background

SpamExperts KnowledgebaseControl Panel Guides

Control Panel All Levels (online)

Email User Level

Log Search

The log search allows you to view all accepted, and rejected messages.

By using the "Classification", and "Status" options, you are able to fine grain your search to match your specific criteria. 

While the "Customize" option allows you to define what columns you prefer to be shown. 

On each message there are various drop down actions either per message or in bulk

Email Scout Reports

The ESR reports allows you to create one time or timed reports on results from your log searches. 

To use this you need to first use the log search to get the data that you need , then click on the "Email me this report" button

Extended details on how you can create reports can be found here.

Delivery Queue

This page shows emails that cannot be temporarily delivered to the destination mail server. Messages that end up here will only be due to temporary issues (4XX error) with the destination mail servers.

On this page you have several options using the drop down menu net to the message:

  • Retry to delivery all messages (Apply to Selected - Force Retry option)
  • View Message (View option)
  • Delete Message (Delete option)
  • Delete and Report as Spam (Delete and report as spam option)
  • Force retry individual message (Force Retry option)
  • Check the Queue Reason (Error Details option)
  • Check the Retry Time (check option under Retry time)
  • Search for messages (Delivery Queue page)
  •  Reply  (reply to the queued message directly from the interface

You can view the content/raw headers of a queued message by pressing the drop-down black arrow on the selected message and View.

We have also reintroduced the option 'Error details' to check the reason why messages are stored in Delivery Queue.

It is possible to execute “bulk removal” on selected messages by putting a tick in the check box of the selected messages and choose “Remove messages” from the actions at the bottom of the screen.

Choosing the “Delete & Report as Spam” option will report the selected message(s) to the training server and delete the message from the queue.

If you choose "Reply", this allows you to compose and reply to a message to a sender when the message is queued.

It's also possible to search the delivery queue using the search option in the interface:

When a message cannot be delivered to its recipients nor returned to its sender, the message is marked as “frozen”, and only occasional delivery attempts are made before eventually giving up on the message. You can now search the Delivery Queue for all the queued messages (including frozen messages), or only ones that are “frozen”, or only normal messages excluding frozen messages. Further details on the queuing system can be found here

Spam Quarantine

The Spam quarantine interface displays all the incoming quarantined messages.

By default, logs are stored in the Spam Quarantine for 14 days.

From the quarantine overview, you are able to view the messages and sort or search on specific criteria. The “From:” address is used  here to resemble the results an email client would show.

Directly from the overview you have the ability to use the following actions:

  • Release  - This will release the specific message from the quarantine and it will only deliver it to the intended recipient.
  • Release and Train - This will deliver the message to the recipient and train the message as ham into our filtering system. This option is recommended when releasing the messages from Spam Quarantine so that the filters can be correctly adjusted.
  • Release and Whitelist - This will deliver the message to the indented recipient and automatically add the sender’s email address to ‘Sender Whitelist’.
  • Remove - This will delete the message from Spam Quarantine.
  • Remove and Blacklist - This will delete the email and automatically add the sender’s email address to ‘Sender Blacklist’.

Please note that releasing messages has effect on your filtering, so releasing spam/virus/phishing emails may have a negative impact on your filtering quality.

To view a message simply click on the "Subject" from the overview

To view the headers and full raw content of one quarantined messages:

  • Click on the subject of the relevant message
  • Click the ‘Raw’ tab
  • Click ‘Load raw body’ at the bottom of the headers

To view the reason for the blocked message, you will need to look for the “Evidence:” line of the raw header and then compare it against our classifications “page”.

Train Spam

With this option you can drag and drop or upload spam messages that passed the filter for immediate training to the systems.

The emails should be in .eml, .txt or .msg format and it must contain the full headers, including the filters' additional headers.

Train Not Spam

With this option you can drag and drop or upload messages you wish to classify as not spam (ham) for training. The emails must be in .eml / .txt / .msg format and it must contain the full headers, including the filters' additional headers.

Archive search

Here you can search messages that match the specified criteria that have been archived. You can set the text to be found in the field ‘query’. Also you can choose the mode.

It may be ‘all’, ‘any’, ‘Boolean’ or ‘phrase’. The Boolean mode allows the ‘&’ (and), ‘|’ (or), ‘-’ ‘!’ (not) operators and grouping ‘(’ and ‘)’ to be used in the query.

All archived emails are indexed including readable attachments. They can be searched using any search string.

You are also able to view, download or re-deliver the messages to the same of different recipients. 

When re-delivering please make sure you press enter for each recipient. 

This can also be done via the log search page, by selecting the messages and using the drop down action "Re-deliver"

Archive Export

Here you can export archived messages for a specified date range to a destination email of your choosing.
All the archived emails from that period will be downloaded as individual files in a zip archive.

This can also be done via the log search page, by selecting the messages and using the bulk action "Download".

Periodic user report (email user)

The periodic user page allows to enable/disable/remove your current report settings. 

Sender Whitelist (email user)

The email user level sender whitelist allows to to whitelist specific senders or domains for the specific recipient. 

Wildcards are available here. 

To add entries one by one, you will need to use the Add whitelist sender button. This will open a new pop-up window, where you will need to: 

  • Select the Sender Flag. This can be: 
    • Envelope Sender
    • From Address
    • Both
  • Add the address / wildcard that you want to whitelist.
  • Click Save

To view the Existing entries, once you get to the Sender Whitelist Section, you need to click on the Show Results button. 

If no search criteria is used, then all entries will be displayed. If you want to search for a specific address, you will first need to populate the Query Rules. By default, only the Address field is selected. You can adjust this by using the drop down list, or add new Rules by using the New Rule button. 

