Kerio Connect
Kerio Connect
Kerio Connect
Administrator’s Guide
Kerio Technologies
2011 Kerio Technologies s.r.o. All rights reserved.
This guide provides detailed description on Kerio Connect, version 7.3. All additional
modifications and updates reserved.
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.1 Additional documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2 Quick Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1 System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2 Conflicting software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.3 Firewall configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.4 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.4.1 Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.4.2 Linux — RPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.4.3 Linux — DEB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.4.4 Mac OS X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.4.5 VMware Virtual Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.5 Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.6 Upgrade and Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
6 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
6.1 Service Parameter Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
6.2 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3
7.5 Automated items clean-out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
7.6 Domain alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
7.7 Authentication of domain users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
7.8 Rename Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
7.9 Deleting of domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
7.10 A company with multiple sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
7.11 Setting up the backup mail server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
8 Users ......................................................................... 73
8.1 Administrator account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
8.2 Creating a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
8.3 Editing User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
8.4 Editing multiple users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
8.5 Removing user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
8.6 Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
8.7 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
8.8 Administration of mobile devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
8.9 Import Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
8.10 Exporting domain users to CSV files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
8.11 User Account Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
9 User groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
9.1 Creating a User Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
9.2 Exporting group members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
4
12.5 Receiving Email Using ETRN Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
12.6 Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
12.7 Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
12.8 Advanced forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
5
18 Limits and quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
18.1 Message size limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
18.1.1 Setting limit for messages delivered via SMTP . . . . . . . . . . . . . . . . . . . . . 224
18.1.2 Setting limit for messages sent by a particular user . . . . . . . . . . . . . . . 224
18.1.3 Setting limit for messages sent from a domain . . . . . . . . . . . . . . . . . . . . 225
18.1.4 Size limit for Kerio WebMail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
19 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
19.1 IP Address Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
19.2 Time Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
19.3 Administration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
19.3.1 Administration Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
19.3.2 Setting Remote Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
6
24.5 Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
24.6 Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
24.7 Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
24.8 Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
24.9 Debug Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
24.10 Performance Monitor (under Windows) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
7
31.1.6 The Online/Offline mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
31.2 Kerio Outlook Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
31.2.1 Installation and configuration without the migration tool . . . . . . . . . . 343
31.2.2 Upgrade of the Kerio Outlook Connector . . . . . . . . . . . . . . . . . . . . . . . . . 351
8
39 MS Entourage support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
39.1 Automatic configuration of Exchange accounts . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
9
Chapter 1
Introduction
Kerio Connect is the successor of the successful application Kerio MailServer. Kerio Connect
is a modern multiplatform mailserver which supports variety of communication protocols.
These protocols allow using of any email clients including those which are supported by
mobile devices. The mailserver also allows direct access to mailboxes via a proprietary web
interface.
Kerio Connect uses mailboxes to store various data types. Besides email messages, calendars,
notes, contacts and tasks are kept in mailboxes. Calendars and tasks offer also task and
meeting planning. These features make Kerio Connect a complex groupware enterprise
solution.
• Product forum — in this discussion, you can encounter experience and problems of
other administrators using the same product. You may find a working solution for
your issues here.
• Knowledge Base — here you can find a set of articles troubleshooting particular
problems.
1. Install Kerio Connect and make the required settings using the configuration wizard
(create the primary domain as well as username and password for the user Admin). Login
to the Kerio Connect Administration.
10
1.2 Quick Checklist
• Mac OS X
/usr/local/kerio/mailserver
• Linux
/opt/kerio/mailserver
• MS Windows
C:\Program Files\Kerio\MailServer
2. Set up the services you are planning to use. If you would like to run a web server on
the same machine, for example, stop the HTTP/Secure HTTP service, change its port or
reserve one IP address for the service’s default port. For more details refer to chapter 6.1.
3. Create local domains. The primary domain must be created first (configuration guide).
After you create other domains, you can set any of them as primary. If you are not sure as
to which domain should be primary, choose the domain that contains the most users. Do
not forget to fill in the DNS name of the SMTP server. For more information see chapter 7.
4. Create user accounts for individual domains. Account names should correspond with the
users’ primary email addresses. We do not recommend using special characters for name
definitions. You can also import users from external sources. See chapter 8 for more
details.
5. If necessary, create groups (to create group addresses, for instance) and assign users to
them. For more information refer to chapter 9.
6. Define aliases for users and user groups if necessary. More details can be found in
chapter 12.3.
7. Set the type of Internet connection: Online for leased line, cable modems and ADSLs and
Offline for any kind of dial-up connection. More details can be found in chapter 12.6.
8. If the modem is installed on the same computer as Kerio Connect, choose the correct RAS
line. More details can be found in chapter 12.6.
9. If the Internet connection type is Offline, set Scheduling. If the type is Online, only set
scheduling if you would like to retrieve email from remote POP3 accounts or receive email
using ETRN command. More details can be found in chapter 12.7.
10. If you would like to retrieve email from remote POP3 accounts or domain accounts, create
corresponding accounts in POP3 Download. If email from these accounts is to be sorted
into local accounts, also define the sorting rules. Refer to chapter 12.4.
11
Introduction
11. If email for certain domains should be received from a secondary server using ETRN
command, define corresponding accounts in ETRN Download. See chapter 12.5 for details.
12. Set up antivirus control in Antivirus. Choose a plug-in module for the antivirus program
that you have installed. Choose the action that should be performed in case an infected
attachment is found. You can also choose to filter certain types of attachments (e.g.
executables). Refer to chapter 14 for more information.
13. If Kerio Connect is running behind a firewall, map appropriate ports. See chapter 28.3 for
more information.
14. If the SMTP server is accessible from the Internet, set up Anti-spam protection, to prevent
misuse of the mail server for sending spam email. You can also protect yourself from
receiving such email from other servers. For more information, see chapter 13.
15. Set up email backup/archiving of mail folders and configuration files if necessary. See
chapter 15.2 for details.
16. Create a certificate for the mail server for secure communication, or ask a commercial
certification authority to do this. For more information, see chapter 16.
12
Chapter 2
Installation
• CPU 1 GHz,
• 512 MB of RAM,
• For maximum protection of the installed product (particularly its configuration files),
it is recommended to use the NTFS file system.
Recommended hardware configuration of the computer where Kerio Connect will be running:
• CPU 2 GHz,
• 2 GB RAM,
• 4 GB RAM,
• 200 GB and more free disk space for user mailboxes and backups.
Note:
• An active user is a user that uses the Kerio Connect services multiple times a day (e.g.
mail services, calendar, tasks, etc.).
• These recommendations apply only in case the computer is used only as a mailserver
(Kerio Connect, antivirus, anti-spam).
13
Installation
A possible conflict is a port clash (if all services are running in Kerio Connect, these TCP
ports are used: 25, 80, 110, 119, 143, 443, 465, 563, 587, 993 and 995). It is therefore not
recommended that users run other mail, LDAP or web server software on the same computer.
If this is necessary, the system administrator must ascertain that there will be no port clashes.
For example, if Kerio Connect is running on a computer together with a web server, we
recommend changing the HTTP service port or disabling the service and only enabling its
secured version — Secure HTTP. Another alternative is to reserve one or more IP addresses for
ports at which Kerio Connect services are listening. For detailed information on services and
port settings, see chapter 6.
If Kerio Connect is run on a firewall or on a secured local network behind a firewall, the
firewall will affect the mail server’s behavior to a certain extent (e.g. accessibility of some or
all services). When configuring the firewall take into consideration which services should be
accessible from the Internet or the local network and enable communication on appropriate
ports (see above or chapters 6 and 28.3 for more detail).
If the mailserver is to be accessible from the Internet, certain ports have to be opened (mapped)
in the firewall. Each mapped port might introduce security problems. Therefore, map ports
only for those services which you want to make available from the Internet.
If server is supposed to deliver email directly by DNS MX records, it is necessary to map port
25 (standard port for SMTP service). This setting is required for cases where an MX record for
the particular domain is addressed to the server. Any SMTP server on the Internet can connect
to your SMTP server to send email to one of its domains.
Now, it is necessary to map ports that will be used for connections out of the local network.
Since the security risk is higher here, it is recommended to map only SSL/TLS-secured services.
Settings are shown in table 2.1.
14
2.4 Installation
2.4 Installation
You can get and install Kerio Connect as standard installation packages for Windows, Mac OS X,
Linux RPM and Debian or as a pre-installed VMware Appliance (Linux Debian with pre-installed
Kerio Connect).
For hardware and software requirements, check
http://www.kerio.com/connect/requirements/
15
Installation
This setting can be changed during the installation process if necessary (see below).
For better reference when solving any problems, the Kerio Connect installation process is
logged in a special file (kerio-connect.setup.log) located in folder %TEMP%. You can use
this file to trace back roots of problems or installation failure.
