: Not Running: (0 threads; Load 0.30 1.05 0.97 1/89 32564 0)
Nov 22 19:25:08 myserver pmCheck[5391]: STOPPING
Nov 22 19:25:09 myserver pmCheck[5391]: STARTING
</pre>

<p>When this happens, the server has insufficient memory to support the number of concurrent threads. A busy PerfectMail server my require 4Gb of memory or more.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/out_of_memory</link>
<pubDate>Wed, 22 Nov 2017 18:35:45 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/out_of_memory,commentrss</wfw:commentRss>
</item>
<item>
<title>Server is using the wrong network interface</title>
<description>If you have changed your hardware or migrated your PerfectMail server to a new virtual host, you may see the wrong network interface is being used. This is a side effect of the plug-and-play infrastructure within the PerfectMail Server Operating System.

To resolve the issue, reboot your PerfectMail server a couple of times. We added code to purge network cards from the plug-and-play repository. It may take a couple of reboots for the changes to take effect.</description>
<content:encoded><![CDATA[<p>If you have changed your hardware or migrated your PerfectMail server to a new virtual host, you may see the wrong network interface is being used. This is a side effect of the <b>plug-and-play</b> infrastructure within the PerfectMail Server Operating System.</p>

<p>To resolve the issue, <b>reboot your PerfectMail server a couple of times</b>. We added code to purge network cards from the plug-and-play repository. It may take a couple of reboots for the changes to take effect.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/wrong_network_interface</link>
<pubDate>Tue, 21 Nov 2017 14:52:23 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/wrong_network_interface,commentrss</wfw:commentRss>
</item>
<item>
<title>How do I register/purchase a production license?</title>
<description>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</description>
<content:encoded><![CDATA[<p>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/how_do_i_buy</link>
<pubDate>Tue, 25 Oct 2016 15:23:59 +0000</pubDate>
<category>Licensing</category>
<wfw:commentRss>https://perfectmail.com/kb/how_do_i_buy,commentrss</wfw:commentRss>
</item>
<item>
<title>Do support incidents expire?</title>
<description>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</description>
<content:encoded><![CDATA[<p>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/do_support_incidents_expire</link>
<pubDate>Tue, 25 Oct 2016 15:17:59 +0000</pubDate>
<category>Licensing</category>
<wfw:commentRss>https://perfectmail.com/kb/do_support_incidents_expire,commentrss</wfw:commentRss>
</item>
<item>
<title>What is a support incident?</title>
<description>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</description>
<content:encoded><![CDATA[<p>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/what_is_a_support_incident</link>
<pubDate>Tue, 25 Oct 2016 15:11:43 +0000</pubDate>
<category>Licensing</category>
<wfw:commentRss>https://perfectmail.com/kb/what_is_a_support_incident,commentrss</wfw:commentRss>
</item>
<item>
<title>Do the Advanced and Enterprise licenses let me run multiple production servers?</title>
<description>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</description>
<content:encoded><![CDATA[<p>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/can_i_have_multiple_servers</link>
<pubDate>Tue, 25 Oct 2016 15:06:09 +0000</pubDate>
<category>Licensing</category>
<wfw:commentRss>https://perfectmail.com/kb/can_i_have_multiple_servers,commentrss</wfw:commentRss>
</item>
<item>
<title>How does PerfectMail intercept Microsoft junk mail reports?</title>
<description>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</description>
<content:encoded><![CDATA[<p>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/how_intercept_junk_email_reports</link>
<pubDate>Tue, 25 Oct 2016 14:58:10 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/how_intercept_junk_email_reports,commentrss</wfw:commentRss>
</item>
<item>
<title>How can I disable GreyListing on my anti-spam server?</title>
<description>GreyListing is an anti-spam technique that makes use of a "temporary reject" status to try to identify legitimate mail servers. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted.

GreyListing can be disabled in the web admin interface:


Login to the web admin interface;
Navigate to: Filters > Filter Settings > Actions (tab);
Uncheck GreyListing.

</description>
<content:encoded><![CDATA[<p>GreyListing is an anti-spam technique that makes use of a "temporary reject" status to try to identify legitimate mail servers. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted.</p>

<p>GreyListing can be disabled in the web admin interface:</p>

<ol>
<li>Login to the web admin interface;</li>
<li>Navigate to: Filters > Filter Settings > Actions (tab);</li>
<li>Uncheck GreyListing.</li>
</ol>
]]></content:encoded>
<link>https://perfectmail.com/kb/how_disable_greylisting</link>
<pubDate>Fri, 19 Aug 2016 14:47:04 +0000</pubDate>
<category>Filtering</category>
<wfw:commentRss>https://perfectmail.com/kb/how_disable_greylisting,commentrss</wfw:commentRss>
</item>
<item>
<title>What is GreyListing?</title>
<description>GreyListing is an anti-spam technique that makes use of a "temporary reject" status to try to identify legitimate mail servers. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted.

The anti-spam service analyzes the content of each message. If the anti-spam server sees email coming from a source that doesn't appear to be a regular email peer of a recipient (based on bi-directional traffic) and has certain spammy constructs or content, the message may be delayed (greylisted). The server then waits for a few attempts to send the message or a few minutes.

A normal mail server will queue a message that has been "temporarily rejected" and retry transmission in 5, 10, 15 or 30 minutes later, depending on the sending server's settings. Spam engines and bulk marketing services will not queue these messages. Often they try to force their way past GreyListing mechanisms by quickly re-sending the message a few times, then moving on to the next recipient. GreyListing is a good technique to help reduce spam originating from industrial spamvertizing sites.

In your logs you see the same message logged multiple times as the sending server tries to force its way past the grey-listing engine.

You can see GreyListing activity in the Email Activity reports, Mail Activity Log and the Transmission Log.</description>
<content:encoded><![CDATA[<p>GreyListing is an anti-spam technique that makes use of a "temporary reject" status to try to identify legitimate mail servers. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted.</p>

<p>The anti-spam service analyzes the content of each message. If the anti-spam server sees email coming from a source that doesn't appear to be a regular email peer of a recipient (based on bi-directional traffic) and has certain spammy constructs or content, the message may be delayed (greylisted). The server then waits for a few attempts to send the message or a few minutes.</p>

<p>A normal mail server will queue a message that has been "temporarily rejected" and retry transmission in 5, 10, 15 or 30 minutes later, depending on the sending server's settings. Spam engines and bulk marketing services will not queue these messages. Often they try to force their way past GreyListing mechanisms by quickly re-sending the message a few times, then moving on to the next recipient. GreyListing is a good technique to help reduce spam originating from industrial spamvertizing sites.</p>

<p>In your logs you see the same message logged multiple times as the sending server tries to force its way past the grey-listing engine.</p>

<p>You can see GreyListing activity in the Email Activity reports, Mail Activity Log and the Transmission Log.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/what_is_greylisting</link>
<pubDate>Fri, 19 Aug 2016 14:42:46 +0000</pubDate>
<category>Filtering</category>
<wfw:commentRss>https://perfectmail.com/kb/what_is_greylisting,commentrss</wfw:commentRss>
</item>
<item>
<title>Is PerfectMail able to access my server?</title>
<description>Do PerfectMail staff have the ability to access my server?

If needed PerfectMail&trade; support staff are able to connect to your PerfectMail server to perform maintenance when you request it.

If such action is needed your PerfectMail support staff will give you instructions on how to give us access to the server via the SSH or Web service.

You can also explicitly deny access to your server using the following configuration page: Server Admin &gt; Server Settings &gt; Support (tab)

Similarly, review your organization's firewall settings to restrict access to your PerfectMail server.</description>
<content:encoded><![CDATA[<h1>Do PerfectMail staff have the ability to access my server?</h1>

<p>If needed PerfectMail&trade; support staff are able to connect to your PerfectMail server to perform maintenance when you request it.</p>

<p>If such action is needed your PerfectMail support staff will give you instructions on how to give us access to the server via the SSH or Web service.</p>

<p>You can also explicitly deny access to your server using the following configuration page: <u>Server Admin &gt; Server Settings &gt; Support (tab)</u></p>

<p>Similarly, review your organization's firewall settings to restrict access to your PerfectMail server.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/access_to_my_server</link>
<pubDate>Tue, 21 Jun 2016 13:49:59 +0000</pubDate>
<category>Administration</category>
<wfw:commentRss>https://perfectmail.com/kb/access_to_my_server,commentrss</wfw:commentRss>
</item>
<item>
<title>Does PerfectMail collect any of my data?</title>
<description>Data Collection Disclosure

Following is a full disclosure of all data reported to PerfectMail&trade; from a PerfectMail&trade; product. PerfectMail&trade; is a high touch product giving the following benefits:

Statistical Reporting gives us clear & early warning of developing spam trends.
Server Monitoring ensures early notification of problems.
Quick & Effective customer support.
Off-site Backups provide additional peace of mind. If needed we can quickly provide assistance or build a fully configured replacement machine.


Automatic Server Updates
The following updates occur automatically. To disable automatic updates, update the related settings on the Security Settings page:

Anti-virus Update - Virus update checks are performed every 10 minutes. If an update is available, it will be installed automatically.
Anti-spam Update - Anti-spam update checks are performed hourly. If an update is available, it will be installed automatically.
Software Update - Software updates are available periodically. If configured, your server will download software updates and install them automatically.


Server Support Data
The following data elements are normally reported back to PerfectMail&trade; for support and analysis purposes. To disable any of these reporting features update the Server Admin &gt; Server Settings page on the Web Interface. If support &amp; reporting features are disabled your PerfectMail&trade; product will still send notification that these features are disabled. No e-mail message content is ever sent to PerfectMail&trade;; except for those messages the client wishes to have examined for spam content.

Statistical Reporting: Statistical information regarding the effectiveness of the anti-spam software; i.e. number of rejects, tags, accepts, RBL's, mining attempts, spam traps, etc.
Report Spam: The client user or administrator forwards a spam e-mail to PerfectMail&trade; for review. Included with the reported spam e-mail are the PerfectMail&trade; server name and the email address of the submitting user.
False Positive Investigation: For each false positive release, a message is sent to PerfectMail&trade; for analysis. If the client has requested false positive investigation, we may examine the message to determine what the problem may be. Even with this option, PerfectMail&trade; staff will contact the client for permission to perform such investigations.
Server Monitoring: Hourly health reports allow us to see if there are any issues with the product. These messages describe the state of the databases, but do not include any elements of their content. If there is an issue with a database, a notification message containing the machine name and data table name is sent to PerfectMail&trade; for information purposes. The PerfectMail&trade; product is able to self-fix its databases. Administrator intervention is rarely required. In the event of a process crash, a core file (describing what the program was doing the issue occurred) may be sent for analysis.


</description>
<content:encoded><![CDATA[<h1>Data Collection Disclosure</h1>

<p>Following is a full disclosure of all data reported to PerfectMail&trade; from a PerfectMail&trade; product. PerfectMail&trade; is a <i>high touch</i> product giving the following benefits:</p>
<ul>
<li><i>Statistical Reporting</i> gives us clear & early warning of developing spam trends.
<li><i>Server Monitoring</i> ensures early notification of problems.
<li><i>Quick & Effective</i> customer support.
<li><i>Off-site Backups</i> provide additional peace of mind. If needed we can quickly provide assistance or build a <i>fully configured</i> replacement machine.
</ul>

<h2>Automatic Server Updates</h2>
<p>The following updates occur automatically. To disable automatic updates, update the related settings on the <i>Security Settings</i> page:</p>
<ul>
<li><i>Anti-virus Update</i> - Virus update checks are performed every 10 minutes. If an update is available, it will be installed automatically.</li>
<li><i>Anti-spam Update</i> - Anti-spam update checks are performed hourly. If an update is available, it will be installed automatically.</li>
<li><i>Software Update</i> - Software updates are available periodically. If configured, your server will download software updates and install them automatically.</li>
</ul>

<h2>Server Support Data</h2>
<p>The following data elements are normally reported back to PerfectMail&trade; for support and analysis purposes. To disable any of these reporting features update the <u>Server Admin &gt; Server Settings</u> page on the <i>Web Interface</i>. If support &amp; reporting features are disabled your PerfectMail&trade; product will still send notification that these features are disabled. <b>No e-mail message content is ever sent to PerfectMail&trade;; except for those messages the client wishes to have examined for spam content.</b></p>
<ul>
<li><i>Statistical Reporting:</i> Statistical information regarding the effectiveness of the anti-spam software; i.e. number of rejects, tags, accepts, RBL's, mining attempts, spam traps, etc.</li>
<li><i>Report Spam:</i> The client user or administrator forwards a spam e-mail to PerfectMail&trade; for review. Included with the reported spam e-mail are the PerfectMail&trade; server name and the email address of the submitting user.</li>
<li><i>False Positive Investigation:</i> For each false positive release, a message is sent to PerfectMail&trade; for analysis. If the client has requested <i>false positive investigation</i>, we may examine the message to determine what the problem may be. Even with this option, PerfectMail&trade; staff will contact the client for permission to perform such investigations.</li>
<li><i>Server Monitoring:</i> Hourly health reports allow us to see if there are any issues with the product. These messages describe the state of the databases, but do not include any elements of their content. If there is an issue with a database, a notification message containing the machine name and data table name is sent to PerfectMail&trade; for information purposes. The PerfectMail&trade; product is able to self-fix its databases. Administrator intervention is rarely required. In the event of a process crash, a core file (describing what the program was doing the issue occurred) may be sent for analysis.</li>
</ul>
</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/data_disclosure</link>
<pubDate>Tue, 21 Jun 2016 13:39:24 +0000</pubDate>
<category>Administration</category>
<wfw:commentRss>https://perfectmail.com/kb/data_disclosure,commentrss</wfw:commentRss>
</item>
<item>
<title>Website Probing</title>
<description>As part of our anti-spam efforts, PerfectMail servers will probe websites based on URLs contained in email. When there is insufficient information in an email to make a definitive spam analysis a PerfectMail server may probe weblinks contained in that message. The target webpage or the root of the website may be probed in an effort to extend content filtering efforts.

This is not web-crawling activity, so the robots.txt file is not downloaded. Rather PerfectMail acts as a user-agent, acting on behalf of the message recipient, to verify weblinks contained in received email messages. If PerfectMail is probing a webpage on your website it is because a link to that webpage was included in an email that was received.

PerfectMail webprobes can be identified by the User-Agent String: PerfectMail/2.0 (http://perfectmail.com/kb/web_probe)

Efforts are made to cache website information to minimize webprobe activity.</description>
<content:encoded><![CDATA[<p>As part of our anti-spam efforts, PerfectMail servers will probe websites based on URLs contained in email. When there is insufficient information in an email to make a definitive spam analysis a PerfectMail server may probe weblinks contained in that message. The target webpage or the root of the website may be probed in an effort to extend content filtering efforts.</p>

<p>This is not web-crawling activity, so the <i>robots.txt</i> file is not downloaded. Rather PerfectMail acts as a <i>user-agent</i>, acting on behalf of the message recipient, to verify weblinks contained in received email messages. If PerfectMail is probing a webpage on your website it is because a link to that webpage was included in an email that was received.</p>

<p>PerfectMail webprobes can be identified by the User-Agent String: <b>PerfectMail/2.0 (http://perfectmail.com/kb/web_probe)</b></p>

<p>Efforts are made to cache website information to minimize webprobe activity.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/web_probe</link>
<pubDate>Wed, 14 Oct 2015 11:05:51 +0000</pubDate>
<category>Filtering</category>
<wfw:commentRss>https://perfectmail.com/kb/web_probe,commentrss</wfw:commentRss>
</item>
<item>
<title>Setup Junk E-mail Reporting Add-in for Microsoft Outlook</title>
<description>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</description>
<content:encoded><![CDATA[<p>This article shows how to setup the Junk E-mail Reporting add-in for Microsoft Outlook. PerfectMail is able to identify and immediately train your spam on your local PerfectMail server without you having to use the PerfectMail console. The Junk E-mail Reporting feature integrates into Outlook 2003, 2007, 2010 and 2013.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/microsoft_junk_email_reporting</link>
<pubDate>Tue, 09 Jun 2015 11:24:06 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/microsoft_junk_email_reporting,commentrss</wfw:commentRss>
</item>
<item>
<title>Test Score: No DNS PTR record</title>
<description>This problem does not lie with PerfectMail, the problem lies with the sending mail server and its DNS configuration.
The correct solution to this problem is for the sending mail server's administrator to create a DNS PTR record to return the mail server's FQDN.
The quick fix solution to the problem (within PerfectMail) is to add the sending mail server's IP address to the No Server Check list. Navigation: Filters &gt; Sender &gt; No Server Check.
Explanation
Domain Name Services (DNS) are the phone book of the Internet. DNS is responsible for performing many types of look ups... Two key look up types are
Address Lookups - Taking a fully qualified domain name (e.g.: mailserver.mydomain.com) and returning a static IP address (e.g.: 1.2.3.4)DNS Name -&gt; Address lookups are handled using DNS Address (also known as 'A') records
Reverse Lookups - Taking an IP address (e.g.: 1.2.3.4) and returning a fully qualified host name (e.g.: mailserver.mydomain.com)DNS Address -&gt; Name lookups are handled by DNS Pointer (also known as 'PTR') records
You can view the DNS records for PerfectMail.com here - http://who.is/dns/perfectmail.com
You can easily view your own DNS records. Simply copy/paste this link into a web browser and add your domain name to the end: http://who.is/dns/&lt;yourDomain&gt;
A Relay Host is any machine that either originates an e-mail transaction, or acts as a Relay for other mail servers to forward e-mail to a target mail server
DNS Best Practice
PerfectMail looks at the DNS configuration of sending e-mail servers to determine if the sending server is a spam engine or a legitimate e-mail server. To understand how PerfectMail assesses a mail server's DNS records, we need to look at the Best Practice for creating and managing DNS records for Mail Servers.
DNS For Well Configured Mail Servers
Properly configured mail servers have a minimum of two DNS records...

An Address (A) record that takes the mail server's fully qualified name to an IP address, and
A Pointer (PTR) record that takes that IP address and returns the same mail server fully qualified name.

Most mail server (or mail gateway servers) have an assigned static IP address. It is a Best Practice for all Internet facing servers to have both Address records and Pointer records.
Spam Engine DNS Records
The vast majority of spam engines on the Internet are computers infected with one or more spam viruses. These machines are typically Microsoft Windows PCs connected to a retail broadband Internet connection.
Retail broadband Internet providers use Dynamic Host Configuration Protocol (DHCP) to assign temporary IP addresses to their customers computers (or modems/firewall appliances). When DHCP assigns a temporary IP address to your computer/router/firewall, it updates the Internet Provider's DNS service with an Address (A) record for your computer. This might look something like r186-49-230-196.dialup.adsl.anteldata.net (taken from a spam sample) which would resolve to 186.49.230.196 (note the IP address is part of the fully qualified name). What retail broadband Internet providers do not do is create Pointer (PTR) or IP Address -&gt; Fully Qualified name lookup DNS records for their non-business customers.
Fly-by-night operations, spammers, compromised PCs, etc. are not entities that are generally willing or able to get PTR records from their ISPs. This makes the presence or absence of DNS PTR records a good measure of the sending mail server's legitimacy.
PerfectMail Test For Mail Server DNS
When PerfectMail gets an inbound e-mail connection, PerfectMail performs a DNS Pointer (PTR) lookup on the IP address of the sending mail server. If the DNS Pointer (PTR) lookup fails, PerfectMail adds a score (+8 Relay Host: No DNS PTR record) to the message because the sending mail server does not follow DNS Best Practices.
Please note: this score is added because the sender's mail server has a DNS configuration problem. The issue does not lie with PerfectMail.
Quick Fix Solution
If you need to configure PerfectMail now to receive messages from a peer mail server with DNS PTR, RBL or SPF configuration problems...

Log in to your PerfectMail Administrator's portal (web site)
Add the sending mail server's IP address to the No Server Check list. Navigation: Filters &gt; Sender &gt; No Server Check.

E-mail messages from domains and IP addresses listed on the No Server Check list do not undergo any incoming mail server based DNS (both A and PTR), RBL or SPF checks. Valid peer mail servers that receive increased scores due to any DNS, RBL or SPF tests should be listed under No Server Check. This includes valid peers e-mail servers that:

Have no DNS PTR record
Are RBL (Real Time Block) listed
Have poorly configured or incorrect SPF (Sender Policy Framework) records

Preferred Solution
The preferred approach to eliminating this score to add a valid DNS PTR record:

Contact the mail administrator of the sending organization and tell them what is going on with their mail server. Tell them that adding a score for a missing PTR records is a common strategy used by all anti-spam systems.
Suggest they contact their Internet Provider (who delegates static IP addresses to their customers). 
Have them request their provider create a DNS PTR record to map the IP address of the mail server to the FQDN of the mail server

This is usually done by calling the Internet Provider's help desk or filing a trouble ticket with the Internet Provider to create the DNS PTR record
Alternative Solutions
The following alternative solutions will eliminate PerfectMail scoring on known valid e-mail peers where DNS for those peers is not configured according to Best Practices.
Solution 1 - Add the Sending Mail Server's FQDN to the White List

Log in to your PerfectMail Administrator's portal (web site)
White list the sending mail server's FQDN. Navigation: Filters &gt; Sender &gt; White List. Add the Sending Mail Server's FQDN to the Whitel List. This will allow all inbound e-mail from the mail server.

Solution 2 - Add the Sender's Domain to the White List

Log in to your PerfectMail Administrator's portal (web site)
White list the sender's Domain. Navigation: Filters &gt; Sender &gt; White List. Add the Sender's Domain to the Whitel List. This will allow all inbound e-mail from any mail server where the sender's e-mail address uses the same domain name.

This should be avoided if possible. The problem with this approach is that spammers can use any domain name they want in the messages From field. If spammers use your peer's Domain name (and you've white listed that domain). the spam will be delivered.</description>
<content:encoded><![CDATA[<p>This problem does not lie with PerfectMail, the problem lies with the sending mail server and its DNS configuration.</p>
<p>The <strong>correct </strong>solution to this problem is for the sending mail server's administrator to create a DNS PTR record to return the mail server's FQDN.</p>
<p>The <strong>quick fix </strong>solution to the problem (within PerfectMail) is to add the sending mail server's IP address to the <em>No Server Check</em> list. Navigation: <strong>Filters </strong>&gt; <strong>Sender </strong>&gt; <strong>No Server Check</strong>.</p>
<h2>Explanation</h2>
<p>Domain Name Services (DNS) are the phone book of the Internet. DNS is responsible for performing many types of look ups... Two key look up types are</p>
<p style="padding-left: 30px;"><strong>Address Lookups</strong> - Taking a fully qualified domain name (e.g.: <span style="font-family: courier new,courier;">mailserver.mydomain.com</span>) and returning a <span style="text-decoration: underline;">static</span> IP address (e.g.: <span style="font-family: courier new,courier;">1.2.3.4</span>)<br />DNS Name -&gt; Address lookups are handled using DNS Address (also known as '<strong>A</strong>') records</p>
<p style="padding-left: 30px;"><strong>Reverse Lookups</strong> - Taking an IP address (e.g.: <span style="font-family: courier new,courier;">1.2.3.4</span>) and returning a fully qualified host name (e.g.: <span style="font-family: courier new,courier;">mailserver.mydomain.com</span>)<br />DNS Address -&gt; Name lookups are handled by DNS Pointer (also known as '<strong>PTR</strong>') records</p>
<p>You can view the DNS records for <span style="font-family: courier new,courier;">PerfectMail.com</span> here - <a title="PerfectMail DNS Records" href="http://who.is/dns/perfectmail.com" target="_blank">http://who.is/dns/perfectmail.com</a></p>
<p>You can easily view your own DNS records. Simply copy/paste this link into a web browser and add your domain name to the end: <strong>http://who.is/dns/&lt;yourDomain&gt;</strong></p>
<p>A <em>Relay Host</em> is any machine that either originates an e-mail transaction, or acts as a Relay for other mail servers to forward e-mail to a target mail server</p>
<h2>DNS Best Practice</h2>
<p>PerfectMail looks at the DNS configuration of sending e-mail servers to determine if the sending server is a spam engine or a legitimate e-mail server. To understand how PerfectMail assesses a mail server's DNS records, we need to look at the Best Practice for creating and managing DNS records for Mail Servers.</p>
<h3>DNS For Well Configured Mail Servers</h3>
<p>Properly configured mail servers have a minimum of two DNS records...</p>
<ol>
<li>An Address (<strong>A</strong>) record that takes the mail server's fully qualified name to an IP address, and</li>
<li>A Pointer (<strong>PTR</strong>) record that takes that IP address and returns the same mail server fully qualified name.</li>
</ol>
<p>Most mail server (or mail gateway servers) have an assigned <strong>static </strong>IP address. It is a <strong>Best Practice</strong> for all Internet facing servers to have both <em>Address </em>records and <em>Pointer </em>records.</p>
<h3>Spam Engine DNS Records</h3>
<p>The vast majority of spam engines on the Internet are computers infected with one or more spam viruses. These machines are typically Microsoft Windows PCs connected to a retail broadband Internet connection.</p>
<p>Retail broadband Internet providers use <em>Dynamic Host Configuration Protocol</em> (DHCP) to assign temporary IP addresses to their customers computers (or modems/firewall appliances). When DHCP assigns a temporary IP address to your computer/router/firewall, it updates the Internet Provider's DNS service with an Address (A) record for your computer. This might look something like <span style="font-family: courier new,courier;">r186-49-230-196.dialup.adsl.anteldata.net</span> (taken from a spam sample) which would resolve to <span style="font-family: courier new,courier;">186.49.230.196</span> (note the IP address is part of the fully qualified name). What retail broadband Internet providers do not do is create Pointer (PTR) or IP Address -&gt; Fully Qualified name lookup DNS records for their non-business customers.</p>
<p>Fly-by-night operations, spammers, compromised PCs, etc. are not entities that are generally willing or able to get PTR records from their ISPs. This makes the presence or absence of DNS PTR records a good measure of the sending mail server's legitimacy.</p>
<h2>PerfectMail Test For Mail Server DNS</h2>
<p>When PerfectMail gets an inbound e-mail connection, PerfectMail performs a DNS Pointer (PTR) lookup on the IP address of the sending mail server. If the DNS Pointer (PTR) lookup fails, PerfectMail adds a score (<span style="font-family: courier new,courier;">+8 Relay Host: No DNS PTR record</span>) to the message because the sending mail server does not follow DNS Best Practices.</p>
<p><strong>Please note</strong>: this score is added because the sender's mail server has a DNS configuration problem. The issue does not lie with PerfectMail.</p>
<h2>Quick Fix Solution</h2>
<p>If you need to configure PerfectMail <strong>now </strong>to receive messages from a peer mail server with DNS PTR, RBL or SPF configuration problems...</p>
<ol>
<li>Log in to your PerfectMail Administrator's portal (web site)</li>
<li>Add the sending mail server's IP address to the <em>No Server Check</em> list. Navigation: <strong>Filters </strong>&gt; <strong>Sender </strong>&gt; <strong>No Server Check</strong>.</li>
</ol>
<p>E-mail messages from domains and IP addresses listed on the <em>No Server Check</em> list do not undergo any incoming mail server based DNS (both A and PTR), RBL or SPF checks. Valid peer mail servers that receive increased scores due to any DNS, RBL or SPF tests should be listed under <em>No Server Check</em>. This includes valid peers e-mail servers that:</p>
<ul>
<li>Have no DNS PTR record</li>
<li>Are RBL (Real Time Block) listed</li>
<li>Have poorly configured or incorrect SPF (Sender Policy Framework) records</li>
</ul>
<h2>Preferred Solution</h2>
<p>The preferred approach to eliminating this score to add a valid DNS PTR record:</p>
<ol>
<li>Contact the mail administrator of the sending organization and tell them what is going on with their mail server. Tell them that adding a score for a missing PTR records is a common strategy used by all anti-spam systems.</li>
<li>Suggest they contact their Internet Provider (who delegates static IP addresses to their customers). </li>
<li>Have them request their provider create a DNS PTR record to map the IP address of the mail server to the FQDN of the mail server</li>
</ol>
<p>This is usually done by calling the Internet Provider's help desk or filing a trouble ticket with the Internet Provider to create the DNS PTR record</p>
<h2>Alternative Solutions</h2>
<p>The following alternative solutions will eliminate PerfectMail scoring on known valid e-mail peers where DNS for those peers is not configured according to Best Practices.</p>
<h3>Solution 1 - Add the Sending Mail Server's FQDN to the White List</h3>
<ol>
<li>Log in to your PerfectMail Administrator's portal (web site)</li>
<li>White list the sending mail server's FQDN. Navigation: <strong>Filters </strong>&gt; <strong>Sender </strong>&gt; <strong>White List</strong>. Add the Sending Mail Server's FQDN to the Whitel List. This will allow all inbound e-mail from the mail server.</li>
</ol>
<h3>Solution 2 - Add the Sender's Domain to the White List</h3>
<ol>
<li>Log in to your PerfectMail Administrator's portal (web site)</li>
<li>White list the sender's Domain. Navigation: <strong>Filters </strong>&gt; <strong>Sender </strong>&gt; <strong>White List</strong>. Add the Sender's Domain to the Whitel List. This will allow all inbound e-mail from any mail server where the sender's e-mail address uses the same domain name.</li>
</ol>
<p>This should be avoided if possible. The problem with this approach is that spammers can use any domain name they want in the messages From field. If spammers use your peer's Domain name (and you've white listed that domain). the spam will be delivered.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/no_dns_ptr_record</link>
<pubDate>Fri, 28 Feb 2014 19:01:06 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/no_dns_ptr_record,commentrss</wfw:commentRss>
</item>
<item>
<title>How can I find the &quot;message headers&quot; using Microsoft Outlook?</title>
<description>Message Headers are the email header information that is usually displayed at the top of a message in your mail client (e.g. Outlook). They usually contain information such as the 'From', 'To', 'Date' and 'Subject' fields. Not all Message Headers are displayed by your mail client. There are many more headers that describe the format and encoding of your email, and additional information supplied by each mail server that handled the message.The "hidden" Message Headers are very useful when your email administrator is investigating an email issue. Sometimes mail clients will remove Message Headers when messages are forwarded, so you may be asked to copy and forward this information to your email administrator.Different versions of Outlook organize their menus in different ways. In general, to find the Message Header information in Microsoft Outlook do the following:1) In an open message, click the File tab. You may not see the file tab in your mail client. In this case click the "Quick Access" icon at the top left corner of the message (which will give you access to other commands such as "New", "Print", "Save", and "Properties".
2) Click Properties.
3) The Message Headers appear in the "Internet headers" box, which may be located on the "Details" tab.
4) Highlight the headers with your mouse and press Control+C to copy the information.You may also find the "Message Source" available on this page. This contains the complete email message in its raw form, which is also very useful for message analysis.</description>
<content:encoded><![CDATA[<p>Message Headers are the email header information that is usually displayed at the top of a message in your mail client (e.g. Outlook). They usually contain information such as the 'From', 'To', 'Date' and 'Subject' fields. Not all Message Headers are displayed by your mail client. There are many more headers that describe the format and encoding of your email, and additional information supplied by each mail server that handled the message.</p><p>The "hidden" Message Headers are very useful when your email administrator is investigating an email issue. Sometimes mail clients will remove Message Headers when messages are forwarded, so you may be asked to copy and forward this information to your email administrator.</p><p>Different versions of Outlook organize their menus in different ways. In general, to find the Message Header information in Microsoft Outlook do the following:</p><p>1) In an open message, click the File tab. You may not see the file tab in your mail client. In this case click the "Quick Access" icon at the top left corner of the message (which will give you access to other commands such as "New", "Print", "Save", and "Properties".<br />
2) Click Properties.<br />
3) The Message Headers appear in the "Internet headers" box, which may be located on the "Details" tab.<br />
4) Highlight the headers with your mouse and press Control+C to copy the information.</p><p>You may also find the "Message Source" available on this page. This contains the complete email message in its raw form, which is also very useful for message analysis.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/microsoft_outlook_mail_headers</link>
<pubDate>Fri, 07 Feb 2014 15:19:44 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/microsoft_outlook_mail_headers,commentrss</wfw:commentRss>
</item>
<item>
<title>Configure a Smarthost Relay Connector in Exchange Server 2013</title>
<description>Exchange Admin Center (EAC) in Exchange&trade; 2013

The Exchange Admin Center (EAC) is the web based management console for Microsoft Exchange Server 2013. The EAC replaces the Exchange Management Console (EMC) and the Exchange Control Panel (ECP) which were the two interfaces used to manage Exchange Server 2010. Because the EAC is a web based management console, you will need access this console by pointing your web browser at your mail server, (e.g. https://mail.mydomain.com/ecp )

Routing e-mail through a Smart Host

Use the EAC to create a Send Connector to route outbound email through a smart host:


In the EAC, navigate to "Mail flow > Send connectors", and then click the "Add +" icon.
In the "New send connector" wizard, specify a name for the send connector and then select "Custom" for the "Type". You typically choose this selection when you want to route messages to computers not running Microsoft Exchange Server 2013. Click "Next".
Choose "Route mail through smart hosts", and then click the "Add +" icon. In the "Add smart host" window, specify the IP address, such as 192.168.100.1, or the fully qualified domain name (FQDN), such as mydomain.com. Click "Save". For "Smart host authentication", choose the type of authentication required by the smart host. Make sure the Authentication type is set to "no authentication".
Under "Address space", click the "Add +" icon. In the "Add domain" window, make sure SMTP is listed as the "Type". For "Fully Qualified Domain Name (FQDN)", enter * to specify that this send connector applies to messages sent to any domain. Click "Save".
For "Source server", click the "Add +" icon. In the "Select a server" window, choose a server and click the "Add +" Icon. Click "OK".
Click "Finish".


