

Block Time (Minutes) - The number of minutes that a block will be placed once anĪ bad session is any connection that ends without successfully sending a message.This to a relatively high value so that you can catch DoS attacks while not impacting It is common for several connections to be open at once from an IP address. Connections Before Block - The number of connections before a block is placed.Too many connections in this period of time, Time Frame (Minutes) - The period of time, in minutes, that is examined to determine.Service - Where applicable, select the service that will be monitored for this type of.It is recommended that you whitelist any trusted IP addresses that may send out large mailing lists or make many connections if you enable this option. Enable this option to block IPs that are connecting too often to the server. Too many connections from a single IP address can indicate a Denial of Service (DoS) attack. When adding or editing an entry, the following configuration settings will be available, based on the Detection Type chosen: Denial of Service (DoS) To create a new Abuse Detection rule, click the New button. To help mitigate these issues, SmarterMail has these permanent Rules in place as they are the most common types of attacks agains mail servers. It is possible to edit the settings for these Rules, but they are permanent due to the likelihood of a System Administrator having brute force attacks against their various webmail URLs. These rules are completely editable, and while most can be deleted as needed, there are 3 Rules that are permanent: Description - A friendly name or brief description of the rule.Ĭlick on the Actions (.) button and then click Reset IDS Rules to replace all existing rules with the default configuration that's available upon installation.īy default, SmarterMail has several pre-configured IDS Rules for System Administrators.(NOTE: If a notification email is sent, then this setting is ignored as a Block does not occur.) Block Time - The time frame, in minutes, in which the IP address will be blocked.For example, the number of messages sent, the number of connections made from an IP address, the number of bounce messages received, etc. Threshold - The threshold that is examined to determine if the rule's action should be triggered.Time Frame - The period of time, in minutes, that is examined to determine if the rule's action should be triggered.Action - The action to be taken when the rule is triggered.Service - The protocol service associated wtih the rule: SMTP, IMAP, POP, LDAP, or XMPP.
SPY KIT UNIVERSAL MAILER TOO MANY EMAILS PASSWORD
Type - The type of Abuse Detection rule configured: Denial of Service (DoS), Bad SMTP Sessions (Harvesting), Internal Spammer, Password Brute Force by Protocol or Bounces Indicate Spammer.The following details can be seen for each entry in the list: These include Denial of Service rules for all major protocols, Brute Force protection for protocols and webmail, and more. Then cick on Security in the navigation pane and select the IDS Rules tab.īy default, SmarterMail offers several rules that are pre-configured upon installation. To access the IDS Rules, log into SmarterMail as a System Administrator and click on the Settings icon. If the IP address is in one of the following formats, it will not be blocked: NOTE: IDS Rules will not block local IPs. These rules allow SmarterMail to alert System Administrators of suspicious behavior or take action to prevent the attack. For example, IDS rules (also known as abuse detection rules) can be configured to monitor a variety of activity on the mail server, including the number of connections coming from a single IP address, the number of messages sent within a specific timeframe, the number of login attempts and more. Through the use of SmarterMail's intrusion detection system (IDS), there are several methods for preventing abuse and denial of service (DoS) attacks on your mail server.