To install Kerio Connect, follow these instructions:
1. Double-click on the Kerio Connect’s installation file run it. This file can be downloaded at
the Kerio Technologies website at http://www.kerio.com/connect/download.
2. The installer asks user to select the installation language. These settings applies to
installation only. Language version of the interface used for administration of Kerio Con-
nect can be selected after the installation.
3. When the installation process is started, a welcome page is displayed. When the welcome
page is opened, the installer scans the disk automatically to find out whether there is
enough space for the installation on the target drive. To install Kerio Connect, click Next.
4. In the following dialog, all important changes and news since the last version of Kerio
Connect are listed. When you finish reading the news, continue by clicking on the Next
button.
5. In the next page, confirm license agreement, otherwise the product installation gets stuck
at this stage. Once the terms are accepted, click Next.
• Complete — all parts and modules of Kerio Connect including the product guide
in two language versions will be installed.
This option is recommended especially to users who are installing Kerio Connect
for the first time.
7. The following dialog is opened only if the Custom installation was selected. If you selected
the Complete option, skip reading this section.
In the Custom installation, it is possible to choose which Kerio Connect components will
be installed. This installation type is usually helpful if you need to spare your disk space
by leaving for example the help file out of the installation.
Components to be installed:
• Connect — the executive core of the program (the Kerio Connect Engine) which
provides all services and functions. It runs as a background application (as
a service on Windows 2000, Windows XP or Windows Vista, or as a daemon on
Unix-based systems).
16
2.4 Installation
Along with the Kerio Connect Engine, it is recommended to install the following
components:
• Help files — If you enable both English and Czech, the help will be displayed in
the language version which is set in the Kerio Connect Administration. If the
language in the Kerio Connect Administration is changed, the language in the help
is switched automatically.
8. In the next step, select a directory where Kerio Connect will be installed. By default, it is
installed in:
C:\Program Files\Kerio\
Select a folder where the program will be installed and click on Next.
9. At this moment, the wizard is started where basic server parameters can be set (see
section 2.5). Be really attentive while setting these parameters.
17
Installation
10. Status of the installation process is showed during the installation. Please be patient, the
installation may take several minutes.
11. Once the settings in the configuration wizard are done, the final dialog of the installation
wizard is opened. Save the installation settings by the Finish button.
Kerio Connect Engine, which is the mail server’s core, running as a service, will be started
immediately after the installation is complete.
Warning:
If the FAT32 file system is used, it is not possible to protect Kerio Connect in the
above way. Thus, we strongly recommend to install Kerio Connect only on NTFS
disks.
Warning:
For installations, Kerio Connect uses the RPM application. All functions are available except
the option of changing the Kerio Connect location.
The installation must be performed by a user with root rights. Kerio Connect Engine is
installed to the /opt/kerio/mailserver directory.
New installation
Start installation using this command:
# rpm -i <installation_file_name>
Example:
# rpm -i kerio-connect-7.3.0-1270.linux.rpm
18
2.4 Installation
In case of the recent versions of the distributions, problems with package dependencies
might occur. If you cannot install Kerio Connect, download and install the
compat-libstdc++ package.
It is recommended to read carefully the LINUX-README file immediately upon the
installation. The file can be found in
/opt/kerio/mailserver/doc
When the installation is completed successfully, run the configuration wizard to set the
domain and the administrator’s account:
/opt/kerio/mailserver
./cfgwizard
Warning:
The Kerio Connect Engine must be stopped while the configuration wizard is
running.
/etc/init.d/kerio-connect stop
/etc/init.d/kerio-connect restart
Kerio Connect must be running on the root account.
Administration
Kerio Connect provides full web administration. You can access the administration
interface by using this URL in your web browser: http://mail.company.com/admin
(you will be automatically redirected to the secured address on port 4040).
For the distributions supported by Kerio Connect, refer to the Kerio Connect product pages.
Warning:
The installation must be performed by a user with root rights.
19
Installation
New installation
To install either of the installation packages, double-click on its icon or use for example
the following command in the terminal:
# dpkg -i <installation_file_name.deb>
Example:
# dpkg -i kerio-connect-7.3.0-1270.linux.i386.deb
It is recommended to read carefully the DEBIAN-README file immediately upon the
installation. The file can be found in
/opt/kerio/mailserver/doc
When the installation is completed successfully, run the configuration wizard to set the
domain and the administrator’s account:
/opt/kerio/mailserver
dpkg-reconfigure kerio-connect
Starting and stopping the server
Once all settings are finished successfully in the configuration wizard, Kerio Connect is
ready to be started.
Within the installation, the kerio-connect script is created in the /etc/init.d
directory which provides automatic startup of the daemon (i.e. Connect Engine) upon
a reboot of the operating system. This script can also be used to start or stop the daemon
manually, using the following commands:
/etc/init.d/kerio-connect start
/etc/init.d/kerio-connect stop
/etc/init.d/kerio-connect restart
Kerio Connect must be running on the root account.
Administration
Kerio Connect provides full web administration. You can access the administration
interface by using this URL in your web browser: http://mail.company.com/admin
(you will be automatically redirected to the secured address on port 4040).
2.4.4 Mac OS X
Kerio Connect supports Mac OS X systems only on Intel processors.
For the versions of Mac OS X supported by Kerio Connect, refer to
the Kerio Connect product pages.
Recommended: G5, 2GB RAM; Mac Intel Solo or Duo, 2GB RAM
kerio-connect-7.3.0-1270.mac.dmg
20
2.4 Installation
installation package.
2. This opens the Finder where the installation package is opened as a disk and where
the Kerio Connect Installer executable is available. Click on it to run the installer (see
figure 2.3).
3. Kerio Connect can be installed only by a user with administration rights for the system.
To start the installation, username and password is required in a special dialog. Enter
the username and password for a user who has administration rights for the system.
Only users with appropriate rights (members of the Admins group) are allowed to install
applications in the system.
Administrators can allocate any users with these rights under System Preferences → Ac-
counts.
5. At the start, license terms are displayed. Click on Continue and confirm the terms by the
Agree button.
6. Once license terms are accepted, a dialog is opened where an installation type can be
selected:
• Custom Install — you can select individual components that you would like to
install (Kerio Connect Engine and Administrator’s Guide are available).
21
Installation
Select an installation type (the Easy Install option will install all available components) and
click on Install.
The complete version of Kerio Connect will be installed (Kerio Connect Engine and Admin-
istrator’s Guide).
8. Once the installation is completed, the configuration wizard is opened automatically. Set
the primary domain name and the admin password which will be used for login to the
Kerio Connect’s administration interface (see chapter 2.5).
9. When the configuration wizard is finished, the final dialog of the installer is displayed.
Finish the installation by the Quit button.
Click OK to open the Kerio Connect folder which includes the administrator’s guide (Adminis-
trator’s Guide) in PDF and Configuration Wizard (refer to chapter 2.5).
Kerio Connect will be run automatically after the operating system is booted. However, users
must run Kerio Connect Monitor (System Preferences → Other → Kerio Connect Monitor).
Username which must belong to the Admins group and password is required for stopping or
running of the service. Once authenticated, clicking Stop Kerio Connect or Start Kerio Connect
is sufficient.
You can also stop, start or restart the Kerio Connect through Terminal or a SSH client with the
following commands with root access.
22
2.4 Installation
If possible, it is recommended to stop/start the service by using the button in System Prefer-
ences → Others → Kerio Connect Monitor (see figure 3.3).
VMware Virtual Appliance is a virtual device (Debian Linux with pre-installed Kerio Connect)
can be used in VMware products. For supported VMware product versions, check
http://www.kerio.com/connect/requirements/.
Use an installation package in accordance with the type of your VMware product:
• In case of products VMware Server, Workstation and Fusion, download the compressed
VMX distribution file (*.zip), unpack it and open it in the VMware product.
• You can import a virtual appliance directly to VMware ESX/ESXi from the URL of the
OVF file — for example:
http://download.kerio.com/dwn/connect/
kerio-connect-appliance-1.x.x-1270-linux.ovf
If you import virtual appliance in the OVF format, bear in mind the following specifics:
• In the imported virtual appliance, time synchronization between the host and
the virtual appliance is disabled. However, Kerio Connect features a proprietary
mechanism for synchronization of time with public Internet time servers. Therefore,
it is not necessary to enable synchronization with the host.
• Tasks for shutdown or restart of the virtual machine will be set to default values after
the import. These values can be set to “hard” shutdown or “hard” reset. However,
this may cause loss of data on the virtual appliance. Kerio Connect VMware Virtual
Appliance supports so called Soft Power Operations which allow to shutdown or restart
hosted operating system properly. Therefore, it is recommended to set shutdown or
restart of the hosted operating system as the value.