Once you have created the send connector, it will in the Send connector list.</description>
<content:encoded><![CDATA[<h2>Exchange Admin Center (EAC) in Exchange&trade; 2013</h2>

<p>The <strong>Exchange Admin Center (EAC)</strong> is the web based management console for <strong>Microsoft Exchange Server 2013</strong>. The EAC replaces the <strong>Exchange Management Console (EMC)</strong> and the <strong>Exchange Control Panel (ECP)</strong> which were the two interfaces used to manage <strong>Exchange Server 2010</strong>. Because the EAC is a web based management console, you will need access this console by pointing your web browser at your mail server, (e.g. https://mail.mydomain.com/ecp )</p>

<h2>Routing e-mail through a Smart Host</h2>

<p>Use the EAC to create a Send Connector to route outbound email through a smart host:</p>

<ol>
<li>In the EAC, navigate to "Mail flow > Send connectors", and then click the "Add +" icon.</li>
<li>In the "New send connector" wizard, specify a name for the send connector and then select "Custom" for the "Type". You typically choose this selection when you want to route messages to computers not running Microsoft Exchange Server 2013. Click "Next".</li>
<li>Choose "Route mail through smart hosts", and then click the "Add +" icon. In the "Add smart host" window, specify the IP address, such as 192.168.100.1, or the fully qualified domain name (FQDN), such as mydomain.com. Click "Save". For "Smart host authentication", choose the type of authentication required by the smart host. Make sure the Authentication type is set to "no authentication".</li>
<li>Under "Address space", click the "Add +" icon. In the "Add domain" window, make sure SMTP is listed as the "Type". For "Fully Qualified Domain Name (FQDN)", enter * to specify that this send connector applies to messages sent to any domain. Click "Save".</li>
<li>For "Source server", click the "Add +" icon. In the "Select a server" window, choose a server and click the "Add +" Icon. Click "OK".</li>
<li>Click "Finish".</li>
</ol>

<p>Once you have created the send connector, it will in the Send connector list.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/smarthost_relay_connector</link>
<pubDate>Tue, 17 Dec 2013 16:27:12 +0000</pubDate>
<category>Configuration</category>
<wfw:commentRss>https://perfectmail.com/kb/smarthost_relay_connector,commentrss</wfw:commentRss>
</item>
<item>
<title>What is the &quot;RX Scanner&quot;?</title>
<description>The RX Scanner is a complex sender+content content validation engine targeting phishing and other spam.This new analysis engine takes content filtering to the next level. It looks for pre-defined signatures in both the message and headers using a powerful matching engine. Using defined templates RX Scanner is able to identify what type of message is being being presented to the recipient. When a phishing target is identified, RX Scanner performs validation and verification of the message against well-known and published validation information available from the actual phishing target.RX Scanner is an effective defense against well-known phishing attacks. Unlike spam campaigns where the content of e-mail can be varied infinitely to defeat anti-spam solutions, phishing attacks depend on a limited number of well defined target sites (e.g. Facebook). For a phishing campaign to be effective the phishing messages must resemble something the target site might send. Once a targeted phishing site is identified RX Scanner then performs a number of verification functions to confirm whether or not the message is legitimate.As a bonus, this technique can also be use to block those well known spam campaigns that never seem to go away.</description>
<content:encoded><![CDATA[<p>The RX Scanner is a complex sender+content content validation engine targeting phishing and other spam.</p><p>This new analysis engine takes content filtering to the next level. It looks for pre-defined signatures in both the message and headers using a powerful matching engine. Using defined templates RX Scanner is able to identify what type of message is being being presented to the recipient. When a phishing target is identified, RX Scanner performs validation and verification of the message against well-known and published validation information available from the actual phishing target.</p><p>RX Scanner is an effective defense against well-known phishing attacks. Unlike spam campaigns where the content of e-mail can be varied infinitely to defeat anti-spam solutions, phishing attacks depend on a limited number of well defined target sites (e.g. Facebook). For a phishing campaign to be effective the phishing messages must resemble something the target site might send. Once a targeted phishing site is identified RX Scanner then performs a number of verification functions to confirm whether or not the message is legitimate.</p><p>As a bonus, this technique can also be use to block those well known spam campaigns that never seem to go away.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/rxscanner_rxscan_content_filter</link>
<pubDate>Wed, 23 Oct 2013 20:01:48 +0000</pubDate>
<category>Filtering</category>
<wfw:commentRss>https://perfectmail.com/kb/rxscanner_rxscan_content_filter,commentrss</wfw:commentRss>
</item>
<item>
<title>Why are outbound messages containing .doc/.docx attachments being blocked?</title>
<description>Sometimes doc/docx messages (and other Microsoft document formats) will be blocked by anti-spam/anti-virus due to the presence of macros. Some filters will reject attachments because of Company Defined Security Policies. These policies may block messages based on specific aspects of the message that may be considered dangerous or due to password protection or encryption. Document files containing macros often get caught by such security policies. The simple existence of a macro may be enough to block the message.
Company Defined Security Policies:Content filters may be set by Company Defined Security Polices to try to prevent potentially dangerous content from entering an organization. The content filtering settings can differ from one company to another depending on the type of company, market sector, government restrictions or arbitrary IT administrator decisions. Filters may also be to prevent data loss be controlling the type of documents that can be transmitted outside an internal network; which may also prevent incoming transmission of such documents depending on the filter implementation.Examples of such security policies include the blocking of:- Dangerous file types including executable files, Active X and Applets;
- Files containing macros or other scripts including JavaScript;
- Zip archives, large zip archives, nested zip archives;
- Password protected zip and pdf files;
- HREF links to files outside of the document (sometimes occurring in pdf files);
- Files whose MIME type does not match its extension;
- Encrypted files;
Unfortunately, such systems may give little or no indication of what aspect of the message is triggering a content block. Further complicating diagnosis is the fact that administrators may be tweaking such rules as new threats are identified and as false positive reports are coming in. Depending on the filter configuration these messages may be rejected outright or they may be deferred. In normal mail transmission "deferral" is meant to be a temporary measure. When deferral is used to impose security policies it will generally result in messages getting stuck in the local mail queue.The best course of action to take when this sort of behavior appears to be happening is to contact the e-mail recipient or mail administrator for the organization and bring this problem to their attention.</description>
<content:encoded><![CDATA[<p>Sometimes doc/docx messages (and other Microsoft document formats) will be blocked by anti-spam/anti-virus due to the presence of macros. Some filters will reject attachments because of Company Defined Security Policies. These policies may block messages based on specific aspects of the message that may be considered dangerous or due to password protection or encryption. Document files containing macros often get caught by such security policies. The simple existence of a macro may be enough to block the message.</p><p><br />
Company Defined Security Policies:</p><p>Content filters may be set by Company Defined Security Polices to try to prevent potentially dangerous content from entering an organization. The content filtering settings can differ from one company to another depending on the type of company, market sector, government restrictions or arbitrary IT administrator decisions. Filters may also be to prevent data loss be controlling the type of documents that can be transmitted outside an internal network; which may also prevent incoming transmission of such documents depending on the filter implementation.</p><p>Examples of such security policies include the blocking of:</p><p>- Dangerous file types including executable files, Active X and Applets;<br />
- Files containing macros or other scripts including JavaScript;<br />
- Zip archives, large zip archives, nested zip archives;<br />
- Password protected zip and pdf files;<br />
- HREF links to files outside of the document (sometimes occurring in pdf files);<br />
- Files whose MIME type does not match its extension;<br />
- Encrypted files;</p><p><br />
Unfortunately, such systems may give little or no indication of what aspect of the message is triggering a content block. Further complicating diagnosis is the fact that administrators may be tweaking such rules as new threats are identified and as false positive reports are coming in. </p><p>Depending on the filter configuration these messages may be rejected outright or they may be deferred. In normal mail transmission "deferral" is meant to be a temporary measure. When deferral is used to impose security policies it will generally result in messages getting stuck in the local mail queue.</p><p>The best course of action to take when this sort of behavior appears to be happening is to contact the e-mail recipient or mail administrator for the organization and bring this problem to their attention.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/doc_docx_attachment_blocked</link>
<pubDate>Mon, 07 Oct 2013 16:22:23 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/doc_docx_attachment_blocked,commentrss</wfw:commentRss>
</item>
<item>
<title>My PerfectMail server says there are network issues that I can't find. What's going on?</title>
<description>PerfectMail has a Validation Script that runs every 15 minutes looking for potential server, network, mail server and configuration issues. The Validation Script generates errors and warnings which are reported on the Administrator's Web Interface. When PerfectMail does identify an issue it will retry testing a number of times, after waiting for short pauses, to reduce the number of warning/error messages it generates.  Often a test must fail nine (9) times before a warning is generated.Because PerfectMail is actively testing your infrastructure it may identify issues you may not normally be aware of. This most often occurs when transient network/connectivity issues occur. Sometimes transient issues with resolve themselves after a short time span. You may find when you manually test the issue it has already be resolved.Examples of this sort of network behavior can include ISP maintenance activity, restricted bandwidth due to very large file downloads, etc.If server validation warning messages occur infrequently you can ignore them. However, consistent ongoing warning messages may signify potential problems with your network infrastructure. After resolving any warning or error conditions, the validation script will automatically clear any warning or error messages.You can find the Server Status summary on the Dashboard in the Server Status box. Detailed validation results are available under "Reports > Server Status". You can run the validation script manually on the PerfectMail Dashboard screen using the "Validate Server Settings" button. To configure the validation tests go to "Server Admin > Server Settings > Validation (tab).</description>
<content:encoded><![CDATA[<p>PerfectMail has a Validation Script that runs every 15 minutes looking for potential server, network, mail server and configuration issues. The Validation Script generates errors and warnings which are reported on the Administrator's Web Interface. When PerfectMail does identify an issue it will retry testing a number of times, after waiting for short pauses, to reduce the number of warning/error messages it generates.  Often a test must fail nine (9) times before a warning is generated.</p><p>Because PerfectMail is actively testing your infrastructure it may identify issues you may not normally be aware of. This most often occurs when transient network/connectivity issues occur. Sometimes transient issues with resolve themselves after a short time span. You may find when you manually test the issue it has already be resolved.</p><p>Examples of this sort of network behavior can include ISP maintenance activity, restricted bandwidth due to very large file downloads, etc.</p><p>If server validation warning messages occur infrequently you can ignore them. However, consistent ongoing warning messages may signify potential problems with your network infrastructure. </p><p>After resolving any warning or error conditions, the validation script will automatically clear any warning or error messages.</p><p>You can find the Server Status summary on the Dashboard in the Server Status box. Detailed validation results are available under "Reports > Server Status". You can run the validation script manually on the PerfectMail Dashboard screen using the "Validate Server Settings" button. To configure the validation tests go to "Server Admin > Server Settings > Validation (tab).</p>]]></content:encoded>
<link>https://perfectmail.com/kb/what_network_issues</link>
<pubDate>Mon, 07 Oct 2013 14:32:31 +0000</pubDate>
<category>Configuration</category>
<wfw:commentRss>https://perfectmail.com/kb/what_network_issues,commentrss</wfw:commentRss>
</item>
<item>
<title>How can I secure message content from casual viewing by mail administrators?</title>
<description>PerfectMail provides a number of ways to secure your mail content from prying eyes. The first step in securing your server is to ensure administrator access is granted on a "needs" basis. Not ever administrator needs full access to your PerfectMail server. End-users should not have access to the administrator interface at all. We provide User Empowerment Tools to allow your users to manage their own e-mail without requiring access to the administrator interface.
Global Settings:If required, you can restrict the global "message view" setting for all PerfectMail administrators. Connect to the administrator web interface and navigate to "Server Admin > Server Settings" and select the "Security" tab. Here you can adjust the setting for "Allow message viewing" to prevent message content viewing in the admin interface.
Restrict User Settings:Under "Server Admin > Users" you can click on the "Permissions" tab of a user and change their type from "Administrator" to "User". An "Administrator" has full access to the PerfectMail web interface. Not every administrative user needs full access. You'll need at least one full "Administrator", but most other users can be set as the "User" type. Then you can select the administrative permissions each user has, including "View message content" setting.
Allow End Users to Manage Their E-mail:With PerfectMail your users can manage their own e-mail without needing administrator access. PerfectMail offers an E-mail Activity Report and Self-Service Console, which allows each user to view and manage their e-mail activity without seeing another persons e-mail.You can enable these features using "Server Admin > Server Settings > Activity Report (tab)". You need to make sure the "Local Server Web URL" is set correctly for your server - it needs to be the URL that *can* be hit from wherever your users are. (Sometimes organizations have problems with internal private networks vs. public networks with respect to DNS resolution; or having the ability to access the PM server because of firewall rules.)After these features are enabled you go to "Domain Admin > Domains", select a domain, click on "Edit Addresses" (in the bottom right corner of the screen), and edit the settings for each user using the "Self Service Console" or "Activity Report" tabs. The Activity Report sends an e-mail activity report which may include "one click" links so users can manage their e-mail directly from the report. It can also include a link to go to the Self Service Console. The Self Service Console is a limited user based interface so an end user can manage their own e-mail. They can get into the interface via a link on the Activity Report or can log in directly to the PerfectMail interface using their e-mail address and password. This password can be set by and administrator or by the users themselves on the "Settings" tab.
Administrator Audit Log:PerfectMail also includes an Audit Log so you can see what your PerfectMail administrators are doing. You can find the Audit Log at "Server Admin > Audit Log". Auditing helps to track administrator activities so you can have peace of mind in knowing what is happening with your PerfectMail server. Auditing can also act as a preventative measure if your administrators know their activities are being audited.</description>
<content:encoded><![CDATA[<p>PerfectMail provides a number of ways to secure your mail content from prying eyes. The first step in securing your server is to ensure administrator access is granted on a "needs" basis. Not ever administrator needs full access to your PerfectMail server. End-users should not have access to the administrator interface at all. We provide User Empowerment Tools to allow your users to manage their own e-mail without requiring access to the administrator interface.</p><p><br />
Global Settings:</p><p>If required, you can restrict the global "message view" setting for all PerfectMail administrators. Connect to the administrator web interface and navigate to "Server Admin > Server Settings" and select the "Security" tab. Here you can adjust the setting for "Allow message viewing" to prevent message content viewing in the admin interface.</p><p><br />
Restrict User Settings:</p><p>Under "Server Admin > Users" you can click on the "Permissions" tab of a user and change their type from "Administrator" to "User". An "Administrator" has full access to the PerfectMail web interface. Not every administrative user needs full access. You'll need at least one full "Administrator", but most other users can be set as the "User" type. Then you can select the administrative permissions each user has, including "View message content" setting.</p><p><br />
Allow End Users to Manage Their E-mail:</p><p>With PerfectMail your users can manage their own e-mail without needing administrator access. PerfectMail offers an E-mail Activity Report and Self-Service Console, which allows each user to view and manage their e-mail activity without seeing another persons e-mail.</p><p>You can enable these features using "Server Admin > Server Settings > Activity Report (tab)". You need to make sure the "Local Server Web URL" is set correctly for your server - it needs to be the URL that *can* be hit from wherever your users are. (Sometimes organizations have problems with internal private networks vs. public networks with respect to DNS resolution; or having the ability to access the PM server because of firewall rules.)</p><p>After these features are enabled you go to "Domain Admin > Domains", select a domain, click on "Edit Addresses" (in the bottom right corner of the screen), and edit the settings for each user using the "Self Service Console" or "Activity Report" tabs. </p><p>The Activity Report sends an e-mail activity report which may include "one click" links so users can manage their e-mail directly from the report. It can also include a link to go to the Self Service Console. </p><p>The Self Service Console is a limited user based interface so an end user can manage their own e-mail. They can get into the interface via a link on the Activity Report or can log in directly to the PerfectMail interface using their e-mail address and password. This password can be set by and administrator or by the users themselves on the "Settings" tab.</p><p><br />
Administrator Audit Log:</p><p>PerfectMail also includes an Audit Log so you can see what your PerfectMail administrators are doing. You can find the Audit Log at "Server Admin > Audit Log". Auditing helps to track administrator activities so you can have peace of mind in knowing what is happening with your PerfectMail server. Auditing can also act as a preventative measure if your administrators know their activities are being audited.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/encrypting_message_content</link>
<pubDate>Mon, 30 Sep 2013 15:12:05 +0000</pubDate>
<category>Configuration</category>
<wfw:commentRss>https://perfectmail.com/kb/encrypting_message_content,commentrss</wfw:commentRss>
</item>
<item>
<title>Does PerfectMail have rate limiting options?</title>
<description>PerfectMail has the following rate limiting options:- Connection rate throttle (Total number of connections per second across the whole server)
- Bad recipient rate throttle  (After a number of bad addresses start adding delays.)
- Client rate throttle (Maximum number of messages per minute, per sending server.)
- Client connection throttle (Maximum number of concurrent connections allowed per sending server.)
- Greeting pause (A short imposed pause on the initial connection to identify and block "slamming".)
- Maximum recipients per message.
- Maximum message size.</description>
<content:encoded><![CDATA[<p>PerfectMail has the following rate limiting options:</p><p>- Connection rate throttle (Total number of connections per second across the whole server)<br />
- Bad recipient rate throttle  (After a number of bad addresses start adding delays.)<br />
- Client rate throttle (Maximum number of messages per minute, per sending server.)<br />
- Client connection throttle (Maximum number of concurrent connections allowed per sending server.)<br />
- Greeting pause (A short imposed pause on the initial connection to identify and block "slamming".)<br />
- Maximum recipients per message.<br />
- Maximum message size.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/rate_limiting</link>
<pubDate>Thu, 26 Sep 2013 11:12:24 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/rate_limiting,commentrss</wfw:commentRss>
</item>
<item>
<title>I'm having trouble relaying outgoing e-mail through PerfectMail</title>
<description>Outbound relaying requires two things:
 i) your PerfectMail server needs to have the IP address of the sending server listed as an outbound relay, and
 ii) your mail server must be configured to relay through PerfectMail.When troubleshooting this sort of situation it is best to replace any host-names configured in the PerfectMail interface with IP addresses. PerfectMail primarily uses IP addresses to track servers, so this may help eliminate any DNS issues including local DNS resolution.
Relay Servers:Each relay server needs to be configured in PerfectMail. When you add your mail server as a destination for a filtered domain (Domain Admin > Domains) it is automatically registered as a valid outbound relay host. However, in some cases the outgoing e-mail messages may appear to be arriving at the PerfectMail server from a different IP address. (This often happens when firewalls are configured to send and receive e-mail traffic using different IP addresses.) Also, you may have additional servers that send e-mail for your organization. Any IP address that should be accepted as a valid outgoing relay server, that is not listed as a destination in the Domain configuration page, needs to be added to the Relay Servers page (Domain Admin > Relay Servers).Outgoing Relays - are hosts that will have their e-mail relayed to the Internet. These hosts receive no filtering.Incoming Relays - are hosts that are permitted to relay e-mail inbound from the Internet. These hosts will not be directly checked against reputation databases, RBL services, etc. Listing your Incoming Relays allows PerfectMail to identify where the effective edge of your organization is. This allows PerfectMail to identify the "actual" sending mail host for testing against reputation databases.
Mail Server Relay Configuration:Your mail server must be configured to relay through PerfectMail. Each mail server has a specific way of configuring this setting. The default relay host for a mail server is most often called a "Smart Relay Host", so look for that in your documentation.Microsoft Exchange users can refer to the following KnowledgeBase article for more information: http://perfectmail.com/kb/microsoft_exchange_smart_host
Troubleshooting Smart Relay Settings:To troubleshoot your smart relay settings make the configuration changes mentioned above, then navigate to the PerfectMail Transmission Log (E-mail > Transmission Log). You can watch e-mail transmission activity using this page. Click the "Last Hour" button to watch see your mail transmissions. (To refresh the screen press the "Last Hour" button again.)There may be many messages being transmitted through your mail server concurrently. The Message ID for each e-mail is displayed in blue on this page. You can click on the Message ID to display just the log entries for that particular message.Any outgoing e-mail from your mail server should be displayed on this page. If you are not seeing e-mail from your mail server, then there is a problem with the smart host relay setting on your mail server.If you are seeing outgoing e-mail from your mail server, check the status to see if the messages are indeed being sent. If not, note the IP address that the e-mail originated from and any error messages. This IP address must be listed as either a destination address in the Domain configuration page or as an Outgoing Relay.</description>
<content:encoded><![CDATA[<p>Outbound relaying requires two things:<br />
 i) your PerfectMail server needs to have the IP address of the sending server listed as an outbound relay, and<br />
 ii) your mail server must be configured to relay through PerfectMail.</p><p>When troubleshooting this sort of situation it is best to replace any host-names configured in the PerfectMail interface with IP addresses. PerfectMail primarily uses IP addresses to track servers, so this may help eliminate any DNS issues including local DNS resolution.</p><p><br />
Relay Servers:</p><p>Each relay server needs to be configured in PerfectMail. When you add your mail server as a destination for a filtered domain (Domain Admin > Domains) it is automatically registered as a valid outbound relay host. However, in some cases the outgoing e-mail messages may appear to be arriving at the PerfectMail server from a different IP address. (This often happens when firewalls are configured to send and receive e-mail traffic using different IP addresses.) Also, you may have additional servers that send e-mail for your organization. Any IP address that should be accepted as a valid outgoing relay server, that is not listed as a destination in the Domain configuration page, needs to be added to the Relay Servers page (Domain Admin > Relay Servers).</p><p>Outgoing Relays - are hosts that will have their e-mail relayed to the Internet. These hosts receive no filtering.</p><p>Incoming Relays - are hosts that are permitted to relay e-mail inbound from the Internet. These hosts will not be directly checked against reputation databases, RBL services, etc. Listing your Incoming Relays allows PerfectMail to identify where the effective edge of your organization is. This allows PerfectMail to identify the "actual" sending mail host for testing against reputation databases.</p><p><br />
Mail Server Relay Configuration:</p><p>Your mail server must be configured to relay through PerfectMail. Each mail server has a specific way of configuring this setting. The default relay host for a mail server is most often called a "Smart Relay Host", so look for that in your documentation.</p><p>Microsoft Exchange users can refer to the following KnowledgeBase article for more information: http://perfectmail.com/kb/microsoft_exchange_smart_host</p><p><br />
Troubleshooting Smart Relay Settings:</p><p>To troubleshoot your smart relay settings make the configuration changes mentioned above, then navigate to the PerfectMail Transmission Log (E-mail > Transmission Log). You can watch e-mail transmission activity using this page. Click the "Last Hour" button to watch see your mail transmissions. (To refresh the screen press the "Last Hour" button again.)</p><p>There may be many messages being transmitted through your mail server concurrently. The Message ID for each e-mail is displayed in blue on this page. You can click on the Message ID to display just the log entries for that particular message.</p><p>Any outgoing e-mail from your mail server should be displayed on this page. If you are not seeing e-mail from your mail server, then there is a problem with the smart host relay setting on your mail server.</p><p>If you are seeing outgoing e-mail from your mail server, check the status to see if the messages are indeed being sent. If not, note the IP address that the e-mail originated from and any error messages. This IP address must be listed as either a destination address in the Domain configuration page or as an Outgoing Relay.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/outbound_relaying_not_working</link>
<pubDate>Thu, 26 Sep 2013 10:53:31 +0000</pubDate>
<category>Configuration</category>
<wfw:commentRss>https://perfectmail.com/kb/outbound_relaying_not_working,commentrss</wfw:commentRss>
</item>
<item>
<title>Why can't I see my local e-mail traffic in PerfectMail?</title>
<description>PerfectMail monitors and filters e-mail sent between your mail server and the Internet. E-mail that is sent between users local to your mail server will not get sent to the Internet, so there will be no incoming/outgoing e-mail traffic for PerfectMail to see.This means:1) PerfectMail will not be able to filter these messages, and2) there will be no record of these messages in the PerfectMail interface.
If your users are not receiving e-mail that is sent locally, these messages may be getting filtered by your mail server (e.g. Exchange) or they may be placed in the local mail client (e.g. Outlook) Junk folder. Outlook may be performing additional spam filtering, that PerfectMail cannot control.</description>
<content:encoded><![CDATA[<p>PerfectMail monitors and filters e-mail sent between your mail server and the Internet. E-mail that is sent between users local to your mail server will not get sent to the Internet, so there will be no incoming/outgoing e-mail traffic for PerfectMail to see.</p><p>This means:</p><p>1) PerfectMail will not be able to filter these messages, and</p><p>2) there will be no record of these messages in the PerfectMail interface.</p><p><br />
If your users are not receiving e-mail that is sent locally, these messages may be getting filtered by your mail server (e.g. Exchange) or they may be placed in the local mail client (e.g. Outlook) Junk folder. Outlook may be performing additional spam filtering, that PerfectMail cannot control.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/search_for_local_internal_mail</link>
<pubDate>Wed, 25 Sep 2013 19:59:25 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/search_for_local_internal_mail,commentrss</wfw:commentRss>
</item>
<item>
<title>Where do I find my PerfectMail License Number?</title>
<description>When you log in to the PerfectMail administrators interface, you can find licensing information on the Dashboard. It is located in the top right box labeled "PerfectMail License". This box should contain your company name followed by the word "License" and the License Number.You can find your complete licensing information by navigating to "Server Admin > License", to find the License Number along with other items.If there is no License Number definied then there may have been an issue with the initial server setup. Contact our support staff (http://helpdesk.perfectmail.com) and we will get you a License Number and Activation Code as soon as possible.</description>
<content:encoded><![CDATA[<p>When you log in to the PerfectMail administrators interface, you can find licensing information on the Dashboard. It is located in the top right box labeled "PerfectMail License". This box should contain your company name followed by the word "License" and the License Number.</p><p>You can find your complete licensing information by navigating to "Server Admin > License", to find the License Number along with other items.</p><p>If there is no License Number definied then there may have been an issue with the initial server setup. Contact our support staff (http://helpdesk.perfectmail.com) and we will get you a License Number and Activation Code as soon as possible.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/where_find_license_number</link>
<pubDate>Tue, 10 Sep 2013 16:50:13 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/where_find_license_number,commentrss</wfw:commentRss>
</item>
<item>
<title>Why am I not receiving my E-mail Activity Report? </title>
<description>The most likely reason your are not receiving your E-mail Activity Report is that it may be getting filtered  by additional spam filtering on your mail server (e.g. MS Exchange) or your local mail client (e.g. MS Outlook). Check your "Junk" folder to see if the reports are there.The Activity Report contains the subject lines of all the e-mail that you were sent, including the subject lines of all the spam messages that were blocked. There may be enough spam content contained within this report to cause your additional spam filtering software to block the report.Unfortunately there is nothing we can do to influence what Outlook does with such messages other than to add the "sender" address to the users "contact list".If the mail client (e.g. MS Outlook) is performing additional spam filtering, you may find there are other messages that are getting filed in the junk folder. Sometimes we will receive reports of "false positives" that result from incorrect filtering at the mail client, that have nothing to do with the PerfectMail product.If the Activity Report is not in your junk folder, ask your e-mail administrator to check in the activity log to see if the activity report was sent by searching for your e-mail address and the phrase "Activity Report" over the last week. There should be daily entries showing that the report was sent. If the report was not sent check the settings for the user in question and check that the Activity Report is configured correctly.</description>
<content:encoded><![CDATA[<p>The most likely reason your are not receiving your E-mail Activity Report is that it may be getting filtered  by additional spam filtering on your mail server (e.g. MS Exchange) or your local mail client (e.g. MS Outlook). Check your "Junk" folder to see if the reports are there.</p><p>The Activity Report contains the subject lines of all the e-mail that you were sent, including the subject lines of all the spam messages that were blocked. There may be enough spam content contained within this report to cause your additional spam filtering software to block the report.</p><p>Unfortunately there is nothing we can do to influence what Outlook does with such messages other than to add the "sender" address to the users "contact list".</p><p>If the mail client (e.g. MS Outlook) is performing additional spam filtering, you may find there are other messages that are getting filed in the junk folder. Sometimes we will receive reports of "false positives" that result from incorrect filtering at the mail client, that have nothing to do with the PerfectMail product.</p><p>If the Activity Report is not in your junk folder, ask your e-mail administrator to check in the activity log to see if the activity report was sent by searching for your e-mail address and the phrase "Activity Report" over the last week. There should be daily entries showing that the report was sent. If the report was not sent check the settings for the user in question and check that the Activity Report is configured correctly.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/not_receiving_email_activity_report</link>
<pubDate>Mon, 09 Sep 2013 14:16:06 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/not_receiving_email_activity_report,commentrss</wfw:commentRss>
</item>
<item>
<title>How can I protect e-mail addresses published on my website?</title>
<description>Publicly published e-mail addresses are de facto spam magnets. The best thing you can do to reduce spam targeting these addresses is to use a decent anti-spam product like PerfectMail! Make sure you mark any spam messages that get through the filters to aid with training and the development of new anti-spam strategies.You can also do things on the website to make these message less readable to electronic devices. However, such techniques also make the addresses less available to your website users. But there are some strategies that can help. One thing you can do is present and image of the e-mail address rather than the text itself. Another thing you can do is to present a messaging page where people can send messages directly via your website;make sure to include a captcha element to discourage e-mail address harvesting engines.If you have a website developer you can use their coding skills to obfuscate your e-mail addresses using JavaScript. On your website replace the domain portion of your e-mail addresses with a bogus address (or better yet a spam trap!) Then use a JavaScript function to rewrite the web page after it is loaded in the web browser. Spammer e-mail scraping programs are unlikely to execute javascript to rewrite the web page, so this should be an effective method of protecting your e-mail addresses.In the example below the e-mail address "user@mydomain.com" is protected by displaying it on the initial web page as "user_smith@mydomain.com", then rewriting that e-mail address after the web page loads. Make sure you add "user_smith@mydomain.com" to the list of Spam Traps (or Spam Honey Pots) on the PerfectMail Administrators Interface at "Filters &gt; Spam Traps".Example Web page:
--------------------------------------------------------------------------------
&lt;html&gt;
&lt;head&gt;
&lt;script&gt;
function dom_replace(src,tgt,node){
	if (!node) node=document;	if (node.nodeType==1){
		if (node.nodeName=='A') node.href = node.href.replace(src,tgt); 
	}else if (node.nodeType==3){
		node.nodeValue = node.nodeValue.replace(src,tgt);
	}	var len = node.childNodes.length;
	var child;
	for (var i = 0; i &lt; len; i++) {
		child = node.childNodes[i];
		dom_replace(src,tgt,child);
	}
}
&lt;/script&gt;
&lt;/head&gt;
&lt;body onload="dom_replace('_smith@mydomain.com','@mydomain.com');";&gt;
&lt;p&gt;In this example I protect addresses for mydomain.com by replacing them with a bogus address.&lt;/p&gt;
&lt;p&gt;This method works with both normal HTML text and hyper linked e-mail addresses as well.&lt;/p&gt;
&lt;p&gt;
user_smith@mydomain.com&lt;br/&gt;
&lt;a href="mailto:user_smith@mydomain.com"&gt;user_smith@mydomain.com&lt;/a&gt;
&lt;/p&gt;
&lt;/body&gt;
&lt;/html&gt;
--------------------------------------------------------------------------------
The interesting thing is, when you look at the source code for the web page (by pressing &lt;CTRL&gt;+U) you will still see the original e-mail address. You can also generalize this by embedding the domain replacement in the function, then placing that function in a separate file that you could simply include in all your web pages, where needed.</description>
<content:encoded><![CDATA[<p>Publicly published e-mail addresses are de facto spam magnets. The best thing you can do to reduce spam targeting these addresses is to use a decent anti-spam product like PerfectMail! Make sure you mark any spam messages that get through the filters to aid with training and the development of new anti-spam strategies.</p><p>You can also do things on the website to make these message less readable to electronic devices. However, such techniques also make the addresses less available to your website users. But there are some strategies that can help. One thing you can do is present and image of the e-mail address rather than the text itself. Another thing you can do is to present a messaging page where people can send messages directly via your website;make sure to include a captcha element to discourage e-mail address harvesting engines.</p><p>If you have a website developer you can use their coding skills to obfuscate your e-mail addresses using JavaScript. On your website replace the domain portion of your e-mail addresses with a bogus address (or better yet a spam trap!) Then use a JavaScript function to rewrite the web page after it is loaded in the web browser. Spammer e-mail scraping programs are unlikely to execute javascript to rewrite the web page, so this should be an effective method of protecting your e-mail addresses.</p><p>In the example below the e-mail address "user@mydomain.com" is protected by displaying it on the initial web page as "user_smith@mydomain.com", then rewriting that e-mail address after the web page loads. Make sure you add "user_smith@mydomain.com" to the list of Spam Traps (or Spam Honey Pots) on the PerfectMail Administrators Interface at "Filters &gt; Spam Traps".</p><p>Example Web page:<br />
--------------------------------------------------------------------------------<br />
&lt;html&gt;<br />
&lt;head&gt;<br />
&lt;script&gt;<br />
function dom_replace(src,tgt,node){<br />
	if (!node) node=document;</p><p>	if (node.nodeType==1){<br />
		if (node.nodeName=='A') node.href = node.href.replace(src,tgt); <br />
	}else if (node.nodeType==3){<br />
		node.nodeValue = node.nodeValue.replace(src,tgt);<br />
	}</p><p>	var len = node.childNodes.length;<br />
	var child;<br />
	for (var i = 0; i &lt; len; i++) {<br />
		child = node.childNodes[i];<br />
		dom_replace(src,tgt,child);<br />
	}<br />
}<br />
&lt;/script&gt;<br />
&lt;/head&gt;<br />
&lt;body onload="dom_replace('_smith@mydomain.com','@mydomain.com');";&gt;<br />
&lt;p&gt;In this example I protect addresses for mydomain.com by replacing them with a bogus address.&lt;/p&gt;<br />
&lt;p&gt;This method works with both normal HTML text and hyper linked e-mail addresses as well.&lt;/p&gt;<br />
&lt;p&gt;<br />
user_smith@mydomain.com&lt;br/&gt;<br />
&lt;a href="mailto:user_smith@mydomain.com"&gt;user_smith@mydomain.com&lt;/a&gt;<br />
&lt;/p&gt;<br />
&lt;/body&gt;<br />
&lt;/html&gt;<br />
--------------------------------------------------------------------------------<br />
The interesting thing is, when you look at the source code for the web page (by pressing &lt;CTRL&gt;+U) you will still see the original e-mail address. </p><p>You can also generalize this by embedding the domain replacement in the function, then placing that function in a separate file that you could simply include in all your web pages, where needed.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/how_protect_email_address_on_website</link>
<pubDate>Fri, 30 Aug 2013 15:37:15 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/how_protect_email_address_on_website,commentrss</wfw:commentRss>
</item>
<item>
<title>What are &quot;timeout before data read&quot; and &quot;to error state&quot; errors?</title>
<description>Your PerfectMail server is made of components connected through something called Milter (mail filter). The Milter interface allows the anti-spam component to integrate with the Mail Transport Agent component (MTA) on your PerfectMail server.When a mail server does not properly complete a mail transmission, either by dropping the connection or due to a timeout, the communication channel is broken. This shows up in your log file as a "Milter Error". This is simply an error notification showing that there was a timeout issue.Following is an example to demonstrate this behavior:Jul 20 09:45:40 perfectmail sendmail[19312]: rzKgjD5s029413: from=, size=7935, class=0, nrcpts=1, msgid=, proto=ESMTP, daemon=MTA, relay=mailhost.somedomain.com [10.50.31.69]
Jul 20 09:56:12 perfectmail sendmail[19312]: r7KGjD5s029413: Milter (pm): timeout before data read
Jul 20 09:56:12 perfectmail sendmail[19312]: r7KGjD5s029413: Milter (pm): to error state
Jul 20 09:56:12 perfectmail sendmail[19312]: r7KGjD5s029413: to=, delay=00:10:32, pri=37935, stat=Please try again later
 
You can see the time span from the first to the second line of the log file. It took over 10 minutes for the sending server to transmit some very basic information (from and to), which timed out the mail connection.</description>
<content:encoded><![CDATA[<p>Your PerfectMail server is made of components connected through something called Milter (mail filter). The Milter interface allows the anti-spam component to integrate with the Mail Transport Agent component (MTA) on your PerfectMail server.</p><p>When a mail server does not properly complete a mail transmission, either by dropping the connection or due to a timeout, the communication channel is broken. This shows up in your log file as a "Milter Error". This is simply an error notification showing that there was a timeout issue.</p><p>Following is an example to demonstrate this behavior:</p><p>Jul 20 09:45:40 perfectmail sendmail[19312]: rzKgjD5s029413: from=<sender@somedomain.com>, size=7935, class=0, nrcpts=1, msgid=<83785233522355324@mailhost.somedomain.com>, proto=ESMTP, daemon=MTA, relay=mailhost.somedomain.com [10.50.31.69]<br />
Jul 20 09:56:12 perfectmail sendmail[19312]: r7KGjD5s029413: Milter (pm): timeout before data read<br />
Jul 20 09:56:12 perfectmail sendmail[19312]: r7KGjD5s029413: Milter (pm): to error state<br />
Jul 20 09:56:12 perfectmail sendmail[19312]: r7KGjD5s029413: to=<person@yourdomain.com>, delay=00:10:32, pri=37935, stat=Please try again later<br />
 <br />
You can see the time span from the first to the second line of the log file. It took over 10 minutes for the sending server to transmit some very basic information (from and to), which timed out the mail connection.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/timeout_before_data_read_error_state</link>
<pubDate>Wed, 21 Aug 2013 12:40:47 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/timeout_before_data_read_error_state,commentrss</wfw:commentRss>
</item>
<item>
<title>Can you help me decipher a &quot;Delivery Status Notification&quot; message?</title>
<description>E-mail is exchanged using a protocol called SMTP. The DSN or bounce message is a report based on an error that occured during the SMTP exchange between two mail servers. The diagnosis of the delivery problem may seem quite technical and may be difficult to explain. If you do not fully understand what you are reading, that is okay. Read through all the text and see if you can extract "something" that makes sense. The cause of your problem is ususally written in plain english, but surrounded by a quantity of technical information.Some mail servers will give you the SMTP response as it is generated, which may be difficult to understand if you are not familiar with the SMTP protocol. Other mail servers may give you an easy to understand message, saying there was a problem, but not very helpful in telling you what the problem actually was.Bounce messages can vary in format, and in exact wording, depending on the mail server that's sending the message back to you. Different types of mail servers use different terminology. Some are quite geeky and difficult to understand. Others seem to take five paragraphs to tell you that you probably just mistyped the email address you were sending to.An Example:All that said, lets work through an example that will hopefully help you understand what is going on. Buried in the all the technical verbage is actually some helpful information, if your mail server passes you this information.Here is an example:

----- Transcript of session follows -----... while talking to smtp.example.net.:&gt;&gt;&gt;&gt; DATA550 5.1.1 ... User unknownHere's a bounce from another mail server which attempts to be friendlier: Hi. This is the qmail-send program at example.com.I'm afraid I wasn't able to deliver your message to the following addresses.This is a permanent error; I've given up. Sorry it didn't work out. 10.10.10.10. does not like recipient.Remote host said: 550 MAILBOX NOT FOUNDGiving up on 10.10.10.10.----- The following addresses had permanent fatal errors -----