Sender Blacklist (email user)

The email user level sender blacklist allows the recipient to add specific senders or domains to the blacklist. 

Wilcard are available here. 

To add entries one by one, you will need to use the Add blacklist sender button. This will open a new pop-up window, where you will need to: 

  • Select the Sender Flag. This can be: 
    • Envelope Sender
    • From Address
    • Both
  • Add the address / wildcard that you want to whitelist.
  • Click Save

To view the Existing entries, once you get to the Sender Blacklist Section, you need to click on the Show Results button.

If no search criteria is used, then all entries will be displayed. If you want to search for a specific address, you will first need to populate the Query Rules. By default, only the Address field is selected. You can adjust this by using the drop down list, or add new Rules by using the New Rule button.

User profile

In this section you can edit the user’s profile and enable options such as :

Features preview

Enabling this option gives the user the ability to be able to view and use new features that are being developed. Pleae note, that as these are previews, they are subject to change at any time. Once enabled, the new options will be shown in the interface with "(preview)" in the icon. 

Two Step Authentication

To increase the security of your account. This means an additional device (like a mobile phone) will be required in order to log in, so even if someone knows your password they will not be able to take control of your account without your device as well.

For Two Step Authentication, you should be able to use any app that supports the Time-based One-Time Password (TOTP) protocol, including:

  • Google Authenticator (Android/iPhone/BlackBerry)
  • Authenticator (Windows Phone 7)

Notification

The Notification option when enabled sends an email notification when the account is accessed from a new/different IP. 

Compose email

The following page allows you to compose an email directly from the interface. This isn’t intended to be a full email client, but you are able to set and change the To, CC, and BCC addresses, use rich formatting, and insert links into messages.

Domain User Level

Domain settings

With the domain settings in the control panel users can control certain domain settings. The default settings apply to all domains that have not yet explicitly set a custom value for the setting yet, and are therefore using the default settings.

In this section users can set the maximum bounces, enable/disable logging for invalid recipients, and set accessible/inaccessible logging days for your domains which are using the default settings.

You can also activate Direct delivery for email and domain aliases which ensures that when aliasing is in use, the emails will be delivered to the alias address, instead of the original one. This applies to both Email and Domain aliasing. Note that the Log Search will still show the message for the original address.

The Rejected Local-part characters are the characters that are allowed in the local part (before the @ part ) of the email address. As regex is used, anything inside the “[ ]” is not allowed. Thus removing a character here will allow that character in the local part. 

You can “Edit Rejected Characters” by setting up a list of regular expressions. If a local part of the recipient matches any of the regular expressions, then the recipient will be rejected.

Advanced Domain settings

The advanced domain settings page allows you to configure further options per domain.

Administrator contact

Here the domain admin contact is set. This is used for password retrieval for domain users.

Maximum bounces per hour

Configurable bounce messages (NDR) per hour per domain.

Days to keep log messages

Logging days to be set. Note the larger this is set the more disk space is used.

Maximum days to retry

Number of days that a message should be retried in the delivery queue.  By default this is 4 days but can be adjusted if needed. Please note, that this only effects new messages when changing and any existing messages that are queued will remain at the original value.

Disable catch-all check

This option can be used to disable the catch-all check when it fails to work properly with servers that have a non-standard behavior (like Microsoft Exchange 2013)

Priority increase for training

If you are 100% sure that users at this domain are correctly training messages, then you can increase the weight of the training process for this domain. Raising this weight will increase the importance of user training as a general filtering factor, thus altering the filtering results. Some automated secondary review processes for messages will be postponed when using this option, meaning that training will have an impact more quickly. Make this change with caution.

Local recipients

This feature allows email traffic only to recipients already added on the below list, verifying the existence of an email account before accepting the email for it. For uploading a large list, for example thousands of email addresses, you can use the “Upload CSV file” feature which will automatically add the recipients without having to manually add them one by one. 

With local recipients you have to add all recipients by hand. If you do not add these users, you will not be able to receive emails on that account.

We highly recommend only using this feature in specific cases, in normal cases this is not necessary to use.

Therefore you have the option to disable the automatic recipient detection system and to enforce a local list of valid recipients. If “Use local recipients” is enabled, the system will only accept email for the listed recipients. Emails sent to not-listed recipients will be permanently rejected.


Email address aliases

Here you can add aliases for your email addresses 

Simply fill in the two fields, “Email Address” and “Email Address Alias”, and click “Add”.

Now the email address alias will appear in the list. By selecting it (tick the checkbox) you can remove the alias.

Email address aliasing rewrites the recipient at SMTP level to the primary address. The "To:" is not changed. 

Domain Aliases

If you have multiple domains, you can make use of the domain aliasing option. Domain aliases can be added to your main domain directly in the web interface. Any email sent to the domain alias will be delivered to the same user on the main domain.

Messages delivered to the alais domain will be re-written at SMTP level to the main domain, so the local email part MUST exist on the main domain.

Alias domains don’t have separate access to the control panel. Since all SMTP traffic to the domain alias is rewritten to the main domain, any changes/lookups on the main domain will simply include the alias domain traffic as if it was sent directly to the main domain. If you are searching for a specific email sent to a domain alias using the log search, the recipient will therefore show as user@maindomain.

Email and address alias is also supported. For example, if the domain example.org is an alias for the primary domain example.com, and example.com has an email alias example_alias@ for the primary mailbox example@, then:

  • example_alias@example.com is an alias for example@example.com

  • example@example.org is an alias for example@example.com

  • example_alias@example.org is an alias for example@example.com

Edit routes

With this function you edit the route(s) (destination mail server) and their respective delivery order.