23
Installation
After login
When you run the virtual computer, Kerio Connect interface is displayed.
Upon the first startup, configuration wizard gets started where the following entries can be
set (for detailed information, see section 2.5):
• primary domain,
• data store.
Access to the console is protected by root password. The password is at first set to: kerio
The console allows to change network configuration, reboot or shut down the computer (see
figure 2.5).
24
2.4 Installation
1. Viewing network adapters — MAC address, name and IP address of the adapter
• DHCP
• static IP address
Note: If you use a DHCP service on your network, the server will be assigned an IP address
automatically and will connect to the network. If you do not use or do not wish to use DHCP
for Kerio Connect, you have to set the IP address manually.
If the IP address is assigned by the DHCP server, we recommend to reserve an IP address for
Kerio Connect so that it will not change.
Shell access
A terminal is available for product and operating system updates. You can switch it by
pressing the standard Alt+Fx combination (for example, Alt+F2) for running a new console.
If you access the system via shell for the first time, log in as root:
Name: root
Password: kerio
VMware Appliance also allows the access via SSH (by default, SSH is disabled) which will be
required for update packages uploads.
Upgrade
The operating system can be upgraded via shell using the standard command apt-get.
25
Installation
The wizard can be also run on Linux. When a corresponding package is installed, user will be
informed that the wizard is available. This information is also provided by the daemon if it
detects that the wizard has not been used yet. To run the wizard use the following command:
Linux — RPM
/opt/kerio/mailserver
./cfgwizard
Linux — DEB
/opt/kerio/mailserver
dpkg-reconfigure kerio-connect
Warning:
Kerio Connect must be stopped while settings are changed in the configuration wizard.
After running the wizard, existing configuration files will be deleted.
Settings
• Create a domain — to enable creating user accounts (or groups) in Kerio Connect, at
least one local domain must be created. The first local domain created is the primary
domain. Unlike in the other local domains, users can login by their usernames (In the
other domains, it is necessary to use the full email address. For detailed information
on domains, see chapter 7).
• Create an administration account which then will be used for login to the Kerio Con-
nect’s administration interface — a crucial operation for your server’s security is
setting of the administration password. Blank password is not accepted. For security
reasons passwords should consist at least of six characters.
• Setting of the DNS name of the Kerio Connect host — the Internet hostname entry
should show Internet DNS name of the computer where Kerio Connect is running
(typically name of the computer with the primary domain name). Server names are
used for server identification while establishing SMTP traffic.
26
2.6 Upgrade and Uninstallation
Warning:
If Kerio Connect is running behind NAT, enter the Internet hostname
that can be converted to the IP address of the sending server, i.e. the
Internet hostname of the firewall.
• Select a data store for the server — Kerio Connect stores a relatively large amount of
data (email messages, information about user folders, records, etc.). The administrator
can select a different location to store data (e.g. another disk partition, RAID etc.). The
store directory can be changed anytime later through the administration interface (for
more information, see chapter 12.8). If the location is changed then it is necessary to
move the files located in this directory to the new location. Prior to this potentially
very time-consuming operation, the Kerio Connect Engine must be stopped. It is
therefore recommended to specify an appropriate data store directory within the
installation process already.
Configuration files
users.cfg
The users.cfg file is an XML file that includes information about user account, groups
and aliases.
Administration name and password was written in this file by the configuration wizard.
mailserver.cfg
mailserver.cfg is an XML file containing any other parameters of Kerio Connect, such
as configuration parameters of domains, back-ups, antispam filter, antivirus, etc.
In this file, the local primary domain just created, Internet name of the server as well as
the location of the message store was written.
Information on these two files are saved in the XML format. They can be therefore
modified by hand or re-generated by your applications. Backups or transfers of these
files can be easily performed by simple copying.
Warning:
On Mac OS X and Linux systems, files can be maintained only if the user is logged
in as the root user.
Simply run the installation package of a new version to upgrade WinRoute (i.e. get a new release
from the Kerio web pages — http://www.kerio.com/). The installation program will detect the
27
Installation
directory where the older version is installed, stop running components (Kerio Connect Engine
and Kerio Connect Monitor) and replace appropriate files with new ones automatically. All
settings and all stored messages will be available in the new version. We recommend not
changing the installation directory!
When upgrading Kerio Connect, follow the same scheme as for the first installation of Kerio
Connect (see chapter 2.4).
Once the product is upgraded successfully, a backup of the configuration files of the previous
Kerio Connect version is saved in the directory where Kerio Connect is installed (C:\Program
Files\Kerio by default), under the UpgradeBackups directory.
Kerio Connect can be uninstalled by using Uninstall from the Start menu using the
Add/Remove Programs in the Control Panels:
1. Under Add or remove programs, select Kerio Connect and click on Remove.
3. In the first dialog, it is possible to choose whether Kerio Connect will be removed
completely, including the data store and configuration files (see figure 2.6):
28
2.6 Upgrade and Uninstallation
• Remove message store — check this option to remove Kerio Connect’s data store
including the archiving and the backup store.
When sure that the settings are finished, continue by clicking on the Next button.
4. Progress of the uninstallation process is showed on the status bar. Please be patient, the
process may take several minutes.
Upgrade
To upgrade, use the following command:
# rpm -U <installation_file_name>
Example:
# rpm -U kerio-connect-7.3.0-1270.linux.i386.rpm
Uninstallation
To uninstall Kerio Connect, use the following commands:
# rpm -e <package_name>
This means:
# rpm -e kerio-connect (for the standard version of Kerio Connect)
During the uninstallation process, only the files that have been included in the former
installation package and that have not been edited will be removed. Configuration,
messages in the mailboxes, etc. will be retained. Such files may be deleted manually
or kept for further installations.
Note: RPM allows using additional, advanced parameters. For description of these parameters,
see the RPM guidance page. To open this page, use the following command: man rpm
29
Installation
Upgrade
To upgrade Kerio Connect, follow the same steps as for a new installation (see 2.4).
Uninstallation
To uninstall Kerio Connect, use the following command:
# apt-get remove <installation_package_name>
This means:
# apt-get remove kerio-connect (for standard Kerio Connect)
or for full removal of Kerio Connect along with all configuration files:
# apt-get remove --purge kerio-connect (for standard Kerio Connect)
Mac OS X
Upgrade
Simply run the installation package of a new version to upgrade WinRoute (i.e. get a new
release from the Kerio web pages — http://www.kerio.com/). The installation program
will detect the directory where the older version is installed, stop running components
(Kerio Connect Engine and Kerio Connect Monitor) and replace appropriate files with new
ones automatically. All settings and all stored messages will be available in the new
version. We recommend not changing the installation directory!
Uninstallation
You can also use the Kerio Connect’s installation program to uninstall this product.
Simply click on the icon of the currently installed Kerio Connect’s installation package
to run the installation and select Uninstall as the installation type.
30
Chapter 3
Performance Monitor
This component allows for real time system performance monitoring of Kerio Connect
components. For more details, see chapter 24.10. This module is available under
MS Windows operating systems only.
In Windows, Kerio Connect Monitor is displayed as an icon in the System Notification Area.
31
Kerio Connect components
If the Kerio Connect Engine is stopped, a red mark appears over the icon. Starting or stopping
the service can take several seconds. During this time the icon is grey and inactive.
On Windows, left double-clicking on this icon runs the Kerio Connect Administration login
page (described later). Right-clicking on this icon displays the following menu.
Start-up Preferences
Options for running Kerio Connect and Kerio Connect Monitor automatically at system
start-up. Both options are enabled by default.
Administration
This option runs the Kerio Connect Administration program (this can also be achieved by
double-clicking the Kerio Connect Monitor icon).
Mac OS X
On Mac OS X, the Kerio Connect Monitor is displayed in a new window (see figure 3.3) which can
be opened from the Other section of System Preferences. The window includes the following
options:
• About Kerio Connect — the button opens the About window providing basic
information on the product and its version number.
Username which must belong to the Admins group and password is required for
stopping or running of the service.
You can also stop, start or restart the Kerio Connect Monitor through Terminal or a SSH client
with the following commands with root access:
32
3.2 Standalone processes of the server
If possible, it is recommended to stop/start the service by using the button in System Prefer-
ences → Others → Kerio Connect Monitor (see figure 3.3).
Linux
Installation packages for Linux do not include Kerio Connect Monitor. Kerio Connect Engine
can be started by the following command:
The mailserver.exe process is located in the directory where Kerio Connect is installed
(Kerio\MailServer\mailserver.exe or Kerio/mailserver/mailserver.exe).
33
Kerio Connect components
The other two processes are represented by executables located in the directory
where Kerio Connect is installed (\Kerio\MailServer\plugins on Windows,
/Kerio/mailserver/plugins on Unix-based systems).