SMTP error messages usually consist of a 3-digit numeric code (e.g. 550) followed by a plain text description of what the problem is. In this example we see: 550 MAILBOX NOT FOUND. If we look closer there were a number of errors in this example:550 5.1.1 ... User unknown550 MAILBOX NOT FOUNDIn general return codes in the 500 range are permanent errors and return codes in the 400 range are temporary errors. For temporary errors the mail server is saying it can not perform the task at the present moment, but try again later. Notice the two entries had the same 550 code bug different descriptions. Different mail servers interpret SMTP codes differently and may give different, but similar, plain text descriptions. From this example, it is plain there is a problem with the recipient address. It likely does not exist, so either there was a mistyped e-mail address, the address may no longer be valid, or there may be a problem with the receiving mail server (which happens much more often than you would believe.) Common Error Messages:Mailbox Not Found, Invalid Mailbox, User Unknown, Not Our Customer - These are all saying pretty much the same thing. In the "someone@example.com" bounce examples above, the mail server "example.com" doesn't have an account for anyone with the email name "someone". Often these errors are due to mis-typing the recipient e-mail address. Double check the e-mail recipient. You may be using an old e-mail address, make sure the address is current.Mailbox Unavailable - This is most often the same as "Mailbox Not Found", though it may also mean that there is a problem with the receiving mail server. Check to make sure that you have the email address correct, wait a while and try again, and if it still bounces, try contacting the recipient some other way.Mailbox Full, Quota Exceeded - Sometimes this will show up as a part of a "Mailbox Mnavailable" message. The recipient has too much e-mail in their inbox and their mail server is refusing to accept any more. This is most common with web-based e-mail services which limit how much mail can accumulate for a particular mail account. This can also be a sign of an abandoned mail account, where the account owner has stopped checking their e-mail. In any case, you'll need to contact the recipient through some other means.Host Unknown, Domain Lookup Failed - There is no mail server that hosts the domain portion of the e-mail address being sent to, (i.e. the example.com part of the e-mail address). A common reason is again, a mis-typed e-mail address. Make sure you typed it in correctly. This may also happen when an organization changes its domain name.Unable to Relay - This is a terribly obscure error message, but also becoming more and more common as ISPs try to crack down on spam. Mail is sent by relaying e-mail from one server to the next. There could be many servers involved, but typically it's the mail server at your ISP relaying your email to the mail server at your recipients ISP. In general, a mail server must "know" either the sender of an email, or its recipient, in order to safely transmit mail. Mail servers that do not enforce this requirement are called "open relays" and can be exploited by spammers to send out tons of spam. Things get complicated because not all ISPs agree on what it means to "know" the sender of an email. All of these might result in an "Unable to Relay" message, depending entirely on the servers and ISPs involved. Sometimes this error will happen only occationally. In this situation there is problably a mail server configuration error on the recipients part. This happens more more frequently than you would think and even very large organizations suffer from this problem.Temporary Errors:Errors like "no adequate servers", "Connection Timed Out", "Resources temporarily unavailable.", "Out of memory" all typically indicate a problem with a mail server that you probably don't have any control over. They are, in general, temporary, and should resolve themselves over time. Look carefully at the bounce message; the email server involved may continue to automatically try to deliver your email without any action required on your part.Blacklist Filters:If you see messages that indicate your email was "blocked", or "listed in", and references to sites that have things like "spamcop", "dynablock", "blackhole", "spamhaus" and similar in their names, then your email was probably intentionally blocked because the receiving system thinks your ISP's mail server is a source of spam.Various blacklisting services try to identify servers which are sources of spam. They then make that list available to ISPs, who in turn can block email coming from these sources. The problem is that criteria for addition and removal from these blacklists are vague, at best, and getting a server removed from blacklists can be very difficult. If this happens to mail you send, get in touch with your ISP and explain that their server may be on a blacklist somewhere, and then try to use a different email address, or a different email account of your own, to contact your intended recipient. You might also tell your recipient that their ISP is improperly blocking legitimate email.Content Filters:Much like blacklists, content filters are an approach many ISPs now implement to stem the tide of spam for their clients. Most will simply discard email that looks like spam, but some servers will actually send a bounce. Phrases in the bounce message like "Message looks like spam", "keywords rejected by the anti-spam content filter", "scored too high on spam scale" and similar means that your email, for whatever reason, tripped the spam filters on the receiving end. Your email looks too much like spam.What does it mean to "look like spam"? Here, again, things get vague. That definition will vary greatly based on how your recipient's email server has been configured. Obvious possibilities are the use of pornographic words or phrases, HTML formatted email, currently popular drugs being hawked by spammers, or even having something that looks too much like a sales letter or a scam. The best approach is to scan the bounce for any clues (sometimes there's more information), and then validate your recipient can get any email by sending a simpler message. Assuming that all works, then re-work your message as best you can to not look like spam.When a Bounce Isn't Really a Bounce:Be careful! There's a class of viruses these days that propagate by "looking like" bounce messages. They instruct you to open an attachment for more information. Don't. Especially if you don't recall sending the message in the first place. Don't open any attachment, especially one accompanying what looks like an email bounce unless you are absolutely positively certain that it's legitimate.You may also be getting bounce messages for email you didn't send. There's another class of virus that "spoofs" or fakes the "From" address on email messages, and as a result you could be getting bounce messages that have nothing to do with you.</description>
<content:encoded><![CDATA[<p>E-mail is exchanged using a protocol called SMTP. The DSN or bounce message is a report based on an error that occured during the SMTP exchange between two mail servers. The diagnosis of the delivery problem may seem quite technical and may be difficult to explain. If you do not fully understand what you are reading, that is okay. Read through all the text and see if you can extract "something" that makes sense. The cause of your problem is ususally written in plain english, but surrounded by a quantity of technical information.<br /><br />Some mail servers will give you the SMTP response as it is generated, which may be difficult to understand if you are not familiar with the SMTP protocol. Other mail servers may give you an easy to understand message, saying there was a problem, but not very helpful in telling you what the problem actually was.<br /><br />Bounce messages can vary in format, and in exact wording, depending on the mail server that's sending the message back to you. Different types of mail servers use different terminology. Some are quite geeky and difficult to understand. Others seem to take five paragraphs to tell you that you probably just mistyped the email address you were sending to.<br /><br /><br /><strong>An Example:</strong><br />All that said, lets work through an example that will hopefully help you understand what is going on. Buried in the all the technical verbage is actually some helpful information, if your mail server passes you this information.<br /><br />Here is an example:</p>
<hr />
<p>----- Transcript of session follows -----<br />... while talking to smtp.example.net.:<br />&gt;&gt;&gt;&gt; DATA<br />550 5.1.1 ... User unknown<br /><br />Here's a bounce from another mail server which attempts to be friendlier: <br />Hi. This is the qmail-send program at example.com.<br />I'm afraid I wasn't able to deliver your message to the following addresses.<br />This is a permanent error; I've given up. Sorry it didn't work out. <br /><br />10.10.10.10. does not like recipient.<br /><br />Remote host said: 550 MAILBOX NOT FOUND<br />Giving up on 10.10.10.10.<br /><br />----- The following addresses had permanent fatal errors -----</p>
<hr />
<p><br />SMTP error messages usually consist of a 3-digit numeric code (e.g. 550) followed by a plain text description of what the problem is. In this example we see: 550 MAILBOX NOT FOUND. If we look closer there were a number of errors in this example:<br /><br />550 5.1.1 ... User unknown<br />550 MAILBOX NOT FOUND<br /><br />In general return codes in the 500 range are permanent errors and return codes in the 400 range are temporary errors. For temporary errors the mail server is saying it can not perform the task at the present moment, but try again later. Notice the two entries had the same 550 code bug different descriptions. Different mail servers interpret SMTP codes differently and may give different, but similar, plain text descriptions. <br /><br />From this example, it is plain there is a problem with the recipient address. It likely does not exist, so either there was a mistyped e-mail address, the address may no longer be valid, or there may be a problem with the receiving mail server (which happens much more often than you would believe.)<br /> <br /><br /><strong>Common Error Messages:</strong><br /><span style="text-decoration: underline;"><em>Mailbox Not Found, Invalid Mailbox, User Unknown, Not Our Customer</em></span> - These are all saying pretty much the same thing. In the "someone@example.com" bounce examples above, the mail server "example.com" doesn't have an account for anyone with the email name "someone". Often these errors are due to mis-typing the recipient e-mail address. Double check the e-mail recipient. You may be using an old e-mail address, make sure the address is current.<br /><br /><span style="text-decoration: underline;"><em>Mailbox Unavailable</em></span> - This is most often the same as "Mailbox Not Found", though it may also mean that there is a problem with the receiving mail server. Check to make sure that you have the email address correct, wait a while and try again, and if it still bounces, try contacting the recipient some other way.<br /><br /><span style="text-decoration: underline;"><em>Mailbox Full, Quota Exceeded</em></span> - Sometimes this will show up as a part of a "Mailbox Mnavailable" message. The recipient has too much e-mail in their inbox and their mail server is refusing to accept any more. This is most common with web-based e-mail services which limit how much mail can accumulate for a particular mail account. This can also be a sign of an abandoned mail account, where the account owner has stopped checking their e-mail. In any case, you'll need to contact the recipient through some other means.<br /><br /><span style="text-decoration: underline;"><em>Host Unknown, Domain Lookup Failed</em></span> - There is no mail server that hosts the domain portion of the e-mail address being sent to, (i.e. the example.com part of the e-mail address). A common reason is again, a mis-typed e-mail address. Make sure you typed it in correctly. This may also happen when an organization changes its domain name.<br /><br /><span style="text-decoration: underline;"><em>Unable to Relay</em></span> - This is a terribly obscure error message, but also becoming more and more common as ISPs try to crack down on spam. Mail is sent by relaying e-mail from one server to the next. There could be many servers involved, but typically it's the mail server at your ISP relaying your email to the mail server at your recipients ISP. In general, a mail server must "know" either the sender of an email, or its recipient, in order to safely transmit mail. Mail servers that do not enforce this requirement are called "open relays" and can be exploited by spammers to send out tons of spam. Things get complicated because not all ISPs agree on what it means to "know" the sender of an email. All of these might result in an "Unable to Relay" message, depending entirely on the servers and ISPs involved. Sometimes this error will happen only occationally. In this situation there is problably a mail server configuration error on the recipients part. This happens more more frequently than you would think and even very large organizations suffer from this problem.<br /><br /><br /><strong>Temporary Errors:</strong><br />Errors like "no adequate servers", "Connection Timed Out", "Resources temporarily unavailable.", "Out of memory" all typically indicate a problem with a mail server that you probably don't have any control over. They are, in general, temporary, and should resolve themselves over time. Look carefully at the bounce message; the email server involved may continue to automatically try to deliver your email without any action required on your part.<br /><br /><br /><strong>Blacklist Filters:</strong><br />If you see messages that indicate your email was "blocked", or "listed in", and references to sites that have things like "spamcop", "dynablock", "blackhole", "spamhaus" and similar in their names, then your email was probably intentionally blocked because the receiving system thinks your ISP's mail server is a source of spam.<br /><br />Various blacklisting services try to identify servers which are sources of spam. They then make that list available to ISPs, who in turn can block email coming from these sources. The problem is that criteria for addition and removal from these blacklists are vague, at best, and getting a server removed from blacklists can be very difficult. If this happens to mail you send, get in touch with your ISP and explain that their server may be on a blacklist somewhere, and then try to use a different email address, or a different email account of your own, to contact your intended recipient. You might also tell your recipient that their ISP is improperly blocking legitimate email.<br />Content Filters:<br /><br />Much like blacklists, content filters are an approach many ISPs now implement to stem the tide of spam for their clients. Most will simply discard email that looks like spam, but some servers will actually send a bounce. Phrases in the bounce message like "Message looks like spam", "keywords rejected by the anti-spam content filter", "scored too high on spam scale" and similar means that your email, for whatever reason, tripped the spam filters on the receiving end. Your email looks too much like spam.<br /><br />What does it mean to "look like spam"? Here, again, things get vague. That definition will vary greatly based on how your recipient's email server has been configured. Obvious possibilities are the use of pornographic words or phrases, HTML formatted email, currently popular drugs being hawked by spammers, or even having something that looks too much like a sales letter or a scam. The best approach is to scan the bounce for any clues (sometimes there's more information), and then validate your recipient can get any email by sending a simpler message. Assuming that all works, then re-work your message as best you can to not look like spam.<br /><br /><br /><strong>When a Bounce Isn't Really a Bounce:</strong><br />Be careful! There's a class of viruses these days that propagate by "looking like" bounce messages. They instruct you to open an attachment for more information. Don't. Especially if you don't recall sending the message in the first place. Don't open any attachment, especially one accompanying what looks like an email bounce unless you are absolutely positively certain that it's legitimate.<br /><br />You may also be getting bounce messages for email you didn't send. There's another class of virus that "spoofs" or fakes the "From" address on email messages, and as a result you could be getting bounce messages that have nothing to do with you.<br /><br /></p>]]></content:encoded>
<link>https://perfectmail.com/kb/delivery_status_notifcation_explanation</link>
<pubDate>Mon, 12 Aug 2013 17:50:18 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/delivery_status_notifcation_explanation,commentrss</wfw:commentRss>
</item>
<item>
<title>Is there any way to stop all bounce messages from coming to my server?</title>
<description>RFC 2142 (http://www.ietf.org/rfc/rfc2142.txt) describes commonly used (and expected) e-mail addresses. A couple of addresses are expected to be valid on your server, namely postmaster@ and abuse@. Further, mail servers expect to be able to send messages from these commonly defined e-mail addresses to your users. If these e-mail addresses are missing (or blocked) your mail server may be considered to be a spam source and may receive a poor reputation. We do not recommend rejecting e-mail for commonly expected e-mail addresses.However, you can configure PerfectMail to accept message but not deliver them! PerfectMail can accept e-mail, record it your E-mail Activity and then discard the message. To the sender it looks like the e-mail was sent, but you will not receive the message in your inbox. But, you can still view the e-mail using your E-mail Activity Report.To add senders to the No Delivery List, log in to the Administrators Web Interface and navigate to "Filters &gt; Sender &gt; No Delivery List tab". You can add complete e-mail addresses here or the "name" portion of the e-mail address, such as "postmaster@".To stop bounce messages from arriving in your inbox add the following entries to the No Delivery List:ironport-mailer-daemon@mailer-daemon@mdaemon@postmaster@abuse@Reference: http://www.ietf.org/rfc/rfc2142.txt</description>
<content:encoded><![CDATA[<p>RFC 2142 (<a href="http://www.ietf.org/rfc/rfc2142.txt">http://www.ietf.org/rfc/rfc2142.txt</a>) describes commonly used (and expected) e-mail addresses. A couple of addresses are expected to be valid on your server, namely postmaster@ and abuse@. Further, mail servers expect to be able to send messages from these commonly defined e-mail addresses to your users. If these e-mail addresses are missing (or blocked) your mail server may be considered to be a spam source and may receive a poor reputation. We do not recommend rejecting e-mail for commonly expected e-mail addresses.<br /><br />However, you can configure PerfectMail to accept message but not deliver them! PerfectMail can accept e-mail, record it your E-mail Activity and then discard the message. To the sender it looks like the e-mail was sent, but you will not receive the message in your inbox. But, you can still view the e-mail using your E-mail Activity Report.<br /><br />To add senders to the No Delivery List, log in to the Administrators Web Interface and navigate to "Filters &gt; Sender &gt; No Delivery List tab". You can add complete e-mail addresses here or the "name" portion of the e-mail address, such as "postmaster@".<br /><br />To stop bounce messages from arriving in your inbox add the following entries to the No Delivery List:<br /><br />ironport-mailer-daemon@<br />mailer-daemon@<br />mdaemon@<br />postmaster@<br />abuse@<br /><br />Reference: <a href="http://www.ietf.org/rfc/rfc2142.txt">http://www.ietf.org/rfc/rfc2142.txt</a></p>]]></content:encoded>
<link>https://perfectmail.com/kb/stop_bounce_messages</link>
<pubDate>Mon, 12 Aug 2013 17:45:01 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/stop_bounce_messages,commentrss</wfw:commentRss>
</item>
<item>
<title>What happens to my e-mail when the back office mail server is down?</title>
<description>If your back office mail server is down PerfectMail will simply spool up your e-mail so nothing is lost!PerfectMail learns and maintains a local database of all the e-mail addresses your organization uses. So, even if your back office mail server is out of service, PerfectMail can continue to accept e-mail. The e-mails are spooled up and will be passed to your back office mail server when it goes back into service.PerfectMail will store as much e-mail as there is storage space available to fill. You can review the available storage space on the Administrators Web Interface at "Server Admin &gt; Archive". If you find you need additional storage, simply add another disk drive to your server. This works for both virtual and physical environments. Added disk drives are automatically appendended to the PerfectMail data volume and formatted to increase the disk storage available to PerfectMail. All you have to do shut down the PerfectMail server, install the new drive (physical or virtual), then restart the PerfectMail server.</description>
<content:encoded><![CDATA[<p>If your back office mail server is down PerfectMail will simply spool up your e-mail so nothing is lost!<br /><br />PerfectMail learns and maintains a local database of all the e-mail addresses your organization uses. So, even if your back office mail server is out of service, PerfectMail can continue to accept e-mail. The e-mails are spooled up and will be passed to your back office mail server when it goes back into service.<br /><br />PerfectMail will store as much e-mail as there is storage space available to fill. You can review the available storage space on the Administrators Web Interface at "Server Admin &gt; Archive". If you find you need additional storage, simply add another disk drive to your server. This works for both virtual and physical environments. Added disk drives are automatically appendended to the PerfectMail data volume and formatted to increase the disk storage available to PerfectMail. All you have to do shut down the PerfectMail server, install the new drive (physical or virtual), then restart the PerfectMail server.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/what_happens_when_mail_server_is_down</link>
<pubDate>Mon, 12 Aug 2013 17:43:04 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/what_happens_when_mail_server_is_down,commentrss</wfw:commentRss>
</item>
<item>
<title>Can PerfectMail see through obfuscated text?</title>
<description>PerfectMail has a number of advanced analysis features, including features in the Content Filters (Filters &gt; Content) to identify obfuscated words and phrases in the subject and body of an e-mail. Anti-Obfuscation and Suffix Matching are powerful tools that can see through certain types of obfuscation, but they can also result in false positives if the phrases used in content filter are not given some consideration.
Anti-Obfuscation:Anti-Obfuscation is a technique that identifies attempts to disguise words. For example, Anti-Obfuscation maps "\/ 1 @ g r @" to "Viagra", "&gt;&lt;@n@x"&gt; to "Xanax", etc. The word score is scaled to match the measure of obfuscation. This technique is very successful. (However, in some instances this technique can give erroneous results if the listed word is similar to other non-offensive words; so use this with care.)Suffix Matching:Suffix Matching is a technique that attempts to match a "root word" to variations of that word "by suffix". For example, applying Suffix Matching to the word "run" will match variations "runs", "runned", "running", etc.If the Suffix Matching option is applied to a "phrase", then Suffix Matching will only apply to the last word in the phrase.A Warning on Anti-Obfuscation:Understand the impact of Anti-Obfuscation and Suffix Matching when matching phrases in the content filters. These techniques try and match words and phrases by matching "possible variations" that may be used to try and avoid detection.This may become a problem when you are trying catch a "specific phrase". For example, if you try and match the word "C A S I N O" when looking for spam and have Anti-Obfuscation turned on it will also match "casino", which may result in inappropriate scoring. This may become more problematic when both Anti-Obfuscation and Suffix Matching are used.</description>
<content:encoded><![CDATA[<p>PerfectMail has a number of advanced analysis features, including features in the Content Filters (Filters &gt; Content) to identify obfuscated words and phrases in the subject and body of an e-mail. Anti-Obfuscation and Suffix Matching are powerful tools that can see through certain types of obfuscation, but they can also result in false positives if the phrases used in content filter are not given some consideration.<br /><br /><strong></strong></p>
<p><strong>Anti-Obfuscation</strong>:<br />Anti-Obfuscation is a technique that identifies attempts to disguise words. For example, Anti-Obfuscation maps "\/ 1 @ g r @" to "Viagra", "&gt;&lt;@n@x"&gt; to "Xanax", etc. The word score is scaled to match the measure of obfuscation. This technique is very successful. (However, in some instances this technique can give erroneous results if the listed word is similar to other non-offensive words; so use this with care.)<br /><br /><br /><strong>Suffix Matching:</strong><br />Suffix Matching is a technique that attempts to match a "root word" to variations of that word "by suffix". For example, applying Suffix Matching to the word "run" will match variations "runs", "runned", "running", etc.<br /><br />If the Suffix Matching option is applied to a "phrase", then Suffix Matching will only apply to the last word in the phrase.<br /><br /><br /><strong>A Warning on Anti-Obfuscation:</strong><br />Understand the impact of Anti-Obfuscation and Suffix Matching when matching phrases in the content filters. These techniques try and match words and phrases by matching "possible variations" that may be used to try and avoid detection.<br /><br />This may become a problem when you are trying catch a "specific phrase". For example, if you try and match the word "C A S I N O" when looking for spam and have Anti-Obfuscation turned on it will also match "casino", which may result in inappropriate scoring. This may become more problematic when both Anti-Obfuscation and Suffix Matching are used.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/perfectmail_obfuscated_hidden_text_engine</link>
<pubDate>Mon, 12 Aug 2013 17:25:29 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/perfectmail_obfuscated_hidden_text_engine,commentrss</wfw:commentRss>
</item>
<item>
<title>How can I migrate my PerfectMail settings to a new server?</title>
<description>When you do an ISO install on the new server it will give you a Demo license which will make the new server fully functional. You will have to get it re-licensed, but there will be plenty of time to do that.To restore your settings, including Black/White lists, etc., start up the old system and navigate to the web interface "Server Admin > Backup". Create a new backup (add a comment), then click the "Existing Backups" tab. Click on the backup you created to download it.On the new server navigate to "Server Admin > Backup". Click the "Browse" button, select the backup file you downloaded and click the "Upload" button. Once again, click over to the "Existing Backups" tab, click the radio button beside the uploaded backup and click one of the restore buttons."Restore Domain and Filter Settings" - Will restore all of the domain configuration, spam settings, etc. "Full Server Restore" - Will restore everything, including network settings. (Network settings will only take affect after the server is rebooted.)Neither of these options will restore your license information. License information is always server specific.When the new server is in production open a support ticket to let us know about the server change. We will update your licensing information as needed.</description>
<content:encoded><![CDATA[<p>When you do an ISO install on the new server it will give you a Demo license which will make the new server fully functional. You will have to get it re-licensed, but there will be plenty of time to do that.</p><p>To restore your settings, including Black/White lists, etc., start up the old system and navigate to the web interface "Server Admin > Backup". Create a new backup (add a comment), then click the "Existing Backups" tab. Click on the backup you created to download it.</p><p>On the new server navigate to "Server Admin > Backup". Click the "Browse" button, select the backup file you downloaded and click the "Upload" button. Once again, click over to the "Existing Backups" tab, click the radio button beside the uploaded backup and click one of the restore buttons.</p><p>"Restore Domain and Filter Settings" - Will restore all of the domain configuration, spam settings, etc. </p><p>"Full Server Restore" - Will restore everything, including network settings. (Network settings will only take affect after the server is rebooted.)</p><p>Neither of these options will restore your license information. License information is always server specific.</p><p>When the new server is in production open a support ticket to let us know about the server change. We will update your licensing information as needed.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/how_migrate_settings_to_new_server</link>
<pubDate>Mon, 12 Aug 2013 17:23:18 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/how_migrate_settings_to_new_server,commentrss</wfw:commentRss>
</item>
<item>
<title>Why is mail still going to my Outlook junk folder when it is not spam?</title>
<description>Unfortunately, this is outside of the scope of what we can do with PerfectMail. Outlook may be performing additional spam filtering, that PerfectMail cannot control. You can read more about the Outlook Junk Email Filter at the following links:Overview of the Junk Email Filter:
http://office.microsoft.com/en-ca/outlook-help/overview-of-the-junk-email-filter-HP010355048.aspxChange the level of protection in the Junk Email Filter:
http://office.microsoft.com/en-ca/outlook-help/change-the-level-of-protection-in-the-junk-email-filter-HP010356454.aspx?CTT=5&origin=HP010355048</description>
<content:encoded><![CDATA[<p>Unfortunately, this is outside of the scope of what we can do with PerfectMail. Outlook may be performing additional spam filtering, that PerfectMail cannot control. You can read more about the Outlook Junk Email Filter at the following links:</p><p>Overview of the Junk Email Filter:<br />
<a href="http://office.microsoft.com/en-ca/outlook-help/overview-of-the-junk-email-filter-HP010355048.aspx">http://office.microsoft.com/en-ca/outlook-help/overview-of-the-junk-email-filter-HP010355048.aspx</a></p><p>Change the level of protection in the Junk Email Filter:<br />
<a href="http://office.microsoft.com/en-ca/outlook-help/change-the-level-of-protection-in-the-junk-email-filter-HP010356454.aspx?CTT=5&origin=HP010355048">http://office.microsoft.com/en-ca/outlook-help/change-the-level-of-protection-in-the-junk-email-filter-HP010356454.aspx?CTT=5&origin=HP010355048</a></p>]]></content:encoded>
<link>https://perfectmail.com/kb/outlook_junk_folder_not_spam</link>
<pubDate>Mon, 12 Aug 2013 17:21:10 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/outlook_junk_folder_not_spam,commentrss</wfw:commentRss>
</item>
<item>
<title>Why do I seem to be the only person getting this type of spam?</title>
<description>Different people get different types of spam for a number of reasons ranging from online behaviour to visibility on the Internet. E-mail address harvesting also plays a big role as do the movements of e-mail address lists. It tends to go in waves as well.Be careful when supplying your e-mail address to any survey, contest or the like. Such things will most likely get your e-mail address placed on any number of spammer lists.</description>
<content:encoded><![CDATA[<p>Different people get different types of spam for a number of reasons ranging from online behaviour to visibility on the Internet. E-mail address harvesting also plays a big role as do the movements of e-mail address lists. It tends to go in waves as well.</p><p>Be careful when supplying your e-mail address to any survey, contest or the like. Such things will most likely get your e-mail address placed on any number of spammer lists.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/only_person_getting_spam</link>
<pubDate>Mon, 12 Aug 2013 17:17:31 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/only_person_getting_spam,commentrss</wfw:commentRss>
</item>
<item>
<title>How can I make changes to the &quot;system&quot; word list?</title>
<description>You cannot directly edit the "system" word list. This list is maintained by our central lab. If you find a problem with the word list please let us know and we will modify it immediately.</description>
<content:encoded><![CDATA[<p>You cannot directly edit the "system" word list. This list is maintained by our central lab. If you find a problem with the word list please let us know and we will modify it immediately.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/how_change_system_word_list</link>
<pubDate>Mon, 12 Aug 2013 17:16:40 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/how_change_system_word_list,commentrss</wfw:commentRss>
</item>
<item>
<title>Do I have to reinstall PerfectMail if I upgrade my license?</title>
<description>Every PerfectMail install is a fully functional product that can be scaled for any organization by simply updating your license and activation code. Some of our clients, including ISPs, started by migrating a small number of domains to PerfectMail before moving over all their domains. All they did to upgrade the PerfectMail service was to ask for a new Activation code. Easy!</description>
<content:encoded><![CDATA[<p>Every PerfectMail install is a fully functional product that can be scaled for any organization by simply updating your license and activation code. Some of our clients, including ISPs, started by migrating a small number of domains to PerfectMail before moving over all their domains. All they did to upgrade the PerfectMail service was to ask for a new Activation code. Easy!</p>]]></content:encoded>
<link>https://perfectmail.com/kb/reinstall_on_license_change</link>
<pubDate>Mon, 12 Aug 2013 17:14:35 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/reinstall_on_license_change,commentrss</wfw:commentRss>
</item>
<item>
<title>Why am I seeing delivery failures with my Exchange Server, but I can see the messages were delivered?</title>
<description>The problem lies with how your Exchange environment deals with SMTP error messages. We can't say for certain, but we believe it has to do with the structural complexity of e-mail and how that structure changes as e-mail moves from server to server. Your Exchange server may be assigning a single "delivery status" for each message, when in fact e-mail is much more complex than that. You can have multiple delivery results for a single message with multiple recipients. In fact you can see this in the details of the status message Exchange generates; it looks like it wants to say the "message" failed (reporting all recipients as failed) when in reality it could be a single address that fails. It may be an Exchange configuration error, or there may be a problem with the Exchange software. Make sure your exchange server is fully patched. If the problem persists you may need to seek the advice of a Microsoft Exchange expert or contact Microsoft for further support.</description>
<content:encoded><![CDATA[<p>The problem lies with how your Exchange environment deals with SMTP error messages. We can't say for certain, but we believe it has to do with the structural complexity of e-mail and how that structure changes as e-mail moves from server to server. Your Exchange server may be assigning a single "delivery status" for each message, when in fact e-mail is much more complex than that. You can have multiple delivery results for a single message with multiple recipients. In fact you can see this in the details of the status message Exchange generates; it looks like it wants to say the "message" failed (reporting all recipients as failed) when in reality it could be a single address that fails. </p><p>It may be an Exchange configuration error, or there may be a problem with the Exchange software. Make sure your exchange server is fully patched. If the problem persists you may need to seek the advice of a Microsoft Exchange expert or contact Microsoft for further support.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/delivery_failures_with_exchange_but_delivered</link>
<pubDate>Mon, 12 Aug 2013 17:10:24 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/delivery_failures_with_exchange_but_delivered,commentrss</wfw:commentRss>
</item>
<item>
<title>How does PerfectMail support work? What is billable?</title>
<description>PerfectMail support is grouped into billable and non-billable support. Non-billable Support Incidents include: - Customer feedback
- Feature requests
- Bug reports
- General Q&A, etc.For Q&A we recommend searching our website for information as a first step. We maintain a KnowledgeBase of information that we regularly contribute to. If you can't find information on our website, send us an e-mail and we'll a) send you the answer and b) create a KnowledgeBase article so others can get the same information.Billable Support:
Billable Support incidents include those items that are not deemed to be the direct responsibility of our development or support team, such as:- Investigations into issues where the solution is readily available on the KnowledgeBase or on the Interface.
- Investigations into "why" e-mail is treated a certain way, or followup with external e-mail senders.
- System maintenance that we would normally be provided by the customer.
- Investigation of configuration and server issues that are not directly related to the PerfectMail product itself.Basically, if there is something wrong with our system, or if we don't provide sufficient information for you to perform an investigation yourself the Support Incident is NOT billable. We will assist you with the issue and/or update our product and/or KnowledgeBase to ensure either the problem is resolved or that you can perform the investigation yourself.If you have the tools/information to reasonably be able to diagnose or perform the tasks you need to do but either lack the expertise or inclination to deal with the issue in house, then this would become a Billable Support Incident. Often Billable Support Incidents occur when the local admin does not have sufficient experience/training with e-mail/SMTP to understand the basic ideas of what happens during an e-mail exchange at the SMTP protocol level. Most of our customers will rarely "burn" a support incident, so 1 or 2 incidents per year is a reasonable number. In fact, I believe we has communicated several times already and non of these exchanges have resulted in a billable incident, (unlike the behavior you may experience with some other vendors.)If you want to push off your local e-mail administrative and diagnostic tasks to our support staff, we are happy to assist you. These tasks would be Billable Support Incidents where we would log into your server and perform diagnostics or administration. For this sort of support you can purchase a Support Pack (of varying sizes) to ensure you have the support you need. We can send you pricing for this (available on our website) if you are interested in this sort of service.</description>
<content:encoded><![CDATA[<p>PerfectMail support is grouped into billable and non-billable support. Non-billable Support Incidents include: </p><p>- Customer feedback<br />
- Feature requests<br />
- Bug reports<br />
- General Q&A, etc.</p><p>For Q&A we recommend searching our website for information as a first step. We maintain a KnowledgeBase of information that we regularly contribute to. If you can't find information on our website, send us an e-mail and we'll a) send you the answer and b) create a KnowledgeBase article so others can get the same information.</p><p><strong>Billable Support:</strong><br />
Billable Support incidents include those items that are not deemed to be the direct responsibility of our development or support team, such as:</p><p>- Investigations into issues where the solution is readily available on the KnowledgeBase or on the Interface.<br />
- Investigations into "why" e-mail is treated a certain way, or followup with external e-mail senders.<br />
- System maintenance that we would normally be provided by the customer.<br />
- Investigation of configuration and server issues that are not directly related to the PerfectMail product itself.</p><p>Basically, if there is something wrong with our system, or if we don't provide sufficient information for you to perform an investigation yourself the Support Incident is NOT billable. We will assist you with the issue and/or update our product and/or KnowledgeBase to ensure either the problem is resolved or that you can perform the investigation yourself.</p><p>If you have the tools/information to reasonably be able to diagnose or perform the tasks you need to do but either lack the expertise or inclination to deal with the issue in house, then this would become a Billable Support Incident. Often Billable Support Incidents occur when the local admin does not have sufficient experience/training with e-mail/SMTP to understand the basic ideas of what happens during an e-mail exchange at the SMTP protocol level. </p><p>Most of our customers will rarely "burn" a support incident, so 1 or 2 incidents per year is a reasonable number. In fact, I believe we has communicated several times already and non of these exchanges have resulted in a billable incident, (unlike the behavior you may experience with some other vendors.)</p><p>If you want to push off your local e-mail administrative and diagnostic tasks to our support staff, we are happy to assist you. These tasks would be Billable Support Incidents where we would log into your server and perform diagnostics or administration. For this sort of support you can purchase a Support Pack (of varying sizes) to ensure you have the support you need. We can send you pricing for this (available on our website) if you are interested in this sort of service.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/how_does_support_work</link>
<pubDate>Mon, 12 Aug 2013 17:08:06 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/how_does_support_work,commentrss</wfw:commentRss>
</item>
<item>
<title>How do I change how long messages are stuck in the queue?</title>
<description>E-mail delivery can be complex and depends on the e-mail priority, the type of return code (error message) generated by the remote mail server and local policies for attempting to resend an e-mail. Error conditions that are considered permanent (e.g. a bad recipient, non-existent recipient, spam, etc.) result in an immediate return of the e-mail to the sender.  Temporary or transient errors result in the e-mail staying in the mail queue and transmission is retried for a period of time. Keep in mind, delivery delays are not uncommon and reasonable attempts must be made to allow the mail server to deliver an e-mail. 
E-mail Priority:
There are 3 types of e-mail priorities that are commonly understood: Urgent, Normal and Bulk. The mail client program (e.g. Outlook) will set the priority of the e-mail and this priority will be used to determine what happens to an e-mail if there is some sort of error during transmission.
E-Mail Errors:
The remote mail server has two options when there is an error. It can return a permanent error code, something in the range of the numbers from 500 to 599. A permanent error condition (e.g. 550) will result in an immediate return of the e-mail to the sender.The remote mail server may also return an error code signifying a temporary error either in it's configuration or server state (e.g. the server is too busy to handle the e-mail message). These error codes ranging from 400 to 499 specify the type of error and tell the sending server to try and re-transmit the e-mail after a short delay. Normally this allows for server conditions to change.
Queue Warning:
Your mail server will try to resend an e-mail with a temporary error for a number of hours. If transmission does not succeed it will send a warning message to the sender, but keep trying to send the e-mail.
Queue Return:
After a longer period of time the server will give up on sending the e-mail and return it to the sender with a notification of the delivery failure.
PerfectMail Warning/Return Thresholds:
You can update how long PerfectMail will try to resend e-mails temporary delivery errors. Using the web admin interface, navigate to the MTA Settings page (Server Admin > MTA), click on the "Warning/Return Thresholds" tab, make any required changes and click the "Update" button.
WARNING: Changing Mail Transport Agent (MTA) Settings can have serious implications on the ability of your mail server to handle/deliver e-mail in a timely manner. Modifications to these settings should be made with caution and by administrators with knowledge of how these settings will impact the Mail Transport Agent.</description>
<content:encoded><![CDATA[<p>E-mail delivery can be complex and depends on the e-mail priority, the type of return code (error message) generated by the remote mail server and local policies for attempting to resend an e-mail. Error conditions that are considered permanent (e.g. a bad recipient, non-existent recipient, spam, etc.) result in an immediate return of the e-mail to the sender.  Temporary or transient errors result in the e-mail staying in the mail queue and transmission is retried for a period of time. Keep in mind, delivery delays are not uncommon and reasonable attempts must be made to allow the mail server to deliver an e-mail. </p><p><br />
<em>E-mail Priority:</em><br />
There are 3 types of e-mail priorities that are commonly understood: Urgent, Normal and Bulk. The mail client program (e.g. Outlook) will set the priority of the e-mail and this priority will be used to determine what happens to an e-mail if there is some sort of error during transmission.</p><p><br />
<em>E-Mail Errors:</em><br />
The remote mail server has two options when there is an error. It can return a permanent error code, something in the range of the numbers from 500 to 599. A permanent error condition (e.g. 550) will result in an immediate return of the e-mail to the sender.</p><p>The remote mail server may also return an error code signifying a temporary error either in it's configuration or server state (e.g. the server is too busy to handle the e-mail message). These error codes ranging from 400 to 499 specify the type of error and tell the sending server to try and re-transmit the e-mail after a short delay. Normally this allows for server conditions to change.</p><p><br />
<em>Queue Warning:</em><br />
Your mail server will try to resend an e-mail with a temporary error for a number of hours. If transmission does not succeed it will send a warning message to the sender, but keep trying to send the e-mail.</p><p><br />
<em>Queue Return:</em><br />
After a longer period of time the server will give up on sending the e-mail and return it to the sender with a notification of the delivery failure.</p><p><br />
<em>PerfectMail Warning/Return Thresholds:</em><br />
You can update how long PerfectMail will try to resend e-mails temporary delivery errors. Using the web admin interface, navigate to the MTA Settings page (Server Admin > MTA), click on the "Warning/Return Thresholds" tab, make any required changes and click the "Update" button.</p><p><br />
<strong>WARNING:</strong> Changing Mail Transport Agent (MTA) Settings can have serious implications on the ability of your mail server to handle/deliver e-mail in a timely manner. Modifications to these settings should be made with caution and by administrators with knowledge of how these settings will impact the Mail Transport Agent.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/how_long_queue_times</link>
<pubDate>Mon, 12 Aug 2013 17:05:42 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/how_long_queue_times,commentrss</wfw:commentRss>
</item>
<item>
<title>Why am I receiving a &quot;521 5.2.1&quot; error from AOL?</title>
<description>The SMTP reply code 521 indicates an Internet mail host DOES NOT ACCEPT incoming mail. If you are receiving this error it indicates a configuration error on the part of the recipient organization, i.e. inbound e-mail traffic is being routed through a mail server which has been explicitly configured (intentionally or not) to NOT ACCEPT incoming e-mail.To resolve this issue the recipient organization needs to resolve their infrastructure issues.In large organizations, with many mail servers, this issue may be a transient error isolated to a particular mail host or cluster configuration (e.g. in a mail server failover situation.) If you are unable to contact the organization to have them resolve your issue, waiting a short time and resending may be all you need to do.References: http://www.ietf.org/rfc/rfc1846.txt</description>
<content:encoded><![CDATA[<p>The SMTP reply code 521 indicates an Internet mail host DOES NOT ACCEPT incoming mail. If you are receiving this error it indicates a configuration error on the part of the recipient organization, i.e. inbound e-mail traffic is being routed through a mail server which has been explicitly configured (intentionally or not) to NOT ACCEPT incoming e-mail.</p><p>To resolve this issue the recipient organization needs to resolve their infrastructure issues.</p><p>In large organizations, with many mail servers, this issue may be a transient error isolated to a particular mail host or cluster configuration (e.g. in a mail server failover situation.) If you are unable to contact the organization to have them resolve your issue, waiting a short time and resending may be all you need to do.</p><p><b>References:</b> http://www.ietf.org/rfc/rfc1846.txt</p>]]></content:encoded>
<link>https://perfectmail.com/kb/receiving_521_aol_error</link>
<pubDate>Mon, 12 Aug 2013 17:00:20 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/receiving_521_aol_error,commentrss</wfw:commentRss>
</item>
<item>
<title>Why do web links (URLs) have BLOCKED:: prefixed on them?</title>
<description>When you receive an HTML message, links in it may not work or the File, Open dialog will open, asking to associate an executable file with the link. Looking at the source, you’ll see the URL is prefixed with BLOCKED::, like this:&gl;A title=http://office.microsoft.com/ href="BLOCKED::http://office.microsoft.com/"&gt;Office Online&lt;/a&gt;This is an Outlook security feature that may occur when URLs are copied from one email message and pasted into another message. This is not a common problem, but we have had some reports where it has been seen in Outlook 2003 and Outlook 2007. It may be do to Internet Security Settings on your PC or in Outlook or may be a result of anti-virus or anti-spam software installed on your PC.You may be able to control it by adjusting the blocked external context setting in Outlook. In Outlook go to: "Got to Tools > Options > Security". Here you can selec to "Change Automatic Download Settings" and make appropriate adjustements. You may also fix this problem by setting Outlook to use the "Internet Zone" (on the same page).Note: We do not recommend lowering the internet Security settings or Setting Outlook to use a less restrictive Internet Zone. Resetting the Internet Zone to use the default settings may help.Warning: Using any zone other than Restricted will lower your security and could leave you open to possible infection from Java exploits.</description>
<content:encoded><![CDATA[<p>When you receive an HTML message, links in it may not work or the File, Open dialog will open, asking to associate an executable file with the link. Looking at the source, you’ll see the URL is prefixed with BLOCKED::, like this:</p><p>&gl;A title=http://office.microsoft.com/ href="BLOCKED::http://office.microsoft.com/"&gt;Office Online&lt;/a&gt;</p><p>This is an Outlook security feature that may occur when URLs are copied from one email message and pasted into another message. This is not a common problem, but we have had some reports where it has been seen in Outlook 2003 and Outlook 2007. It may be do to Internet Security Settings on your PC or in Outlook or may be a result of anti-virus or anti-spam software installed on your PC.</p><p>You may be able to control it by adjusting the blocked external context setting in Outlook. In Outlook go to: "Got to Tools > Options > Security". Here you can selec to "Change Automatic Download Settings" and make appropriate adjustements. You may also fix this problem by setting Outlook to use the "Internet Zone" (on the same page).</p><p>Note: We do not recommend lowering the internet Security settings or Setting Outlook to use a less restrictive Internet Zone. Resetting the Internet Zone to use the default settings may help.</p><p><b>Warning:</b> Using any zone other than Restricted will lower your security and could leave you open to possible infection from Java exploits.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/blocked_web_link_urls</link>
<pubDate>Mon, 12 Aug 2013 16:57:54 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/blocked_web_link_urls,commentrss</wfw:commentRss>
</item>
<item>
<title>Does the admin account allow ssh to the PerfectMail server?</title>
<description>On installation PerfectMail will create an "admin" user account to match the web access account. This allows you to login to the PerfectMail Linux console.As a security consideration the default configuration is to not allow SSH access via the admin account. This task is left for your Linux administrator to perform, if necessary. A qualified Linux administrator should be able to easily perform this task.In general, Linux administration is not needed; in fact it is discouraged. Updating the configuration of your PerfectMail server may render it non-functional. If you do need to make changes to the Linux release hosting PerfectMail, you do so at your own risk. Make sure you have full backups and plan to recover in case there is an issue.If you are running an older OS release of our product, you can download the latest release from our website: http://perfectmail.com/download</description>
<content:encoded><![CDATA[<p>On installation PerfectMail will create an "admin" user account to match the web access account. This allows you to login to the PerfectMail Linux console.</p><p>As a security consideration the default configuration is to not allow SSH access via the admin account. This task is left for your Linux administrator to perform, if necessary. A qualified Linux administrator should be able to easily perform this task.</p><p>In general, Linux administration is not needed; in fact it is discouraged. Updating the configuration of your PerfectMail server may render it non-functional. If you do need to make changes to the Linux release hosting PerfectMail, you do so at your own risk. Make sure you have full backups and plan to recover in case there is an issue.</p><p>If you are running an older OS release of our product, you can download the latest release from our website: <a href="http://perfectmail.com/download">http://perfectmail.com/download</a></p>]]></content:encoded>
<link>https://perfectmail.com/kb/admin_ssh_server_access</link>
<pubDate>Mon, 12 Aug 2013 16:54:06 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/admin_ssh_server_access,commentrss</wfw:commentRss>
</item>
<item>
<title>Should I be updating the Linux packages installed on my PerfectMail server?</title>
<description>In general, Linux administration is not needed; in fact it is discouraged. Updating rpm packages may result in a non-functioning PerfectMail server.If you do need to update Linux packages you do so at your own risk. Make sure you have full backups and plan to recover in case there is an issue.If you are running an older OS release of our product, you can download the latest release from our website: http://perfectmail.com/download</description>
<content:encoded><![CDATA[<p>In general, Linux administration is not needed; in fact it is discouraged. Updating rpm packages may result in a non-functioning PerfectMail server.</p><p>If you do need to update Linux packages you do so at your own risk. Make sure you have full backups and plan to recover in case there is an issue.</p><p>If you are running an older OS release of our product, you can download the latest release from our website: <a href="http://perfectmail.com/download">http://perfectmail.com/download</a></p>]]></content:encoded>
<link>https://perfectmail.com/kb/perfectmail_update_linux_rpm_packages</link>
<pubDate>Mon, 12 Aug 2013 16:49:55 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/perfectmail_update_linux_rpm_packages,commentrss</wfw:commentRss>
</item>
<item>
<title>If I do a server migration will I have to re-register my PerfectMail server?</title>
<description>I am currently planning a server migration. When I perform the migration will I need to re-register my PerfectMail server? Will my migrated server be functional?In most instances your PerfectMail server will be fully functional after a server migration, with no impact to production or functionality. However you will need to register a newly created PerfectMail server.There are two types of server migrations that are generally be performed with PerfectMail servers:1) Migration of data to a newly installed PerfectMail server. When you create a new PerfectMail anti-spam server instance, that instance comes with a fully functional 60 day license. This will let you set up your new environment and perform your migration at your leisure. When you are ready to put the new server into production let us know and we will assign your license to the new server.2) Migration of a virtual server within the virtualization host server or across host servers. In most cases the virtual server will be migrated intact with the virtual hardware components being maintained. Your existing PerfectMail anti-spam license will remain functional. In fact this sort of server migration will be seamless to your PerfectMail server.In any case, if you have any issues, let us know. We will be happy to assist you.</description>
<content:encoded><![CDATA[<p>I am currently planning a server migration. When I perform the migration will I need to re-register my PerfectMail server? Will my migrated server be functional?</p><p>In most instances your PerfectMail server will be fully functional after a server migration, with no impact to production or functionality. However you will need to register a newly created PerfectMail server.</p><p>There are two types of server migrations that are generally be performed with PerfectMail servers:</p><p>1) Migration of data to a newly installed PerfectMail server. When you create a new PerfectMail anti-spam server instance, that instance comes with a fully functional 60 day license. This will let you set up your new environment and perform your migration at your leisure. When you are ready to put the new server into production let us know and we will assign your license to the new server.</p><p>2) Migration of a virtual server within the virtualization host server or across host servers. In most cases the virtual server will be migrated intact with the virtual hardware components being maintained. Your existing PerfectMail anti-spam license will remain functional. In fact this sort of server migration will be seamless to your PerfectMail server.</p><p>In any case, if you have any issues, let us know. We will be happy to assist you.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/server_migration_reregister</link>
<pubDate>Mon, 12 Aug 2013 16:47:54 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/server_migration_reregister,commentrss</wfw:commentRss>
</item>
<item>
<title>If I migrate to a new PerfectMail server will I have to buy a new server license?</title>
<description>Server migrations are a necessary component of maintaining your data center. We understand that and do not penalize you with additional fees for having a well maintained data center. When you create a new PerfectMail antispam server instance, that instance comes with a fully functional 60 day license. This will let you set up your new environment and perform your migration at your leisure. When you are ready to put the new server into production let us know and we will assign your license to the new server.If you have any issues at all, let us know. We will be happy to assist you.</description>
<content:encoded><![CDATA[<p>Server migrations are a necessary component of maintaining your data center. We understand that and do not penalize you with additional fees for having a well maintained data center. When you create a new PerfectMail antispam server instance, that instance comes with a fully functional 60 day license. This will let you set up your new environment and perform your migration at your leisure. When you are ready to put the new server into production let us know and we will assign your license to the new server.</p><p>If you have any issues at all, let us know. We will be happy to assist you.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/perfectmail_migrate_server_new_license</link>
<pubDate>Mon, 12 Aug 2013 16:44:13 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/perfectmail_migrate_server_new_license,commentrss</wfw:commentRss>
</item>
<item>
<title>Why can't I see the message body for some messages?</title>
<description>PerfectMail selectively stores message content based on the spam analysis result of the message.  Some analysis results such as "RBL Listed" or "Virus Detected" very rarely contain content we care about.  For some servers, this type of content can account for 90% of e-mail traffic.  Rather than filling up your server with massive amounts of spam content, content that is very likely to be spam is not stored in the PerfectMail local archive.Content that is not stored in the local archive can not be viewed or restored.If this becomes a problem, you can adjust the Archive Settings on your Perfectmail server to select what sort of message content is stored locally. To update the Archive Settings go to the Administrator Web Interface and navigate to "Server Admin > Archive > Message Storage tab" and select the message types to store.</description>
<content:encoded><![CDATA[<p>PerfectMail selectively stores message content based on the spam analysis result of the message.  Some analysis results such as "RBL Listed" or "Virus Detected" very rarely contain content we care about.  For some servers, this type of content can account for 90% of e-mail traffic.  Rather than filling up your server with massive amounts of spam content, content that is very likely to be spam is not stored in the PerfectMail local archive.</p><p>Content that is not stored in the local archive can not be viewed or restored.</p><p>If this becomes a problem, you can adjust the Archive Settings on your Perfectmail server to select what sort of message content is stored locally. To update the Archive Settings go to the Administrator Web Interface and navigate to "Server Admin > Archive > Message Storage tab" and select the message types to store.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/no_message_body</link>
<pubDate>Mon, 12 Aug 2013 16:40:15 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/no_message_body,commentrss</wfw:commentRss>
</item>
<item>
<title>Common SMTP return Codes</title>
<description>Following are some of the commonly seen SMTP return codes.211 System status, or system help reply
214 Help message220  Service ready
221  Service closing transmission channel
421  Service not available,250 Requested mail action okay, completed
251 User not local; will forward to 
252 Cannot VRFY user (e.g. info is not local). but will take message for this users and attempt delivery
450 Requested mail action not taken: mailbox unavailable (e.g. mailbox busy)
550 Requested action not taken: mailbox unavailable (e.g. mailbox not found or no access)
451 Requested action aborted: error in processing
551 User not local; please try 
452 Requested action not taken: insufficient system storage
552 Requested mail action aborted: exceeded storage allocation
553 Requested action not taken: mailbox name not allowed (e.g. mailbox syntax incorrect)
354 Start mail input; end with .
554 Transaction failed</description>
<content:encoded><![CDATA[<p>Following are some of the commonly seen SMTP return codes.</p><p>211 System status, or system help reply<br />
214 Help message</p><p>220 <domain> Service ready<br />
221 <domain> Service closing transmission channel<br />
421 <domain> Service not available,</p><p>250 Requested mail action okay, completed<br />
251 User not local; will forward to <forward-path><br />
252 Cannot VRFY user (e.g. info is not local). but will take message for this users and attempt delivery<br />
450 Requested mail action not taken: mailbox unavailable (e.g. mailbox busy)<br />
550 Requested action not taken: mailbox unavailable (e.g. mailbox not found or no access)<br />
451 Requested action aborted: error in processing<br />
551 User not local; please try <forward-path><br />
452 Requested action not taken: insufficient system storage<br />
552 Requested mail action aborted: exceeded storage allocation<br />
553 Requested action not taken: mailbox name not allowed (e.g. mailbox syntax incorrect)<br />
354 Start mail input; end with <CRLF>.<CRLF><br />
554 Transaction failed</p>]]></content:encoded>
<link>https://perfectmail.com/kb/common_smtp_codes</link>
<pubDate>Mon, 12 Aug 2013 16:39:03 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/common_smtp_codes,commentrss</wfw:commentRss>
</item>
<item>
<title>How to accept &quot;self-sent&quot; messages from specific servers.</title>
<description>A "self sent" message is an e-mail message originating from outside your organization, where the "from" and "to" addresses are the same. Spammers set the "from" address to match the "to" address in an attempt to spoof the "from" address and side step spam filtering, usually due to white-list settings.Normally this sort of activity would be "unusual" and a high indication of spam. However, this may not be true if your users work remotely and send their e-mail from servers located outside of your organization. To block "self-sent" e-mail log into the Web Administrator interface and navigate to Filters > Filter Settings > Sender Tab, and enable "Block self sent e-mail". To allow "self-sent" e-mail from a particular server, either:1) White list the sending server or domain in Filters > Sender > White List tab; or
2) Disabling the "Self Sent" anti-spoofing test on Filters > Filter Settings > Sender Tab.</description>
<content:encoded><![CDATA[<p>A "self sent" message is an e-mail message originating from outside your organization, where the "from" and "to" addresses are the same. Spammers set the "from" address to match the "to" address in an attempt to spoof the "from" address and side step spam filtering, usually due to white-list settings.</p><p>Normally this sort of activity would be "unusual" and a high indication of spam. However, this may not be true if your users work remotely and send their e-mail from servers located outside of your organization. </p><p>To block "self-sent" e-mail log into the Web Administrator interface and navigate to Filters > Filter Settings > Sender Tab, and enable "Block self sent e-mail". </p><p>To allow "self-sent" e-mail from a particular server, either:</p><p>1) White list the sending server or domain in Filters > Sender > White List tab; or<br />
2) Disabling the "Self Sent" anti-spoofing test on Filters > Filter Settings > Sender Tab.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/accept_self_sent_email_from_specific_servers</link>
<pubDate>Wed, 07 Aug 2013 19:50:03 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/accept_self_sent_email_from_specific_servers,commentrss</wfw:commentRss>
</item>
<item>
<title>What is a &quot;self-sent&quot; message and what does it have to do with spam?</title>
<description>A "self sent" message is an e-mail message originating from outside your organization, where the "from" and "to" addresses are the same. Spammers set the "from" address to match the "to" address in an attempt to spoof the "from" address and side step spam filtering, usually due to white-list settings.Normally this sort of activity would be "unusual" and a high indication of spam. However, this may not be true if your users work remotely and send their e-mail from servers located outside of your organization. To block "self-sent" e-mail log into the Web Administrator interface and navigate to Filters > Filter Settings > Sender Tab, and enable "Block self sent e-mail".</description>
<content:encoded><![CDATA[<p>A "self sent" message is an e-mail message originating from outside your organization, where the "from" and "to" addresses are the same. Spammers set the "from" address to match the "to" address in an attempt to spoof the "from" address and side step spam filtering, usually due to white-list settings.</p><p>Normally this sort of activity would be "unusual" and a high indication of spam. However, this may not be true if your users work remotely and send their e-mail from servers located outside of your organization. </p><p>To block "self-sent" e-mail log into the Web Administrator interface and navigate to Filters > Filter Settings > Sender Tab, and enable "Block self sent e-mail".</p>]]></content:encoded>
<link>https://perfectmail.com/kb/what_is_self_sent_message</link>
<pubDate>Wed, 07 Aug 2013 19:47:34 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/what_is_self_sent_message,commentrss</wfw:commentRss>
</item>
<item>
<title>What is spoofing and what can I do to stop it?</title>
<description>Spoofing is the act of forging e-mail headers to make it look like the e-mail is originating from a different sender or server. A spammer can simply state they are sending a message from another e-mail address, almost at will.Spoofing is so hard to stop because there is no way to validate an e-mail within the message itself. This is an inherent problem with the SMTP design. With DKIM and SPF you have some sort of validation technique, but the adoption of these methods is relatively sparse; though we do see the acceptance of SPF increasing.For anti-spoofing we recommend the "verify e-mail option" as a minimum. Some organizations will never see e-mail coming from the internet as "sent" from their domain. However, when you have situations where people send from their home accounts "using their work e-mail address" the "block" options can result in many false positives.To configure anti-spoofing options log into the PerfectMail web interface and navigate to Filters > Filter Settings > Sender tab; there are 3 options:Verify e-mail address: Verify the existence of e-mail addresses from hosted domain, but coming from the outside. (Recommended.)Block self sent e-mail:  Block e-mail sent by a user to their selves, but coming from outside. (Recommended for most organizations.)Block all: Block all e-mail from the outside that is reportedly from a hosted domain. (Restrictive)Note: To PerfectMail the outside world is anything that is not defined as a part of your infrastructure. Your mail servers and relay servers are all considered "inside", while everything else is considered "outside". PerfectMail is smart enough to recognize mail coming through "inbound" relays and will consider the first "outside" hop as the outside originator.</description>
<content:encoded><![CDATA[<p>Spoofing is the act of forging e-mail headers to make it look like the e-mail is originating from a different sender or server. A spammer can simply state they are sending a message from another e-mail address, almost at will.</p><p>Spoofing is so hard to stop because there is no way to validate an e-mail within the message itself. This is an inherent problem with the SMTP design. With DKIM and SPF you have some sort of validation technique, but the adoption of these methods is relatively sparse; though we do see the acceptance of SPF increasing.</p><p>For anti-spoofing we recommend the "verify e-mail option" as a minimum. Some organizations will never see e-mail coming from the internet as "sent" from their domain. However, when you have situations where people send from their home accounts "using their work e-mail address" the "block" options can result in many false positives.</p><p>To configure anti-spoofing options log into the PerfectMail web interface and navigate to Filters > Filter Settings > Sender tab; there are 3 options:</p><p>Verify e-mail address: Verify the existence of e-mail addresses from hosted domain, but coming from the outside. (Recommended.)</p><p>Block self sent e-mail:  Block e-mail sent by a user to their selves, but coming from outside. (Recommended for most organizations.)</p><p>Block all: Block all e-mail from the outside that is reportedly from a hosted domain. (Restrictive)</p><p>Note: To PerfectMail the outside world is anything that is not defined as a part of your infrastructure. Your mail servers and relay servers are all considered "inside", while everything else is considered "outside". PerfectMail is smart enough to recognize mail coming through "inbound" relays and will consider the first "outside" hop as the outside originator.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/how_to_stop_spoofing</link>
<pubDate>Wed, 07 Aug 2013 19:46:16 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/how_to_stop_spoofing,commentrss</wfw:commentRss>
</item>
<item>
<title>How do I configure E-mail Activity Reports for a single user?</title>
<description>You can change the frequency of the Activity Report by adjusting the personal settings for a user via the Domain Admin page:1) Log into the PerfectMail Administrator Interface,
2) Navigate to Domains Admin > Domains,
3) Select (click) the appropriate domain, then click on "Edit Addresses" button at the bottom right of the page
4) Select (click) the appropriate e-mail address, and select (click) the "Activity Report" tab,
5) Adjust Activity Report settings. Make sure to "Enable Reports" and set your "Report Frequency" to Daily, Weekly or Monthly, as needed.</description>
<content:encoded><![CDATA[<p>You can change the frequency of the Activity Report by adjusting the personal settings for a user via the Domain Admin page:</p><p>1) Log into the PerfectMail Administrator Interface,<br />
2) Navigate to Domains Admin > Domains,<br />
3) Select (click) the appropriate domain, then click on "Edit Addresses" button at the bottom right of the page<br />
4) Select (click) the appropriate e-mail address, and select (click) the "Activity Report" tab,<br />
5) Adjust Activity Report settings. Make sure to "Enable Reports" and set your "Report Frequency" to Daily, Weekly or Monthly, as needed.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/email_activity_report_single_user</link>
<pubDate>Wed, 07 Aug 2013 19:15:59 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/email_activity_report_single_user,commentrss</wfw:commentRss>
</item>
<item>
<title>Why am I seeing the error &quot;Deferred: Name server: host name lookup failure&quot;?</title>
<description>This error message occurs when PerfectMail is unable to resolve the domain name of the sending e-mail address in DNS. Most often this occurs when spammers make up ficticious domain names when sending spam. However, in rare circumstances this can also signal a problem with your local DNS resolution. DNS resolution is required for e-mail analysis and delivery, so there may be a problem affecting your e-mail flow. To see the validation error report go to the "Reports > Server Status" page and look at all of the validation results. There will be lines for each DNS server saying "Querying DNS server" with the results.Try the following:
1) Reboot your local DNS Server
2) Restart your MTA using the PerfectMail DashboardAfter restarting these services go to the web administrator interface "Tools > DNS Lookup" page. Enter the IP address of the questionable DNS server and lookup names for domains that you would not normally see. The idea is to try and find domain names that would nor normally be cached on your DNS server.Sometimes we see DNS servers misbehave when performing new lookups. When this happens  DNS lookups for cached entries appear to work fine, but new lookups appear to fail. Restarting DNS services appears to fix this problem in the short term.</description>
<content:encoded><![CDATA[<p>This error message occurs when PerfectMail is unable to resolve the domain name of the sending e-mail address in DNS. Most often this occurs when spammers make up ficticious domain names when sending spam. </p><p>However, in rare circumstances this can also signal a problem with your local DNS resolution. DNS resolution is required for e-mail analysis and delivery, so there may be a problem affecting your e-mail flow. To see the validation error report go to the "Reports > Server Status" page and look at all of the validation results. There will be lines for each DNS server saying "Querying DNS server" with the results.</p><p>Try the following:<br />
1) Reboot your local DNS Server<br />
2) Restart your MTA using the PerfectMail Dashboard</p><p>After restarting these services go to the web administrator interface "Tools > DNS Lookup" page. Enter the IP address of the questionable DNS server and lookup names for domains that you would not normally see. The idea is to try and find domain names that would nor normally be cached on your DNS server.</p><p>Sometimes we see DNS servers misbehave when performing new lookups. When this happens  DNS lookups for cached entries appear to work fine, but new lookups appear to fail. Restarting DNS services appears to fix this problem in the short term.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/deferred_host_name_lookup_failure</link>
<pubDate>Wed, 07 Aug 2013 18:59:44 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/deferred_host_name_lookup_failure,commentrss</wfw:commentRss>
</item>
<item>
<title>Why am I seeing the warning &quot;Unable to resolve hosts on the Internet&quot;?</title>
<description>This message says you are having problems with at least one of your DNS servers. DNS resolution is required for e-mail analysis and delivery, so there may be a problem affecting your e-mail flow. To see the validation error report go to the "Reports > Server Status" page and look at all of the validation results. There will be lines for each DNS server saying "Querying DNS server" with the results.Try the following:
1) Reboot your local DNS Server
2) Restart your MTA using the PerfectMail DashboardAfter restarting these services go to the web administrator interface "Tools > DNS Lookup" page. Enter the IP address of the questionable DNS server and lookup names for domains that you would not normally see. The idea is to try and find domain names that would nor normally be cached on your DNS server.Sometimes we see DNS servers misbehave when performing new lookups. When this happens  DNS lookups for cached entries appear to work fine, but new lookups appear to fail. Restarting DNS services appears to fix this problem in the short term.</description>
<content:encoded><![CDATA[<p>This message says you are having problems with at least one of your DNS servers. DNS resolution is required for e-mail analysis and delivery, so there may be a problem affecting your e-mail flow. To see the validation error report go to the "Reports > Server Status" page and look at all of the validation results. There will be lines for each DNS server saying "Querying DNS server" with the results.</p><p>Try the following:<br />
1) Reboot your local DNS Server<br />
2) Restart your MTA using the PerfectMail Dashboard</p><p>After restarting these services go to the web administrator interface "Tools > DNS Lookup" page. Enter the IP address of the questionable DNS server and lookup names for domains that you would not normally see. The idea is to try and find domain names that would nor normally be cached on your DNS server.</p><p>Sometimes we see DNS servers misbehave when performing new lookups. When this happens  DNS lookups for cached entries appear to work fine, but new lookups appear to fail. Restarting DNS services appears to fix this problem in the short term.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/unable_to_resolve_hosts</link>
<pubDate>Wed, 07 Aug 2013 18:56:58 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/unable_to_resolve_hosts,commentrss</wfw:commentRss>
</item>
<item>
<title>What is the Best Practice for changing mail server DNS records?</title>
<description>Changing DNS records involves a propagation delay that may be as long as 48 hours. After changing your MX records in DNS you cannot tell how long it will be before mail servers will become aware of your new MX record and new mail server. In this 48 hour time span you can expect e-mail to be sent to both the old and new records.Further, this process can result in downtime if there are problems with the mail server migration. Consider a situation where you are forced to fall back to the old mail server and the new MX records have already propagated through DNS. Servers may be unable to reach your old mail server.The following procedure allows you to perform a discreet, clean cut over with no loss of e-mail and allows for falling back to the old server if there is an issue with the migration.Clean Mail Server Cutover Procedure:1) Ensure both mail servers are operational.
2) Turn off SMTP for the new mail server and add the new MX record in DNS.
2) Wait 48 hours.
3) Turn on SMTP for the new mail server and turn off SMTP for the old mail server.
4) Test. If there are migration issues simply reverse step 3.
5) Remove the old MX record in DNS.</description>
<content:encoded><![CDATA[<p>Changing DNS records involves a propagation delay that may be as long as 48 hours. After changing your MX records in DNS you cannot tell how long it will be before mail servers will become aware of your new MX record and new mail server. In this 48 hour time span you can expect e-mail to be sent to both the old and new records.</p><p>Further, this process can result in downtime if there are problems with the mail server migration. Consider a situation where you are forced to fall back to the old mail server and the new MX records have already propagated through DNS. Servers may be unable to reach your old mail server.</p><p>The following procedure allows you to perform a discreet, clean cut over with no loss of e-mail and allows for falling back to the old server if there is an issue with the migration.</p><p>Clean Mail Server Cutover Procedure:</p><p>1) Ensure both mail servers are operational.<br />
2) Turn off SMTP for the new mail server and add the new MX record in DNS.<br />
2) Wait 48 hours.<br />
3) Turn on SMTP for the new mail server and turn off SMTP for the old mail server.<br />
4) Test. If there are migration issues simply reverse step 3.<br />
5) Remove the old MX record in DNS.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/changing_dns_records</link>
<pubDate>Wed, 07 Aug 2013 18:49:19 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/changing_dns_records,commentrss</wfw:commentRss>
</item>
<item>
<title>PerfectMail is saying my server is black listed! What should I do?</title>
<description>PerfectMail's validation system will proactively check to ensure your mail server is properly configured and functioning. It will also check to ensure your server is not black listed by well known RBL sites on the Internet including spamhaus.org. If your server is listed you will receive a message in the validation report that looks something like the following:Internet Facing IP Address: WARNINGThe "Internet Facing IP Address" of this server [xxx.xxx.xxx.xxx] is Black Listed! E-mail servers may reject e-mail originating from this server.This issue will definitely affect your ability to send e-mail to the Internet. You must get this issue resolved; and it must be resolved before you can get delisted, otherwise you may end up permanently Black Listed.Likely a PC on your network has been infected with some sort of malware (virus, trojan, etc.), and is connecting directly to the Internet and sending spam/viruses/malware.If PCs and mail servers use the same "external IP address" for connecting to the Internet then the reputation of malicious PCs will also be applied to your mail server. Similarly, if you are providing WIFI access to the public and share the "external IP address" between your public WIFI offering and your business servers you may be putting the reputation of your mail servers at risk.Take the following actions to remediate both the immediate problem and mitigate against future exposure:1) Does your firewall block port 25 access to the internet from every machine except for mail servers? Remote mail servers make reputation determination based on your public Internet facing IP address. So, all PCs and servers will share the same public facing IP address through your firewall and receive the same reputation. PC's should not normally be sending e-mail to the Internet.  Any malicious activity from an infected PC can adversely affect the reputation of your mail servers. Blocking outbound port 25 traffic of PCs may stop this problem.ACTION: Lock your firewall down so only mail servers can send to port 25 (SMTP).2) Similarly, do your mail servers and PCs use the same "external IP address" to connect to the Internet?  If possible you should configure your firewall so mail servers and PCs use different public facing IP addresses. Separating the paths for outbound Internet traffic may insulate your mail servers from experiencing this problem. ACTION: Separate outbound traffic to different Internet facing IP addresses for mail servers from other servers and PCs on your internal network.3) If you offer publically available WIFI services ensure they are locked down as much as possible. Do not let publicly connected PCs to send out on port 25 (SMTP). If possible ensure public WIFI connections use a different "external IP address" from your business service.ACTION: Prefent public WIFI clients from sending on port 25 and separate such traffic from your business (if possible.)4) Defenses should always be implemented at multiple locations in your organization. Ensure anti-virus and malware filters are up to date and functioning on edge transport servers, office servers and PCs to provide full protection.ACTION: Ensure anti-virus/malware filters are up to date.4) An infected PC may be sending spam through your mail server. In this case you can use PerfectMail to look for and identify an infected PC. Check the PerfectMail logs for "outbound" mail only.  Look for patterns of spam messages originating from inside your network. If you see a suspicious pattern of behaviour, identify the infected PC by looking at the ACTION: Review PerfectMail mail logs to identify PCs sending suspicious e-mail.5) Go to spamhaus.org and find the CBL list. You are listed there. There should be a form to get your IP address delisted on the site. Remember, you must get this issue resolved locally. If the issue is not resolved before delisting you may end up permanently Black Listed.ACTION: Get de-listed</description>
<content:encoded><![CDATA[<p>PerfectMail's validation system will proactively check to ensure your mail server is properly configured and functioning. It will also check to ensure your server is not black listed by well known RBL sites on the Internet including spamhaus.org. If your server is listed you will receive a message in the validation report that looks something like the following:<br /><br />Internet Facing IP Address: WARNING<br />The "Internet Facing IP Address" of this server [xxx.xxx.xxx.xxx] is Black Listed! E-mail servers may reject e-mail originating from this server.<br /><br />This issue will definitely affect your ability to send e-mail to the Internet. You must get this issue resolved; and it must be resolved before you can get delisted, otherwise you may end up permanently Black Listed.<br /><br />Likely a PC on your network has been infected with some sort of malware (virus, trojan, etc.), and is connecting directly to the Internet and sending spam/viruses/malware.<br /><br />If PCs and mail servers use the same "external IP address" for connecting to the Internet then the reputation of malicious PCs will also be applied to your mail server. Similarly, if you are providing WIFI access to the public and share the "external IP address" between your public WIFI offering and your business servers you may be putting the reputation of your mail servers at risk.<br /><br />Take the following actions to remediate both the immediate problem and mitigate against future exposure:<br /><br />1) Does your firewall block port 25 access to the internet from every machine except for mail servers? Remote mail servers make reputation determination based on your public Internet facing IP address. So, all PCs and servers will share the same public facing IP address through your firewall and receive the same reputation. PC's should not normally be sending e-mail to the Internet.  Any malicious activity from an infected PC can adversely affect the reputation of your mail servers. Blocking outbound port 25 traffic of PCs may stop this problem.<br /><br />ACTION: Lock your firewall down so only mail servers can send to port 25 (SMTP).<br /><br />2) Similarly, do your mail servers and PCs use the same "external IP address" to connect to the Internet?  If possible you should configure your firewall so mail servers and PCs use different public facing IP addresses. Separating the paths for outbound Internet traffic may insulate your mail servers from experiencing this problem. <br /><br />ACTION: Separate outbound traffic to different Internet facing IP addresses for mail servers from other servers and PCs on your internal network.<br /><br />3) If you offer publically available WIFI services ensure they are locked down as much as possible. Do not let publicly connected PCs to send out on port 25 (SMTP). If possible ensure public WIFI connections use a different "external IP address" from your business service.<br /><br />ACTION: Prefent public WIFI clients from sending on port 25 and separate such traffic from your business (if possible.)<br /><br />4) Defenses should always be implemented at multiple locations in your organization. Ensure anti-virus and malware filters are up to date and functioning on edge transport servers, office servers and PCs to provide full protection.<br /><br />ACTION: Ensure anti-virus/malware filters are up to date.<br /><br />4) An infected PC may be sending spam through your mail server. In this case you can use PerfectMail to look for and identify an infected PC. Check the PerfectMail logs for "outbound" mail only.  Look for patterns of spam messages originating from inside your network. If you see a suspicious pattern of behaviour, identify the infected PC by looking at the <br /><br />ACTION: Review PerfectMail mail logs to identify PCs sending suspicious e-mail.<br /><br />5) Go to spamhaus.org and find the CBL list. You are listed there. There should be a form to get your IP address delisted on the site. Remember, you must get this issue resolved locally. If the issue is not resolved before delisting you may end up permanently Black Listed.<br /><br />ACTION: Get de-listed<br /><br /></p>]]></content:encoded>
<link>https://perfectmail.com/kb/my_server_is_black_listed</link>
<pubDate>Mon, 25 Mar 2013 14:01:06 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/my_server_is_black_listed,commentrss</wfw:commentRss>
</item>
<item>
<title>Blocking top level country domains</title>
<description>Yes you can list an entire country code or any other top level domain or subdomain using the Black/White List (Filters &gt; Black/White List).