You have the option to add and delete routes. Also, the list allows you to dynamically move the order of the routes by drag dropping them to the right position in the list.

Whenever there are temporary problems with the first route (e.g. 4xx temporary rejects), we’ll automatically try delivery to the second route. If there are permanent failures with a route (e.g. hostname not resolvable) we’ll directly start rejecting email and won’t try the next route. 

We recommend not to use your own fallback system, and instead use the filtering cluster to queue your emails if there are problems with your main destination route. 

Domain statistics

Here you can view the statistics for a given time-frame (Hours,Days,Weeks,Months,Years) of your incoming email traffic.

 

Statistics are displayed for :

  • General accuracy
  • Spam ratio (of total messages)
  • Not Spam messages
  • Unsure messages
  • Spam messages blocked
  • Viruses blocked
  • Whitelisted
  • Blacklisted

Filter Settings

With the Filter settings function, you can control the activation of the quarantine system as well as other options. 

Quarantine enabled

If you disable the quarantine system, emails detected as spam will not be kept in the quarantine system but will be delivered to your destination email server. Under “Spam Notation” you can mark these messages with a specific subject notation. Note that we do NOT return a 5xx reject message for messages classified as spam if the quarantine has been disabled, we do return a 5xx reject message for messages classified as spam if the quarantine is enabled. Every email gets a special header added “X-Recommended-Action: accept” or “X-Recommended-Action: reject”. You can filter the message based on this header if quarantine is disabled.

Threshold

The Quarantine Threshold slider (in red) indicates what score you have set for spam messages. The higher the score, the higher the threshold our systems detect and flag the message as spam. We recommend setting this level to 0.90 to avoid any mail delivery problems.

The "Beneficical to train" Threshold slider (in green) indicates at what threshold our systems classify the message as unsure, the higher the number set here, the higher threshold our systems have to reach before we class it as unsure. The default here should be 0.3. This option is primary used when pro-active training is needed.

When a message gets blocked using this method, you can see the combined score in the headers of the email. For example:

X-BrandedHostname-Evidence: Combined (0.96)

Quarantine days

Here you can set the number of days for how long you wish to store the spam emails in the Spam Quarantine. This applies globally to all the domains using the default settings. (Super Administrators only)

Sender Checks

Here you can enable/Disable SPF/DMARC/DKIM related checks per domain. Note in doing this all messages for this domain will have these checks disabled. 

We strongly recommend that all these are enabled. If you wish to skip specific sender domains or IP's from these checks we would recommend that you use the following option:

Manage list of domains and IP addresses with disabled SPF, DKIM, and DMARC checks

Skip Maximum Line Length

This means that emails for all the domains using the default settings will not be subject the RFC line length checks.

Clear Callout Cache

This button clears the "Callout Cache" for the domain in question (the default cache clears all domains - Super Administrator only). By default we cache server responses to 2 hours. For example, if you change a route of a domain you will need to clear the calllout cache for that domain if you do not want to wait for the 2 hour cache to expire.

We recommended to clear the callout cache only at domain level of the domain that is having issues instead of clearing the callout cache globally. 

Generate DKIM certificate

On this page can generate a DKIM (DomainKeys Identified Mail) certificate for your domain. You will need to choose the desired selector that you chose earlier in the outgoing users section.  As a result you will get a value for public key which should be available in your DNS.

After successful DKIM generation, you should enable the resulting DKIM certificate for each outgoing user using your selector.

The key lengths that can be chosen are:

  • DKIM length 2048 bits (Recommended)
  • DKIM length 1024 bits (Only can be used if unable to use a 2048 bit key DNS provider)

Settings

On this page you can set the administrator’s contact email for the domain.

This address is predominately used for ARF (Abuse Report Feedback) reports.

Generate SPF record

On this page you can generate a SPF record.

The system automatically generates the SPF record string along with the current status on the domain. For the SPF Record to become functional it has to be added at the DNS Registrar / Edit Zone page as a TXT Record. 

Manage Outgoing Identities 

This page allows you to view your current logged outgoing Identities. By using the query rules you are able to use fine-grained searching. 

It's Also possible to lock/unlock either individual or on mass your outgoing Identities. More information on user locking can be found here.

Manage Outgoing Users

The manage users page allows you to view/edit or create your outgoing users. 

For detailed information about outgoing user settings please see here

Outgoing Reports

The Outgoing reports page allows you to generate custom reports for outgoing email for a given timeframe. This can either be done for one domain or mutiple (max 500).

Grouping can be done on either an envelope-sender, identity or from header. 

On-demand Protection report 

Using this feature you can generate a Protection Domain Report for a specified date range, and send it to a specified email address. The format of the report can be either HTML or PDF format.

The “Include extra spam table” is only used in the PDF reports, and this adds a table of of messages that were rejected but not quarantined.

Periodic domain report 

A daily or weekly report can be generated for your domain (or for specific recipients at a domain) and is delivered via email. Multiple recipients can be separated with a comma. A report can also be generated on-demand from the API/web interface.

The report can be sent as a PDF attachment or as inline HTML. The PDF report outlines a summary of the spam and viruses that the filtering service has protected the domain (or address) from receiving, and also includes information about the total volume of mail processed for the said domain.

The PDF report also includes a detailed table (for auditing purposes) of messages that were rejected but not quarantined; this table is configured by default but may be disabled via the API/web interface – it will be very large for some domains. A similar table is also included with the messages that were quarantined, including links to release each message directly.       