Whenever a problem occurs regarding any of the plug-ins (e.g. when connection is closed
improperly or if connection “freezes”), automatic restart is initiated by the corresponding
process. Initiation of the application’s restart also generates and saves a crashdump log that
might help discover the problem’s cause. Then, when an administrator connects to Kerio
Connect, a Kerio Assist dialog asks them to decide whether the crashdump log would be sent
to Kerio Technologies for analysis.
Warning:
Any information recorded in the log are used only to solve problems associated with usage
of Kerio Technologies products. No information including the sender’s email address will be
misused in any way.
34
Chapter 4
Kerio Connect — has a modern web interface. Its major advantage is the ability to
administer Kerio Connect from any place with Internet connection without having to install
the application.
Web browsers
New versions of all commonly used browsers that support JavaScript and cascading
stylesheets (CSS) can be used to access Kerio Connect Administration. For updated list of
supported browsers, refer to the Kerio Connect product pages.
To use the secured access to the Kerio Connect Administration interface (by HTTPS protocol),
the browser must support SSL encryption. If it can be configured (e.g. in Microsoft Internet
Explorer), it is recommend to enable support for SSL 3.0 and TLS 1.0 versions.
Users logged in
To access the HTTP service using a web browser, insert the IP address (or the name if it is
contained in DNS) of the computer where Kerio Connect is running. The URL also requires
specification of the HTTPS protocol for SSL-secured connection. Kerio Connect Administra-
tion runs on port 4040. The URL will be for example https://192.168.1.1:4040/admin or
https://mail.company.com:4040/admin.
Note: If you use URL without the HTTPS and 4040 substrings, Kerio Connect will be directed
to the secured protocol and port 4040 automatically.
If the URL has been entered correctly, a login page will be displayed in the browser. Enter the
username on this page (if the user does not belong to the primary domain, a username with
domain name must be entered, for example name@domain) and password.
35
Kerio Connect administration
Log out
It is recommended to log out after finishing work in Web Administration. To log out, click
the Logout button in the upper right corner. After logout, users get disconnected from Kerio
Connect, which prevents misuse of such connection. If Kerio Connect Administration is inactive
for 40 minutes, it will be automatically disconnected for security reasons.
• Domain administrator — can administer accounts, groups, aliases, mailing lists and
resources in their own domain. This access is suitable for larger companies or Internet
service providers because it enables the server administrator to delegate the basic
administration to domain owners (see figure 4.2).
36
4.1 Kerio Connect Administration
1. Log in to the web administration using the name and password of the primary
administrator (the name and password you created during the installation of Kerio Con-
nect).
3. Use the mouse pointer to select a user to whom the rights will be assigned.
4. Click on Edit to open the Edit User dialog and go to the Rights tab.
Figure 4.3 Setting user access rights for Kerio Connect Administration
37
Kerio Connect administration
5. On this tab, check <company.com> accounts for the domain administrator (see figure 4.3)
or Whole server read/write for server administrator.
38
Chapter 5
Once purchased, Kerio Connect must be registered. Registration may be performed in the
Kerio Connect’s administration interface (see chapter 5.2) or at Kerio Technologies website
(refer to chapter 5.1).
If Kerio Connect is not registered, it behaves like a trial version. The trial version of Kerio
Connect is not limited in functionality, it only expires after a certain period of time. After
30 days from the installation, Kerio Connect Engine is disabled.
This means that the trial version differs from the registered (full) version only in time of
functionality. This should be sufficient time (30 days) to test the product in the regular
environment. It is not necessary to reinstall or reconfigure Kerio Connect after registration.
Against the registration, you will receive a license key (the license.key file including the
corresponding certificate) which must be imported to Kerio Connect. For detailed information
on the import of the license key, refer to chapter 5.3.
Note: The trial version of Kerio Connect cannot be registered via the website.
Warning:
If Kerio Connect is protected by a firewall, it is necessary to allow outgoing HTTPS traffic for
Kerio Connect at port 443. Unless HTTPS traffic is allowed, Kerio Connect cannot use the
port to connect to the Kerio Technologies registration server.
39
Product Registration and Licensing
The trial version is intended to allow the customer to become familiar with the product’s
features and configuration. Once you register the trial version, you will be provided free Kerio
Technologies technical support during the entire trial period (up to 30 days).
You should pay careful attention during step five where a special identification code called
Trial ID is generated. This ID is later required when contacting the technical support. After
a successful registration, Trial ID can be found in the license information in the administration
interface.
Note: If you intend to reinstall Kerio Connect or to move it to another working station in the
registered trial period, it is recommended to back-up the mailserver.cfg configuration file
first (besides another information, your trial ID is included in this file).
If the registration is completed successfully, a confirmation message will be sent to your email
address provided.
40
5.2 Registration with the administration interface
To run the process of full version registration, click on the Register product link provided at
the main page of the administration interface (see figure 5.5):
• Base product — in step one, enter the license number you acquired upon purchasing
the product (License number).
License number
Enter your license number for the product.
Security code
Copy the security code provided in the picture. The code is a part of the
protection against license number generators.
The code is not case-sensitive.
Click Next to make Kerio Connect establish a connection to the registration server and
check validity of the number entered. If the number is invalid, the registration cannot
be completed.
• Software Maintenance — In this dialog you can specify add-ons and/or Software
Maintenance numbers. If you have purchased only the base license so far (usually
when performing registration of the product for the first time), skip this step.
Software Maintenance and add-on licensing policies are described in detail at the Kerio
Technologies webpage at http://www.kerio.com/support/software-maintenance/.
41
Product Registration and Licensing
You can add one or more license numbers acquired upon purchasing Software
Maintenance or an add-on license. Numbers provided in the list can also be edited
or removed. To register all numbers specified, click Next.
42
5.3 License Information and Import of the License Key
The red entries marked with an asterisk are required, The other ones are optional.
• Summary — in the last dialog, the data specified in the wizard is summarized.
Information of Software Maintenance expiration date is provided (the latest date when
the product can be updated for free).
Kerio Connect connects to the registration server, checks whether the data inserted is
correct and downloads automatically the license key (digital certificate).
43
Product Registration and Licensing
To run a full version of Kerio Connect, a license key is required. A license key is a special
file that must be imported to the product. Three methods can be applied to obtain the key
(depending on the type of the product’s registration and on the fact whether the product was
registered in time):
• The license key is imported automatically during the product’s registration in the
administration interface (see chapter 5.2).
• Import using the link on the main page — click on the Install license link (see figure 5.5).
A standard file-opening dialog is displayed where the license key can be browsed and
imported. If the import is successful, information about the new license is provided
at the main page.
If the new license increases number of licensed users, the Kerio Connect Engine must
be restarted upon the successful installation.
• Adding the license key file in the license directory manually — it is possible to copy
the license.key file manually to the license subdirectory under the directory where
Kerio Connect is installed.
If the file must be imported manually, it is necessary to stop the Kerio Connect Engine
before the import process is started.
License ID
License number of the product.
44
5.4 Licensing policy
Company
Name of the company (or a person) to which the product is registered.
Operational system
Name and version of the operating system on which Kerio Connect is installed.
Number of licenses does not include the internal administrator account designed exclusively
for administration of Kerio Connect (for more information, see chapter 19.3.1).
In case of users mapped from the LDAP database of the directory service, all users created in
this database are counted as individual licenses (all active users).
Once the number of licensed users is exceeded no other users will be allowed to connect to
their accounts.
Software Maintenance
Software Maintenance and add-on licensing policies are described in detail at the Kerio Tech-
nologies webpage at http://www.kerio.com/support/software-maintenance/.
45
Chapter 6
Services
In Configuration → Services the user can set which Kerio Connect services will be run and with
which parameters. Use the Start, Stop and Restart buttons below the table to run, stop or
restart appropriate service. The following services are available:
SMTP
SMTP protocol server (Simple Mail Transfer Protocol), handling open (non-encrypted) or
SSL secured connections. The SMTP server is used for sending outgoing mail messages,
for receiving incoming mail (if it is the primary or backup domain mail server) and for
messages delivered via mailing lists created in Kerio Connect.
Secure SMTP is an SMTP server whose communication is encrypted by SSL. Port 465 is
used as default for the traffic.
Two methods can be used for encryption of SMTP traffic. The traffic can be encrypted
either via SMTPS on port 465 or via SMTP on port 25 (STARTTLS, if TLS encryption 1 is
supported). The differences between the two methods are as follows:
46
• SMTP on port 25 with STARTTLS — traffic on port 25 is started as unencrypted.
If both sides support TLS, TLS is started via STARTTLS. Otherwise, the traffic is
held unencrypted.
• SMTP with SSL/TLS on port 465 — the traffic is encrypted right from the start.