To block a whole domain or subdomain, simply add that domain to the black list:


Log into your PerfectMail web interface using an administrator account;
Navigate to the Black/White List page (Filtering &gt;Black White List) and select the Black List tab;
Add the Top Level Domain Country Code to the Black List. For example, to block the Soviet Union you would add an entry for "SU" to the list (not ".su" nor "*.su"; simply use "su"). Any e-mail coming from any domain ending ".su" or from any hostname ending ".su" will be black listed.


Internet domain country codes are listed by IANA in ISO 3166-1.

You can find a list of country codes at this link: http://perfectmail.com/kb/top_domain_country_codes

</description>
<content:encoded><![CDATA[<p>Yes you can list an entire country code or any other top level domain or subdomain using the Black/White List (Filters &gt; Black/White List).</p>

<p>To block a whole domain or subdomain, simply add that domain to the black list:</p>

<ol>
<li>Log into your PerfectMail web interface using an administrator account;</li>
<li>Navigate to the <i>Black/White List</i> page (Filtering &gt;Black White List) and select the <i>Black List</i> tab;</li>
<li>Add the <i>Top Level Domain Country Code</i> to the <i>Black List</i>. For example, to block the <i>Soviet Union</i> you would add an entry for "SU" to the list (not ".su" nor "*.su"; simply use "su"). Any e-mail coming from any domain ending ".su" or from any hostname ending ".su" will be black listed.</li>
</ol>

<p>Internet domain <i>country codes</i> are listed by IANA in <a href="http://en.wikipedia.org/wiki/ISO_3166-1">ISO 3166-1</a>.</p>

<p>You can find a list of country codes at this link: <a href="http://perfectmail.com/kb/top_domain_country_codes">http://perfectmail.com/kb/top_domain_country_codes</a></p>

]]></content:encoded>
<link>https://perfectmail.com/kb/blocking_top_level_country_codes</link>
<pubDate>Mon, 03 Dec 2012 19:05:05 +0000</pubDate>
<category>Filtering</category>
<wfw:commentRss>https://perfectmail.com/kb/blocking_top_level_country_codes,commentrss</wfw:commentRss>
</item>
<item>
<title>Top Level Domain Country Codes</title>
<description>Internet domain country codes are listed by IANA in ISO 3166-1. The current country codes at the time of this article are listed below.