Settings defined here will mean that users on this domain will also take these values

Periodic User Report

As domain user, with this option you can enable Periodic Protection Reports based on users. You can add users, either individually or via the .csv upload function for multiple users (multiple upload is only available for domain users). Only ASCII characters are supported for the local part.

The report will contain an overview of the quarantined messages for a specific user, including links to release each message directly.

The option “Automatically activate for all recipient” will automatically add users to the user report list, and then once added, send them a daily or weekly report on the spam received. It will also send the end users a welcome email in the beginning to let users know their personal quarantine has been activated. If users would like to log in and see and adjust settings, they can do it using the login link in the email.

If your domain has “Catch-All” enabled, then this option will not be available for use.For Exchange versions that do not have recipient verification enabled, please see here for instructions on how to enable this.

Domain report actions

This option allows you to restrict specific actions that are available via the user and domain reports.  By default all options are enabled, howveer if you wish to disable the training or releasing options you can do this here. This will effect all users on the domain. 

Email restrictions

By default the system applies no limits to the email size, and uses the size set by the destination mailserver. You can however set the maximum size for incoming and outgoing emails to be accepted by the filtering system. If the message exceeds the set up limit , it can either Rejected and stored in the Spam Quarantine or it can be Rejected with 5xx code(and not stored in Spam Quarantine) depending on how you set this up.   

Attachment restrictions

You can specify which emails should be blocked based on the extension of the files attached. There is a list of some extensions added by default but you can add whatever extension type you want. If a file extension will be blocked the email message which contained the attachment will be quarantined. 

 

Restricted Options:

here you are able to enable/disable messages that are likely to be dangerous. for example, compressed archives that have executable within a zip file, compressed archives that are password protected , and attachments that are classified as PUA  (This can be attachments that have runtime packers for example, or PDF's that contain Javascript)

 

Additional restrictions:

The additional restrictions options allows to to configure how many mime parts are allowed for a message, and the “message link size limit”. The message link size limit refers to the “scanned link extensions” below. As malware will often be of a small size, we would recommend to set this to around 2MB maximum. 

 

Scanned link extensions:

By default when a message is sent with a link inside the email, the content of this link is not downloaded. Here you can configure this. For example, you can add “.zip” and “.rar” to this list, and if a message is sent with “http://example.com/mybadfile.zip”, then the “mybadfile.zip” will be downloaded and scanned. We recommend to never add things like “.php”, “.html” etc to this list. 

 

Sender Whitelist

This page allows you to configure whitelisted senders for either the whole domain or specific users.  

 

For domain whitelisting simply add the domain (or email address) of the sender you wish to whitelist in the "Sender" part, and leave the "Local-Part" empty.

If you want to whitelist a sender only for one recipient, add the local part only. (the part before the @)

Wild-cards are possible here when whitelisting senders. 

  • *.example.com - Will whitelist all sub-domains of example.com
  • *.TLD - Will whitelist the entire TLD

To view the Existing entries, once you get to the Sender Whitelist Section, you need to click on the Show Results button. 

If no search criteria is used, then all entries will be displayed. If you want to search for a specific address, you will first need to populate the Query Rules. By default, only the Address field is selected. You can adjust this by using the drop down list, or add new Rules by using the New Rule button. 

In the Default Senders tab, you will be able to see the addresses that have been whitelisted by default for the entire cluster. You can choose to use those addresses or not, by simply selecting between Yes and No for the Use Default Values

Recipient whitelist

The recipient whitelist is used when no filtering of the recipient is needed.  Any recipient added here will have all messages delivered without any filtering.

To add a recipient to the list, you need to use the Add whitelist recipient button and in the new pop-up screen, you only need to add the local part (the part before the @). 

To view the Existing entries, once you get to the Recipient Whitelist Section, you need to click on the Show Results button. In the Domain recipients tab only the recipients added for this domain will be returned. In the Default tab, you will see addresses that have been whitelisted by default for the entire cluster. By default the "abuse@" and "postmaster@" addresses are added.  

You can choose to use those addresses or not, by simply selecting between Yes and No for the Use Default Values

Sender blacklist

To allow the domain administrator or email user to remain in control over the filtering, it’s possible to blacklist a sender. 

The check works based on the MAIL FROM (envelope-sender)  provided by the sender at SMTP level and the From address that is visible to recipients or both.  The MAIL FROM might be different from the From: address.

  • Messages from blacklisted MAIL FROM (Envelope-senders) addresses are rejected at SMTP level and are not quarantined. 
  • Messages from blacklisted "FROM:" addresses (if different) are quarantined.

For domain blacklisting simply add the domain (or email address) of the sender you wish to blacklist in the "Sender" part, and leave the "Local-Part" empty.

If you want to blacklist a sender only for one recipient, add the local part only. (the part before the @)

Wild-cards are possible here when blacklisting senders. 

  • *.example.com - Will blacklist all sub-domains of example.com
  • *.TLD - Will blacklist the entire TLD

To view the Existing entries, once you get to the Sender Blacklist Section, you need to click on the Show Results button. 

If no search criteria is used, then all entries will be displayed. If you want to search for a specific address, you will first need to populate the Query Rules. By default, only the Address field is selected. You can adjust this by using the drop down list, or add new Rules by using the New Rule button. 

In the Default Senders tab, you will be able to see the addresses that have been blacklisted by default for the entire cluster. You can choose to use those addresses or not, by simply selecting between Yes and No for the Use Default Values

Recipient blacklist

The recipient blacklist is used when the mentioned recipient should not receive any email.  Any recipient added here will have all messages blocked. 

To add a recipient to the list, you need to use the Add blacklist recipient button and in the new pop-up screen, you only need to add the local part (the part before the @). 

