|
|
|
This article explains how to verify recipients email adresses using a Domino LDAP |
|
|
|
Fixed Issues for 2.8 This release includes the following fixed issues: Fixed several minor issues in the LMI. Removed some consumers of memory that might have lead to memory exhaustion after several weeks of high load. Several security enchancements at the systemlevel and in the LMI. If a relay ... |
|
|
|
This article explains which firewall outbound and inbound ports you use with Lotus Protector for Mail Security 2.8. |
|
|
|
This article highlights what's new for users of Lotus Protector for Mail Security 2.8. |
|
|
|
The Quarantine Report Templates allow administrators to control what end users see in the quarantine reports they receive via email. Default templates are available for most languages and do not require customization. If you want to customize a template, see the example below on how to add a ... |
|
|
|
There are four key log files that can help you quickly and easily diagnose mail flow issues with Protector: SMTP, Filters, Messages and SMAIL. You can access all of these log files by logging into the console of the appliance with the root account.. SMTP
varlogxmailsmtpYYYYMMDDHH00
This logs ... |
|
|
|
This article explains which firewall outbound and inbound ports you use with Lotus Protector for Mail Security 2.5.1. |
|
|
|
This article lists the VMware settings that you should use if you are installing Lotus Protector for Mail Security from an ISO or from the Installation DVD. |
|
|
|
This article highlights what's new for users of Lotus Protector for Mail Security 2.5.1. |