Warning:
If traffic between Kerio Connect and mail client is running on port 25, a problem
might occur with email sending. Since public WiFi networks often do not support
traffic on unencrypted protocols, SMTP on port 25 can be blocked. In such case
users cannot send email out of the network. However, SMTPS on port 465 is
usually allowed. Therefore, it is recommended to keep SMTPS connection enabled
so that notebook and Apple iPhone users can use this port to connect to the server.
It is also necessary that users’ email clients (SMTPS encryption and traffic port) are
set correctly.
SMTP Submission is a special type of communication which enables the mail sent by
an authenticated user to be delivered immediately without antispam control. SMTP
Submission is used for sending mail among servers connected in the distributed domain.
This service is necessary for example when you use distributed domain (for more details,
see chapter 11).
POP3
POP3 protocol server (Post Office Protocol). This server allows users — clients to retrieve
messages from their accounts. It is also often referred to as the incoming mail server.
Secure POP3 is a POP3 server whose communication is encrypted by SSL. The encryption
prevents the communication from being tapped.
IMAP
IMAP protocol server (Internet Message Access Protocol). This server also allows users to
access their messages. With this protocol, messages stay in folders and can be accessed
from multiple locations at any given time.
Secure IMAP is an IMAP server whose communication is encrypted by SSL.
NNTP
NNTP protocol (News Network Transfer Protocol) — transfer protocol for newsgroups
over the Internet. The service allows users use messages of the news type and use the
protocol to view public folders.
Public folders cannot be viewed via NNTP protocol if its name include a blank space or
the . sign (dot).
Secure NNTP is the NNTP server version whose communication is encrypted by SSL.
LDAP
Simple LDAP server that enables users to access centrally managed contacts. The LDAP
server provides read-only access to the information; you are not allowed to create nor
edit the existing ones.
47
Services
HTTP
The HTTP protocol is used for:
• accessing user mailboxes via Kerio WebMail,
• accessing mail using Microsoft Entourage mail client (see chapter 39),
• accessing the Free/Busy server,
• automatic upgrades of new versions of the Kerio Outlook Connector and the Kerio
Outlook Connector (Offline Edition).
• for synchronization via the ActiveSync protocol.
• for BlackBerry synchronization via NotifyLink.
• for publishing of calendars as iCal
Secure HTTP is an encrypted version of this protocol (HTTPS — SSL or TLS encrypted).
HTTPS is used especially for the following purposes:
• accessing the user administration via the Kerio Connect Administration interface
(see chapter 4.1). The services gets redirected to port 4040 automatically.
• for secured access to WebMail.
Upon the first startup of Kerio Connect, all the services listed above are running on their
default (standard) ports.
Note: If you are sure that some services will not be used, it is recommended to disable them
(for security reasons).
If any service provided also by Kerio Connect is already running on the server, it is necessary
to change traffic port for one of the services. To change a port of a Kerio Connect’s service,
follow the instructions in section 6.1.
• Service — includes protocol name and an icon informing whether the service is
running or stopped.
• Status (running/stopped) — this item shows whether the service is running or stopped.
• IP addresses — this item shows all IP addresses and ports used for traffic by the
particular Kerio Connect’s service.
48
6.1 Service Parameter Settings
• Limit Access — Kerio Connect allows narrowing access rights to a certain group of
IP addresses which will be allowed to use the particular service (usually, unsecured
services are accessible from the local network only).
The parameters of a selected service can be changed. To do this, use the Edit button. The
button opens the Service dialog (see figure 6.2). The dialog consists of the following tabs:
Features
This tab allows setting of startup type and of a TCP port for traffic.
Name
Type of service.
Startup
Kerio Connect allows two startup modes:
• Automatically — the service will be run automatically upon Kerio Connect’s
startup.
• Manually — when the server is started, the service is stopped and it must be run
by the administrator if desirable.
49
Services
such a case, it is possible to reserve only one IP address for each service of Kerio Connect
so that port collisions are avoided.
This means that two different web servers may use port 80 at two different IP addresses. 2
Warning:
Assignment of IP addresses to ports is not recommended if IP addresses are
reserved dynamically, e.g. using DHCP.
Access
The Access tab allows setting limits for access to the particular service. The following
parameters can be set:
2 Indeed, it is necessary to reserve an IP address for the same service in another application, that is not used by Kerio
Connect.
50
6.2 Troubleshooting
Warning:
When you plan to limit the number of connections, consider the number of server
users.
For unlimited number of connections set the value to 0.
6.2 Troubleshooting
When solving problems regarding services, logs of the traffic between the server and clients
might be helpful. To log relevant information, enable a corresponding option under Logs →
Debug in the Kerio Connect Administration:
1. In the Kerio Connect Administration, go to the Logs section and select the Debug log.
2. Right-click on the log pane to open a context menu, and select Messages.
3. In the Logged Information dialog just opened, enable logging for the particular service (see
figure 6.5).
The following types of services are associated with the Debug log options:
SMTP
If any problems arise in the communication between the SMTP server and a client, it is
possible to use the SMTP Server and SMTP Client options.
51
Services
POP3
When problems with POP3 server arise, enabling the POP3 Server option might be helpful.
IMAP
When problems with IMAP server arise, enabling of the IMAP server logging might be
helpful.
IMAP Server.
NNTP
When problems with NNTP server arise, a log that can be enabled by the NNTP Server
option might help.
LDAP
When problems with LDAP server arise, a log that can be enabled by the LDAP Server
option might help.
HTTP
• HTTP Server — this option enables logging of HTTP traffic on the server’s side.
• WebDAV Server Request — this option enables logging of queries sent from the
WebDAV server. It can be used in MS Entourage or Apple Mail where problems
with Exchange accounts arise.
• PHP Engine Messages — enables log which may be helpful when solving problems
with the Kerio WebMail web interface.
To read more on the Debug log and its options, see chapter 24.9.
52
Chapter 7
A domain is a unique identifier for a host or a computer network. Email domain is a unique
domain identifier which is used to recognize to which server mail should be delivered. In email
addresses, the domain identifier follows the "at" symbol (@).
Email domain might be (and often is) different from the name of the server where Kerio
Connect is installed and running. The server name can be for example mail.company.com
where the email domain name is company.com. Users in this domain will use email addresses
following the pattern user@company.com.
Kerio Connect can include any number of email domains (see figure 7.1). Various parameters
can be defined for each domain and its users. The only condition is that one of the domains
must be set as primary. For details on setting of primary domain and its use, refer to
section 7.2.1.
Warning:
User accounts are defined separately in each domain. Therefore, domains must be have
been defined before accounts are created.
53
Domain and its settings
To make email deliverable to mail domains, Kerio Connect requires specification of a DNS
name of the host where the server is running (typically, it is the name of the host
complemented with the primary domain name — this server name is generated automatically
by the installation wizard).
Domains are defined in the Configuration → Domains section. Server names are used for
server identification while establishing SMTP traffic.
Upon initializing SMTP communication, the EHLO command is used for retrieving reverse DNS
record. The server that communicates with Kerio Connect can perform checks of the reverse
DNS record.
Warning:
If Kerio Connect is running behind NAT, enter the Internet hostname that can be converted
to the IP address of the sending server, i.e. the Internet hostname of the firewall.
Basic settings of the domain system in Kerio Connect include also the option of 3 sharing
of public folders across all created domains or creating of public folders separately for each
folder. This can be set in Configuration → Domains by the Public folders button (see figure 7.2).
To read more on public folders and their settings, refer to chapter 25.
The troubleshooting section for public folders issues can be found in chapter 30.1.
3 Public folders are folders which can be read by any users within the domain or any users in Kerio Connect. They are
created and managed by a user with administration rights for public folders. Public folders can be helpful for sharing
contacts or calendar with company events across the company, for example.
54
7.2 Definition of Domains
2. This opens the Domain dialog; on the General tab, enter the domain name and description
(description is not obligatory but it is recommended in case you would create multiple
domains).
3. Recommendation for ISP: On the General tab, set a limit for number of users in the domain
so that exceeding of number of license users is avoided (see figure 7.3).
The limit sets maximum number of users who can be connected to Kerio Connect at a time.
Note: For better reference, number of users gets red any time the limit is exceeded.
55
Domain and its settings
Users log into the primary domain with their usernames only, whereas they have to log into
all other domains using their full email addresses. This is again best shown on an example:
The domain company.com has been set as the primary domain. A user is defined in both
domains with the name user. The user will log into the domain company.com with the name
user, whereas for the second domain the user will have to use user@anothercompany.com as
a username.
Note: Users in the primary domain can also authenticate to the server using their complete
email address.
This implies that unless a serious reason to set a particular domain as primary occurs,
a domain which includes the highest number of users should be set as primary. That will
make it simpler for as many users as possible to specify their usernames when connecting to
the server.