To view the Existing entries, once you get to the Recipient Blacklist Section, you need to click on the Show Results button. In the Domain recipients tab only the recipients added for this domain will be returned. In the Default tab, you will see addresses that have been blacklisted by default for the entire cluster.

You can choose to use those addresses or not, by simply selecting between Yes and No for the Use Default Values

Archive Settings 

The Archive settings page allows you to configure specific options for the domain. Including the number of days to store email, and what parts of the message you want indexing. 

Please note, if you require to add password protection to archived data for users(for security reasons),  this needs to be done in the admin settings page. 

Archive status

On this page you can check the status of your Archiving service.

As a domain user you can check the following: 

  • Space Used
  • Archived email for recipients
  • Number of days emails are stored
  • Soft quota
  • Hard quota

 

As a Super-Admin you will see the following parameters, including the ones from above if you go to your domain (Super-Admin Dashboard – Overview – Select a domain – Archiving – Status).

  • Number of days emails are stored
  • Soft quota
  • Hard quota

Archived recipients

On this page you can manage the archived recipients for your domain. 

You have the options to manage all recipients, a list of specific recipients, or all recipients except a list of recipients (for example a journaling address).

The list should be separated by a space ( ) or a comma (,). Also, please provide only the local part of the recipient’s email address. For example only add “test” from the “test@example.com” email address.

Manage email users

With this function you can manage email users. These users can log into the  Control Panel with their email address to see their own quarantine, and manage their specific email settings.

Please ensure that the domain you are creating the email for already exists on the server, and when setting the password, the password must contain lower case letters, at least one upper case letter or one digit, no spaces, and must be 6-25 characters in length.

Only ASCII characters are supported for the local part.

You may also upload a Comma Separated Values (CSV) file. Each line in the file must contain at least four columns, the username, the domain, the password and the status.

The password must contain lower case letters, at least one upper case letter or one digit, no spaces, and must be 6-25 characters in length.

As a higher level user, you also have the ability to “Login as user”.

If you select an Email user in ‘Manage Email Users’ page and press the drop-down black arrow you have several options such as:

  • Edit Email User
  • Delete Email User
  • Login as the Email User
  • Require 2FA

With Require 2FA an Administrator or Reseller or Domain user can require specific users, or all users, to use 2FA. If a user didn’t previously have this enabled, they will be prompted to set it up on their first login after it’s requested.

Manage permissions

In this section you can manage specific permissions for available user roles and for individual pages for user levels.

User settings

On this page you have the option to configure the global password policy for all your users.

You can customize the following elements of the password policy:

  • Minimum number of characters
  • Minimum number of digits
  • Minimum number of lowercase characters
  • Minimum number of uppercase characters
  • Minimum number of punctuation characters
  • Allow spaces
  • Allow dictionary words

As a Super-Admin you also have the option to enforce Two-Factor Authentication (2FA) for user types, such as super-admins, admins, domain users or email users.

     

Admin User Level

Overview

Domain Overview contains a list of domains, domain aliases, destination routes, and ports for which your email filtering system accepts email. Also active services present on each domain are displayed as small green boxes by each domain name.

You can perform the following functions by clicking on the respective drop down menu, beside each domain:

  • Configure (Domain)
  • Manage products
  • (Check) Protection Status
  •  (Check) Valid recipient count
  • Transfer (the domain) to an admin 
  • Unbind from an admin (on the Cluster)
  • Telnet
  • Remove (domain)

Add Domain

To add a domain, click on the Add Domain button in the welcome user dashboard. You can optionally upload a Comma Separated Values (CSV) file to add multiple domains at once.

Then type the domain you would like to add to your filtering system, for example: "example.com" and click *Continue*.

If no destination mail server (route) could be determined for the final mail delivery, you are automatically asked to enter the route manually. 

If you want to add more than 1 route, in case the first one is not reachable, you can do this later by going to *Domain Dashboard* > *Incoming* > *Edit Routes*.

Always add the domain to the interface before changing the MX records to the new cluster MX records, because in this way the correct route for the destination mail server will be added automatically and no mail will be rejected.

The domain will appear in the Overview page, after being successfully added.

MX verification tool

The MX verification tool is used to check if domains present on the server have the correct MX records.

Click on the DashboardMX verification tool under the Domains menu section. Enter your valid MX hostname(s) and click start verification.

The output will list all the domains present on the system with different MX records.

There are 2 checkbox options available:

  • Check this box to send an email notification to a customer in case of wrong MX settings
  • Also verify MX records of domain aliases

The above are by default unchecked.

Domain Ownership

Here you can add your domain(s) and we'll verify your ownership. Simply follow the instructions, for example, add a domain "example.com". Then you need to add the CNAME you are provided with.

You will be given for example the following CNAME record: 

dwtzty8kedtw.   CNAME 6p6ngfykfnreylqxcslsbut3voabhqqp.verifydomain.login.FILTERINGHOSTNAME.com

Checks will be performed periodically to validate the domain, until we find your CNAME record in the DNS settings.

Here you can also check if the domain has been validated or remove the domain validation process, by clicking the left-hand side button as shown in the below screenshot and choosing your appropriate action (Check or Remove).

You should leave the CNAME in place for re-verification. Don't remove it.

Bandwidth overview

The Bandwidth Overview feature will display the bandwidth usage per domain for a given time-frame.

OAuth settings (Private Label)

OAuth can be set up at Super-Admin, Admin, and Sub-admin level when the Private Label feature is enabled. It is applied based on the Custom Hostname that is set for the branding.

Login to the Spampanel interface, and navigate to the OAuth section.