English Short NameCountry Code
AfghanistanAF
Åland IslandsAX
AlbaniaAL
AlgeriaDZ
American SamoaAS
AndorraAD
AngolaAO
AnguillaAI
AntarcticaAQ
Antigua and BarbudaAG
ArgentinaAR
ArmeniaAM
ArubaAW
Ascension IslandAS
AustraliaAU
AustriaAT
AzerbaijanAZ
BahamasBS
BahrainBH
BangladeshBD
BarbadosBB
BelarusBY
BelgiumBE
BelizeBZ
BeninBJ
BermudaBM
BhutanBT
Bolivia, Plurinational State ofBO
Bonaire, Sint Eustatius and SabaBQ
Bosnia and HerzegovinaBA
BotswanaBW
Bouvet IslandBV
BrazilBR
British Indian Ocean TerritoryIO
Brunei DarussalamBN
BulgariaBG
Burkina FasoBF
BurundiBI
CambodiaKH
CameroonCM
CanadaCA
Cape VerdeCV
Cayman IslandsKY
Central African RepublicCF
ChadTD
ChileCL
ChinaCN
Christmas IslandCX
Cocos (Keeling) IslandsCC
ColombiaCO
ComorosKM
CongoCG
Congo, the Democratic Republic of theCD
Cook IslandsCK
Costa RicaCR
Côte d'IvoireCI
CroatiaHR
CubaCU
CuraçaoCW
CyprusCY
Czech RepublicCZ
DenmarkDK
DjiboutiDJ
DominicaDM
Dominican RepublicDO
EcuadorEC
EgyptEG
El SalvadorSV
Equatorial GuineaGQ
EritreaER
EstoniaEE
EthiopiaET
European UnionEU
Falkland Islands (Malvinas)FK
Faroe IslandsFO
FijiFJ
FinlandFI
FranceFR
French GuianaGF
French PolynesiaPF
French Southern TerritoriesTF
GabonGA
GambiaGM
GeorgiaGE
GermanyDE
GhanaGH
GibraltarGI
Great BritainGB
GreeceGR
GreenlandGL
GrenadaGD
GuadeloupeGP
GuamGU
GuatemalaGT
GuernseyGG
GuineaGN
Guinea-BissauGW
GuyanaGY
HaitiHT
Heard Island and McDonald IslandsHM
Holy See (Vatican City State)VA
HondurasHN
Hong KongHK
HungaryHU
IcelandIS
IndiaIN
IndonesiaID
Iran, Islamic Republic ofIR
IraqIQ
IrelandIE
Isle of ManIM
IsraelIL
ItalyIT
JamaicaJM
JapanJP
JerseyJE
JordanJO
KazakhstanKZ
KenyaKE
KiribatiKI
Korea, Democratic People's Republic ofKP
Korea, Republic ofKR
KuwaitKW
KyrgyzstanKG
Lao People's Democratic RepublicLA
LatviaLV
LebanonLB
LesothoLS
LiberiaLR
LibyaLY
LiechtensteinLI
LithuaniaLT
LuxembourgLU
MacaoMO
Macedonia, The Former Yugoslav Republic ofMK
MadagascarMG
MalawiMW
MalaysiaMY
MaldivesMV
MaliML
MaltaMT
Marshall IslandsMH
MartiniqueMQ
MauritaniaMR
MauritiusMU
MayotteYT
MexicoMX
Micronesia, Federated States ofFM
Moldova, Republic ofMD
MonacoMC
MongoliaMN
MontenegroME
MontserratMS
MoroccoMA
MozambiqueMZ
MyanmarMM
NamibiaNA
NauruNR
NepalNP
NetherlandsNL
New CaledoniaNC
New ZealandNZ
NicaraguaNI
NigerNE
NigeriaNG
NiueNU
Norfolk IslandNF
Northern Mariana IslandsMP
NorwayNO
OmanOM
PakistanPK
PalauPW
Palestinian Territory, OccupiedPS
PanamaPA
Papua New GuineaPG
ParaguayPY
PeruPE
PhilippinesPH
PitcairnPN
PolandPL
PortugalPT
Puerto RicoPR
QatarQA
RéunionRE
RomaniaRO
Russian FederationRU
RwandaRW
Saint BarthélemyBL
Saint Helena, Ascension and Tristan da CunhaSH
Saint Kitts and NevisKN
Saint LuciaLC
Saint Martin (French part)MF
Saint Pierre and MiquelonPM
Saint Vincent and the GrenadinesVC
SamoaWS
San MarinoSM
Sao Tome and PrincipeST
Saudi ArabiaSA
SenegalSN
SerbiaRS
SeychellesSC
Sierra LeoneSL
SingaporeSG
Sint Maarten (Dutch part)SX
SlovakiaSK
SloveniaSI
Solomon IslandsSB
SomaliaSO
South AfricaZA
South Georgia and the South Sandwich IslandsGS
South SudanSS
Soviet UnionSU
SpainES
Sri LankaLK
SudanSD
SurinameSR
Svalbard and Jan MayenSJ
SwazilandSZ
SwedenSE
SwitzerlandCH
Syrian Arab RepublicSY
Taiwan, Province of ChinaTW
TajikistanTJ
Tanzania, United Republic ofTZ
ThailandTH
Timor-LesteTL
TogoTG
TokelauTK
TongaTO
Trinidad and TobagoTT
TunisiaTN
TurkeyTR
TurkmenistanTM
Turks and Caicos IslandsTC
TuvaluTV
UgandaUG
UkraineUA
United Arab EmiratesAE
United KingdomGB
United StatesUS
United States Minor Outlying IslandsUM
UruguayUY
UzbekistanUZ
VanuatuVU
Venezuela, Bolivarian Republic ofVE
Viet NamVN
Virgin Islands, BritishVG
Virgin Islands, U.S.VI
Wallis and FutunaWF
Western SaharaEH
YemenYE
ZambiaZM
ZimbabweZW

</description>
<content:encoded><![CDATA[<p>Internet domain <i>country codes</i> are listed by IANA in <a href="http://en.wikipedia.org/wiki/ISO_3166-1">ISO 3166-1</a>. The current country codes at the time of this article are listed below.</p>

<table border="1" style="border:1px solid black; border-collapse:collapse;">
<tr><th>English Short Name</th><th>Country Code</th></tr>
<tr><td><i>Afghanistan</i></td><td>AF</td></tr>
<tr><td><i>Åland Islands</i></td><td>AX</td></tr>
<tr><td><i>Albania</i></td><td>AL</td></tr>
<tr><td><i>Algeria</i></td><td>DZ</td></tr>
<tr><td><i>American Samoa</i></td><td>AS</td></tr>
<tr><td><i>Andorra</i></td><td>AD</td></tr>
<tr><td><i>Angola</i></td><td>AO</td></tr>
<tr><td><i>Anguilla</i></td><td>AI</td></tr>
<tr><td><i>Antarctica</i></td><td>AQ</td></tr>
<tr><td><i>Antigua and Barbuda</i></td><td>AG</td></tr>
<tr><td><i>Argentina</i></td><td>AR</td></tr>
<tr><td><i>Armenia</i></td><td>AM</td></tr>
<tr><td><i>Aruba</i></td><td>AW</td></tr>
<tr><td><i>Ascension Island</i></td><td>AS</td></tr>
<tr><td><i>Australia</i></td><td>AU</td></tr>
<tr><td><i>Austria</i></td><td>AT</td></tr>
<tr><td><i>Azerbaijan</i></td><td>AZ</td></tr>
<tr><td><i>Bahamas</i></td><td>BS</td></tr>
<tr><td><i>Bahrain</i></td><td>BH</td></tr>
<tr><td><i>Bangladesh</i></td><td>BD</td></tr>
<tr><td><i>Barbados</i></td><td>BB</td></tr>
<tr><td><i>Belarus</i></td><td>BY</td></tr>
<tr><td><i>Belgium</i></td><td>BE</td></tr>
<tr><td><i>Belize</i></td><td>BZ</td></tr>
<tr><td><i>Benin</i></td><td>BJ</td></tr>
<tr><td><i>Bermuda</i></td><td>BM</td></tr>
<tr><td><i>Bhutan</i></td><td>BT</td></tr>
<tr><td><i>Bolivia, Plurinational State of</i></td><td>BO</td></tr>
<tr><td><i>Bonaire, Sint Eustatius and Saba</i></td><td>BQ</td></tr>
<tr><td><i>Bosnia and Herzegovina</i></td><td>BA</td></tr>
<tr><td><i>Botswana</i></td><td>BW</td></tr>
<tr><td><i>Bouvet Island</i></td><td>BV</td></tr>
<tr><td><i>Brazil</i></td><td>BR</td></tr>
<tr><td><i>British Indian Ocean Territory</i></td><td>IO</td></tr>
<tr><td><i>Brunei Darussalam</i></td><td>BN</td></tr>
<tr><td><i>Bulgaria</i></td><td>BG</td></tr>
<tr><td><i>Burkina Faso</i></td><td>BF</td></tr>
<tr><td><i>Burundi</i></td><td>BI</td></tr>
<tr><td><i>Cambodia</i></td><td>KH</td></tr>
<tr><td><i>Cameroon</i></td><td>CM</td></tr>
<tr><td><i>Canada</i></td><td>CA</td></tr>
<tr><td><i>Cape Verde</i></td><td>CV</td></tr>
<tr><td><i>Cayman Islands</i></td><td>KY</td></tr>
<tr><td><i>Central African Republic</i></td><td>CF</td></tr>
<tr><td><i>Chad</i></td><td>TD</td></tr>
<tr><td><i>Chile</i></td><td>CL</td></tr>
<tr><td><i>China</i></td><td>CN</td></tr>
<tr><td><i>Christmas Island</i></td><td>CX</td></tr>
<tr><td><i>Cocos (Keeling) Islands</i></td><td>CC</td></tr>
<tr><td><i>Colombia</i></td><td>CO</td></tr>
<tr><td><i>Comoros</i></td><td>KM</td></tr>
<tr><td><i>Congo</i></td><td>CG</td></tr>
<tr><td><i>Congo, the Democratic Republic of the</i></td><td>CD</td></tr>
<tr><td><i>Cook Islands</i></td><td>CK</td></tr>
<tr><td><i>Costa Rica</i></td><td>CR</td></tr>
<tr><td><i>Côte d'Ivoire</i></td><td>CI</td></tr>
<tr><td><i>Croatia</i></td><td>HR</td></tr>
<tr><td><i>Cuba</i></td><td>CU</td></tr>
<tr><td><i>Curaçao</i></td><td>CW</td></tr>
<tr><td><i>Cyprus</i></td><td>CY</td></tr>
<tr><td><i>Czech Republic</i></td><td>CZ</td></tr>
<tr><td><i>Denmark</i></td><td>DK</td></tr>
<tr><td><i>Djibouti</i></td><td>DJ</td></tr>
<tr><td><i>Dominica</i></td><td>DM</td></tr>
<tr><td><i>Dominican Republic</i></td><td>DO</td></tr>
<tr><td><i>Ecuador</i></td><td>EC</td></tr>
<tr><td><i>Egypt</i></td><td>EG</td></tr>
<tr><td><i>El Salvador</i></td><td>SV</td></tr>
<tr><td><i>Equatorial Guinea</i></td><td>GQ</td></tr>
<tr><td><i>Eritrea</i></td><td>ER</td></tr>
<tr><td><i>Estonia</i></td><td>EE</td></tr>
<tr><td><i>Ethiopia</i></td><td>ET</td></tr>
<tr><td><i>European Union</i></td><td>EU</td></tr>
<tr><td><i>Falkland Islands (Malvinas)</i></td><td>FK</td></tr>
<tr><td><i>Faroe Islands</i></td><td>FO</td></tr>
<tr><td><i>Fiji</i></td><td>FJ</td></tr>
<tr><td><i>Finland</i></td><td>FI</td></tr>
<tr><td><i>France</i></td><td>FR</td></tr>
<tr><td><i>French Guiana</i></td><td>GF</td></tr>
<tr><td><i>French Polynesia</i></td><td>PF</td></tr>
<tr><td><i>French Southern Territories</i></td><td>TF</td></tr>
<tr><td><i>Gabon</i></td><td>GA</td></tr>
<tr><td><i>Gambia</i></td><td>GM</td></tr>
<tr><td><i>Georgia</i></td><td>GE</td></tr>
<tr><td><i>Germany</i></td><td>DE</td></tr>
<tr><td><i>Ghana</i></td><td>GH</td></tr>
<tr><td><i>Gibraltar</i></td><td>GI</td></tr>
<tr><td><i>Great Britain</i></td><td>GB</td></tr>
<tr><td><i>Greece</i></td><td>GR</td></tr>
<tr><td><i>Greenland</i></td><td>GL</td></tr>
<tr><td><i>Grenada</i></td><td>GD</td></tr>
<tr><td><i>Guadeloupe</i></td><td>GP</td></tr>
<tr><td><i>Guam</i></td><td>GU</td></tr>
<tr><td><i>Guatemala</i></td><td>GT</td></tr>
<tr><td><i>Guernsey</i></td><td>GG</td></tr>
<tr><td><i>Guinea</i></td><td>GN</td></tr>
<tr><td><i>Guinea-Bissau</i></td><td>GW</td></tr>
<tr><td><i>Guyana</i></td><td>GY</td></tr>
<tr><td><i>Haiti</i></td><td>HT</td></tr>
<tr><td><i>Heard Island and McDonald Islands</i></td><td>HM</td></tr>
<tr><td><i>Holy See (Vatican City State)</i></td><td>VA</td></tr>
<tr><td><i>Honduras</i></td><td>HN</td></tr>
<tr><td><i>Hong Kong</i></td><td>HK</td></tr>
<tr><td><i>Hungary</i></td><td>HU</td></tr>
<tr><td><i>Iceland</i></td><td>IS</td></tr>
<tr><td><i>India</i></td><td>IN</td></tr>
<tr><td><i>Indonesia</i></td><td>ID</td></tr>
<tr><td><i>Iran, Islamic Republic of</i></td><td>IR</td></tr>
<tr><td><i>Iraq</i></td><td>IQ</td></tr>
<tr><td><i>Ireland</i></td><td>IE</td></tr>
<tr><td><i>Isle of Man</i></td><td>IM</td></tr>
<tr><td><i>Israel</i></td><td>IL</td></tr>
<tr><td><i>Italy</i></td><td>IT</td></tr>
<tr><td><i>Jamaica</i></td><td>JM</td></tr>
<tr><td><i>Japan</i></td><td>JP</td></tr>
<tr><td><i>Jersey</i></td><td>JE</td></tr>
<tr><td><i>Jordan</i></td><td>JO</td></tr>
<tr><td><i>Kazakhstan</i></td><td>KZ</td></tr>
<tr><td><i>Kenya</i></td><td>KE</td></tr>
<tr><td><i>Kiribati</i></td><td>KI</td></tr>
<tr><td><i>Korea, Democratic People's Republic of</i></td><td>KP</td></tr>
<tr><td><i>Korea, Republic of</i></td><td>KR</td></tr>
<tr><td><i>Kuwait</i></td><td>KW</td></tr>
<tr><td><i>Kyrgyzstan</i></td><td>KG</td></tr>
<tr><td><i>Lao People's Democratic Republic</i></td><td>LA</td></tr>
<tr><td><i>Latvia</i></td><td>LV</td></tr>
<tr><td><i>Lebanon</i></td><td>LB</td></tr>
<tr><td><i>Lesotho</i></td><td>LS</td></tr>
<tr><td><i>Liberia</i></td><td>LR</td></tr>
<tr><td><i>Libya</i></td><td>LY</td></tr>
<tr><td><i>Liechtenstein</i></td><td>LI</td></tr>
<tr><td><i>Lithuania</i></td><td>LT</td></tr>
<tr><td><i>Luxembourg</i></td><td>LU</td></tr>
<tr><td><i>Macao</i></td><td>MO</td></tr>
<tr><td><i>Macedonia, The Former Yugoslav Republic of</i></td><td>MK</td></tr>
<tr><td><i>Madagascar</i></td><td>MG</td></tr>
<tr><td><i>Malawi</i></td><td>MW</td></tr>
<tr><td><i>Malaysia</i></td><td>MY</td></tr>
<tr><td><i>Maldives</i></td><td>MV</td></tr>
<tr><td><i>Mali</i></td><td>ML</td></tr>
<tr><td><i>Malta</i></td><td>MT</td></tr>
<tr><td><i>Marshall Islands</i></td><td>MH</td></tr>
<tr><td><i>Martinique</i></td><td>MQ</td></tr>
<tr><td><i>Mauritania</i></td><td>MR</td></tr>
<tr><td><i>Mauritius</i></td><td>MU</td></tr>
<tr><td><i>Mayotte</i></td><td>YT</td></tr>
<tr><td><i>Mexico</i></td><td>MX</td></tr>
<tr><td><i>Micronesia, Federated States of</i></td><td>FM</td></tr>
<tr><td><i>Moldova, Republic of</i></td><td>MD</td></tr>
<tr><td><i>Monaco</i></td><td>MC</td></tr>
<tr><td><i>Mongolia</i></td><td>MN</td></tr>
<tr><td><i>Montenegro</i></td><td>ME</td></tr>
<tr><td><i>Montserrat</i></td><td>MS</td></tr>
<tr><td><i>Morocco</i></td><td>MA</td></tr>
<tr><td><i>Mozambique</i></td><td>MZ</td></tr>
<tr><td><i>Myanmar</i></td><td>MM</td></tr>
<tr><td><i>Namibia</i></td><td>NA</td></tr>
<tr><td><i>Nauru</i></td><td>NR</td></tr>
<tr><td><i>Nepal</i></td><td>NP</td></tr>
<tr><td><i>Netherlands</i></td><td>NL</td></tr>
<tr><td><i>New Caledonia</i></td><td>NC</td></tr>
<tr><td><i>New Zealand</i></td><td>NZ</td></tr>
<tr><td><i>Nicaragua</i></td><td>NI</td></tr>
<tr><td><i>Niger</i></td><td>NE</td></tr>
<tr><td><i>Nigeria</i></td><td>NG</td></tr>
<tr><td><i>Niue</i></td><td>NU</td></tr>
<tr><td><i>Norfolk Island</i></td><td>NF</td></tr>
<tr><td><i>Northern Mariana Islands</i></td><td>MP</td></tr>
<tr><td><i>Norway</i></td><td>NO</td></tr>
<tr><td><i>Oman</i></td><td>OM</td></tr>
<tr><td><i>Pakistan</i></td><td>PK</td></tr>
<tr><td><i>Palau</i></td><td>PW</td></tr>
<tr><td><i>Palestinian Territory, Occupied</i></td><td>PS</td></tr>
<tr><td><i>Panama</i></td><td>PA</td></tr>
<tr><td><i>Papua New Guinea</i></td><td>PG</td></tr>
<tr><td><i>Paraguay</i></td><td>PY</td></tr>
<tr><td><i>Peru</i></td><td>PE</td></tr>
<tr><td><i>Philippines</i></td><td>PH</td></tr>
<tr><td><i>Pitcairn</i></td><td>PN</td></tr>
<tr><td><i>Poland</i></td><td>PL</td></tr>
<tr><td><i>Portugal</i></td><td>PT</td></tr>
<tr><td><i>Puerto Rico</i></td><td>PR</td></tr>
<tr><td><i>Qatar</i></td><td>QA</td></tr>
<tr><td><i>Réunion</i></td><td>RE</td></tr>
<tr><td><i>Romania</i></td><td>RO</td></tr>
<tr><td><i>Russian Federation</i></td><td>RU</td></tr>
<tr><td><i>Rwanda</i></td><td>RW</td></tr>
<tr><td><i>Saint Barthélemy</i></td><td>BL</td></tr>
<tr><td><i>Saint Helena, Ascension and Tristan da Cunha</i></td><td>SH</td></tr>
<tr><td><i>Saint Kitts and Nevis</i></td><td>KN</td></tr>
<tr><td><i>Saint Lucia</i></td><td>LC</td></tr>
<tr><td><i>Saint Martin (French part)</i></td><td>MF</td></tr>
<tr><td><i>Saint Pierre and Miquelon</i></td><td>PM</td></tr>
<tr><td><i>Saint Vincent and the Grenadines</i></td><td>VC</td></tr>
<tr><td><i>Samoa</i></td><td>WS</td></tr>
<tr><td><i>San Marino</i></td><td>SM</td></tr>
<tr><td><i>Sao Tome and Principe</i></td><td>ST</td></tr>
<tr><td><i>Saudi Arabia</i></td><td>SA</td></tr>
<tr><td><i>Senegal</i></td><td>SN</td></tr>
<tr><td><i>Serbia</i></td><td>RS</td></tr>
<tr><td><i>Seychelles</i></td><td>SC</td></tr>
<tr><td><i>Sierra Leone</i></td><td>SL</td></tr>
<tr><td><i>Singapore</i></td><td>SG</td></tr>
<tr><td><i>Sint Maarten (Dutch part)</i></td><td>SX</td></tr>
<tr><td><i>Slovakia</i></td><td>SK</td></tr>
<tr><td><i>Slovenia</i></td><td>SI</td></tr>
<tr><td><i>Solomon Islands</i></td><td>SB</td></tr>
<tr><td><i>Somalia</i></td><td>SO</td></tr>
<tr><td><i>South Africa</i></td><td>ZA</td></tr>
<tr><td><i>South Georgia and the South Sandwich Islands</i></td><td>GS</td></tr>
<tr><td><i>South Sudan</i></td><td>SS</td></tr>
<tr><td><i>Soviet Union</i></td><td>SU</td></tr>
<tr><td><i>Spain</i></td><td>ES</td></tr>
<tr><td><i>Sri Lanka</i></td><td>LK</td></tr>
<tr><td><i>Sudan</i></td><td>SD</td></tr>
<tr><td><i>Suriname</i></td><td>SR</td></tr>
<tr><td><i>Svalbard and Jan Mayen</i></td><td>SJ</td></tr>
<tr><td><i>Swaziland</i></td><td>SZ</td></tr>
<tr><td><i>Sweden</i></td><td>SE</td></tr>
<tr><td><i>Switzerland</i></td><td>CH</td></tr>
<tr><td><i>Syrian Arab Republic</i></td><td>SY</td></tr>
<tr><td><i>Taiwan, Province of China</i></td><td>TW</td></tr>
<tr><td><i>Tajikistan</i></td><td>TJ</td></tr>
<tr><td><i>Tanzania, United Republic of</i></td><td>TZ</td></tr>
<tr><td><i>Thailand</i></td><td>TH</td></tr>
<tr><td><i>Timor-Leste</i></td><td>TL</td></tr>
<tr><td><i>Togo</i></td><td>TG</td></tr>
<tr><td><i>Tokelau</i></td><td>TK</td></tr>
<tr><td><i>Tonga</i></td><td>TO</td></tr>
<tr><td><i>Trinidad and Tobago</i></td><td>TT</td></tr>
<tr><td><i>Tunisia</i></td><td>TN</td></tr>
<tr><td><i>Turkey</i></td><td>TR</td></tr>
<tr><td><i>Turkmenistan</i></td><td>TM</td></tr>
<tr><td><i>Turks and Caicos Islands</i></td><td>TC</td></tr>
<tr><td><i>Tuvalu</i></td><td>TV</td></tr>
<tr><td><i>Uganda</i></td><td>UG</td></tr>
<tr><td><i>Ukraine</i></td><td>UA</td></tr>
<tr><td><i>United Arab Emirates</i></td><td>AE</td></tr>
<tr><td><i>United Kingdom</i></td><td>GB</td></tr>
<tr><td><i>United States</i></td><td>US</td></tr>
<tr><td><i>United States Minor Outlying Islands</i></td><td>UM</td></tr>
<tr><td><i>Uruguay</i></td><td>UY</td></tr>
<tr><td><i>Uzbekistan</i></td><td>UZ</td></tr>
<tr><td><i>Vanuatu</i></td><td>VU</td></tr>
<tr><td><i>Venezuela, Bolivarian Republic of</i></td><td>VE</td></tr>
<tr><td><i>Viet Nam</i></td><td>VN</td></tr>
<tr><td><i>Virgin Islands, British</i></td><td>VG</td></tr>
<tr><td><i>Virgin Islands, U.S.</i></td><td>VI</td></tr>
<tr><td><i>Wallis and Futuna</i></td><td>WF</td></tr>
<tr><td><i>Western Sahara</i></td><td>EH</td></tr>
<tr><td><i>Yemen</i></td><td>YE</td></tr>
<tr><td><i>Zambia</i></td><td>ZM</td></tr>
<tr><td><i>Zimbabwe</i></td><td>ZW</td></tr>
</table>
]]></content:encoded>
<link>https://perfectmail.com/kb/top_domain_country_codes</link>
<pubDate>Mon, 03 Dec 2012 19:03:20 +0000</pubDate>
<category>Filtering</category>
<wfw:commentRss>https://perfectmail.com/kb/top_domain_country_codes,commentrss</wfw:commentRss>
</item>
<item>
<title>Content Filtering</title>
<description>Use Content Filtering (Filters &gt; Content) to identify messages containing content and language that is not acceptable to your organization. When adding entries to this table, please take some time to consider the various instances.

The content of each message is checked for the listed words and phrases. The word list is case-insensitive. Your words will be automatically converted to the simplest version our filter can handle, including character case conversion and stripping/converting of any characters that cannot be understood by the filter.

Two lists are implemented on your server: a system word list maintained by our staff and a local word list that can be maintained by your local e-mail support staff.

Scoring for specific phrases is generally different for the e-mail subject and other headers than it is for the e-mail body. Words and phrases that may be high indicators of spam when contained in the subject may be used frequently in legitimate e-mail bodies. It is important to use caution when managing content filtering.

Try to avoid very simple words that may appear in messages or in HTML constructs contained in e-mail; for example a word such as "aaaa" would be a very bad word choice.

Bonus Scoring

You can give negative values to words and phrases to drive down the score of known good content. If your business uses terms and phrases that are unlikely to appear in spam messages, add them here with negative scores to mark known good content.

Anti-Obfuscation

Anti-Obfuscation is a technique that identifies attempts to disguise words. For example: Anti-Obfuscation maps \/ 1 @ g r @ to Viagra, &gt;&lt;@n@x to Xanax, etc.  The word score is scaled to match the measure of obfuscation. This technique is very successful, but it can sometimes give erroneous results if the listed word is similar to other non-offensive words; so use this with care.

Suffix Matching

Suffix Matching is a technique that attempts to match a root word to variations of that word by suffix. For example, applying Suffix Matching to the word "run" will match variations "runs", "runned", "running", etc.

If the Suffix Matching option is applied to a phrase, then Suffix Matching will only apply to the last word in the phrase.

A Warning on Anti-Obfuscation

Understand the impact of Anti-Obfuscation and Suffix Matching when matching phrases in the content filters. These techniques try and match words and phrases by matching possible variations that may be used to try and avoid detection.

This may become a problem when you are trying catch a specific phrase. For example, if you try and match the word "C A S I N O" when looking for spam and have Anti-Obfuscation turned on it will also match "casino", which may result in inappropriate scoring. This may become more problematic when both Anti-Obfuscation and Suffix Matching are used.

Anti-Obfuscation and Suffix Matching are powerful tools that also require some consideration.

Updating the Content Filters

The fields for each word/phrase are in two groups for the Subject and other headers and the message body.




Enable - Enable scoring for this word.
Score - For each instance of this word score this amount.
Rjct - If this word is found reject the message. (Score=99)
Suf - Enable the Variable Suffix Engine. This engine matches against variations of word suffixes. For example, if you wanted to score the word jump the Variable Suffix engine would also catch: jumps, jumping, jumped, jumpy, jumper, etc.
Obf - Enable the Anti-Obfuscation Engine for matching structural word variations. Spammers will attempt to change the structure of words so they are still readable by people, but difficult to recognize by machines. Depending on the amount of obfuscation found, the score of the found word will increase by the obfuscation factor. Our Anti-Obfuscation Engine is very good at catching and scoring for such attempts. However, this feature should be used with caution.


</description>
<content:encoded><![CDATA[<p>Use <i>Content Filtering</i> (<b>Filters &gt; Content</b>) to identify messages containing content and language that is not acceptable to your organization. When adding entries to this table, please take some time to consider the various instances.</p>

<p>The content of each message is checked for the listed words and phrases. The word list is case-insensitive. Your words will be automatically converted to the simplest version our filter can handle, including character case conversion and stripping/converting of any characters that cannot be understood by the filter.</p>

<p>Two lists are implemented on your server: a <i>system word list</i> maintained by our staff and a <i>local word list</i> that can be maintained by your local e-mail support staff.</p>

<p>Scoring for specific phrases is generally different for the e-mail <i>subject</i> and other headers than it is for the e-mail <i>body</i>. Words and phrases that may be high indicators of spam when contained in the subject may be used frequently in legitimate e-mail bodies. It is important to use caution when managing content filtering.</p>

<p>Try to avoid very simple words that may appear in messages or in HTML constructs contained in e-mail; for example a word such as "aaaa" would be a very bad word choice.</p>

<h2>Bonus Scoring</h2>

<p>You can give <b>negative values</b> to words and phrases to drive down the score of known good content. If your business uses terms and phrases that are unlikely to appear in spam messages, add them here with negative scores to mark known good content.</p>

<h2>Anti-Obfuscation</h2>

<p>Anti-Obfuscation is a technique that identifies attempts to disguise words. For example: <br>Anti-Obfuscation maps <code>\/ 1 @ g r @</code> to <code>Viagra</code>, <code>&gt;&lt;@n@x</code> to <code>Xanax</code>, etc.  The word score is scaled to match the measure of obfuscation. This technique is very successful, but it can sometimes give erroneous results if the listed word is similar to other non-offensive words; so use this with care.</p>

<h2>Suffix Matching</h2>

<p>Suffix Matching is a technique that attempts to match a <i>root word</i> to variations of that word <i>by suffix</i>. For example, applying Suffix Matching to the word "run" will match variations "runs", "runned", "running", etc.</p>

<p>If the Suffix Matching option is applied to a <i>phrase</i>, then Suffix Matching will only apply to the <i>last word</i> in the phrase.</p>

<h2>A Warning on Anti-Obfuscation</h2>

<p>Understand the impact of <b>Anti-Obfuscation</b> and <b>Suffix Matching</b> when matching phrases in the content filters. These techniques try and match words and phrases by matching <i>possible variations</i> that may be used to try and avoid detection.</p>

<p>This may become a problem when you are trying catch a <i>specific phrase</i>. For example, if you try and match the word "C A S I N O" when looking for spam and have Anti-Obfuscation turned on it will also match "casino", which may result in inappropriate scoring. This may become more problematic when <i>both</i> Anti-Obfuscation and Suffix Matching are used.</p>

<p>Anti-Obfuscation and Suffix Matching are powerful tools that also require some consideration.</p>

<h2>Updating the Content Filters</h2>

<p>The fields for each word/phrase are in two groups for the <i>Subject and other headers</i> and the message <i>body</i>.

<center><img src="http://perfectmail.com/media/FilterOptions.png"></center>

<ul>
<li><i>Enable</i> - Enable scoring for this word.<br><br>
<li><i>Score</i> - For each instance of this word score this amount.<br><br>
<li><i>Rjct</i> - If this word is found reject the message. (Score=99)<br><br>
<li><i>Suf</i> - Enable the <i>Variable Suffix Engine</i>. This engine matches against variations of word suffixes. For example, if you wanted to score the word <i>jump</i> the <i>Variable Suffix</i> engine would also catch: <i>jumps</i>, <i>jumping</i>, <i>jumped</i>, <i>jumpy</i>, <i>jumper</i>, etc.<br><br>
<li><i>Obf</i> - Enable the <i>Anti-Obfuscation Engine</i> for matching structural word variations. Spammers will attempt to change the structure of words so they are still <i>readable</i> by people, but difficult to recognize by machines. Depending on the amount of obfuscation found, the score of the found word will increase by the obfuscation factor. Our <i>Anti-Obfuscation Engine</i> is very good at catching and scoring for such attempts. However, this feature should be used with caution.
</ul>
</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/content_filtering</link>
<pubDate>Thu, 29 Nov 2012 17:35:00 +0000</pubDate>
<category>Filtering</category>
<wfw:commentRss>https://perfectmail.com/kb/content_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>PerfectMail Advanced Content Filtering</title>
<description>PerfectMail has a number of advanced analysis features, including features in the Content Filters (Filters &gt; Content) to identify obfuscated words and phrases in the subject and body of an e-mail.

Anti-Obfuscation

Anti-Obfuscation is a technique that identifies attempts to disguise words. For example: Anti-Obfuscation maps \/ 1 @ g r @ to Viagra, &gt;&lt;@n@x to Xanax, etc.  The word score is scaled to match the measure of obfuscation. This technique is very successful, but it can sometimes give erroneous results if the listed word is similar to other non-offensive words; so use this with care.

Suffix Matching

Suffix Matching is a technique that attempts to match a root word to variations of that word by suffix. For example, applying Suffix Matching to the word "run" will match variations "runs", "runned", "running", etc.

If the Suffix Matching option is applied to a phrase, then Suffix Matching will only apply to the last word in the phrase.

A Warning on Anti-Obfuscation

Understand the impact of Anti-Obfuscation and Suffix Matching when matching phrases in the content filters. These techniques try and match words and phrases by matching possible variations that may be used to try and avoid detection.

This may become a problem when you are trying catch a specific phrase. For example, if you try and match the word "C A S I N O" when looking for spam and have Anti-Obfuscation turned on it will also match "casino", which may result in inappropriate scoring. This may become more problematic when both Anti-Obfuscation and Suffix Matching are used.

Anti-Obfuscation and Suffix Matching are powerful tools that also require some consideration.

Updating the Content Filters

The fields for each word/phrase are in two groups for the Subject and other headers and the message body.




Enable - Enable scoring for this word.
Score - For each instance of this word score this amount.
Rjct - If this word is found reject the message. (Score=99)
Suf - Enable the Variable Suffix Engine. This engine matches against variations of word suffixes. For example, if you wanted to score the word jump the Variable Suffix engine would also catch: jumps, jumping, jumped, jumpy, jumper, etc.
Obf - Enable the Anti-Obfuscation Engine for matching structural word variations. Spammers will attempt to change the structure of words so they are still readable by people, but difficult to recognize by machines. Depending on the amount of obfuscation found, the score of the found word will increase by the obfuscation factor. Our Anti-Obfuscation Engine is very good at catching and scoring for such attempts. However, this feature should be used with caution.


</description>
<content:encoded><![CDATA[<p>PerfectMail has a number of <i>advanced analysis</i> features, including features in the <i>Content Filters</i> (Filters &gt; Content) to identify obfuscated words and phrases in the subject and body of an e-mail.</p>

<h2>Anti-Obfuscation</h2>

<p>Anti-Obfuscation is a technique that identifies attempts to disguise words. For example: <br>Anti-Obfuscation maps <code>\/ 1 @ g r @</code> to <code>Viagra</code>, <code>&gt;&lt;@n@x</code> to <code>Xanax</code>, etc.  The word score is scaled to match the measure of obfuscation. This technique is very successful, but it can sometimes give erroneous results if the listed word is similar to other non-offensive words; so use this with care.</p>

<h2>Suffix Matching</h2>

<p>Suffix Matching is a technique that attempts to match a <i>root word</i> to variations of that word <i>by suffix</i>. For example, applying Suffix Matching to the word "run" will match variations "runs", "runned", "running", etc.</p>

<p>If the Suffix Matching option is applied to a <i>phrase</i>, then Suffix Matching will only apply to the <i>last word</i> in the phrase.</p>

<h2>A Warning on Anti-Obfuscation</h2>

<p>Understand the impact of <b>Anti-Obfuscation</b> and <b>Suffix Matching</b> when matching phrases in the content filters. These techniques try and match words and phrases by matching <i>possible variations</i> that may be used to try and avoid detection.</p>

<p>This may become a problem when you are trying catch a <i>specific phrase</i>. For example, if you try and match the word "C A S I N O" when looking for spam and have Anti-Obfuscation turned on it will also match "casino", which may result in inappropriate scoring. This may become more problematic when <i>both</i> Anti-Obfuscation and Suffix Matching are used.</p>

<p>Anti-Obfuscation and Suffix Matching are powerful tools that also require some consideration.</p>

<h2>Updating the Content Filters</h2>

<p>The fields for each word/phrase are in two groups for the <i>Subject and other headers</i> and the message <i>body</i>.

<center><img src="http://perfectmail.com/media/FilterOptions.png"></center>

<ul>
<li><i>Enable</i> - Enable scoring for this word.<br><br>
<li><i>Score</i> - For each instance of this word score this amount.<br><br>
<li><i>Rjct</i> - If this word is found reject the message. (Score=99)<br><br>
<li><i>Suf</i> - Enable the <i>Variable Suffix Engine</i>. This engine matches against variations of word suffixes. For example, if you wanted to score the word <i>jump</i> the <i>Variable Suffix</i> engine would also catch: <i>jumps</i>, <i>jumping</i>, <i>jumped</i>, <i>jumpy</i>, <i>jumper</i>, etc.<br><br>
<li><i>Obf</i> - Enable the <i>Anti-Obfuscation Engine</i> for matching structural word variations. Spammers will attempt to change the structure of words so they are still <i>readable</i> by people, but difficult to recognize by machines. Depending on the amount of obfuscation found, the score of the found word will increase by the obfuscation factor. Our <i>Anti-Obfuscation Engine</i> is very good at catching and scoring for such attempts. However, this feature should be used with caution.
</ul>
</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/advanced_content_filtering</link>
<pubDate>Thu, 29 Nov 2012 17:31:59 +0000</pubDate>
<category>Filtering</category>
<wfw:commentRss>https://perfectmail.com/kb/advanced_content_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>PerfectMail Updates and Upgrades</title>
<description>- KB: PerfectMail Software Development Process
- KB: PerfectMail Updates and Upgrades

PerfectMail is an actively developed product with regular releases to rules, signatures, block-lists and code updates.

Updates: Updates to PerfectMail occur on a regular and ongoing basis. Your server will check for updates to its spam and virus settings every 10 to 15 minutes to quickly adjust how it reacts to spam threats.

Upgrades: Periodic code releases are made to add more tools or make improvements to our anti-spam engine.

Notes on Upgrades

It takes approximately 30 seconds to apply a PerfectMail upgrade; no e-mail will be lost. The upgrade process consists of: a download phase, where the new release is transferred to your server; and an upgrade phrase, where the new release is installed. We have structured the upgrade process to minimize downtime and take advantage of existing e-mail practices to make the upgrade process invisible to your users and e-mail peers.


PerfectMail support staff will be available for 72 business hours after an upgrade. 
Normally, PerfectMail upgrades will be made between Monday morning and Wednesday evening; ensuring the availability of PerfectMail support staff, customer support staff and a user population to identify any issues that may arise. However, if a significant bug is found we may opt to publish a maintenance update outside of this window. In any case, support staff will be available for 72 hours after the upgrade. 
Your PerfectMail server will send you an upgrade notification e-mail after the upgrade. 


The Upgrade Process

We provide a 72 hour post install support availability window, where staff
must be available to deal with any upgrade issues.

The upgrades themselves occur seamlessly on your PerfectMail&trade; server. The latest upgrade is downloaded to your server; after which mail services are suspended  and the upgrade is applied. The total downtime is usually about 30 seconds, with no loss of e-mail.

After the upgrade is finished your PerfectMail&trade; server will send you an e-mail notification.

Staggered Upgrade Scheme

We have a staggered upgrade release schedule to minimize any disruption to your Mail Server. Prior to general release PerfectMail is tested on our Development, Alpha and Beta sites. After successful deployments through these three server groups it becomes available for general release, being pushed to upgrade groups: 'A', 'B' and 'C' in a progressive release schedule.

'A' sites receive their updates on the Monday of the general release; 'B' and 'C' sites receive their upgrades later in the week, or even in the following week.

At any time, if there are any reported issues they are assessed and appropriate actions are taken.
</description>
<content:encoded><![CDATA[- KB: PerfectMail Software Development Process
- KB: PerfectMail Updates and Upgrades

<p><i>PerfectMail</i> is an actively developed product with regular releases to rules, signatures, block-lists and code updates.</p>

<p><b>Updates:</b> Updates to <i>PerfectMail</i> occur on a regular and ongoing basis. Your server will check for updates to its spam and virus settings every 10 to 15 minutes to quickly adjust how it reacts to spam threats.</p>

<p><b>Upgrades:</b> Periodic code releases are made to add more tools or make improvements to our anti-spam engine.</p>

<h2>Notes on Upgrades</h2>

<p>It takes approximately 30 seconds to apply a PerfectMail upgrade; no e-mail will be lost. The upgrade process consists of: a download phase, where the new release is transferred to your server; and an upgrade phrase, where the new release is installed. We have structured the upgrade process to minimize downtime and take advantage of existing e-mail practices to make the upgrade process invisible to your users and e-mail peers.</p>

<p><ol>
<li>PerfectMail support staff will be available for 72 business hours after an upgrade. 
<li>Normally, PerfectMail upgrades will be made between Monday morning and Wednesday evening; ensuring the availability of PerfectMail support staff, customer support staff and a user population to identify any issues that may arise. However, if a significant bug is found we may opt to publish a maintenance update outside of this window. In any case, support staff will be available for 72 hours after the upgrade. 
<li>Your PerfectMail server will send you an upgrade notification e-mail after the upgrade. 
</ol></p>

<h2>The Upgrade Process</h2>

<p>We provide a 72 hour post install support availability window, where staff
must be available to deal with any upgrade issues.</p>

<p>The upgrades themselves occur seamlessly on your PerfectMail&trade; server. The latest upgrade is downloaded to your server; after which mail services are suspended  and the upgrade is applied. The total downtime is usually about 30 seconds, with no loss of e-mail.</p>

<p>After the upgrade is finished your PerfectMail&trade; server will send you an e-mail notification.</p>

<h2>Staggered Upgrade Scheme</h2>

<p>We have a staggered upgrade release schedule to minimize any disruption to your Mail Server. Prior to general release PerfectMail is tested on our Development, Alpha and Beta sites. After successful deployments through these three server groups it becomes available for general release, being pushed to upgrade groups: 'A', 'B' and 'C' in a progressive release schedule.</p>

<p>'A' sites receive their updates on the Monday of the general release; 'B' and 'C' sites receive their upgrades later in the week, or even in the following week.</p>

<p>At any time, if there are any reported issues they are assessed and appropriate actions are taken.</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/perfectmail_upgrades_updates</link>
<pubDate>Fri, 23 Nov 2012 16:45:17 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/perfectmail_upgrades_updates,commentrss</wfw:commentRss>
</item>
<item>
<title>PerfectMail Software Development Process</title>
<description>Each developer is responsible for their code. Development is done in a modular method with a central co-ordinating module. Each developer is responsible for all aspects of their modules. The PerfectMail&trade; product architect is responsible for co-ordinating all development efforts and supervises the testing and integration of modules.