Footers for email sent from the domain can be set in domain settings under Configuration →
Domains, namely the Footers tab (see figure 7.4).
Since it might be irrelevant to append footers to messages delivered within Kerio Connect, it
is possible to allow footers only for messages which are not delivered locally. This can be set
by using the Don’t append the footer to messages addressed to internal recipients option.
56
7.4 Restoring deleted items
This feature works as follows: deleted items of each user of the particular domain are kept for
certain time. If desirable, any kept items of a user can be recovered (all items not older than
the set date). Recovered items are then moved and can be later found in the Deleted Items
folder.
Enabling of deleted items recovery applies automatically to all users of the particular domain.
Setting of deleted items recovery is very simple and it can be done in domain settings under
Configuration → Domains:
1. Open settings of the domain you want to enable the recovery for.
2. On the Messages tab, check Keep deleted items for.
57
Domain and its settings
3. Set time how long deleted items will be kept on the disk for. Any length can be set,
depending on the free disk space available for this purpose. The maximal value is 365
days. If this value is exceeded, the domain settings cannot be saved.
If the Recover deleted items button is not active, deleted items recovery is not enabled for the
particular domain. In such a case, the given deleted item can be looked up in the archive if
archiving has been used.
TIP:
To optimize results, it is recommended to combine this rule with quotas for mailbox size
and with deleted items recovery (see section 7.4). Users can then view in Kerio WebMail or
in MS Outlook how much space is still available for their email.
If anyone loses an important message which is accidentally moved to a folder which is
cleaned up automatically, deleted messages can be simply recovered before the store with
deleted items is completely cleared out (with the deleted items recovery option).
The check for items ready for clean-out is run approximately every 6 hours (depending on the
store directory size).
In folders, such items will be deleted where date of creation would not have been modified for
the previous X days/years (defined in settings). Date of creation is changed in the following
cases:
58
7.5 Automated items clean-out
To avoid the server’s overload, up to 1000 items is deleted from each folder within one
clean-out.
Junk E-mail, Deleted Items, Sent Items
If there are subfolders in Junk E-Mail and/or Deleted Items, the items inside them will
be deleted in dependence on the set time limit. If a subfolder is empty, it is deleted
automatically (the time limit does not apply here).
All folders except contacts and notes
Whole message store delete can be set in years. Delete period can be set from 1 to 50
years. Items in the following folder and subfolders will be deleted:
• Inbox, Deleted Items, Junk E-mail, Drafts, Sent Items;
• Calendar, Tasks;
• Public Folders, mailing lists archive;
• all user created folders.
No items will be deleted in:
• contact folders,
• public contact folders,
• notes folder,
• unfinished tasks
• unfinished events and events with no end date,
• empty subfolders.
If your public folders are common for all domains, auto delete uses the mildest setting.
• Domain1 is set to 3 years, domain2 is set to 5 yeas — global public folders delete
is set to 5 years.
• Whole store delete is turned off in domain1 and set to 2 years in domain2 —
global public folders delete is turned off.
More information on public folders, see chapter 25.
Note: If you switch the Keep deleted items option (see chapter 7.4), the items deleted from
the whole store (except the Public folders and mailing list archives) will also be kept for
the time set.
Items clean-out can be applied either in a batch on all users of the particular domain or on
selected users.
1. Open the domain settings dialog where automatic clear-out will be set.
2. Switch to the Email tab.
3. In the Items clean-out section, select folders for automatic clean-out and set their
clean-out timeout.
The All folders except contacts and notes option requires confirmation.
59
Domain and its settings
Automatic email clear-out for particular users can be set under Accounts → Users:
1. Open the dialog with settings for the particular user to set automatic clean-out.
2. Go to the Messages tab (see figure 7.6).
3. In the Items clean-out section, select which folders you want to clean out automatically
and set timeout for the clean-out.
The All folders except contacts and notes option requires confirmation.
60
7.6 Domain alias
Usage of domain aliases will be better understood through the following example:
A company uses two domains: company.us and company.com. The company.us domain
is was set as a mail domain in Kerio Connect. Email addresses of the domain users are
user@company.us. If we create the company.com domain alias for the company.us domain, it
is also possible to use the user@company.com for identical users. It does not matter, whether
the user@company.us or the user@company.com is used. In both cases, the mail is delivered
to the same user.
61
Domain and its settings
Warning:
Unless this is a local alias (virtual domain), corresponding MX records must be defined in
DNS for each of such domains. A simple definition of the domain as an alias of another
domain does not make the alias exist in the Internet.
Domain aliases can be used only for email delivery. It is not possible to use them for user
authentication at Kerio Connect or to view the Free/Busy server. Domain aliases cannot be
used for administration purposes.
2. Open settings of the domain which the alias will be set for and go to the Aliases tab.
62
7.7 Authentication of domain users
Linux PAM
This option is available only for installation on Linux.
PAM (Pluggable Authentication Modules) are authentication modules that are able to
authenticate the user from a specific domain (e.g. company.com) against the Linux server
on which Kerio Connect is running. Use this option to specify the name of the PAM
service (configuration file) used for authentication of users in this domain. The Kerio
Connect installation package includes a configuration file for the keriomail PAM service
(it can be found under /etc/pam.d/keriomail). It is strongly recommended to use the
file. Details about PAM service configuration can be found in the documentation to your
Linux distribution.
Kerberos 5
Kerberos is an authorization and authentication protocol (for details, see information at
http://web.mit.edu/Kerberos/). Kerio Connect uses this protocol to authenticate users
against the Kerberos server (e.g. in Active Directory).
In the appropriate item of the dialog box, specify the Kerberos system domain, where
the users will be authenticated. Capital letters are used automatically for the name of
Kerberos realm in Kerio Connect.
If user account are saved in Active Directory or in Open Directory (see the Directory
Service tab), it is required to specify name of the Active Directory or the Open Directory
domain here. If you use the Directory Service tab for Active Directory or Open Directory
definition, this entry will be specified automatically.
63
Domain and its settings
Warning:
Warning: If you use Open Directory or a stand-alone Kerberos server, check
thoroughly that the Kerberos realm specified on the Advanced tab matches the
name of Kerberos realm in the file
/Library/Preferences/edu.mit.Kerberos
In particular, it must match the default_realm value in this file. By result, the
line may be for example default_realm = COMPANY.COM
Authentication settings for the individual platforms are described in chapter 26.
Windows NT domain
The NT domain in which all users will be authenticated. The computer which Kerio Con-
nect is running on must be a part of this domain.
Example:
For the company.com domain, the NT domain is COMPANY.
Bind this domain to specific IP address
Users can use any interface for connection to Kerio Connect. However, each domain
can be bound with one IP address. Binding of an IP address with a domain saves users
connecting from such an IP address from the necessity of including domain in username
(e.g. wsmith@company.com) for each login attempt. This implies that such users can use
separate user name (e.g. jsmith) as if connecting to the primary domain.
Correct functionality of binding of domains with an IP address requires at most one
domain to be bound to each IP address. Otherwise the server would not recognize to
which domain the username with no domain defined belongs.
Example: Kerio Connect host uses two interfaces. 192.168.1.10 is deployed to
the network of the company called Company and 192.168.2.10 is deployed to the
network of AnotherCompany. A new user account called smith is added to the
anothercompany.com domain (this domain is not primary).
The anothercompany.com is bound to the IP address 192.168.2.10. Users of this
domain will not need to specify their domain name while connecting to Kerio Connect.
Note: On the other hand, primary domain users have to specify their complete email
addresses to connect to this interface.
2. Right-click on the log pane to open a context menu, and select Messages.
64
7.8 Rename Domain
Warning:
Ensure that you have purchased a domain from your provider and that its name is registered
in DNS records. Test your domain first.
Make a full backup of your message store before and after the renaming process (how to
run a new backup, refer to chapter 15.2).
Renaming of the domain will take effect upon the server restart. Before the restart, all
operations will be performed using the original name.
The domain configuration will not change after renaming.
During the server restart, the original domain name will automatically be replaced with the
new name in the configuration files. The original name will become an alias (see table 7.1).
Warning:
Any events created before renaming will not be available for editing or removing after
application of the new name.
Settings
To rename domain, go to Configuration → Domains.
1. Select a domain to get renamed. Use the Edit button to open a dialog box.
3. In the Domain entry, specify a new domain name and confirm settings with OK (see
figure 7.9).
4. Information about the renaming action is then showed in the domain list (see figure7.10).
65
Domain and its settings
Note:
• If a user user’s mail filters include addresses of users from the renamed domain, they
need to change the rules.
• If you wish to cancel the domain rename action, you can do that under Configuration
→ Domains → Edit before the next server restart. For this purpose, use the Cancel
Rename button.