To enable OAuth login, tick the checkbox

  • Provider URL: This URL should be made available by the service provider you choose to use
  • Client ID: This ID is provided during the setup on your server / public service
  • Client Secret: This is provided during the setup on your server / public service
  • Token Endpoint: This is provided during the setup on your server / public service
  • Authorization Endpoint: This is provided during the setup on your server / public service
  • User info endpoint: This is provided during the setup on your server / public service
  • User Identification Method: select Verified Email
  • Jwks Uri*: This is provided during the setup on your server / public service
  • Use Nonce Validation: Select Yes
  • Click Save

Once the setup was saved, the user will be able to go to the Login Screen using the master hostname or the branded / custom hostname, and they will see another Login Option: 

Login with <branded> user

Branding Management (Private Label)

In the branding section, you are able to set custom colouring and logo for the web interface, and set a custom address to access the interface, either using a TLS certificate you provide, or having us obtain and manage a certificate for you. 

The brand name is shown in the copyright of the control panel, in the Protection Reports, and in the headers of scanned emails. Your site logo is displayed in the header of the control panel. Note that the managed certificate cannot be used if the custom hostname is not valid.

Edit Brand

In this section, you will be able to:

  • Specify the custom hostname. This hostname will be used by your clients to log in to the interface. 

  • Specify a relevant brand name. The brand name is shown in the copyright of the control panel, in the Protection Reports, and in the headers of scanned emails. Your site logo is displayed in the header of the control panel. Note that the managed certificate cannot be used if the custom hostname is not valid.

  • Upload your branding logo and your favicon.


HTTPS TLS Certificate

In this section, you will be able to choose between, not using a certificate, having us generate and manage a certificate for you (courtesy of Let’s Encrypt), or uploading your own custom certificate.

  • Let’s E    ncrypt - with this option, a certificate will automatically be generated for the hostname that you chose to use, and automatically renewed as required.

  • Upload your own certificate bundle - this allows you to upload your own certificate. For more information, please review our article here

Colour Scheme and Custom CSS Login Screen

With the colour scheme, you can choose for each level: Admin, Domain, Email users to have different colours when they log in to the interface.

This option allows you to use a custom CSS for the login screen. This is especially useful when you want to centre a logo. An example of this can be seen below

  • Centre logo:
    #top_logo_container {
        text-align: center;
    } 
  • Dealing with transparent logos (note that you will need to change colour here according to your branded colour) :
    #top_logo_container {
        background-color: #39b0da;
        margin: -20px -20px 25px -20px;
    } 
  • Both centre and transparent logo:
    #top_logo_container {
        background-color: #39b0da;
        text-align: center;
        margin: -20px -20px 25px -20px;
    } 
  • Adding a text at the bottom of the login page:
    div#form-wrapper:after {
        position: absolute;
        content: 'Email support available at support@example.com';
        bottom: 15px;
        color: #fff;
        text-align: center;
        width: 100%;
        left: 0;
        z-index:2;
    }

Additional details on branding can be found here

Protection report Templates (Private Label)

The content of the HTML report may be customized via the API/webinterface. By default, it includes the quarantined messages table, but does not include the table of messages that were rejected without quarantine, this setting can be adjusted to show both tables.

Here you can create or edit existing protection reports, so they can be tailored to suit your specific needs. You can customize the following:

  • Language
  • Email Subject
  • From address
  • Reply-To address
  • Sender address
  • Attachment filename
  • PDF body
  • HTML body
  • Domain name
  • Welcome email subject
  • Welcome email text
  • Non-black report color
  • Long date format
  • Short date format
  • Quarantine Hostname
  • HTML Stylesheet
  • HTML TR template
  • HTML TH template
  • HTML TD template
  • Show subjects as links in the message view.

Control Panel API calls (Admin)

Clicking the “Control Panel API calls” function will direct you to the help page. Here it will give you a comprehensive guide to all the calls used.

The Control Panel API allows you to automate the process of adding/removing domains to admin accounts, allowing your customers/admins/sub-admins to use a one-click-login solution and modify the settings of the domains in the system. You can also use this account with our range of add-ons.

Your API username is your Admin username.  

The option enable Control Panel API must be enabled from the user settings, Dashboard > Webinterface Users > Manage Super-Admins/Admins.

Example Control Panel API calls:

  • /api/domain/add/domain//[destinations//][aliases//]
  • /api/domain/edit/[domain//]destinations//
  • /api/domain/exists/[domain//]
  • /api/domain/getbandwidthusage/domain//since//until//

Settings (admin)

The settings page allows you to configure your Administrator settings. 

Support URL

The Support URL relates to the "Support" Link in the top right corner of the interface. Here you can configure a direct support URL for you configured sub-administrator with configurable parameters.  

  • Support URL: The URL to re-direct admins too. 
  • Parameter name to send username Value: The username parameter to be sent
  • Parameter name to send Email Value: The email parameter to be used.  

The above example would redirect the admin (when clicking on the support button) to:

https://support.example.com/?username=sub-admin1&email=sub-admin@example.com

Protection against rendering in HTML Frames

This option is designed to help prevent "ClickJacking". By default the login screen will always be protected with  "Same-Origin" regardless of any setting made here.

The "Same-Origin" option means that only IFRAMES can be rendered from the same domain. For example, if your server hostname is filter.example.com, only filter.example.com is able to load an IFRAME of filter.example.com

The "Allow from URL" option allows you to define a specific URL that is able to load IFRAMES of the interface. 