We perform regular peer-level code reviews. Code reviews give an opportunity to search for potential bugs; facilitate the exchange of ideas pertaining to programming style; and help identify potential system wide improvements.

All code is passed through code analysis software. We use the Coverity&reg; Quality Advisor (www.coverity.com) to identify code quality defects while in development.

Prior to coding, design decisions are discussed and debated. Functionality, stress points, boundary conditions, best/worst case scenarios, etc. are established for design changes.

Metrics are established to measure the effectiveness of a module and performance goals are set. At this point the module is re-evaluated for feasibility and impact.

On completion a module must go through development and Alpha testing. During development testing the module must demonstrate programmatic and functional stability and scalability. During Alpha testing the module is placed in a production environment. We maintain two alpha servers servicing approximately 80 domains; including our own domains.

For new modules or significant changes to modules, the modules are initially delivered impotent; they log what they would have done instead of actually making decisions. After a test has proven itself and the metrics have met our goals we turn it on in the next maintenance release.

We currently have 11 beta test sites servicing approximately 600 domains. They consist of various sizes and business types. Site traffic ranges from a few hundred to 1.5 million connections per day.

After Beta release we actively monitor these sites for any issues that may occur. After a period of clean behavior we make a determination of whether to release our software. Software release typically occurs on the following Monday.

Major releases should occur every two years. PM-4.0 should be available next summer.

Minor releases should occur every 2-4 months, depending on our development cycle.

Minor improvements are included in our Maintenance releases. Maintenance releases occur as needed. Spam is constantly evolving. Our maintenance releases generally occur every 2-4 weeks, depending on need.</description>
<content:encoded><![CDATA[<p>Each developer is responsible for their code. Development is done in a modular method with a central co-ordinating module. Each developer is responsible for all aspects of their modules. The PerfectMail&trade; product architect is responsible for co-ordinating all development efforts and supervises the testing and integration of modules.</p>

<p>We perform regular peer-level code reviews. Code reviews give an opportunity to search for potential bugs; facilitate the exchange of ideas pertaining to programming style; and help identify potential system wide improvements.</p>

<p>All code is passed through code analysis software. We use the Coverity&reg; Quality Advisor (<a href="http://www.coverity.com">www.coverity.com</a>) to identify code quality defects while in development.</p>

<p>Prior to coding, design decisions are discussed and debated. Functionality, stress points, boundary conditions, best/worst case scenarios, etc. are established for design changes.</p>

<p>Metrics are established to measure the effectiveness of a module and performance goals are set. At this point the module is re-evaluated for feasibility and impact.</p>

<p>On completion a module must go through development and Alpha testing. During development testing the module must demonstrate programmatic and functional stability and scalability. During Alpha testing the module is placed in a production environment. We maintain two alpha servers servicing approximately 80 domains; including our own domains.</p>

<p>For new modules or significant changes to modules, the modules are initially delivered impotent; they log what they would have done instead of actually making decisions. After a test has proven itself and the metrics have met our goals we turn it on in the next maintenance release.</p>

<p>We currently have 11 beta test sites servicing approximately 600 domains. They consist of various sizes and business types. Site traffic ranges from a few hundred to 1.5 million connections per day.</p>

<p>After Beta release we actively monitor these sites for any issues that may occur. After a period of clean behavior we make a determination of whether to release our software. Software release typically occurs on the following Monday.</p>

<p>Major releases should occur every two years. PM-4.0 should be available next summer.</p>

<p>Minor releases should occur every 2-4 months, depending on our development cycle.</p>

<p>Minor improvements are included in our Maintenance releases. Maintenance releases occur as needed. Spam is constantly evolving. Our maintenance releases generally occur every 2-4 weeks, depending on need.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/perfectmail_software_development_process</link>
<pubDate>Fri, 23 Nov 2012 16:43:19 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/perfectmail_software_development_process,commentrss</wfw:commentRss>
</item>
<item>
<title>Filtering E-mail with Evolution&amp;trade;</title>
<description>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the X-Spam-Flag and X-Spam-Level e-mail headers. These headers can be used to filter spam with your e-mail client.

To filter e-mail flagged as spam you need to create Filter Rules. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.

The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.

How to Configure Evolution&trade; Filters

Ximian Evolution&trade; is an email client for Linux similar to Microsoft Outlook&trade;. It is installed by many Linux&trade; distributions including Red Hat&trade;, Fedora&trade;, and SuSE Linux&trade;. Evolution&trade; has the ability to filter on an arbitrary header as well as on the send and receive addresses.


Click "Inbox" to display the Inbox.
Click "Edit" and select "Message Filters". (Sometimes "Filters is located under "Tools".)
In the Filters window, click "Add".
Enter a name for the filter under "Rule name".
Under "Find items that meet the following conditions", choose "Specific header" in the leftmost button menu; in the field to the right of "Specific header", enter "X-Spam-Flag"; change the button beside this to read "is"; and enter "YES" in the last field.
Under "Then", choose "Move to Folder".
Click "click here to select a folder".
Click "New", enter SPAM as the folder name, select "Local Folders", and then click "OK" for each window until you get back to the main window..

</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the <i>X-Spam-Flag</i> and <i>X-Spam-Level</i> e-mail headers. These headers can be used to filter spam with your e-mail client.</p>

<p>To filter e-mail flagged as spam you need to create <i>Filter Rules</i>. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.</p>

<p>The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.</p>

<h2>How to Configure Evolution&trade; Filters</h2>

<p>Ximian Evolution&trade; is an email client for Linux similar to Microsoft Outlook&trade;. It is installed by many Linux&trade; distributions including Red Hat&trade;, Fedora&trade;, and SuSE Linux&trade;. Evolution&trade; has the ability to filter on an arbitrary header as well as on the send and receive addresses.</p>

<p><ol>
<li>Click "Inbox" to display the Inbox.
<li>Click "Edit" and select "Message Filters". (Sometimes "Filters is located under "Tools".)
<li>In the Filters window, click "Add".
<li>Enter a name for the filter under "Rule name".
<li>Under "Find items that meet the following conditions", choose "Specific header" in the leftmost button menu; in the field to the right of "Specific header", enter "X-Spam-Flag"; change the button beside this to read "is"; and enter "YES" in the last field.
<li>Under "Then", choose "Move to Folder".
<li>Click "click here to select a folder".
<li>Click "New", enter SPAM as the folder name, select "Local Folders", and then click "OK" for each window until you get back to the main window..
</ol>
</p>]]></content:encoded>
<link>https://perfectmail.com/kb/evolution_email_filtering</link>
<pubDate>Fri, 23 Nov 2012 16:27:06 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/evolution_email_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Filtering E-mail with Macintosh OS X&amp;trade;</title>
<description>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the X-Spam-Flag and X-Spam-Level e-mail headers. These headers can be used to filter spam with your e-mail client.

To filter e-mail flagged as spam you need to create Filter Rules. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.

The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.

How to Configure Macintosh OS X&trade; Filters

Macintosh OS X&trade;'s built-in Mail program can create filters based on custom headers.


In the menu bar, click 'Mailbox' then 'New Mailbox' and create the mailbox you want the Spam to end up in.
In the menu bar, click 'Mail' then 'Preferences...'
Click 'Rules' then 'Create Rule'.
Add a description of the rule, then click the 'From' Criteria, then click 'Expert...'
In the Header: field enter 'X-Spam-Flag', click 'Add Header' and 'OK'
Now click 'From' and select 'X-Spam-Flag'. Select 'Contains' in the next box and enter 'Yes' in the third Criteria box.
In the Action section, check 'Transfer to mailbox' and select the desired mailbox. Click 'OK'.
Adjust the rule priorities if you want, and dismiss the Mail Preferences dialog box.
The next time you check your mail, check to see if any messages were automatically filtered into your Spam mailbox!

</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the <i>X-Spam-Flag</i> and <i>X-Spam-Level</i> e-mail headers. These headers can be used to filter spam with your e-mail client.</p>

<p>To filter e-mail flagged as spam you need to create <i>Filter Rules</i>. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.</p>

<p>The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.</p>

<h2>How to Configure Macintosh OS X&trade; Filters</h2>

<p>Macintosh OS X&trade;'s built-in Mail program can create filters based on custom headers.</p>

<p><ol>
<li>In the menu bar, click 'Mailbox' then 'New Mailbox' and create the mailbox you want the Spam to end up in.
<li>In the menu bar, click 'Mail' then 'Preferences...'
<li>Click 'Rules' then 'Create Rule'.
<li>Add a description of the rule, then click the 'From' Criteria, then click 'Expert...'
<li>In the Header: field enter 'X-Spam-Flag', click 'Add Header' and 'OK'
<li>Now click 'From' and select 'X-Spam-Flag'. Select 'Contains' in the next box and enter 'Yes' in the third Criteria box.
<li>In the Action section, check 'Transfer to mailbox' and select the desired mailbox. Click 'OK'.
<li>Adjust the rule priorities if you want, and dismiss the Mail Preferences dialog box.
<li>The next time you check your mail, check to see if any messages were automatically filtered into your Spam mailbox!
</ol></p>
]]></content:encoded>
<link>https://perfectmail.com/kb/macintosh_os_x_email_filtering</link>
<pubDate>Fri, 23 Nov 2012 16:25:00 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/macintosh_os_x_email_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Filtering E-mail with Outlook Express&amp;trade; for Macintosh&amp;trade;</title>
<description>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the X-Spam-Flag and X-Spam-Level e-mail headers. These headers can be used to filter spam with your e-mail client.

To filter e-mail flagged as spam you need to create Filter Rules. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.

The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.

How to Configure Outlook Express&trade; for Macintosh&trade; Filters

The instructions are the same as for Outlook Express 4.5 and 5.x for Mac, but the menu item under Tools is called "Mail Rules" in version 4.5 and "Rules" in version 5.x. Also, there's no choice between POP/IMAP. Note: if you are sending messages found by this rule to a special mail folder, you must already have created the destination folder before you create the rule.


From the menu bar, choose Tools; then "Rules" or "Mail Rules" depending on your Outlook Express Version (5.x and 4.5 respectively.
Select POP, and then hit "new" for a new rule.
Under the section marked "If", choose "specific header" and then type or paste in the name of the header, which is "X-Spam-Flag".
Under "Contains:" type in Yes.
In the section marked "Then", specify an action -- move to a new folder, change its status or color, as you see fit. Note that we do not recommend simply deleting messages found by this rule.
The Enabled box needs to be checked in order for this rule to be active - it will be checked by default.

</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the <i>X-Spam-Flag</i> and <i>X-Spam-Level</i> e-mail headers. These headers can be used to filter spam with your e-mail client.</p>

<p>To filter e-mail flagged as spam you need to create <i>Filter Rules</i>. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.</p>

<p>The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.</p>

<h2>How to Configure Outlook Express&trade; for Macintosh&trade; Filters</h2>

<p>The instructions are the same as for Outlook Express 4.5 and 5.x for Mac, but the menu item under Tools is called "Mail Rules" in version 4.5 and "Rules" in version 5.x. Also, there's no choice between POP/IMAP. Note: if you are sending messages found by this rule to a special mail folder, you must already have created the destination folder before you create the rule.</p>

<p><ol>
<li>From the menu bar, choose Tools; then "Rules" or "Mail Rules" depending on your Outlook Express Version (5.x and 4.5 respectively.
<li>Select POP, and then hit "new" for a new rule.
<li>Under the section marked "If", choose "specific header" and then type or paste in the name of the header, which is "X-Spam-Flag".
<li>Under "Contains:" type in Yes.
<li>In the section marked "Then", specify an action -- move to a new folder, change its status or color, as you see fit. Note that we do not recommend simply deleting messages found by this rule.
<li>The Enabled box needs to be checked in order for this rule to be active - it will be checked by default.
</ol></p>
]]></content:encoded>
<link>https://perfectmail.com/kb/outlook_express_macintosh_email_filtering</link>
<pubDate>Fri, 23 Nov 2012 16:21:40 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/outlook_express_macintosh_email_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Filtering E-mail with Netscape&amp;trade;</title>
<description>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the X-Spam-Flag and X-Spam-Level e-mail headers. These headers can be used to filter spam with your e-mail client.

To filter e-mail flagged as spam you need to create Filter Rules. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.

The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.

How to Configure Netscape&trade; Filtering

Netscape 6.2.1 does not allow you to create custom filters, so users of this version are unable to take advantage of the special headers used in their mail client software at this time.

Netscape 4.7.8 allows you to create a custom filter. You can supply the special x-header information to Netscape 4.7.8 by doing the following:


In the pull-down bar at the top of your Netscape 4.78 window, go to "Edit: Message Filters". A new window will open.
Click "New". Click "Advanced". A new window will open.
Enter "X-Spam-Flag", click "Add", and click "OK". The latest new window will close.
In the pull-down list, select "X-Spam-Flag".
In the "contains" box, enter "X-Spam-Flag: Yes".
In the "Perform this action" pull-down list, select "move to folder".
Click "new folder" and create a Spam folder. It should then be selected in the pulldown list of your folders.
Click OK.
The next time you check your mail, check to see if any messages were automatically filtered into your Spam folder!
</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the <i>X-Spam-Flag</i> and <i>X-Spam-Level</i> e-mail headers. These headers can be used to filter spam with your e-mail client.</p>

<p>To filter e-mail flagged as spam you need to create <i>Filter Rules</i>. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.</p>

<p>The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.</p>

<h2>How to Configure Netscape&trade; Filtering</h2>

<p>Netscape 6.2.1 does not allow you to create custom filters, so users of this version are unable to take advantage of the special headers used in their mail client software at this time.</p>

<p>Netscape 4.7.8 allows you to create a custom filter. You can supply the special x-header information to Netscape 4.7.8 by doing the following:</p>

<p><ol>
<li>In the pull-down bar at the top of your Netscape 4.78 window, go to "Edit: Message Filters". A new window will open.
<li>Click "New". Click "Advanced". A new window will open.
<li>Enter "X-Spam-Flag", click "Add", and click "OK". The latest new window will close.
<li>In the pull-down list, select "X-Spam-Flag".
<li>In the "contains" box, enter "X-Spam-Flag: Yes".
<li>In the "Perform this action" pull-down list, select "move to folder".
<li>Click "new folder" and create a Spam folder. It should then be selected in the pulldown list of your folders.
<li>Click OK.
<li>The next time you check your mail, check to see if any messages were automatically filtered into your Spam folder!
</ol></p>]]></content:encoded>
<link>https://perfectmail.com/kb/netscape_email_filtering</link>
<pubDate>Fri, 23 Nov 2012 16:17:59 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/netscape_email_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Filtering E-mail with Microsoft Outlook 2002&amp;trade;</title>
<description>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the X-Spam-Flag and X-Spam-Level e-mail headers. These headers can be used to filter spam with your e-mail client.

To filter e-mail flagged as spam you need to create Filter Rules. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.

The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.

How to Configure Microsoft Outlook 2002&trade; Filters

Microsoft Outlook 2002&trade; does not have the ability to filter spam itself, but it has filtering "rules" that we can use. The Rules Wizard will only appear in the Tools menu when the Inbox is selected, so choose the Inbox before you try to add a filter.


Select "Inbox" in the Folder List.
Click "Tools" and select "Rules Wizard".
Click "New" to create a new rule.
Check "Start from a blank rule" and select "Check messages when they arrive". Click "Next".
Check "with specific words in the message header".
In the rule description, click "specific words".
Under Specify a word or phrase to search for in the message header, enter "X-Spam-Flag: YES" to put spam into your "Spam" folder". Click "Add", then "OK", and finally "Next".
Under "What do you want to do with the message?", check "move it to the specified folder".
In the rule description, click "specified".
Under Choose a folder, click "New".
Enter "Spam" as the name and click "OK"
Select "Spam" under Personal Folders (click the plus sign to open Personal Folders if necessary) and click "OK", then click "Next" twice.
Click "Finish".

</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the <i>X-Spam-Flag</i> and <i>X-Spam-Level</i> e-mail headers. These headers can be used to filter spam with your e-mail client.</p>

<p>To filter e-mail flagged as spam you need to create <i>Filter Rules</i>. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.</p>

<p>The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.</p>

<h2>How to Configure Microsoft Outlook 2002&trade; Filters</h2>

<p>Microsoft Outlook 2002&trade; does not have the ability to filter spam itself, but it has filtering "rules" that we can use. The Rules Wizard will only appear in the Tools menu when the Inbox is selected, so choose the Inbox before you try to add a filter.</p>

<p><ol>
<li>Select "Inbox" in the Folder List.
<li>Click "Tools" and select "Rules Wizard".
<li>Click "New" to create a new rule.
<li>Check "Start from a blank rule" and select "Check messages when they arrive". Click "Next".
<li>Check "with specific words in the message header".
<li>In the rule description, click "specific words".
<li>Under Specify a word or phrase to search for in the message header, enter "X-Spam-Flag: YES" to put spam into your "Spam" folder". Click "Add", then "OK", and finally "Next".
<li>Under "What do you want to do with the message?", check "move it to the specified folder".
<li>In the rule description, click "specified".
<li>Under Choose a folder, click "New".
<li>Enter "Spam" as the name and click "OK"
<li>Select "Spam" under Personal Folders (click the plus sign to open Personal Folders if necessary) and click "OK", then click "Next" twice.
<li>Click "Finish".
</ol></p>
]]></content:encoded>
<link>https://perfectmail.com/kb/microsoft_outlook_2002_email_filtering</link>
<pubDate>Fri, 23 Nov 2012 16:12:54 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/microsoft_outlook_2002_email_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Filtering E-mail with Microsoft Outlook 2003&amp;trade;</title>
<description>PerfectMail™ can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the X-Spam-Flag and X-Spam-Level e-mail headers. These headers can be used to filter spam with your e-mail client.
To filter e-mail flagged as spam you need to create Filter Rules. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.
The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.
How to Configure Microsoft Outlook 2003™ Filters
Microsoft Outlook 2003™ includes spam filtering. Outlook will filter messages based on its own concept of spam, but you can also have it put spam messages identified by PerfectMail in your "Junk" folder.

Select "Inbox" in the Folder List.
Select "Tools" and then "Rules and Alerts".
View the E-mail Rules tab.
Click "New Rule..."
Check "Start from a blank rule" and select "Check messages when they arrive". Click "Next".
Check "with specific words in the message header".
In the rule description, click "specific words".
Under Specify a word or phrase to search for in the message header, enter X-Spam-Flag: YES to put spam in your "Junk" folder. Click "Add", then "OK", and finally "Next".
Under "What do you want to do with the message?", check "move it to the specified folder".
In the rule description, click "specified".
Under Choose a folder, select "Junk E-mail" and click "OK".
Click "Finish".
</description>
<content:encoded><![CDATA[<p>PerfectMail™ can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the <em>X-Spam-Flag</em> and <em>X-Spam-Level</em> e-mail headers. These headers can be used to filter spam with your e-mail client.</p>
<p>To filter e-mail flagged as spam you need to create <em>Filter Rules</em>. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.</p>
<p>The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.</p>
<h3>How to Configure Microsoft Outlook 2003™ Filters</h3>
<p>Microsoft Outlook 2003™ includes spam filtering. Outlook will filter messages based on its own concept of spam, but you can also have it put spam messages identified by PerfectMail in your "Junk" folder.</p>
<ol>
<li>Select "Inbox" in the Folder List.</li>
<li>Select "Tools" and then "Rules and Alerts".</li>
<li>View the E-mail Rules tab.</li>
<li>Click "New Rule..."</li>
<li>Check "Start from a blank rule" and select "Check messages when they arrive". Click "Next".</li>
<li>Check "with specific words in the message header".</li>
<li>In the rule description, click "specific words".</li>
<li>Under Specify a word or phrase to search for in the message header, enter X-Spam-Flag: YES to put spam in your "Junk" folder. Click "Add", then "OK", and finally "Next".</li>
<li>Under "What do you want to do with the message?", check "move it to the specified folder".</li>
<li>In the rule description, click "specified".</li>
<li>Under Choose a folder, select "Junk E-mail" and click "OK".</li>
<li>Click "Finish".</li>
</ol>]]></content:encoded>
<link>https://perfectmail.com/kb/microsoft_outlook_2003_email_filtering</link>
<pubDate>Fri, 23 Nov 2012 16:08:53 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/microsoft_outlook_2003_email_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Filtering E-mail with Microsoft Outlook Express&amp;trade;</title>
<description>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the X-Spam-Flag and X-Spam-Level e-mail headers. These headers can be used to filter spam with your e-mail client.

To filter e-mail flagged as spam you need to create Filter Rules. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.

The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.

How to Configure Microsoft Outlook Express&trade; Filters


Go to Tools-&gt;Message Rules-&gt;Mail...
Check 'Where the Message Body contains specific words'
Select 'Where the Message Body contains specific words '.
Click on 'contains specific words'.
Type in: X-Spam-Flag: Yes (one space between the : and the Yes)
Click 'Add'.
Click 'Ok'.
Select 'Move it to the specified folder'.
Click on 'specified'.
Highlight an existing folder, or create a new one.
Click 'Ok'.
Give the rule a name. (The default is New Mail Rule #1.)
Click 'Apply Now'. (You may or may not want to Apply Rule Now)
Click 'OK'.

</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment. This information is stored in the <i>X-Spam-Flag</i> and <i>X-Spam-Level</i> e-mail headers. These headers can be used to filter spam with your e-mail client.</p>

<p>To filter e-mail flagged as spam you need to create <i>Filter Rules</i>. Filter rules can automatically file messages in your "Spam" or "Junk" folder. For sites that are particularly concerned about loosing e-mail, or even for specific users, you can have PerfectMail not reject any e-mail and use these filtering rules to filter messages on your local e-mail client.</p>

<p>The steps for creating filter rules are specific to your e-mail client. We have instructions for creating filter rules for several popular e-mail clients. The steps for other e-mail clients are likely very similar to those presented here.</p>

<h2>How to Configure Microsoft Outlook Express&trade; Filters</h2>

<p><ol>
<li>Go to Tools-&gt;Message Rules-&gt;Mail...
<li>Check 'Where the Message Body contains specific words'
<li>Select 'Where the Message Body contains specific words '.
<li>Click on 'contains specific words'.
<li>Type in: X-Spam-Flag: Yes (one space between the : and the Yes)
<li>Click 'Add'.
<li>Click 'Ok'.
<li>Select 'Move it to the specified folder'.
<li>Click on 'specified'.
<li>Highlight an existing folder, or create a new one.
<li>Click 'Ok'.
<li>Give the rule a name. (The default is New Mail Rule #1.)
<li>Click 'Apply Now'. (You may or may not want to Apply Rule Now)
<li>Click 'OK'.
</ol></p>
]]></content:encoded>
<link>https://perfectmail.com/kb/microsoft_outlook_express_email_filtering</link>
<pubDate>Fri, 23 Nov 2012 16:06:46 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/microsoft_outlook_express_email_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Distributed Filtering with PerfectMail</title>
<description>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment.  The information is placed in a special header that you can not see, but which most mail clients use to filter the spam from your e-mail. Specifically, PerfectMail uses two e-mail headers:

X-Spam-Flag: YES
X-Spam-Level: *****


To use Distributed Filtering you must enable specific mail headers in PerfectMail. Using your web browser, log into the PerfectMail administrative interface and go to the Filter Settings page on the Actions tab (Filtering &gt; Filter Settings :: Actions tab). Enable distributed filtering by checking/unchecking the following options:

Reject spam: Uncheck (optional)
Spam flag header: Check
Spam level header: Check


Unchecking the Reject spam option is optional. With this option unchecked all spam will flow to all e-mail recipients. Another option is to leave this option checked but to disable filtering for specific users in the Domain Configuration (Domain Admin &gt; Domains). On the Domain Configuration page click on a domain name, then click the Edit Addresses button at the bottom right of the screen. You can then disable filtering for specified users using the Address Maintenance screen.

With these settings each message will contain the e-mail headers, mentioned above, which you can use for filtering using your mail client.</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; can mark spam messages so that your desktop mail client (e.g. Outlook) can filter your e-mail based on PerfectMail's assessment.  The information is placed in a special header that you can not see, but which most mail clients use to filter the spam from your e-mail. Specifically, PerfectMail uses two e-mail headers:</p>
<ul>
<li>X-Spam-Flag: YES</li>
<li>X-Spam-Level: *****</li>
</ul>

<p>To use Distributed Filtering you must enable specific mail headers in PerfectMail. Using your web browser, log into the PerfectMail administrative interface and go to the <i>Filter Settings</i> page on the <i>Actions</i> tab (Filtering &gt; Filter Settings :: Actions tab). Enable distributed filtering by checking/unchecking the following options:</p>
<ul>
<li>Reject spam: <b>Uncheck</b> (optional)</li>
<li>Spam flag header: <b>Check</b></li>
<li>Spam level header: <b>Check</b></li>
</ul>

<p>Unchecking the <i>Reject spam</i> option is <b>optional</b>. With this option unchecked all spam will flow to all e-mail recipients. Another option is to leave this option checked but to disable filtering for specific users in the <i>Domain Configuration</i> (Domain Admin &gt; Domains). On the <i>Domain Configuration</i> page click on a domain name, then click the <i>Edit Addresses</i> button at the bottom right of the screen. You can then disable filtering for specified users using the <i>Address Maintenance</i> screen.</p>

<p>With these settings each message will contain the e-mail headers, mentioned above, which you can use for filtering using your mail client.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/perfectmail_distributed_filtering</link>
<pubDate>Fri, 23 Nov 2012 14:41:51 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/perfectmail_distributed_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Understanding E-mail</title>
<description>It's important to have a clear understanding of what e-mail is, or more specifically how it is structured. The concepts referred to in this section will be used throughout this document. Many of the idiosyncrasies of spam result directly from the structure of an e-mail. This is also the starting point for the development of the many anti-spam tests used
by PerfectMail&trade;.


E-mail Structure

E-mail is actually composed of two main elements: the envelope and the data sections. The data section is further divided into the e-mail header and e-mail body or message; which may be comprised of different alternative formats and contain embedded images and other elements; as well as e-mail attachments.



If we focus on the two main elements, the envelope and the data sections you can think of an e-mail like a conventional written letter.

The envelope contains addressing and delivery information. Your e-mail server uses the envelope to decide how an e-mail should be forwarded or delivered. It ignores the actual message.

When you view an e-mail using your mail App (e.g. Microsoft Outlook&trade;), you are seeing the data section comprising the header and actual message; the envelope has been stripped away. Liken this action to a receptionist who has taken the letters from their envelopes, put those letters on your desk and discarded the envelopes.

Envelope Abuse

Spammers make use of the inconsistency between the envelope and the header to try and side-step spam filters. They do many things to push the boundaries of what is acceptable in e-mail. This is why you can receive emails that look like they were addressed to someone else, or no-one at all. In fact, you can put any e-mail address in the header! 

So why don't we just block this sort of e-mail?  Unfortunately, many legitimate e-mail clients also push the boundaries of what is acceptable in e-mail and the spammers take advantage of these issues. Also, this technique is commonly used by distribution lists and newsletters. You may often see text such as "undisclosed-recipients". This technique is so widely used that we cannot block these sorts of messages.

(PerfectMail&trade; adds a score for mismatches between the e-mail envelope and message headers, but this alone is not enough to reject a message.) 

E-Mail Addresses and Delivery

The envelope is used, and only used, for message delivery, just like a written letter.

The e-mail header is made up of what we like to think of as the delivery information: the From, To, Subject, Date, etc. But this simply is not the case. The delivery information is contained in the envelope, which has been discarded. The header information is simply information displayed as a courtesy to the recipient.

The information in the envelope and the header are completely unrelated! For legitimate messages the header will contain the original delivery information, but this is simply not something that is enforced.

</description>
<content:encoded><![CDATA[<p>It's important to have a clear understanding of what e-mail is, or more specifically how it is structured. The concepts referred to in this section will be used throughout this document. Many of the idiosyncrasies of spam result directly from the structure of an e-mail. This is also the starting point for the development of the many <b>anti-spam tests</b> used
by <i>PerfectMail&trade;</i>.</p>


<h2>E-mail Structure</h2>

<p>E-mail is actually composed of two main elements: the <i>envelope</i> and the <i>data</i> sections. The <i>data</i> section is further divided into the e-mail <i>header</i> and e-mail <i>body</i> or <i>message</i>; which may be comprised of different alternative formats and contain embedded images and other elements; as well as e-mail <i>attachments</i>.</p>

<center><img src="/media/email_structure.gif"></center>

<p>If we focus on the two main elements, the <i>envelope</i> and the <i>data</i> sections you can think of an e-mail like a conventional written letter.</p>

<p>The <i>envelope</i> contains addressing and delivery information. Your e-mail server uses the <i>envelope</i> to decide how an e-mail should be forwarded or delivered. It ignores the actual <i>message</i>.</p>

<p>When you view an e-mail using your mail App (e.g. Microsoft Outlook&trade;), you are seeing the <i>data</i> section comprising the <i>header</i> and actual <i>message</i>; the envelope has been stripped away. Liken this action to a receptionist who has taken the letters from their envelopes, put those letters on your desk and discarded the envelopes.</p>

<h2>Envelope Abuse</h2>

<p>Spammers make use of the inconsistency between the <i>envelope</i> and the <i>header</i> to try and side-step spam filters. They do many things to push the boundaries of what is acceptable in e-mail. This is why you can receive emails that look like they were addressed to someone else, or no-one at all. In fact, you can put any e-mail address in the <i>header</i>!</p> 

<p>So why don't we just block this sort of e-mail?  Unfortunately, many legitimate e-mail clients also push the boundaries of what is acceptable in e-mail and the spammers take advantage of these issues. Also, this technique is commonly used by distribution lists and newsletters. You may often see text such as "undisclosed-recipients". This technique is so widely used that we cannot block these sorts of messages.</p>

<p>(PerfectMail&trade; adds a score for mismatches between the e-mail <i>envelope</i> and <i>message headers</i>, but this alone is not enough to reject a message.)</p> 

<h2>E-Mail Addresses and Delivery</h2>

<p>The <i>envelope</i> is used, and only used, for message delivery, just like a written letter.</p>

<p>The e-mail <i>header</i> is made up of what we like to think of as the delivery information: the From, To, Subject, Date, etc. But this simply is not the case. The delivery information is contained in the <i>envelope</i>, which has been discarded. The <i>header</i> information is simply information displayed as a courtesy to the recipient.</p>

<p><b>The information in the <i>envelope</i> and the <i>header</i> are completely unrelated!</b> For legitimate messages the <i>header</i> will contain the original delivery information, but this is simply not something that is enforced.</p>

]]></content:encoded>
<link>https://perfectmail.com/kb/understanding_email</link>
<pubDate>Thu, 22 Nov 2012 21:24:47 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/understanding_email,commentrss</wfw:commentRss>
</item>
<item>
<title>Enforcing TLS Encryption on Mail Traffic</title>
<description>This can easily be configured using the Force Encrypt page (Domain Admin =&gt; Force Encrypt) on the PerfectMail User Interface.

When an e-mail message is sent between two mail servers, the sending server contacts the receiving server to begin a negotiation.  Part of that negotiation is how the message will be sent by the sender to the receiver.  The two domains start by trying to negotiate an encrypted connection using TLS/SSL.  If the two servers fail to negotiate an encrypted connection, they will negotiate a plain text connection.  The e-mail is sent once an encrypted or plain text connection has been negotiated.

PerfectMail Force Encrypt Feature
The behavior between PerfectMail&trade; and domains listed in the Force Encrypt table begin in the same manner as normal e-mail exchange. However, if the mail server hosting the external domain fails to negotiate an encrypted connection, PerfectMail will not allow the unencrypted message to be sent. The sender will receive an SMTP response message indicating that the message could not be sent.

When To Use Force Encrypt
It is possible for third parties to "listen in" on traffic between e-mail servers (domains).  An e-mail that is sent in plain text provides no privacy for the sender or the receiver.  If you have particularly sensitive data (e.g. financial or personal) that is regularly exchanged with a particular domain, you should have PerfectMail&trade; enforce an encrypted connection for all e-mail transmissions concerning that domain.

How To Configure Force Encrypt
To force encrypt e-mail traffic with an external domain; enter the domain, one entry per line, in the Force Encrypt Table of the PerfectMail user interface (Domain Admin =&gt; Force Encrypt). You may use domain names, IP addresses and IP address ranges.

For example:

their_domain.com
204.10.243.26
207.219.44.0/24


</description>
<content:encoded><![CDATA[<p>This can easily be configured using the <i>Force Encrypt</i> page (Domain Admin =&gt; Force Encrypt) on the PerfectMail User Interface.</p>

<p>When an e-mail message is sent between two mail servers, the sending server contacts the receiving server to begin a negotiation.  Part of that negotiation is how the message will be sent by the sender to the receiver.  The two domains start by trying to negotiate an encrypted connection using TLS/SSL.  If the two servers fail to negotiate an encrypted connection, they will negotiate a <i>plain text</i> connection.  The e-mail is sent once an encrypted or plain text connection has been negotiated.</p>

<b>PerfectMail Force Encrypt Feature</b><br/>
<p>The behavior between PerfectMail&trade; and domains listed in the Force Encrypt table begin in the same manner as normal e-mail exchange. However, if the mail server hosting the external domain fails to negotiate an encrypted connection, PerfectMail will not allow the unencrypted message to be sent. The sender will receive an SMTP response message indicating that the message could not be sent.</p>

<b>When To Use Force Encrypt</b><br/>
<p>It is possible for third parties to "listen in" on traffic between e-mail servers (domains).  An e-mail that is sent in <i>plain text</i> provides no privacy for the sender or the receiver.  If you have particularly sensitive data (e.g. financial or personal) that is regularly exchanged with a particular domain, you should have PerfectMail&trade; enforce an encrypted connection for all e-mail transmissions concerning that domain.</p>

<b>How To Configure Force Encrypt</b><br/>
<p>To <i>force encrypt</i> e-mail traffic with an external domain; enter the domain, one entry per line, in the Force Encrypt Table of the PerfectMail user interface (Domain Admin =&gt; Force Encrypt). You may use domain names, IP addresses and IP address ranges.</p>

<p>For example:
<pre>
their_domain.com
204.10.243.26
207.219.44.0/24
</pre></p>

]]></content:encoded>
<link>https://perfectmail.com/kb/enforcing_tls_email_encryption</link>
<pubDate>Thu, 22 Nov 2012 21:20:01 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/enforcing_tls_email_encryption,commentrss</wfw:commentRss>
</item>
<item>
<title>PerfectMail is Not Accepting E-mail</title>
<description>PerfectMail&trade; may stop accepting e-mail for a number of reasons. Fortunately, PerfectMail runs a periodic validation script that checks for the most likely reasons and displays error messages and warnings on the PerfectMail Dashboard. It there is a problem with e-mail delivery, check the dashboard first.

Resolvable Hostname Issues

A server's hostname is the name that it knows itself as. This is different than naming in DNS or any other mechanism. It is the locally defined name.

Your PerfectMail product must have a resolvable, fully qualified hostname; e.g. perfectmail.mydomain.com. There must be a domain portion to the hostname of your PerfectMail server.

This hostname must be resolvable in DNS. Mail servers will look-up server names in DNS as a validation mechanism. Not having a resolvable hostname can cause problems.

If this is not possible to use resolvable DNS names you can use the .localdomain domain; e.g. perfectmail.localdomain.

The PerfectMail configuration scripts try to mitigate the creation of partial hostnames by appending all single word hostnames (e.g. "myhost") with the ".localdomain" top-level-domain (e.g. "myhost.localdomain"). The ".localdomain" top-level-domain is "known" and will not be validated against DNS.

Unique Hostname Issue

Your PerfectMail hostname must be unique. Often, mail servers will refuse to relay e-mail through mail servers with the same hostname. This is done to prevent endless e-mail delivery loops.

DNS Issues

PerfectMail absolutely needs to be able to perform DNS resolution. PerfectMail will refuse to accept e-mail from domain names that do not exist in the DNS space. If DNS is not resolvable then e-mail will not flow.

DNS is also used for a number of validation tests including look-ups on many RBL sites. Not having the ability to perform DNS look-ups severely impairs PerfectMail's ability to filter e-mail.


Server Resources

Memory constraints are the most likely cause of server problems. PerfectMail must have sufficient resources (i.e. memory, CPU and disk) to run. If the server uses all memory and swaps to disk the system performance will slow down significantly. If your server appears to be running slow, check the memory usage and add memory as appropriate.

If the hard disk becomes full PerfectMail will stop accepting e-mail. A nightly script prunes old data to ensure a safe amount of free disk to prevent this from happening.

When the "load average" of the server is greater than 12 (i.e. 12 processes waiting for the CPU) our Mail Tranpsort Agent (MTA) will stop accepting new e-mail connections. This behavior prevents the PerfectMail server from crashing. With a high server load your server is not realistically able to process mail in any case as pushing the load average past 12 can put the server in an unresponsive state.