• Before renaming a distributed domain, disconnect all servers, rename domains
separately and then reconnect them to the distributed domain.
• user accounts or groups have been already defined within the domain. All accounts
must be deleted first (for details, see chapter 8.5).
66
7.10 A company with multiple sites
• the aliases are defined in it. First, delete all the aliases (for details, see chapter 12.3).
• it is the primary domain. However, you can create another domain and define it as
primary. Then, the former domain can be deleted.
The company in our example uses the only domain called company.com. Supposing
a company has its headquarters in New York and a branch office in Paris. Kerio Connect
is installed both at the headquarters and the branch office (two separate licenses). The
headquarters’ server uses DNS name fr.company.com. The branch office’s server uses DNS
name mail-fr.company.com.
We want the email transferred among local users in the branch office to be delivered locally,
while the email addressed to users in the headquarters is really sent to the headquarters. The
same thing should be guaranteed for the communication in the other direction — messages
sent from the headquarters to the branch office must be delivered to the branch office’s server.
67
Domain and its settings
Note: To keep the example as simple as possible, suppose that users boss and secretary
work in the headquarters and users technician and programmer work in the branch office.
The following description is focused on these special requirements — it does not include
detailed configuration of the SMTP server, remote administration, etc.
Implementation
1. In the company’s headquarters (at the primary server mail.company.com) in Kerio Con-
nect, set the company.com domain as the local primary domain.
2. In this domain, accounts of local users are defined (of those who work in the
headquarters).
3. If Kerio Connect is behind the firewall, it is necessary to make port 25 available for the
SMTP service.
4. Create the fr.company.com domain where no users and aliases will be defined. Set the
Forwarding tab under Domains in a way that email for the fr.company.com domain is
forwarded to the mail-fr.company.com server of the branch office (see figure 7.12).
68
7.10 A company with multiple sites
5. Next, set aliases for all users at the branch office (Accounts → Aliases), in this case for the
users technician and programmer. These aliases provide that email for corresponding
users is delivered to domain fr.company.com.
2. In the local primary domain, create accounts for all users in this branch office (for those
who will have local mailboxes at the other site).
3. Set that email addressed to the domain company.com is forwarded to the headquarters’
server mail.company.com, while messages with the domain alias in the recipient’s
address are not forwarded. This option guarantees that messages where username or
its alias is not specified correctly in the recipient’s address are caught.
Notes:
• Set a secondary DNS MX record for the filial’s server. This will help you avoid problems
in case of the headquarters’ primary server’s failure.
• The wildcard alias should not be used in branch office’s server’s, otherwise the email
for the headquarters will not be forwarded.
• If users want to access their email remotely (e.g. using Kerio WebMail), they will
always connect to the server where their local accounts are created (i.e. users in
69
Domain and its settings
the headquarters will connect to mail.company.com and users in the branch office
connect to the server mail-fr.company.com).
• The Free/Busy calendar will display only information regarding local users of the
particular server.
1. A company has own company.com domain, the primary MX record points to the
computer where primary mailserver is installed. The primary mail server’s DNS name
is mail1.company.com.
2. Create the backup server for the primary mailserver (its DNS name will be
mail2.company.com). A basic version of Kerio Connect can be used, because in this case
there is no need to create user accounts.
Implementation
1. Create the secondary MX record (with lower priority) in DNS for the company.com mail
domain for (mail2.company.com) backup server.
2. After the backup of Kerio Connect is installed, create a primary domain in the
configuration wizard and assign it the same name as the primary mailserver, i.e.
company.com.
• The best way of setting up forwarding from the backup server is to set the primary
server in the way that it queries the secondary server regularly using the ETRN
command. This procedure saves time because the servers are not connected
to an unavailable primary server. The primary server must support the ETRN
command.
Kerio Connect supports using the ETRN command for requesting emails (see
chapter 12.5). If you use Kerio Connect as a primary mailserver, we recommend
this option. Kerio Connect also sends the ETRN command to different servers
upon each server startup and thus all mail is downloaded to the server in the
shortest possible time after failure.
70
7.11 Setting up the backup mail server
If you want to use this method of email forwarding, allow the Offline delivery —
delivery is triggered by ETRN command from remote host option (see figure 7.15)
the company.com domain on the backup server in the administration interface
(Configuration → Domains).
It is also necessary to enable using the ETRN command in the primary mailserver
(see chapter 12.5) and schedule sending the ETRN command (see chapter 12.7).
If you prefer this method of setting the secondary SMTP server, we recommend
to extend the interval for message resending. This can be set in Configuration →
SMTP Server, on the Queue Options tab.
• The last method is to set up the scheduler so that it adjusts the intervals for
sending emails. This setting is similar to the previous one, because the server
again uses the rules for the outgoing message queue. However, in this case, the
interval is adjusted by a scheduler, where more convenient schedule can be set.
71
Domain and its settings
5. If Kerio Connect is used as a primary mailserver, we recommend to add the server address
to the list of ignored servers that are not restricted by the settings in the Configuration →
SMTP server menu of the Security options tab (for more information, see chapter 12.2).
72
Chapter 8
Users
User accounts in Kerio Connect represent physical email boxes. Users access mailboxes
through user name and password authentication. Since Kerio Connect can serve several
independent domains, the user accounts are not valid globally but are only valid for
a particular domain. This implies that domains must be defined before user accounts are
created (for details, see chapter 7).
1. locally — user mailboxes are located in Kerio Connect and any management of user
accounts is performed in Kerio Connect (see chapter 8.2),
2. in the LDAP database — accounts are just mapped to Kerio Connect. Mapping of user
accounts is available from the Active Directory and/or from the Apple Open Directory
(refer to chapter 10).
Each domain may include local accounts as well as accounts saved in a directory service (e.g.
Microsoft Active Directory). The list of users of the particular domain includes both types of
accounts. However, only local accounts can be added (accounts for directory services must be
created with the respective administration tools, e.g. Active Directory Users and Computers).
Some of the features of accounts within a directory service can be edited.
User accounts can be simply imported to Kerio Connect from another user database, as
follows:
73
Users
• public folders — for details on purpose and behavior of these folders, refer to
section 25.1;
• archive folders — for details on purpose and behavior of these folders, refer to
section 15.1.
The default administrator account also manages archive folders (if archiving is enabled — see
chapter 15.2). Any message which passed through Kerio Connect can be found in the archive.
Administrator can make archive folders shared with other users. However, since messages
of all users are archived, only a confidential administrator (or a tiny group of confidential
persons) should be allowed to access these folders.
Besides that, Kerio Connect provides a special built-in administrator account designed
exclusively for the product administration. This account does not consume a license from
the total number of purchased licenses and does not include a mailbox.
Warning:
Passwords for those user accounts that have full administration rights should be kept close
so that they cannot be misused by an unauthorized user.
74
8.2 Creating a user account
First, choose a local domain in the Domain field, in which the accounts will be defined. Each
domain may include local accounts as well as accounts saved in a directory service (e.g. Mi-
crosoft Active Directory). The list of users of the particular domain includes both types of
accounts. However, only local accounts can be created (accounts for directory services must
be created with the respective administration tools, e.g. Active Directory Users and Comput-
ers). Some of the features of accounts within a directory service can be edited.
Warning:
If an account mapped from the directory service is deleted in the administration interface,
the account is disabled in Kerio Connect.
The roles of each column of this window will be better understood through the following
descriptions. The only exception — the Data source column — displays account types:
• LDAP — the account is saved in a directory service (Active Directory, Apple Open
Directory).
Template
If at least one template has been created for generating of new accounts, select whether to add
a local user or use a template. To create a new template for user accounts, go to Configuration
→ Definitions → User Templates. The template is useful especially for creating multiple user
accounts at once that have some parameters in common (e.g. authentication type, quotas,
etc.). When all these common parameters are entered in a template, it can save a lot of time.
75
Users
Basic information
Login name
User login name (note: the domain must be the local primary domain; otherwise enter
the full email address, e.g. user@anothercompany.com, not only user).
The username is not case-sensitive.
Full name
A full name of the user (usually first name and surname). This option is required, if the
user data from this account are to be exported to a public contacts folder.
Description
User description (e.g. a position in a company). The Description entry is for informative
purposes only. They can contain any type of information or they can be left blank.
Authentication
Possible authentication methods:
• Internal user database
Users are only authenticated within Kerio Connect. In this case a password must
be entered in the Password and Confirm Password fields (the user can then change
his/her password in the Kerio WebMail interface).
76
8.2 Creating a user account
Warning:
Passwords may contain printable symbols only (letters,
numbers, punctuation marks). Password is case-sensitive.