Certificates

The certificates page allows you to generate the CSR (Certificate signing request) and set a custom certificate for HTTPS.  (For Super Administrators you can also set SMTP and IMAP

Please note, that when generating the CSR, the Private key will be displayed. Please make sure you save this locally temporarily as this is not retrievable after you navigate away from the page. 

To set a certificate, you need to make sure that the following parts are in your .PEM file. 

Private Key
Certificate from provider
Root chain

Email Notification Templates

The notification template page allows you to customize the following notification templates. 

  • Wrong MX records email notification - Used with the MX verification tool
  • Password recovery email - User for password resets
  • Email security check -  This templates is ued the the Exchange catch-all check only. 

API calls history

This page allows you to check historic API calls made by your domains. You can either define a specific "API method", or simply input a domain name to see historic logs of actions. 

To access the new "Master API" logs. The "Features Preview" option needs to be enabled via the "User Profile" page. Once this is enabled the "logs" icon should be available.  An example of how to check for a whitelisted sender can be seen below:

Senders Whitelist

This page allows you to configure whitelisted senders for either the your domains or specific users of your domains. 

  

To add a sender to the whitelist, you need to select the Add whitelist sender button. Then, in the new pop-up window, you need to select: 

  • A domain from the drop-down list
  • Add a local part (just the part before the @) if required
  • Sender Flag
  • And the sender address
  • Click Save

Wild-cards are possible here when whitelisting senders.

    *.example.com - Will whitelist all sub-domains of example.com
    *.TLD - Will whitelist the entire TLD

To view the Existing entries, once you get to the Sender Whitelist Section, you need to click on the Show Results button.

If no search criteria is used, then all entries will be displayed. If you want to search for a specific address, you will first need to populate the Query Rules. By default, only the Domain and Address fields are selected. You can adjust this by using the drop down list, or add new Rules by using the New Rule button.

In the Default Senders tab, you will be able to see the addresses that have been whitelisted by default for the entire cluster.

Recipient Whitelist

The recipient whitelist is used when no filtering of the recipient is needed.  Any recipient added here will have all messages delivered without any filtering. 

To add a recipient to the list, you need to use the Add whitelist recipient button. In the new pop-up screen, you need to select a domain from the drop-down list and add a local part. 

To view the Existing entries, once you get to the Recipient Whitelist Section, you need to click on the Show Results button. In the Domain recipients tab only the recipients added for your domains will be returned. In the Default tab, you will see addresses that have been whitelisted by default for the entire cluster. By default the "abuse@" and "postmaster@" addresses are added.  

Sender Blacklist

This allows you to specify which senders are not able to send messages to  specific recipients of your domains or to all recipients of your domains.

To add a sender to the blacklist, you need to select the Add blacklist sender button. Then, in the new pop-up window, you need to select: 

  • A domain from the drop-down list
  • Add a local part (just the part before the @) if required
  • Sender Flag
  • And the sender address
  • Click Save

The check works based on the MAIL FROM (envelope-sender)  provided by the sender at SMTP level and the From address that is visible to recipients or both.  The MAIL FROM might be different from the From: address.

  • Messages from blacklisted MAIL FROM (Envelope-senders) addresses are rejected at SMTP level and are not quarantined. 
  • Messages from blacklisted "FROM:" addresses (if different) are quarantined.

Wild-cards are possible here when blacklisting senders. 

  • *.example.com - Will blacklist all sub-domains of example.com
  • *.TLD - Will blacklist the entire TLD

To view the Existing entries, once you get to the Sender Blacklist Section, you need to click on the Show Results button. 

If no search criteria is used, then all entries will be displayed. If you want to search for a specific address, you will first need to populate the Query Rules. By default, only the Domain and Address fields are selected. You can adjust this by using the drop down list, or add new Rules by using the New Rule button. 

In the Default Senders tab, you will be able to see the addresses that have been blacklisted by default for the entire cluster.

Recipient Blacklist

This allows you to specify which recipients are not to receive any email. 

To add a recipient to the list, you need to use the Add blacklist recipient button and in the new pop-up screen, you only need to add the domain and the local part (the part before the @). 

To view the Existing entries, once you get to the Recipient Blacklist Section, you need to click on the Show Results button. In the Domain recipients tab only the recipients added for this domain will be returned. In the Default tab, you will see addresses that have been blacklisted by default for the entire cluster.

Manage admins

With this option you can manage your Administrators to have access to the Control Panel and configure their specified products and services.

You are able to set the following options and services per administrator:

  • Incoming mail
  • Outgoing mail
  • Archiving
  • Private label
  • Domain Limits
  • Control Panel API usage
  • Allow Sub-admins
  • Archive protection

You can either add the Administrator(s) one by one – Add button or you can upload a Comma Separated Values (CSV) file to add multiple users at once. Each line in the CSV file must contain at least four columns, the username, the password, the email, the status and the domain’s limit (domain’s limit should be set to 0 if there is no limit).

Please ensure that when setting the password, the password contains lower case letters, at least one upper case letter or one digit, no spaces, and is between 6-25 characters in length.

If you select an Administrator and choose the drop-down arrow you have several options such as:

  • Edit Administrator
  • Delete Administrator
  • Login as Administrator
  • Require 2FA
  • Bind Domains to this Administrator (you can bind/unbind domains to the selected Re-Seller)

With Require 2FA a Super Administrator or Administrator or Domain user can require specific users, or all users, to use 2FA. If a user didn’t previously have this enabled, they will be prompted to set it up on their first login after it’s requested.

At the top of the page there is an option “Overview of bandwidth usage” where you can find an overview of the bandwidth usage for incoming/outgoing email per admin for a given time-frame.