In any case, if your server is performing sub-optimally, you will likely need to review your resource usage and increase resources as appropriate. PerfectMail provides reports on its web interface to assist you with this assessment. Please refer to the following reports:


Reports =&gt; E-mail Activity
Reports =&gt; Resource Usage
Server Admin =&gt; Archive
</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; may stop accepting e-mail for a number of reasons. Fortunately, PerfectMail runs a periodic validation script that checks for the most likely reasons and displays error messages and warnings on the <i>PerfectMail Dashboard</i>. It there is a problem with e-mail delivery, check the dashboard first.</p>

<h2>Resolvable Hostname Issues</h2>

<p>A server's <i>hostname</i> is the name that it knows itself as. This is different than naming in DNS or any other mechanism. It is the locally defined name.</p>

<p>Your PerfectMail product <b>must</b> have a <i>resolvable, fully qualified hostname</i>; e.g. <code>perfectmail.mydomain.com</code>. There <b>must</b> be a domain portion to the <i>hostname</i> of your PerfectMail server.</p>

<p>This <i>hostname</i> must be resolvable in DNS. Mail servers will look-up server names in DNS as a validation mechanism. Not having a resolvable <i>hostname</i> can cause problems.</p>

<p>If this is not possible to use resolvable DNS names you can use the <code>.localdomain</code> domain; e.g. <code>perfectmail.localdomain</code>.</p>

<p>The PerfectMail configuration scripts try to mitigate the creation of partial hostnames by appending all single word hostnames (e.g. "myhost") with the ".localdomain" top-level-domain (e.g. "myhost.localdomain"). The ".localdomain" top-level-domain is "known" and will not be validated against DNS.

<h2>Unique Hostname Issue</h2>

<p>Your PerfectMail <i>hostname</i> must be unique. Often, mail servers will refuse to relay e-mail through mail servers with the same <i>hostname</i>. This is done to prevent endless e-mail delivery loops.</p>

<h2>DNS Issues</h2>

<p>PerfectMail absolutely needs to be able to perform DNS resolution. PerfectMail will refuse to accept e-mail from domain names that do not exist in the DNS space. If DNS is not resolvable then e-mail will not flow.</p>

<p>DNS is also used for a number of validation tests including look-ups on many RBL sites. Not having the ability to perform DNS look-ups severely impairs PerfectMail's ability to filter e-mail.</p>


<h2>Server Resources</h2>

<p>Memory constraints are the most likely cause of server problems. PerfectMail must have sufficient resources (i.e. memory, CPU and disk) to run. If the server uses all memory and swaps to disk the system performance will slow down significantly. If your server appears to be running slow, check the memory usage and add memory as appropriate.</p>

<p>If the hard disk becomes full PerfectMail will stop accepting e-mail. A nightly script prunes old data to ensure a safe amount of free disk to prevent this from happening.</p>

<p>When the "load average" of the server is greater than 12 (i.e. 12 processes waiting for the CPU) our Mail Tranpsort Agent (MTA) will stop accepting new e-mail connections. This behavior prevents the PerfectMail server from crashing. With a high server load your server is not realistically able to process mail in any case as pushing the load average past 12 can put the server in an unresponsive state.</p>

<p>In any case, if your server is performing sub-optimally, you will likely need to review your resource usage and increase resources as appropriate. PerfectMail provides reports on its web interface to assist you with this assessment. Please refer to the following reports:</p>

<ul>
<li>Reports =&gt; E-mail Activity</li>
<li>Reports =&gt; Resource Usage</li>
<li>Server Admin =&gt; Archive</li>
</ul>]]></content:encoded>
<link>https://perfectmail.com/kb/not_accepting_email</link>
<pubDate>Thu, 22 Nov 2012 21:06:05 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/not_accepting_email,commentrss</wfw:commentRss>
</item>
<item>
<title>Firewall Setting Requirements</title>
<description>Port 25 (SMTP) traffic needs to be directed to your PerfectMail product should be forwarded to your PerfectMail product from the Internet.

It is best to create a one-to-one NAT mapping port 25 on the Internet facing IP address and your PerfectMail product. Problems can arise when the incoming SMTP IP address and the outgoing SMTP IP address do not match. In this situation incoming SMTP traffic is properly configured, however the outgoing SMTP traffic is sent on an unexpected port (usually the default outgoing IP address is used).

When sending e-mail to the Internet remote anti-spam servers will verify the domain name, hostname and reverse address of the sending IP address against your DNS records. Often the DNS records are not configured to support the default outbound IP address.

Anti-spam servers will compare the name reported by the server itself (i.e. the hostname), the address record (A record) from DNS and the reverse DNS record (PTR record). Anti-spam servers will score and possibly even reject messages for discrepencies between these records. This is further complicated by firewall port forwarding issues. The best way is if you have a 1-1 NAT for your e-mail so both incoming and outgoing mail use the same IP number. Failing that the names should all match up on the outgoing side of things.

We strongly recommend updating your firewall to restrict all outgoing SMTP (port 25) traffic. Only PerfectMail and other mail servers should be able to send e-mail directly to the Internet. PC's compromised by viruses, Trojans, etc. may send e-mail directly to the Internet which may result in your entire organization being blacklisted by RBL sites such as Spamhaus. (Especially if you have only one Internet facing IP address.)

Following are two examples of how to configure PerfectMail within your firewalled infrastructure.

Firewall Configuration: Green Zone + Internet

If you have a simple firewall configuration, with your internal network (Green Zone) being protected from the Internet, place your PerfectMail product in the internal network (Green Zone) and configure your firewall to allow the following network traffic.


Incoming Ports:

PortTypeProtocolDescription
25TCPSMTPPort forward to Perfectmail for incoming e-mail 
443TCPHTTPSPort forward to Perfectmail for remote secure web access (optional)
22TCPSSHPort forward to Perfectmail for technical support (optional)


[Note: Using non-standard ports for support access (i.e. SSH and HTTPS) is acceptable as long as these are port forwarded to the appropriate ports on the PerfectMail server.]



Outgoing Ports:

PortTypeProtocolDescription
25TCPSMTPFor outgoing e-mail
53TCP/UDPDNS/BINDFor DNS look-ups and testing
80TCPHTTPFor website probing
123UDPNTPFor remote Network Time Protocol look-ups
443TCPHTTPSFor website probing
43, 4321TCPwhois, rwhoisFor WhoIs queries





Firewall Configuration: Green Zone + DMZ + Internet

For the configuration you described with PM in the DMZ and your Mail Server and DNS in a Green Zone (protected network).


The following ports are required for PerfectMail to function:


If you have a firewall configuration that includes a DMZ, with your internal network (Green Zone) being protected from the Internet, place your PerfectMail product in the DMZ network and configure your firewall to allow the following network traffic.


Between Internet and the DMZ - Incoming Ports:

PortTypeProtocolDescription
25TCPSMTPPort forward to Perfectmail for incoming e-mail 
443TCPHTTPSPort forward to Perfectmail for remote secure web access (optional)
22TCPSSHPort forward to Perfectmail for technical support (optional)


[Note: Using non-standard ports for support access (i.e. SSH and HTTPS) is acceptable as long as these are port forwarded to the appropriate ports on the PerfectMail server.]



Between Internet and the DMZ - Outgoing Ports:

PortTypeProtocolDescription
25TCPSMTPFor outgoing e-mail
53TCP/UDPDNS/BINDFor DNS look-ups and testing
80TCPHTTPFor website probing
123UDPNTPFor remote Network Time Protocol look-ups
443TCPHTTPSFor website probing
43, 4321TCPwhois, rwhoisFor WhoIs queries





Between the DMZ and the Green Zone - Incoming Ports, to Green Zone:

PortTypeProtocolDescription
25TCPSMTPPort forward to mail server for incoming e-mail 
53TCP/UDPDNS/BINDFor DNS look-ups and testing (unless DNS server is in DMZ)
123UDPNTPFor Network Time Protocol (unless time server is in DMZ)





Between the DMZ and the Green Zone - Outgoing Ports, from Green Zone:

PortTypeProtocolDescription
25TCPSMTPFor outgoing e-mail
443TCPHTTPSFor PerfectMail Web-UI secure access
80TCPHTTPFor PerfectMail Web-UI access (optional)



</description>
<content:encoded><![CDATA[<p>Port 25 (SMTP) traffic needs to be directed to your PerfectMail product should be forwarded to your PerfectMail product from the Internet.</p>

<p>It is best to create a one-to-one NAT mapping port 25 on the Internet facing IP address and your PerfectMail product. Problems can arise when the incoming SMTP IP address and the outgoing SMTP IP address do not match. In this situation incoming SMTP traffic is properly configured, however the outgoing SMTP traffic is sent on an unexpected port (usually the default outgoing IP address is used).</p>

<p>When sending e-mail to the Internet remote anti-spam servers will verify the domain name, hostname and reverse address of the sending IP address against your DNS records. Often the DNS records are not configured to support the default outbound IP address.</p>

<p>Anti-spam servers will compare the name reported by the server itself (i.e. the hostname), the address record (A record) from DNS and the reverse DNS record (PTR record). Anti-spam servers will score and possibly even reject messages for discrepencies between these records. This is further complicated by firewall port forwarding issues. The best way is if you have a 1-1 NAT for your e-mail so both incoming and outgoing mail use the same IP number. Failing that the names should all match up on the outgoing side of things.</p>

<p>We strongly recommend updating your firewall to restrict all outgoing SMTP (port 25) traffic. Only PerfectMail and other mail servers should be able to send e-mail directly to the Internet. PC's compromised by viruses, Trojans, etc. may send e-mail directly to the Internet which may result in your entire organization being blacklisted by RBL sites such as Spamhaus. (Especially if you have only one Internet facing IP address.)</p>

<p>Following are two examples of how to configure PerfectMail within your firewalled infrastructure.</p>

<h2>Firewall Configuration: Green Zone + Internet</h2>

<p>If you have a simple firewall configuration, with your internal network (Green Zone) being protected from the Internet, place your PerfectMail product in the internal network (Green Zone) and configure your firewall to allow the following network traffic.</p>

<p>
<b>Incoming Ports:</b>
<table border=1>
<tr><th>Port<th>Type<th>Protocol<th>Description
<tr><td>25<td>TCP<td>SMTP<td>Port forward to Perfectmail for incoming e-mail 
<tr><td>443<td>TCP<td>HTTPS<td>Port forward to Perfectmail for remote secure web access (optional)
<tr><td>22<td>TCP<td>SSH<td>Port forward to Perfectmail for technical support (optional)
</table>
<br>
[Note: Using non-standard ports for support access (i.e. SSH and HTTPS) is acceptable as long as these are port forwarded to the appropriate ports on the PerfectMail server.]
</p>

<p>
<b>Outgoing Ports:</b>
<table border=1>
<tr><th>Port<th>Type<th>Protocol<th>Description
<tr><td>25<td>TCP<td>SMTP<td>For outgoing e-mail
<tr><td>53<td>TCP/UDP<td>DNS/BIND<td>For DNS look-ups and testing
<tr><td>80<td>TCP<td>HTTP<td>For website probing
<tr><td>123<td>UDP<td>NTP<td>For remote Network Time Protocol look-ups
<tr><td>443<td>TCP<td>HTTPS<td>For website probing
<tr><td>43, 4321<td>TCP<td>whois, rwhois<td>For WhoIs queries
</table>
<br>
</p>


<h2>Firewall Configuration: Green Zone + DMZ + Internet</h2>

For the configuration you described with PM in the DMZ and your Mail Server and DNS in a Green Zone (protected network).


The following ports are required for PerfectMail to function:


<p>If you have a firewall configuration that includes a DMZ, with your internal network (Green Zone) being protected from the Internet, place your PerfectMail product in the DMZ network and configure your firewall to allow the following network traffic.</p>

<p>
<b>Between Internet and the DMZ - Incoming Ports:</b>
<table border=1>
<tr><th>Port<th>Type<th>Protocol<th>Description
<tr><td>25<td>TCP<td>SMTP<td>Port forward to Perfectmail for incoming e-mail 
<tr><td>443<td>TCP<td>HTTPS<td>Port forward to Perfectmail for remote secure web access (optional)
<tr><td>22<td>TCP<td>SSH<td>Port forward to Perfectmail for technical support (optional)
</table>
<br>
[Note: Using non-standard ports for support access (i.e. SSH and HTTPS) is acceptable as long as these are port forwarded to the appropriate ports on the PerfectMail server.]
</p>

<p>
<b>Between Internet and the DMZ - Outgoing Ports:</b>
<table border=1>
<tr><th>Port<th>Type<th>Protocol<th>Description
<tr><td>25<td>TCP<td>SMTP<td>For outgoing e-mail
<tr><td>53<td>TCP/UDP<td>DNS/BIND<td>For DNS look-ups and testing
<tr><td>80<td>TCP<td>HTTP<td>For website probing
<tr><td>123<td>UDP<td>NTP<td>For remote Network Time Protocol look-ups
<tr><td>443<td>TCP<td>HTTPS<td>For website probing
<tr><td>43, 4321<td>TCP<td>whois, rwhois<td>For WhoIs queries
</table>
<br>
</p>

<p>
<b>Between the DMZ and the Green Zone - Incoming Ports, to Green Zone:</b>
<table border=1>
<tr><th>Port<th>Type<th>Protocol<th>Description
<tr><td>25<td>TCP<td>SMTP<td>Port forward to mail server for incoming e-mail 
<tr><td>53<td>TCP/UDP<td>DNS/BIND<td>For DNS look-ups and testing (unless DNS server is in DMZ)
<tr><td>123<td>UDP<td>NTP<td>For Network Time Protocol (unless time server is in DMZ)
</table>
<br>
</p>

<p>
<b>Between the DMZ and the Green Zone - Outgoing Ports, from Green Zone:</b>
<table border=1>
<tr><th>Port<th>Type<th>Protocol<th>Description
<tr><td>25<td>TCP<td>SMTP<td>For outgoing e-mail
<tr><td>443<td>TCP<td>HTTPS<td>For PerfectMail Web-UI secure access
<tr><td>80<td>TCP<td>HTTP<td>For PerfectMail Web-UI access (optional)
</table>
<br>
</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/firewall_setting_requirements</link>
<pubDate>Thu, 22 Nov 2012 21:02:27 +0000</pubDate>
<category>Administration</category>
<wfw:commentRss>https://perfectmail.com/kb/firewall_setting_requirements,commentrss</wfw:commentRss>
</item>
<item>
<title>Configuring a SmartHost for Microsoft Exchange&amp;trade;</title>
<description>Microsoft Exchange&trade; 2003

In Exchange 2003, it's possible to configure a smart host on the Default SMTP Virtual Server, but if you do it this way you can only set a single smart host. The preferred method, therefore, is to use an SMTP Connector for your outgoing emails which does allow multiple smart hosts to be specified.

Following are the steps to have Microsoft Exchange 2003&trade; System deliver outbound mail via a Smart Host:

Open up the Microsoft Exchange System Manager (Start &gt; Programs &gt; Microsoft Exchange &gt; System Manager);
Expand "Administrative Group", &lt;Your Groupname&gt;, you may have more than one, "Servers", &lt;SERVER NAME&gt;, "Protocols", "SMTP", "Default SMTP Virtual Server";
Right-click on "Default SMTP Virtual Server" and select Properties;
Click on "Delivery" tab and select the "Advanced" button;
Enter the Address of the hosting PM for the "Smart Host" field. You can specify the IP Address e.g.. [192.168.3.44] (using the square brackets) or use a FQDN "yourhost.yourdomain.com" (without the quotes);
Click on "Apply", then "OK" for all cascading windows.


These changes should take place on the fly, there is no need to restart the Exchange services.

Note that the above procedures assumes that you have a straight-forward Exchange system in place with pre-defined Exchange Routing Groups in place and that there is only one Exchange system within your organization. If you have an Exchange environment consisting of a Front-End system and a Back-End system, then the above needs to be applied on the Back-End system only.

Alternatively, you may decide to use a connector which routes email, rather than an SMTP virtual server:


Open up the Microsoft Exchange System Manager (Start &gt; Programs &gt; Microsoft Exchange &gt; System Manager);
Right-click on {Your Exchange Server} and select Properties;
Make sure the checkbox Display routing groups is checked;
Right Click "First Organization";
Locate the folder: Administrative Groups/{Your_Administrative_Group}/Routing Groups/{Your_Routing_Group}/Connectors;
Right-click Connectors, select New, and then click SMTP Connector;
Fill in the Name field;
In the Smart host box, type the hostname or IP address (wrapped in square brackets [ ]) of the smart host server and select the local bridgehead (usually your mail server);
Select the Address Space tab, typical settings are "SMTP" and select (*).


If the above procedures do not work for you and you have restarted the Exchange services (or rebooted the Exchange Server) then there is a possibility that you may have a custom Routing group defined with a custom SMTP connector for all SMTP Address Spaces and SMTP connector configurations within the Routing Group section take precedence over the default virtual SMTP protocol configurations within the Protocols section.

Microsoft Exchange&trade; 2007/2010

For Exchange 2007/2010 configure a default relay host (smarhost) by creating a Send Connector. With Exchange 2007/2010, Microsoft has separated the mail server roles. The Hub Transport role is responsible for sending and receiving external email. In a single Exchange server environment, the same server will perform all roles.


Open the Exchange Management Console;
Expand the Organization Configuration (click on the "+" next to Organization Configuration);
Select Hub Transport, then the Send Connectors tab;
Right-click on the existing Send Connector;
Select Properties, then the Network tab;
Select "Route mail through the following smart hosts:" and click Add;
Enter the IP address of your smarthost relay server.
Click OK.


Once you click OK the changes will take effect immediately.

</description>
<content:encoded><![CDATA[<h2>Microsoft Exchange&trade; 2003</h2>

<p>In Exchange 2003, it's possible to configure a smart host on the Default SMTP Virtual Server, but if you do it this way you can only set a single smart host. The preferred method, therefore, is to use an SMTP Connector for your outgoing emails which does allow multiple smart hosts to be specified.</p>

<p>Following are the steps to have Microsoft Exchange 2003&trade; System deliver outbound mail via a Smart Host:
<ol>
<li>Open up the Microsoft Exchange System Manager (Start &gt; Programs &gt; Microsoft Exchange &gt; System Manager);
<li>Expand "Administrative Group", &lt;Your Groupname&gt;, you may have more than one, "Servers", &lt;SERVER NAME&gt;, "Protocols", "SMTP", "Default SMTP Virtual Server";
<li>Right-click on "Default SMTP Virtual Server" and select Properties;
<li>Click on "Delivery" tab and select the "Advanced" button;
<li>Enter the Address of the hosting PM for the "Smart Host" field. You can specify the IP Address e.g.. [192.168.3.44] (using the square brackets) or use a FQDN "yourhost.yourdomain.com" (without the quotes);
<li>Click on "Apply", then "OK" for all cascading windows.
</ol></p>

<p>These changes should take place on the fly, there is no need to restart the Exchange services.</p>

<p>Note that the above procedures assumes that you have a straight-forward Exchange system in place with pre-defined Exchange Routing Groups in place and that there is only one Exchange system within your organization. If you have an Exchange environment consisting of a Front-End system and a Back-End system, then the above needs to be applied on the Back-End system only.</p>

<p>Alternatively, you may decide to use a connector which routes email, rather than an SMTP virtual server:</p>

<ol>
<li>Open up the Microsoft Exchange System Manager (Start &gt; Programs &gt; Microsoft Exchange &gt; System Manager);</li>
<li>Right-click on {Your Exchange Server} and select Properties;</li>
<li>Make sure the checkbox Display routing groups is checked;</li>
<li>Right Click "First Organization";</li>
<li>Locate the folder: Administrative Groups/{Your_Administrative_Group}/Routing Groups/{Your_Routing_Group}/Connectors;</li>
<li>Right-click Connectors, select New, and then click SMTP Connector;</li>
<li>Fill in the Name field;</li>
<li>In the Smart host box, type the hostname or IP address (wrapped in square brackets [ ]) of the smart host server and select the local bridgehead (usually your mail server);</li>
<li>Select the Address Space tab, typical settings are "SMTP" and select (*).</li>
</ol>

<p>If the above procedures do not work for you and you have restarted the Exchange services (or rebooted the Exchange Server) then there is a possibility that you may have a custom Routing group defined with a custom SMTP connector for all SMTP Address Spaces and SMTP connector configurations within the Routing Group section take precedence over the default virtual SMTP protocol configurations within the Protocols section.</p>

<h2>Microsoft Exchange&trade; 2007/2010</h2>

<p>For Exchange 2007/2010 configure a default relay host (smarhost) by creating a Send Connector. With Exchange 2007/2010, Microsoft has separated the mail server roles. The Hub Transport role is responsible for sending and receiving external email. In a single Exchange server environment, the same server will perform all roles.</p>

<ol>
<li>Open the Exchange Management Console;</li>
<li>Expand the Organization Configuration (click on the "+" next to Organization Configuration);</li>
<li>Select Hub Transport, then the Send Connectors tab;</li>
<li>Right-click on the existing Send Connector;</li>
<li>Select Properties, then the Network tab;</li>
<li>Select "Route mail through the following smart hosts:" and click Add;</li>
<li>Enter the IP address of your smarthost relay server.</li>
<li>Click OK.</li>
</ol>

<p>Once you click OK the changes will take effect immediately.</p>

]]></content:encoded>
<link>https://perfectmail.com/kb/microsoft_exchange_smart_host</link>
<pubDate>Thu, 22 Nov 2012 20:50:31 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/microsoft_exchange_smart_host,commentrss</wfw:commentRss>
</item>
<item>
<title>Receiving e-mail not addressed to me</title>
<description>E-mail is actually composed of two elements. The envelope and the actual e-mail. Think of it like a conventional letter.

The envelope contains the addressing/delivery information. Your mail server looks at the envelope to decide where the e-mail should go, but will ignore the actual e-mail content. The actual e-mail content contains the e-mail headers (including From: To: Subject:, etc), message body and any attachments.

Your e-mail client displays only the actual e-mail content; the envelope has been stripped away. Liken this to a receptionist taking your letters from their envelopes, putting those letters on your desk and throwing away the envelopes.

This is why you can receive emails that look like they were addressed to someone else or no-one at all. If you received the e-mail, then be assured your e-mail address appeared on the envelope.

Why don't we just block all of this type of e-mail? Well, this technique is commonly used by distribution lists and newsletters. You may often see text such as "undisclosed-recipients". This technique is so widely used that we cannot block these sorts of messages.</description>
<content:encoded><![CDATA[<p>E-mail is actually composed of two elements. The envelope and the actual e-mail. Think of it like a conventional letter.</p>

<p>The envelope contains the addressing/delivery information. Your mail server looks at the envelope to decide where the e-mail should go, but will ignore the actual e-mail content. The actual e-mail content contains the e-mail headers (including From: To: Subject:, etc), message body and any attachments.</p>

<p>Your e-mail client displays only the actual e-mail content; the envelope has been stripped away. Liken this to a receptionist taking your letters from their envelopes, putting those letters on your desk and throwing away the envelopes.</p>

<p>This is why you can receive emails that look like they were addressed to someone else or no-one at all. If you received the e-mail, then be assured your e-mail address appeared on the envelope.</p>

<p>Why don't we just block all of this type of e-mail? Well, this technique is commonly used by distribution lists and newsletters. You may often see text such as "undisclosed-recipients". This technique is so widely used that we cannot block these sorts of messages.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/receiving_email_not_my_address</link>
<pubDate>Thu, 22 Nov 2012 20:47:35 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/receiving_email_not_my_address,commentrss</wfw:commentRss>
</item>
<item>
<title>Domain of Sender Does Not Exist Error</title>
<description>Someone tried to send me a message and received "SMTP Error 553 5.1.8... Domain of sender address does not exist". What does this mean?

In this situation, your mail server has refused the e-mail because it cannot identify the sender's domain (e.g. example.com) as a valid registered domain name. This is a common practice across most mail servers.

There may be a problem with the senders domain. More likely, there may be a DNS issue at your site.

Sometimes this sort of thing occurs when domains are moved from one ISP to another. You can get an inconsistent view of DNS where the Internet as a whole has one view of DNS, while a particular ISP (and all it's clients) get another view.

I recommend speaking with your technical support team. Get them to see what happens if they try DNS resolution for the senders domain on their e-mail server.

Also, this may have been a temporary issue that has since been resolved. If that's the case the technical support team won't see anything wrong. Try sending the message again to see if the issue has been resolved.</description>
<content:encoded><![CDATA[<p>Someone tried to send me a message and received "SMTP Error 553 5.1.8... Domain of sender address does not exist". What does this mean?</p>

<p>In this situation, your mail server has refused the e-mail because it cannot identify the sender's domain (e.g. example.com) as a valid registered domain name. This is a common practice across most mail servers.</p>

<p>There may be a problem with the senders domain. More likely, there may be a DNS issue at your site.</p>

<p>Sometimes this sort of thing occurs when domains are moved from one ISP to another. You can get an inconsistent view of DNS where the Internet as a whole has one view of DNS, while a particular ISP (and all it's clients) get another view.</p>

<p>I recommend speaking with your technical support team. Get them to see what happens if they try DNS resolution for the senders domain on their e-mail server.</p>

<p>Also, this may have been a temporary issue that has since been resolved. If that's the case the technical support team won't see anything wrong. Try sending the message again to see if the issue has been resolved.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/domain_of_sender_does_not_exist</link>
<pubDate>Thu, 22 Nov 2012 20:43:34 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/domain_of_sender_does_not_exist,commentrss</wfw:commentRss>
</item>
<item>
<title>Selective &quot;Domain Spoofing&quot; prevention.</title>
<description>To disable anti-spam tests, including Domain Spoofing, for a specific host or domain simply add the sending e-mail domain, or the hostname or IP address of the sending server, to the "White List" table or "No Server Checks" table on the Black/White List page (Filters =&gt; Black/White List).
</description>
<content:encoded><![CDATA[<p>To disable anti-spam tests, including Domain Spoofing, for a specific host or domain simply add the sending e-mail domain, or the hostname or IP address of the sending server, to the "White List" table or "No Server Checks" table on the <i>Black/White List</i> page (Filters =&gt; Black/White List).</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/selective_domain_spoofing_prevention</link>
<pubDate>Thu, 22 Nov 2012 20:38:44 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/selective_domain_spoofing_prevention,commentrss</wfw:commentRss>
</item>
<item>
<title>A Spammer is spoofing my e-mail address to my organization!</title>
<description>E-mail is very prone to this sort of thing. When an e-mail is crafted, you can say you are anyone you wish! Spammers take advantage of this to give themselves more credibility and deflect bounce messages to other people.
PerfectMail has anti-spoof settings to help prevent this sort of abuse. On the user interface, go to the Filter Settings page  Filters &gt; Filter Settings &gt; Sender  tab. There are three options available:

Verify e-mail address - Verify the existence of e-mail addresses from hosted domain, but coming from the outside.
Block self sent e-mail - Block all e-mail from the outside that is reportedly from a hosted domain.
Block all - Block all e-mail from the outside that is reportedly from a hosted domain.

The best way to block this sort of thing is using Sender Policy Framework (SPF). SPF is implemented as a DNS entry for your domain. It specifies what hosts are valid for sending mail for your domain. Any other host should be considered a hoax.
You can get more information on crafting an SPF Record by going to http://www.openspf.org/. On this page there is a section called "Deploying SPF", with a web form for crafting an SPF record (currently set to example.com). Use this to craft an SPF record for your domain.
Many e-mail hosts and even anti-spam filters are not making use of SPF records, so there will always be a number of false messages being delivered; but this is the best method available to us at this time.</description>
<content:encoded><![CDATA[<p>E-mail is very prone to this sort of thing. When an e-mail is crafted, you can say you are anyone you wish! Spammers take advantage of this to give themselves more credibility and deflect bounce messages to other people.</p>
<p>PerfectMail has <em>anti-spoof</em> settings to help prevent this sort of abuse. On the user interface, go to the <em>Filter Settings</em> page  <span style="text-decoration: underline;">Filters &gt; Filter Settings &gt; Sender</span>  tab. There are three options available:</p>
<ul>
<li><strong>Verify e-mail address</strong> - Verify the existence of e-mail addresses from hosted domain, but coming from the outside.</li>
<li><strong>Block self sent e-mail</strong> - Block all e-mail from the outside that is reportedly from a hosted domain.</li>
<li><strong>Block all</strong> - Block all e-mail from the outside that is reportedly from a hosted domain.</li>
</ul>
<p>The best way to block this sort of thing is using Sender Policy Framework (SPF). SPF is implemented as a DNS entry for your domain. It specifies what hosts are valid for sending mail for your domain. Any other host should be considered a hoax.</p>
<p>You can get more information on crafting an SPF Record by going to http://www.openspf.org/. On this page there is a section called "Deploying SPF", with a web form for crafting an SPF record (currently set to example.com). Use this to craft an SPF record for your domain.</p>
<p>Many e-mail hosts and even anti-spam filters are not making use of SPF records, so there will always be a number of false messages being delivered; but this is the best method available to us at this time.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/spammer_spoofing_my_email</link>
<pubDate>Thu, 22 Nov 2012 20:36:28 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/spammer_spoofing_my_email,commentrss</wfw:commentRss>
</item>
<item>
<title>A Spammer is spoofing my e-mail address!</title>
<description>E-mail is very prone to this sort of thing. When an e-mail is crafted, you can say you are anyone you wish! Spammers take advantage of this to give themselves more credibility and deflect bounce messages to other people.

The best way to block this sort of thing is using Sender Policy Framework (SPF). SPF is implemented as a DNS entry for your domain. It specifies what hosts are valid for sending mail for your domain. Any other host should be considered a hoax.

You can get more information on crafting an SPF Record by going to http://www.openspf.org/. On this page there is a section called "Deploying SPF", with a web form for crafting an SPF record (currently set to example.com). Use this to craft an SPF record for your domain.

Many e-mail hosts and even anti-spam filters are not making use of SPF records, so there will always be a number of false messages being delivered; but this is the best method available to us at this time.

There are numerous schemes for performing mailhost verification checks and none of them have a high acceptance rate. So this continues to be an ongoing problem.</description>
<content:encoded><![CDATA[<p>E-mail is very prone to this sort of thing. When an e-mail is crafted, you can say you are anyone you wish! Spammers take advantage of this to give themselves more credibility and deflect bounce messages to other people.</p>

<p>The best way to block this sort of thing is using Sender Policy Framework (SPF). SPF is implemented as a DNS entry for your domain. It specifies what hosts are valid for sending mail for your domain. Any other host should be considered a hoax.</p>

<p>You can get more information on crafting an SPF Record by going to http://www.openspf.org/. On this page there is a section called "Deploying SPF", with a web form for crafting an SPF record (currently set to example.com). Use this to craft an SPF record for your domain.</p>

<p>Many e-mail hosts and even anti-spam filters are not making use of SPF records, so there will always be a number of false messages being delivered; but this is the best method available to us at this time.</p>

<p>There are numerous schemes for performing mailhost verification checks and none of them have a high acceptance rate. So this continues to be an ongoing problem.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/address_spoofing</link>
<pubDate>Thu, 22 Nov 2012 20:25:20 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/address_spoofing,commentrss</wfw:commentRss>
</item>
<item>
<title>Why am I still receiving Spam?</title>
<description>There are a number of reasons why the amount of Spam you receive does not go down immediately after implementing PerfectMail.

Here are the most common reasons along with suggestions on how to fix the problem:

You may be receiving e-mail from unprotected mail accounts.  It is quite common for people to have multiple e-mail accounts. Modern mail clients (e.g.: Outlook) can poll for mail from many sources and consolidate it into a single in-basket. PerfectMail will block Spam from your protected accounts but not from unprotected accounts. If all of your e-mail accounts are on local servers, then you can solve the problem in one of 2 ways:
	
	Be sure that PerfectMail filtering is configured for all of your domains. To do this, create domain records in PerfectMail for all local mail servers and all of their respective domains. Be sure to indicate that each domain has filtering enabled (Domains &gt; Your Domain &gt; Filtering Enabled is checked).
	Ensure that all mail is directed to your PerfectMail server. This may involve updating DNS mail exchanger (MX) records so that they direct mail to your new PerfectMail server or changing the SMTP port forwarding rules at your firewall to direct all traffic to your PerfectMail appliance.
	
You may be receiving e-mail from remote mail servers. PerfectMail can only protect e-mail traffic directed to local mail servers. Often people use a mix of e-mail accounts on both local and remote mail servers. PerfectMail cannot protect remote mail servers or popular Web based mail services like HotMail, MSN or Yahoo Mail.
You may have insecure mail relays. PerfectMail can be told to accept all e-mail from a trusted source. If this trusted mail server also accepts mail from the Internet, then you are providing a back door through which Spam may arrive. To solve this problem, ensure that your internal trusted mail relays do not accept e-mail directly from the Internet. Stated another way, all internal relays must be outbound only mail relays, not inbound mail relays.
Spammers may continue to use your old IP address. A common implementation strategy is to provide PerfectMail with a new IP address and then redirect e-mail to the new address via DNS MX record updates. This strategy works well for legitimate senders but may result in no immediate decrease in Spam.

Our research has shown that Spam engines do not do DNS queries for each message they send. Instead, they query DNS once and then remember (cache) the answer - sometimes for months. Since DNS queries take time and mail servers rarely change IP addresses, caching IP addresses helps Spammers send out much higher volumes of junk mail.

Often the old IP address is still a legitimate pathway to your mail server. If true, and spammers have cached your mail servers' IP address, then Spam will continue to show up in your inbox.

You can solve this problem by migrating all of your domains to PerfectMail as quickly as possible. Once this is done, configure your firewall to shut down mail handling on the old IP address.

Another solution is to configure your local mail server so that protected domains may only communicate with the mail server from the IP address assigned to PerfectMail (as that is their only legitimate pathway). The local mail server should not accept SMTP traffic for protected domains directly from the firewall. 

</description>
<content:encoded><![CDATA[<p>There are a number of reasons why the amount of Spam you receive does not go down immediately after implementing PerfectMail.</p>

<p>Here are the most common reasons along with suggestions on how to fix the problem:
<ul>
<li>You may be receiving e-mail from unprotected mail accounts.  It is quite common for people to have multiple e-mail accounts. Modern mail clients (e.g.: Outlook) can poll for mail from many sources and consolidate it into a single in-basket. PerfectMail will block Spam from your protected accounts but not from unprotected accounts. If all of your e-mail accounts are on local servers, then you can solve the problem in one of 2 ways:<br>
	<ol>
	<li>Be sure that PerfectMail filtering is configured for all of your domains. To do this, create domain records in PerfectMail for all local mail servers and all of their respective domains. Be sure to indicate that each domain has filtering enabled (Domains &gt; Your Domain &gt; Filtering Enabled is checked).<br>
	<li>Ensure that all mail is directed to your PerfectMail server. This may involve updating DNS mail exchanger (MX) records so that they direct mail to your new PerfectMail server or changing the SMTP port forwarding rules at your firewall to direct all traffic to your PerfectMail appliance.<br>
	</ol>
<li>You may be receiving e-mail from remote mail servers. PerfectMail can only protect e-mail traffic directed to local mail servers. Often people use a mix of e-mail accounts on both local and remote mail servers. PerfectMail cannot protect remote mail servers or popular Web based mail services like HotMail, MSN or Yahoo Mail.
<li>You may have insecure mail relays. PerfectMail can be told to accept all e-mail from a trusted source. If this trusted mail server also accepts mail from the Internet, then you are providing a back door through which Spam may arrive. To solve this problem, ensure that your internal trusted mail relays do not accept e-mail directly from the Internet. Stated another way, all internal relays must be outbound only mail relays, not inbound mail relays.
<li>Spammers may continue to use your old IP address. A common implementation strategy is to provide PerfectMail with a new IP address and then redirect e-mail to the new address via DNS MX record updates. This strategy works well for legitimate senders but may result in no immediate decrease in Spam.
<br><br>
Our research has shown that Spam engines do not do DNS queries for each message they send. Instead, they query DNS once and then remember (cache) the answer - sometimes for months. Since DNS queries take time and mail servers rarely change IP addresses, caching IP addresses helps Spammers send out much higher volumes of junk mail.
<br><br>
Often the old IP address is still a legitimate pathway to your mail server. If true, and spammers have cached your mail servers' IP address, then Spam will continue to show up in your inbox.
<br><br>
You can solve this problem by migrating all of your domains to PerfectMail as quickly as possible. Once this is done, configure your firewall to shut down mail handling on the old IP address.
<br><br>
Another solution is to configure your local mail server so that protected domains may only communicate with the mail server from the IP address assigned to PerfectMail (as that is their only legitimate pathway). The local mail server should not accept SMTP traffic for protected domains directly from the firewall. 
</ul>
</p>]]></content:encoded>
<link>https://perfectmail.com/kb/why_still_receiving_spam</link>
<pubDate>Thu, 22 Nov 2012 20:05:25 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/why_still_receiving_spam,commentrss</wfw:commentRss>
</item>
<item>
<title>What does &quot;may be forged&quot; mean?</title>
<description>PerfectMail's Mail Transport Agent does a reverse hostname lookup of the IP address of the connecting client, and a lookup of the IP addresses associated with that hostname. If the client IP address does not appear in that list then the "may be forged" tag is added.
The "may be forged" mail tag is an artifact of the sendmail MTA.
Example/Explanation:
Spammers can spoof DNS domains via PTR records. In DNS validation of data is implicit in the lookup process. When you do a DNS lookup of "example.com" (A record) you are directed to the Name Servers for "example.com"; they are inherently valid servers. No validation is performed or implied on the responses the Names Servers provide. 
Similarly, when you do a Reverse DNS lookup of an IP address (e.g. 204.10.243.99), you are directed to the Name Servers for "204.10.243", and no validation/verification is performed on the responses.
The Name Server easily can say 204.10.243.99 is secure.yourbank.com. The only way to validate this result is to perform a DNS lookup of the PTR result (e.g. secure.yourbank.com) and confirm that the IP address is listed. If it is not listed you may be in a situation where the PTR record is a spoof/forged!
It is best practice to maintain the referential integrity of your DNS A and PTR records. Unfortunately it is quite common for these records to not be fully matched.
</description>
<content:encoded><![CDATA[<p>PerfectMail's <em>Mail Transport Agent</em> does a reverse hostname lookup of the IP address of the connecting client, and a lookup of the IP addresses associated with that hostname. If the client IP address does not appear in that list then the "may be forged" tag is added.</p>
<p>The "may be forged" mail tag is an artifact of the sendmail MTA.</p>
<h3>Example/Explanation:</span></strong></h3>
<p><span style="font-size: 16.0016px;">Spammers can spoof DNS domains via PTR records. In DNS validation of data is implicit in the lookup process. When you do a DNS lookup of "example.com" (A record) you are directed to the Name Servers for "example.com"; they are inherently valid servers. No validation is performed or implied on the responses the Names Servers provide. </span></p>
<p><span style="font-size: 16.0016px;">Similarly, when you do a Reverse DNS lookup of an IP address (e.g. 204.10.243.99), you are directed to the Name Servers for "204.10.243", and no validation/verification is performed on the responses.</span></p>
<p>The Name Server easily can say <span style="font-size: 16.0016px;">204.10.243.99 is secure.yourbank.com. The only way to validate this result is to perform a DNS lookup of the PTR result (e.g. secure.yourbank.com) and confirm that the IP address is listed. If it is not listed you may be in a situation where the PTR record is a spoof/forged!</span></p>
<p><span style="font-size: 16.0016px;">It is best practice to maintain the referential integrity of your DNS A and PTR records. Unfortunately it is quite common for these records to not be fully matched.</span></p>
]]></content:encoded>
<link>https://perfectmail.com/kb/may_be_forged_header</link>
<pubDate>Thu, 22 Nov 2012 20:00:14 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/may_be_forged_header,commentrss</wfw:commentRss>
</item>
<item>
<title>Deferred Messages</title>
<description>E-mail deferral occurs when a message (usually outgoing) cannot be immediately handed off to the next relay host. It is quite common to have messages queued as "deferred" as remote mail servers may not be available for any number of reasons: network traffic congestion, service outages, server load, DNS hiccups, grey-listing, etc.