Archive protection

This option allows you to turn on the view/export protection for messages (assuming email archiving is enabled). Once this option is enabled, archived messages will only be visible/exportable after authentication as the user to whom the message belongs. While this option is turned on, sub-admins cannot override it.

Manage domain users

With this function you can manage the domain users. These users can login using their domain and the set password to manage their domain specific settings.You can either add individual users or multiple users at a time by uploading a CSV file.

Please ensure that the domain you are creating the email for already exists on the server, and when setting the password, the password must contain lower case letters, at least one upper case letter or one digit, no spaces, and must be 6-25 characters in length.

If you select a Domain user and choose the drop-down arrow you have several options such as:

  • Edit Domain user
  • Delete Domain user
  • Login as Domain user
  • Require 2FA

With Require 2FA an Administrator or Domain user can require specific users, or all users, to use 2FA. If a user didn’t previously have this enabled, they will be prompted to set it up on their first login after it’s requested.

Super Admin Level

Global Statistics

With the Global Statistics (Super Administrator) users can view the incoming statistics for a given time-frame (Hours,Days,Weeks,Months,Years).

Statistics are displayed for :

  • General accuracy
  • Spam ratio (of total messages)
  • Not Spam messages
  • Unsure messages
  • Spam messages blocked
  • Viruses blocked
  • Whitelisted
  • Blacklisted

IP Whitelist 

The Incoming IP whitelist can be used to SKIP certain filtering methods. Hence if you skip a filtering method which is actually reducing the spam score, such as content check, chances of messages being blocked may increase by skipping certain filters. Therefore we recommend only to skip checks for very specific situations to overrule the overall system, and to avoid messages being falsely blocked.

The following filtering checks are able to be skipped:

  • Skip temporary rejection by DNSBL
  • Skip rate limit
  • Skip greylisting
  • Skip content checks
  • Skip DNS checks
  • Skip DNSBL checks
  • Skip EHLO checks
  • Skip Connection limit

To whitelist an IP simply click "Add IP".

IP Blacklist

Traffic from IP addresses listed on the IP blacklist will get immediately rejected. The messages are NOT quarantined. All messages from blacklisted IP addresses are rejected with a 5xx SMTP error code, so legitimate sending SMTP servers will generate a bounce message to the sender. You have the option to add, edit and delete IP addresses, as well as adding a reason for why you blacklisted the respective IP address/range.

To blacklist an IP , simply click "Add IP"

Manage outgoing delivery IPs 

This page allows you to  configure an identity to use a specific set of IPs, or all identities for an outgoing user or domain, or all users and domains that belong to a specific admin. 

You can also set the interfaces that should be used by default, if you haven't chosen a specific set of IPs for a user. 

If you remove all choices, then one will be automatically selected. You can also disable all delivery over IPv4 (only allowing IPv6) 

You'll need to ensure that your users know that they need to have the IPs that you have selected for them in their SPF records.

Viewing the current defaults

  1. Use the default query rules (or reset to default)
  2. Click show results 

The IP address (any) indicates that the OS will choose, which will be the Primary IP of the server. 

Configure outbound IP

  1. Click Configure outgoing IP
  2. Select your level (Default, Admin, Domain, Domain + Username, Domain + Username +Identity)
  3. Select Hostname
  4. Select IP address to be used
  5. Click Save

Before configuring any secondary IP, please make sure that the PTR is correct. Do not use underscores (_) in your PTR hostnames as this is not permitted per RFC. If you use a custom HELO this needs to be configured via the API


Edit an existing outbound IP

  1. Create your specific query. 
  2. Click Show Results
  3. Select the entry you wish to edit
  4. Use the drop down menu
  5. Click edit
  6. Adjust settings

Using the Query Rules

The Query rules allows you to filter on specific criteria when showing results. Columns are also customizable.

Network tools

The network tools page allows you to do simply SMTP network checks. For example:

Sender callout

If you are seeing problems with sender verification, you can see exactly what the sender's mail server responds when the address is checked.

Recipient callout

If you are seeing delivery problems, you can see exactly what the destination's mail server responds when the recipient is specified.

Open relay check

You can see whether a mail server appears to be an "open relay", accepting mail for any destination.

Catch-all check

You can see whether a mail server appears to be a "catch-all" for a specified domain, accepting mail for any address at that domain.

Telnet test

You can check the full SMTP delivery process to a destination, to see exactly what the destination responds in answer to each of the SMTP commands, and the final message content.

The tool will go as far as the information provided. If a recipient is not provided, then the connection will end after "MAIL FROM", and if a message is not provided, then the connection will end after "RCPT TO". If you have a message in the DATA section, this will send an email to the specified recipient.

To test deliverability issues from a specific server in the cluster, or IP assigned to a server, select the relevant IP. If left blank, then one of the control panel IPs will be used.

Logging in and Retrieving password

For a user to be able to log in to the interface, they need to visit the Login page.

 

  • Super-Administrators and Administrators will log in using their provided usernames and passwords

  • Domain Users will log in using the domain name and password

  • Email Users will log in using their email address and password. 

This section also allows you to change the password in case you have forgotten it. It also allows email users to automatically add themselves as Interface users by using the Retrieve log-in link.

In the text box the user needs to add their username and click submit. This will generate an email to their assigned address, which will include details on how to change their password. 

It is also possible to customise the retrieve password link to pre-fill the username: 

For this, you need to provide users with a customised link:

hxxps://master.hostname/retrievelogin.php?username=example@example.com

This way, the user will simply need to click on the submit button to receive the password change email. Alternatively, if a POST request is issued for the customized link the password change email will be automatically sent. 


Was this article helpful?

Related articles

Search result for :