Sometimes spam and delivery notification messages will get stuck in the queue as well. Spammers send a lot of e-mail, but rarely accept return e-mail, including bounce messages. These messages can get stuck in the queue. PerfectMail&trade; has automated processes that clean out such messages on an hourly basis.</description>
<content:encoded><![CDATA[<p>E-mail deferral occurs when a message (usually outgoing) cannot be immediately handed off to the next relay host. It is quite common to have messages queued as "deferred" as remote mail servers may not be available for any number of reasons: network traffic congestion, service outages, server load, DNS hiccups, grey-listing, etc.</p>

<p>Sometimes <i>spam</i> and <i>delivery notification messages</i> will get stuck in the queue as well. Spammers send a lot of e-mail, but rarely accept return e-mail, including bounce messages. These messages can get stuck in the queue. PerfectMail&trade; has automated processes that clean out such messages on an hourly basis.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/deferred_email_messages</link>
<pubDate>Thu, 22 Nov 2012 19:56:12 +0000</pubDate>
<category>Troubleshooting</category>
<wfw:commentRss>https://perfectmail.com/kb/deferred_email_messages,commentrss</wfw:commentRss>
</item>
<item>
<title>The Definition of Spam</title>
<description>The word spam as applied to e-mail means Unsolicited Bulk Email ("UBE").

Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent. Examples include: first contact inquiries, job inquiries, sales inquiries, etc.

Bulk means that the message is sent as part of a larger collection of messages, all having substantively identical content. Examples include: subscriber newsletters, customer communications, discussion lists, etc.

The technical definition states a message is spam only if it is both unsolicited and bulk.

Spam is an issue about consent, not content. Whether the UBE message is an advert, a scam, porn, a begging letter or an offer of a free lunch, the content is irrelevant; if the message was sent unsolicited and in bulk then the message is spam.

Spam is not a subset of UBE. It is not "UBE that is also a scam or that does not contain an unsubscribe link". All email sent unsolicited and in bulk is spam.

This distinction is important because legislators spend inordinate amounts of time attempting to regulate the content of spam messages, and in doing so come up against free speech issues.

Important facts relating to this definition:
The sending of Unsolicited Bulk Email ("UBE") is banned by all legitimate Internet service providers worldwide.
Real-time Block Lists are used by hundreds of millions of Internet users to reject emails identified as spam. These lists are based on the internationally accepted definition of spam as unsolicited bulk email. Therefore anyone sending UBE on the Internet, regardless of whether the content is commercial or not, illegal or not, needs to be fully aware that they will lose their Internet access if they send UBE and they will be placed on the Real-time Block Lists.
All a spammer has to do is GET YOUR PERMISSION and they can spam you with impunity.


The last point above is currently a huge issue. All the spammers have to do is to get your e-mail address and permission, then they can spam you with impunity. At PerfectMail&trade; we call these spammers "industrial spammers" or "spamvertizers". They are by far the biggest problem we are now encountering.

While they technically gain impunity by skirting the law, at PerfectMail&trade; we expand our definition of spam to include messages where the sender attempts to hide who they are or where they are coming from.</description>
<content:encoded><![CDATA[<p>The word <i>spam</i> as applied to e-mail means Unsolicited Bulk Email ("UBE").</p>

<p>Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent. Examples include: first contact inquiries, job inquiries, sales inquiries, etc.</p>

<p>Bulk means that the message is sent as part of a larger collection of messages, all having substantively identical content. Examples include: subscriber newsletters, customer communications, discussion lists, etc.</p>

<p>The technical definition states a message is spam only if it is both <i>unsolicited</i> and <i>bulk</i>.</p>

<p>Spam is an issue about consent, not content. Whether the UBE message is an advert, a scam, porn, a begging letter or an offer of a free lunch, the content is irrelevant; if the message was sent unsolicited and in bulk then the message is spam.</p>

<p>Spam is not a subset of UBE. It is not "UBE that is also a scam or that does not contain an unsubscribe link". All email sent unsolicited and in bulk is spam.</p>

<p>This distinction is important because legislators spend inordinate amounts of time attempting to regulate the content of spam messages, and in doing so come up against free speech issues.</p>

<p>Important facts relating to this definition:<ol>
<li>The sending of <i>Unsolicited Bulk Email</i> ("UBE") is banned by all legitimate Internet service providers worldwide.
<li>Real-time Block Lists are used by hundreds of millions of Internet users to reject emails identified as spam. These lists are based on the internationally accepted definition of spam as <i>unsolicited bulk email</i>. Therefore anyone sending UBE on the Internet, regardless of whether the content is commercial or not, illegal or not, needs to be fully aware that they will lose their Internet access if they send UBE and they will be placed on the Real-time Block Lists.
<li>All a spammer has to do is <b>GET YOUR PERMISSION</b> and they can spam you with impunity.
</ol></p>

<p>The last point above is currently a huge issue. All the spammers have to do is to get your e-mail address and permission, then they can spam you with impunity. At PerfectMail&trade; we call these spammers "industrial spammers" or "spamvertizers". They are by far the biggest problem we are now encountering.</p>

<p>While they technically gain impunity by skirting the law, at PerfectMail&trade; we expand our definition of spam to include messages where the sender attempts to hide who they are or where they are coming from.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/definition_of_spam</link>
<pubDate>Thu, 22 Nov 2012 19:53:46 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/definition_of_spam,commentrss</wfw:commentRss>
</item>
<item>
<title>Spam Traps</title>
<description>Spammers are constantly scouring the Internet looking for fresh targets for their trash. Empirical studies show that Spammers harvest e-mail address from web-sites, discussion groups, web blogs, chain letters and any other source they can find.

Spammers are so effective at harvesting e-mail addresses from websites that some people report receiving spam on their website published e-mail address in as little as 8 hours from the time the e-mail address is first posted to the site. It is because of aggressive website e-mail harvesting that many people believe that it is no longer practical to publish your e-mail address on your company or personal website.

PerfectMail&trade; is so effective, you can safely publish your e-mail address on your web site.

Surprisingly, an effective way to defend against spam is to give Spammers exactly what they want! PerfectMail includes a feature aptly called Spam Traps. Spam Trap accounts are e-mail addresses that are used to trick Spammers into identifying themselves.

The Spam Trap strategy is simple; create a bogus e-mail account, hide that account on your website, let Spammers harvest the bogus address from your website and then block all e-mail traffic that includes the Spam Trap e-mail addresses in a message's recipient list.

PerfectMail's spam trap feature looks for pre-defined Spam Trap e-mail addresses in the recipient list of every in-bound message. If a Spam Trap e-mail address is found in the recipient list, PerfectMail will:

Quietly removes all legitimate e-mail addresses from the recipient list (so legitimate users don't receive spam).
Adds or updates its reputation system to mark the sender as a Spam Trap spammer.
All the real recipient e-mail addresses are rejected to encourage them to "prune" your valid e-mail addresses from their lists.
All the spam trap e-mail addresses are accepted to encourage the spammers to keep using them.
Silently discards the message.



This strategy is effective because it gives PerfectMail notice when a spammer is targeting your server.</description>
<content:encoded><![CDATA[<p>Spammers are constantly scouring the Internet looking for fresh targets for their trash. Empirical studies show that Spammers harvest e-mail address from web-sites, discussion groups, web blogs, chain letters and any other source they can find.</p>

<p>Spammers are so effective at harvesting e-mail addresses from websites that some people report receiving spam on their website published e-mail address in as little as 8 hours from the time the e-mail address is first posted to the site. It is because of aggressive website e-mail harvesting that many people believe that it is no longer practical to publish your e-mail address on your company or personal website.</p>

<p>PerfectMail&trade; is so effective, you can safely publish your e-mail address on your web site.</p>

<p>Surprisingly, an effective way to defend against spam is to give Spammers exactly what they want! PerfectMail includes a feature aptly called <i>Spam Traps</i>. Spam Trap accounts are e-mail addresses that are used to trick Spammers into identifying themselves.</p>

<p>The Spam Trap strategy is simple; create a bogus e-mail account, hide that account on your website, let Spammers harvest the bogus address from your website and then block all e-mail traffic that includes the Spam Trap e-mail addresses in a message's recipient list.</p>

<p>PerfectMail's <i>spam trap</i> feature looks for pre-defined Spam Trap e-mail addresses in the recipient list of every in-bound message. If a Spam Trap e-mail address is found in the recipient list, PerfectMail will:
<ol>
<li>Quietly removes all legitimate e-mail addresses from the recipient list (so legitimate users don't receive spam).
<li>Adds or updates its reputation system to mark the sender as a Spam Trap spammer.
<li>All the <i>real recipient</i> e-mail addresses are rejected to encourage them to "prune" your valid e-mail addresses from their lists.
<li>All the <i>spam trap</i> e-mail addresses are accepted to encourage the spammers to keep using them.
<li>Silently discards the message.
</ol>
</p>

<p>This strategy is effective because it gives PerfectMail notice when a spammer is targeting your server.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/spam_traps_honeypots</link>
<pubDate>Thu, 22 Nov 2012 19:51:11 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/spam_traps_honeypots,commentrss</wfw:commentRss>
</item>
<item>
<title>Recipient Filtering</title>
<description>Recipient Filtering is a process where e-mail destined to addresses not hosted on your mail server are rejected during transmission. This is an important tool in reducing the volume of spam serviced by your mail server.

PerfectMail&trade; performs recipient filtering on incoming e-mail based on it's list of known e-mail addresses. Under normal operation, PerfectMail uses a progressive scheme that selectively queries your mail server to build a local database of known e-mail addresses.

To support this functionality, it is important that recipient filtering is enabled on your mail server. There are notes in the reference section for enabling this in Microsoft Exchange&trade; (which has this feature disabled by default.) If recipient filtering is disabled PerfectMail will receive responses that make it look like all e-mail addresses are valid on your mail server.

If recipient filtering cannot be enabled on your mail server, you need to disable this feature in PerfectMail's Domain Admin pages.</description>
<content:encoded><![CDATA[<p><i>Recipient Filtering</i> is a process where e-mail destined to addresses not hosted on your mail server are rejected during transmission. This is an important tool in reducing the volume of spam serviced by your mail server.</p>

<p>PerfectMail&trade; performs <i>recipient filtering</i> on incoming e-mail based on it's list of known e-mail addresses. Under normal operation, PerfectMail uses a progressive scheme that selectively queries your mail server to build a local database of known e-mail addresses.</p>

<p>To support this functionality, it is important that <i>recipient filtering</i> is enabled on your mail server. There are notes in the reference section for enabling this in Microsoft Exchange&trade; (which has this feature disabled by default.) If <i>recipient filtering</i> is disabled PerfectMail will receive responses that make it look like all e-mail addresses are valid on your mail server.</p>

<p>If <i>recipient filtering</i> cannot be enabled on your mail server, you need to disable this feature in PerfectMail's <i>Domain Admin</i> pages.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/recipient_filtering</link>
<pubDate>Thu, 22 Nov 2012 19:47:41 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/recipient_filtering,commentrss</wfw:commentRss>
</item>
<item>
<title>Message Scrubbing/Shredding</title>
<description>Generally deletion/scrubbing e-mail messages is not something that businesses should be doing. However, there may be a requirement for this functionality when security is a concern.

PerfectMail uses a US DoD compliant process for scrubbing and removing e-mail messages.

DoD 5220.22-M(ECE) is a seven pass overwriting wipe standard: first and second passes - with certain bytes and with its compliment, then two passes with random character, then two passes with character and its complement and the last pass - with random character.

Enable File Scrubbing by the following steps:

Enable the feature on: Server Admin =&gt; Server Settings, Other tab; enable e-mail shredding and deletion.
Give permission to a user to Shred/Delete a message on: Server Admin =&gt; Users; select a user; Permissions tab; enable Shred/Delete messages.
Now you can Shred/Delete messages in the E-mail Activity pages.
A log entry of the deletion is made on: Server Admin =&gt; Audit Log and a record of the message remains in the activity log; but all content is scrubbed and removed.


</description>
<content:encoded><![CDATA[<p>Generally deletion/scrubbing e-mail messages is not something that businesses should be doing. However, there may be a requirement for this functionality when security is a concern.</p>

<p><i>PerfectMail</i> uses a US DoD compliant process for scrubbing and removing e-mail messages.</p>

<p><i>DoD 5220.22-M(ECE) is a seven pass overwriting wipe standard: first and second passes - with certain bytes and with its compliment, then two passes with random character, then two passes with character and its complement and the last pass - with random character.</i></p>

<p>Enable <i>File Scrubbing</i> by the following steps:
<ol>
<li>Enable the feature on: <i><u>Server Admin =&gt; Server Settings</u></i>, <i>Other</i> tab; enable e-mail shredding and deletion.
<li>Give permission to a user to Shred/Delete a message on: <i><u>Server Admin =&gt; Users</u>; select a user; <i>Permissions</i> tab; enable Shred/Delete messages.
<li>Now you can Shred/Delete messages in the <i>E-mail Activity</i> pages.
<li>A log entry of the deletion is made on: <i><u>Server Admin =&gt; Audit Log</u></i> and a record of the message remains in the activity log; but all content is scrubbed and removed.
</ol>
</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/email_message_scrubbing_shredding</link>
<pubDate>Thu, 22 Nov 2012 19:21:25 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/email_message_scrubbing_shredding,commentrss</wfw:commentRss>
</item>
<item>
<title>Reverse DNS / PTR Records</title>
<description>DNS (Domain Name Services) is a system that resolves Internet host and domain names into their corresponding IP addresses. The basic DNS mechanism for this resolution is the A record. For example, "whitehouse.gov" is really the IP address 23.60.72.110 (as recorded in its A record).

Reverse DNS is a mechanism using a PTR record to recording the reverse mapping, i.e. mapping an IP address to an Internet domain or host name.

Many mail servers perform reverse DNS lookups in an attempt to validate a mail server and verifying the legitimacy of the sender. There are identifying elements of a mail server that are commonly queried and compared: the DNS A record, the DNS PTR record and the hostname reported by the mail server.

Different mail servers will apply different degrees of strictness with respect to these values. Often mail server connections will be refused if a PTR record does not exist for a mail server. Other servers will compare the values associated with A records, PTR records and the reported hostname of a mail server and apply spam scores based on the discrepencies between these values.

The best practice is to have the A record, PTR record and hostname of your mail server or PerfectMail anti-spam server all use the same name to ensure there are not validation issues.
</description>
<content:encoded><![CDATA[<p><i>DNS</i> (Domain Name Services) is a system that resolves Internet host and domain names into their corresponding IP addresses. The basic DNS mechanism for this resolution is the <i>A record</i>. For example, "whitehouse.gov" is really the IP address 23.60.72.110 (as recorded in its <i>A record</i>).</p>

<p><i>Reverse DNS</i> is a mechanism using a <i>PTR record</i> to recording the reverse mapping, i.e. mapping an IP address to an Internet domain or host name.</p>

<p>Many mail servers perform reverse DNS lookups in an attempt to validate a mail server and verifying the legitimacy of the sender. There are identifying elements of a mail server that are commonly queried and compared: the DNS A record, the DNS PTR record and the hostname reported by the mail server.</p>

<p>Different mail servers will apply different degrees of strictness with respect to these values. Often mail server connections will be refused if a PTR record does not exist for a mail server. Other servers will compare the values associated with A records, PTR records and the reported hostname of a mail server and apply spam scores based on the discrepencies between these values.</p>

<p>The best practice is to have the A record, PTR record and hostname of your mail server or PerfectMail anti-spam server all use the same name to ensure there are not validation issues.</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/reverse_dns_ptr_records</link>
<pubDate>Thu, 22 Nov 2012 19:16:28 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/reverse_dns_ptr_records,commentrss</wfw:commentRss>
</item>
<item>
<title>How do I view e-mail headers in Outlook 2010?</title>
<description>To view headers in Outlook 2010:

Open the e-mail you wish to view headers for;
Click the "File" menu and select "Properties", which will display the message headers in a new window.
</description>
<content:encoded><![CDATA[<p>To view headers in Outlook 2010:</p>
<ol>
<li>Open the e-mail you wish to view headers for;</li>
<li>Click the "File" menu and select "Properties", which will display the message headers in a new window.</li>
</ol>]]></content:encoded>
<link>https://perfectmail.com/kb/outlook_2010_mail_headers</link>
<pubDate>Thu, 22 Nov 2012 19:14:25 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/outlook_2010_mail_headers,commentrss</wfw:commentRss>
</item>
<item>
<title>Why am I still receiving e-mail from a sender I have black listed?</title>
<description>With PerfectMail, whitelisting takes precidence over blacklisting. Search the Mail Log (E-mail =&gt; Mail Log) for the message and check at the Scores (expand the Scores by clicking on the [+]) to see if the message was whitelisted.

If it was not whitelisted then check the Headers (expand the Headers by clicking on the [+]). The Envelope section of the Headers will show the relayhost, relayhostname, and env-from (envelope from address); make sure none of these entries are not whitelisted on your server.</description>
<content:encoded><![CDATA[<p>With PerfectMail, whitelisting takes precidence over blacklisting. Search the <i>Mail Log</i> (E-mail =&gt; Mail Log) for the message and check at the <i>Scores</i> (expand the Scores by clicking on the [+]) to see if the message was whitelisted.</p>

<p>If it was not whitelisted then check the <i>Headers</i> (expand the Headers by clicking on the [+]). The <i>Envelope</i> section of the <i>Headers</i> will show the <i>relayhost</i>, <i>relayhostname</i>, and <i>env-from</i> (envelope from address); make sure none of these entries are not whitelisted on your server.</p>]]></content:encoded>
<link>https://perfectmail.com/kb/receiving_black_listed_blocked_email</link>
<pubDate>Thu, 22 Nov 2012 19:09:28 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/receiving_black_listed_blocked_email,commentrss</wfw:commentRss>
</item>
<item>
<title>Does PerfectMail send NDR (bounce) messages?</title>
<description>PerfectMail does not make use of Non Delivery Reports (NDRs), rather it uses SMTP Rejection Notices. These rejection notices are exchanged during the SMTP mail exchange; when e-mail is being exchanged between mail servers. PerfectMail is able to give notification during the e-mail exchange because it is a Live Filtering Solution. PerfectMail analyzes, filters and responds to e-mail in real time, during the message exchange. This guarantees that PerfectMail sends a rejection notification and that the sending server received it; which is implicitly the correct server to send the notification to. By definition, such messages are not Backscatter.
</description>
<content:encoded><![CDATA[<p>PerfectMail does not make use of Non Delivery Reports (NDRs), rather it uses SMTP Rejection Notices. These rejection notices are exchanged during the SMTP mail exchange; when e-mail is being exchanged between mail servers. PerfectMail is able to give notification during the e-mail exchange because it is a Live Filtering Solution. PerfectMail analyzes, filters and responds to e-mail in real time, during the message exchange. This guarantees that PerfectMail sends a rejection notification and that the sending server received it; which is implicitly the correct server to send the notification to. By definition, such messages are not Backscatter.</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/ndr_bounce_messages</link>
<pubDate>Thu, 22 Nov 2012 19:03:01 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/ndr_bounce_messages,commentrss</wfw:commentRss>
</item>
<item>
<title>Network Connectivity Diagnostics</title>
<description>Network problems can be very annoying when they happen. PerfectMail&trade; provides a number of tools to assist administrators in diagnosing network connectivity issues. Available tools include:


DNS Lookup - Used to perform DNS Lookups;
Ping - Used to test network connectivity between PerfectMail and another network device;
TraceRoute - Used to trace the network route between PerfectMail and another network device;
WhoIs - Used to look-up human readable information about an Internet domain name;
SMTP Test - Used to diagnose low level SMTP protocol exchanges between PerfectMail and another mail server.


Additionally, PerfectMail performs periodic diagnostics of its configuration and connectivity to local infrastructure and the Internet. PerfectMail displays the health of its DNS configuration, Network Status and Mail Server Status on the Dashboard. The detailed results of these diagnostic tests are available in the Server Status Report (Reports =&gt; Server Status).

In e-mail diagnostics, first verify that network connectivity exists then check that DNS resolution is functioning correctly. Following is a step-by-step process to aid in general network diagnostics:

Step 1: Record local settings.

Confirm and record your local network settings under Server Admin =&gt; Networking, including: IP Address, Gateway and DNS servers. If you are having problems with a specific mail server, record the IP address of the mail server.

Step 2: Test basic connectivity.

Confirm basic network connectivity using the Ping Tool (Tools =&gt; Ping). Ping each device recorded in Step 1 (Gateway Server, each DNS server and any Mail Servers.) Note: Some network devices, including firewalls, may disable ping packet responses or even block the ICMP protocol, used to send ping network packets.

If you are experiencing connectivity issues at this stage, use the TraceRoute Tool (Tools =&gt; TraceRoute) to try and identify where the connectivity issue is located. Once again, firewalls and other devices may block the gathering of this information.

This step may identify a problem, or it may simply identify that your firewall is preventing you from gathering this information. If this is your situation, continue the diagnostic process keeping in mind connectivity issues may still be your problem.

Step 3: Confirm DNS resolution.

Confirm DNS resolution is functioning. Use the DNS Lookup Tool (Tools =&gt; DNS Lookup) to verify DNS resolution is working. Perform DNS Lookups against each of your listed DNS servers for well known hosts (e.g. www.google.com). Also, perform queries for hosts which will likely note be cached by your DNS server. Confirm DNS responses with those returned by DNS servers external to your organization (e.g. 4.2.2.1, 4.2.2.2, 8.8.8.8, etc.)

Frequently DNS servers may appear to be operating correctly when tests are performed against DNS entries which may be cached, while new DNS queries may fail. (This sometimes happens with Microsoft DNS services; rebooting the service resolves this problem.)

Occasionally, if there has been a significant DNS outage the PerfectMail Mail Transport Service (MTA) may need to be restarted. If you are not receiving incoming e-mail from domains you expect to receive e-mail from, try restarting the MTA service using the following proceedure:


Log in to the PerfectMail web interface;
On the Dashboard, locate the Mail Transport Service (MTA) status at the top left of the screen;
Stop the Mail Transport Service, then start the Mail Transport Service.


Step 4: Confirm SMTP Connections.

If basic connectivity and DNS resolution are functioning correctly, there may be a problem with the actual SMTP exchange. Occasionally, we see problems where firewalls, ISPs, etc. will block SMTP (port 25) traffic. There may also be configuration issues where SMTP services are not running or address acceptance or routing is broken.

You can diagnose SMTP connections using the SMTP Test Tool (Tools =&gt; SMTP Test). This tool allows you to specify a mail server IP address and port number, along with sender address, recipient address and simple content for testing purposes. The SMTP Test Tool will actually send an e-mail to the recipient you choose, directly through the specified mail server. During the process of sending this e-mail the actual SMTP commands used during communication will be displayed, along with any error messages.
</description>
<content:encoded><![CDATA[<p>Network problems can be very annoying when they happen. PerfectMail&trade; provides a number of tools to assist administrators in diagnosing network connectivity issues. Available tools include:</u>

<ul>
<li><a href="/kb/dns_lookup_tool">DNS Lookup</a> - Used to perform DNS Lookups;</li>
<li><a href="/kb/ping_connectivity_tool">Ping</a> - Used to test network connectivity between PerfectMail and another network device;</li>
<li><a href="/kb/traceroute_tool_network_diagnostics">TraceRoute</a> - Used to trace the network route between PerfectMail and another network device;</li>
<li><a href="/kb/whois_network_research_tool">WhoIs</a> - Used to look-up human readable information about an Internet domain name;</li>
<li><a href="/kb/smtp_test_tool">SMTP Test</a> - Used to diagnose low level SMTP protocol exchanges between PerfectMail and another mail server.</li>
</ul>

<p>Additionally, PerfectMail performs periodic diagnostics of its configuration and connectivity to local infrastructure and the Internet. PerfectMail displays the health of its DNS configuration, Network Status and Mail Server Status on the Dashboard. The detailed results of these diagnostic tests are available in the <i>Server Status Report</i> (<u>Reports =&gt; Server Status</u>).</p>

<p>In e-mail diagnostics, first verify that network connectivity exists then check that DNS resolution is functioning correctly. Following is a step-by-step process to aid in general network diagnostics:</p>

<h4>Step 1: Record local settings.</h4>

<p>Confirm and record your local network settings under <u>Server Admin =&gt; Networking</u>, including: IP Address, Gateway and DNS servers. If you are having problems with a specific mail server, record the IP address of the mail server.</p>

<h4>Step 2: Test basic connectivity.</h4>

<p>Confirm basic network connectivity using the <i>Ping Tool</i> (<u>Tools =&gt; Ping</u>). Ping each device recorded in <i>Step 1</i> (Gateway Server, each DNS server and any Mail Servers.) Note: Some network devices, including firewalls, may disable ping packet responses or even block the ICMP protocol, used to send ping network packets.</p>

<p>If you are experiencing connectivity issues at this stage, use the <i>TraceRoute Tool</i> (<u>Tools =&gt; TraceRoute</u>) to try and identify where the connectivity issue is located. Once again, firewalls and other devices may block the gathering of this information.</p>

<p>This step may identify a problem, or it may simply identify that your firewall is preventing you from gathering this information. If this is your situation, continue the diagnostic process keeping in mind connectivity issues may still be your problem.</p>

<h4>Step 3: Confirm DNS resolution.</h4>

<p>Confirm DNS resolution is functioning. Use the <i>DNS Lookup Tool</i> (<u>Tools =&gt; DNS Lookup</u>) to verify DNS resolution is working. Perform DNS Lookups against each of your listed DNS servers for well known hosts (e.g. www.google.com). Also, perform queries for hosts which will likely note be cached by your DNS server. Confirm DNS responses with those returned by DNS servers external to your organization (e.g. 4.2.2.1, 4.2.2.2, 8.8.8.8, etc.)</p>

<p>Frequently DNS servers may appear to be operating correctly when tests are performed against DNS entries which may be cached, while new DNS queries may fail. (This sometimes happens with <i>Microsoft DNS services</i>; rebooting the service resolves this problem.)</p>

<p>Occasionally, if there has been a significant DNS outage the PerfectMail <i>Mail Transport Service</i> (MTA) may need to be restarted. If you are not receiving incoming e-mail from domains you expect to receive e-mail from, try restarting the MTA service using the following proceedure:</p>

<ol>
<li>Log in to the PerfectMail web interface;</li>
<li>On the Dashboard, locate the Mail Transport Service (MTA) status at the top left of the screen;</li>
<li>Stop the Mail Transport Service, then start the Mail Transport Service.</li>
</ol>

<h4>Step 4: Confirm SMTP Connections.</h4>

<p>If basic connectivity and DNS resolution are functioning correctly, there may be a problem with the actual SMTP exchange. Occasionally, we see problems where firewalls, ISPs, etc. will block SMTP (port 25) traffic. There may also be configuration issues where SMTP services are not running or address acceptance or routing is broken.</p>

<p>You can diagnose SMTP connections using the <i>SMTP Test Tool</i> (<u>Tools =&gt; SMTP Test</u>). This tool allows you to specify a mail server IP address and port number, along with sender address, recipient address and simple content for testing purposes. The <i>SMTP Test Tool</i> will actually send an e-mail to the recipient you choose, directly through the specified mail server. During the process of sending this e-mail the actual SMTP commands used during communication will be displayed, along with any error messages.</p>
]]></content:encoded>
<link>https://perfectmail.com/kb/network_connectivity_diagnostics</link>
<pubDate>Mon, 19 Nov 2012 21:08:07 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/network_connectivity_diagnostics,commentrss</wfw:commentRss>
</item>
<item>
<title>Diagnostic Tools</title>
<description>PerfectMail&trade; provides a number of tools on its web interface (on the "Tools" menu) to provide administrators with the means of easily diagnosing network problems. The following tools are available:


DNS Look-up - Used to perform DNS look-ups;
Ping - Used to test network connectivity between PerfectMail and another network device;
TraceRoute - Used to trace the network route between PerfectMail and another network device;
WhoIs - Used to look-up human readable information about an Internet domain name;
SMTP Test - Used to diagnose low level SMTP protocol exchanges between PerfectMail and another mail server.


Additionally, PerfectMail performs periodic diagnostics of its configuration and connectivity to local infrastructure and the Internet. PerfectMail displays the health of its DNS configuration, Network Status and Mail Server Status on the Dashboard. The detailed results of these diagnostic tests are available in the Server Status Report ("Reports =&gt; Server Status").</description>
<content:encoded><![CDATA[<p>PerfectMail&trade; provides a number of tools on its web interface (on the "Tools" menu) to provide administrators with the means of easily diagnosing network problems. The following tools are available:</p>

<ul>
<li><a href="/kb/dns_lookup_tool">DNS Look-up</a> - Used to perform DNS look-ups;</li>
<li><a href="/kb/ping_connectivity_tool">Ping</a> - Used to test network connectivity between PerfectMail and another network device;</li>
<li><a href="/kb/traceroute_tool_network_diagnostics">TraceRoute</a> - Used to trace the network route between PerfectMail and another network device;</li>
<li><a href="/kb/whois_network_research_tool">WhoIs</a> - Used to look-up human readable information about an Internet domain name;</li>
<li><a href="/kb/smtp_test_tool">SMTP Test</a> - Used to diagnose low level SMTP protocol exchanges between PerfectMail and another mail server.</li>
</ul>

<p>Additionally, PerfectMail performs periodic diagnostics of its configuration and connectivity to local infrastructure and the Internet. PerfectMail displays the health of its DNS configuration, Network Status and Mail Server Status on the Dashboard. The detailed results of these diagnostic tests are available in the Server Status Report ("Reports =&gt; Server Status").</p>]]></content:encoded>
<link>https://perfectmail.com/kb/network_diagnostic_tools</link>
<pubDate>Mon, 19 Nov 2012 20:57:27 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/network_diagnostic_tools,commentrss</wfw:commentRss>
</item>
<item>
<title>The SMTP Test Tool</title>
<description>The SMTP Test Tool is used to diagnose an SMTP protocol connection between your PerfectMail&trade; server and another mail server. SMTP (S M T P) stands for Simple Mail Transfer Protocol. It is the protocol for sending e-mail messages between servers.

The information used to test the SMTP protocol are similar to what you would use for sending an e-mail. In fact the tool will actually send an e-mail to the recipient you choose. The important thing to note is that you must specify the IP address of the mail server you want to connect to. During the process of sending this e-mail the actual SMTP commands used during communication will be displayed.

Options for using this tool are as follows:

Server IP - The IP address of the mail server you want to connect to;
Port - The port number (25 by default) that you want to connect to;
From - The "from" e-mail address (may be blank);
To - The "to" or "recipient" e-mail address; you may provide multiple e-mail addresses separated by commas ',';
Subject - An optional subject line;
Message - Simple message content. (Text only. Keep it simple.)


Click the "Send" button to run the test. The actual SMTP commands will be displayed in the output box. Data sent from your PerfectMail server to the specified mail host will be prefaced with "&gt;&gt;", data received from the specified mail host will be prefaced with "&lt;&lt;".

Each line sent from your PerfectMail server will be responded to with a three digit return value:

200, 300 series numbers (e.g. 220, 250, 354, etc.) denote normal response codes.
400 series numbers (e.g. 421) denote temporary delivery errors; a recipient or the message could not be accepted/delivered at the current time, but you should try to send the message again.
500 series number (e.g. 550) denote permanent delivery errors; a recipient or the message will not be accepted/delivered.


Example:
[+] Connected to 204.10.243.25 25
&lt;&lt; 220 mailhost2.perfectmail.com ESMTP Sendmail 8.14.2/8.14.2; Mon, 19 Nov 2012 12:28:20 -0500
&gt;&gt; HELO localhost.localdomain
&lt;&lt; 250 mailhost2.perfectmail.com Hello remotehost.localdomain [192.168.10.123], pleased to meet you
&gt;&gt; MAIL FROM: &lt;&gt;
&lt;&lt; 250 2.1.0 &lt;&gt;... Sender ok
&gt;&gt; RCPT TO: &lt;dave@perfectmail.com&gt;
&lt;&lt; 250 2.1.5 &lt;dave@perfectmail.com&gt;... Recipient ok
&gt;&gt; DATA
&lt;&lt; 354 Enter mail, end with "." on a line by itself
&gt;&gt; To: &lt;dave@perfectmail.com&gt;
Subject: Testing connection
Date: Mon, 19 Nov 2012 12:28:22 -0500
X-Mailer: PerfectMail

&gt;&gt; Testing the SMTP connection.
&gt;&gt; .
&lt;&lt; 250 2.0.0 qAJHSKTL017642 Message accepted for delivery
&gt;&gt; QUIT
[-] Closed connection</description>
<content:encoded><![CDATA[<p>The <i>SMTP Test Tool</i> is used to diagnose an <i>SMTP protocol connection</i> between your PerfectMail&trade; server and another mail server. SMTP (S M T P) stands for <i>Simple Mail Transfer Protocol</i>. It is the protocol for sending e-mail messages between servers.</p>

<p>The information used to test the SMTP protocol are similar to what you would use for sending an e-mail. In fact the tool will actually send an e-mail to the recipient you choose. The important thing to note is that you <b>must specify</b> the IP address of the mail server you want to connect to. During the process of sending this e-mail the actual SMTP commands used during communication will be displayed.</p>

<p>Options for using this tool are as follows:</u>
<ul>
<li><b>Server IP</b> - The IP address of the mail server you want to connect to;</li>
<li><b>Port</b> - The port number (25 by default) that you want to connect to;</li>
<li><b>From</b> - The "from" e-mail address (may be blank);</li>
<li><b>To</b> - The "to" or "recipient" e-mail address; you may provide multiple e-mail addresses separated by commas ',';</li>
<li><b>Subject</b> - An optional subject line;</li>
<li><b>Message</b> - Simple message content. (Text only. Keep it simple.)</li>
</ul>

<p>Click the "Send" button to run the test. The actual SMTP commands will be displayed in the output box. Data sent from your PerfectMail server to the specified mail host will be prefaced with "&gt;&gt;", data received from the specified mail host will be prefaced with "&lt;&lt;".</p>

<p>Each line sent from your PerfectMail server will be responded to with a three digit return value:</p>
<ul>
<li>200, 300 series numbers (e.g. 220, 250, 354, etc.) denote normal response codes.</li>
<li>400 series numbers (e.g. 421) denote temporary delivery errors; a recipient or the message could not be accepted/delivered at the current time, but you should try to send the message again.</li>
<li>500 series number (e.g. 550) denote permanent delivery errors; a recipient or the message will not be accepted/delivered.</li>
</ul>

<p>Example:</p><hr/>
<pre>[+] Connected to 204.10.243.25 25
&lt;&lt; 220 mailhost2.perfectmail.com ESMTP Sendmail 8.14.2/8.14.2; Mon, 19 Nov 2012 12:28:20 -0500
&gt;&gt; HELO localhost.localdomain
&lt;&lt; 250 mailhost2.perfectmail.com Hello remotehost.localdomain [192.168.10.123], pleased to meet you
&gt;&gt; MAIL FROM: &lt;&gt;
&lt;&lt; 250 2.1.0 &lt;&gt;... Sender ok
&gt;&gt; RCPT TO: &lt;dave@perfectmail.com&gt;
&lt;&lt; 250 2.1.5 &lt;dave@perfectmail.com&gt;... Recipient ok
&gt;&gt; DATA
&lt;&lt; 354 Enter mail, end with "." on a line by itself
&gt;&gt; To: &lt;dave@perfectmail.com&gt;
Subject: Testing connection
Date: Mon, 19 Nov 2012 12:28:22 -0500
X-Mailer: PerfectMail

&gt;&gt; Testing the SMTP connection.
&gt;&gt; .
&lt;&lt; 250 2.0.0 qAJHSKTL017642 Message accepted for delivery
&gt;&gt; QUIT
[-] Closed connection</pre><hr/>]]></content:encoded>
<link>https://perfectmail.com/kb/smtp_test_tool</link>
<pubDate>Mon, 19 Nov 2012 20:45:22 +0000</pubDate>
<category>General</category>
<wfw:commentRss>https://perfectmail.com/kb/smtp_test_tool,commentrss</wfw:commentRss>
</item>
</channel>
</rss>