• Windows NT domain
Users are authenticated in a Windows NT domain. The NT domain name must
be entered in the email domain properties (Windows NT domain in the Advanced
tab). This authentication method can be used only if Kerio Connect is running on
Windows 2000/XP/2003. For details, see chapter 7.7.
• Kerberos 5
Users are authenticated in the Kerberos 5 authentication system.
• PAM service
Authentication using the PAM service (Pluggable Authentication Module),
available only in the Linux operating system.
• Apple Open Directory
Authentication against Apple Open Directory database (only for mailservers
installed on a Macintosh). The option can be selected only if the user is mapped
from Apple Open Directory.
Account is enabled
Unchecking this option allows you to temporarily disable an account without deleting it.
This feature is not identical with account blocking set under Configuration → Advanced
Options, on the Security Policy tab (see section 12.8). If the user enters an invalid
password too many times in row and the limit set on the Security Policy tab is reached, the
account is blocked automatically. To unblock the accounts, use the Unlock all accounts
now button on the Security Policy tab.
Warning:
It is not recommended to create this rule when the user accesses emails via POP3.
In such case, only the INBOX folder is downloaded to the local client and the user
is not able to check if the emails moved to the Spam folder are really spam emails.
77
Users
Mail Addresses
In this step, all required email addresses of the user can be defined. The other addresses are
called aliases. The other addresses are called aliases. These can be defined either during the
user definition or in Accounts → Aliases. We recommend to use the first alternative — it is
easier and the aliases are available through Active Directory.
78
8.2 Creating a user account
If user accounts are maintained in Active Directory (see chapter 10.1), their aliases can be
defined in Active Directory Users and Computers. Global aliases (in Accounts → Aliases) cannot
be defined this way.
Messages for a user can be forwarded to other email accounts if defined. If the Deliver mes-
sages to... button is activated, messages will be saved in the local account and forwarded to
the addresses defined by user (if not, messages will be forwarded only, not saved).
Note: The same functionality can be achieved by aliases; however, setting this within the user
definition dialog is smoother and easier to follow.
Groups
In this dialog window, you can add or remove groups of which the user is a member. Groups
must be created first in the Accounts → Groups section. You can add users to groups during
definition of groups. Therefore, it is not important which is created first — users or groups.
79
Users
Each user must be assigned one of the following three levels of access rights.
No rights
The user will not be granted any administration rights
<your.domain> accounts
The user will be granted administration rights for user accounts, groups, aliases, mailing
lists and resource in the domain their account belongs to. For more information refer to
section 4.1.
80
8.2 Creating a user account
The value of either of these items can be set to 0 (zero), which means that there is no limit set
for the mailbox.
The user quota prevents cluttering of the server disk. If either of the limits is reached, any
new messages will be refused by the server.
When the quota is reached, the user will receive a warning message including recommendation
on deleting some messages. It is also not important if the quota was exceeded by number of
messages or by the reserved disk space capacity. The quota is reached at the moment when
an incoming message (or an event, a contact or a task) exceeds one of these limits.
The threshold of 90 per cent of the quota value is set (90 per cent of the limit set for the
number of messages or 90 per cent of the disk space reserved). When this threshold is reached,
an informative message is send to the particular user.
These warning messages are sent maximally each 24 hours (not more frequently). Even if
a user removes messages to get under the quota threshold and then exceeds it again, the next
informative message will be sent after 24 hours from the previous informatory message.
Note: When solving any problems regarding quota settings arise, information obtained in the
Debug log might help. The Debug log can be found in the Logs → Debug section of the
administration interface. To log information on the quota’s behavior, enable the Quota and
Login Statistics option (see chapter 24.9 for details).
Messages
81
Users
By setting the size limit, you can prevent the Internet connection from being overloaded
by emails with large attachments.
Limit set for a specific user has higher priority than limits applied to the entire domain.
Items clean-out
Kerio Connect includes an option of setting a special rule for automatic deletion of all
items older than a defined number of days (for a mailbox, or for an entire domain in
domain settings). This rule applies to folders Junk E-mail, Deleted Items, Sent Items and
All folders except contacts and notes.
For more information on this feature, read section 7.5.
This dialog consists of the same items as above. Current usage of this quota can be viewed in
the Quota tab. Percent usage is not displayed unless the quota is defined (limited).
82
8.4 Editing multiple users
The dialog window regarding mass modification of user accounts consists of four tabs
where quota and user access rights parameters as well as other settings (user description,
authentication type, password format settings, etc.) and user restrictions can be edited for the
selected users.
83
Users
In this dialog window, only items and parameters that will be changed en bloc for all selected
accounts are set. Three status modes are available for the Store password in highly secure
SHA format and Account is disabled options on the General tab that can be switched by
checking/unchecking the checkboxes:
The Rights, Quota and Restrictions tabs can be edited in the same way as while editing their
parameters for individual accounts.
Example:
One of the typical cases where mass change is helpful is setting maximal size of
outgoing/incoming mail. The Kerio Connect administrator set maximal size of outgoing mail
(for one message) for the company.com to 20 MB. However, some users need to send larger
attachments.
Kerio Connect enables selecting users of the domain by Ctrl and the mouse pointer. Simply
select accounts of the company.com domain and set a new value for the outgoing mail on the
Restrictions tab.
84
8.5 Removing user accounts
85
Users
8.6 Search
The Search option makes looking up items in the users list easier. Insert a string in the Search
field to list only items containing the string specified.
8.7 Statistics
User statistics are recorded immediately after Kerio Connect is installed. To store the statistics
even when the server is off, each user’s data is saved into the stats.usr file under its parent
directory.
Use the More actions → User Statistics button in the Accounts → Users section to open the table
of statistics that contains selected user accounts, services to which the statistics refer to, last
login (day and time of the most recent user authentication to the service) and login count (total
number of authentications of individual users).
The Kerio Connect administrator can customize the way information is displayed in individual
sections. After clicking on the arrow to the right of the column name in the Statistics window,
you can select which columns will be displayed.
The user statistics can be exported in two formats: XML and CSV (the comma-separated
values). The export button is located under the statistics.
Note: If you use MS Excel to display and work with statistics, problems with text separator
might arise. In CSV formats, commas are usually used as text separators. However, in some
localizations MS Outlook requires the semi-colon to be used for this purpose (e.g. the Czech
localization of MS Office). To prevent yourself from collisions which would cause incorrect
printing of the statistics in the table, do the following:
1. Select data for the statistics and click on Export → Export to CSV .
2. In the standard saving dialog box, enter a name for the file and select a directory to save
it in.
3. Open MS Excel.
4. In the Data menu, click on Import external data → Import data.
5. The Select data source dialog box is opened where you can look up the statistics file.
6. This opens the Text import wizard. Switch to the Delimited mode (otherwise, individual
items of the statistics will not be displayed in columns).
7. Click on Next.
8. In the next dialog, select comma as a delimiter.
9. Click on Finish.
86
8.8 Administration of mobile devices
The administration interface includes tools for administration of mobile devices that can be
used by the Kerio Connect administrator to overview devices currently used by individual
users.
The mobile device administration tools can be found in Accounts → Users. In this section,
simply select a user who uses a mobile device to connect to the server. Click on More actions
and select the Mobile Devices option in the menu (see figure 8.14). The Mobile Devices dialog
is opened which shows all devices used by the user to connect to the server. Several buttons
are available below the device list:
• Remove — removes selected devices from the list. This option is helpful especially
when a device is not used (for details on this option, see chapter 36.6).
• Wipe — this option allows remote removal of user data from the selected device (see
chapter 36.5).
• Details — use this button to view details on a selected device. Click the button
to display another section including details on the device connected as well as on
synchronization. The section consists of two parts (see figure 8.15). The first part,
providing information about the device connected and about the synchronization, is
called Details:
87
Users
Protocol version
ActiveSync version.
Device ID
Serial number of the device.
Device Registered
The date when the user specified server info in ActiveSync and established the
first connection.
Last Synchronization
Date and time of the last synchronization.
Status
Synchronization status. This item provides synchronization status information,
i.e. whether the process was completed successfully, if any problems arose, etc.
Remote Host
IP address assigned to the device’s network adapter.
The Synchronized Folders section lists all synchronized folders. Older device types
usually support only synchronization of email, calendars and contacts, whereas newer
devices support also synchronization of tasks.
Below the pane where folders are overviewed, an information addressing solution of
synchronization collisions is provided. A collision is detected if the same data items
88
8.9 Import Users
• Server wins — if there is a collision, data saved on the server overwrite the
data stored in the device.
• Client wins — if there is a collision, data saved on the device overwrite the
data stored on the server.
If you use a Windows 2000 or windows 2003 domain (Active Directory), it is easier to set Kerio
Connect so that it cooperates directly with the Active Directory database (see chapter 10.1).
When users are imported, local accounts are created in Kerio Connect. Therefore, when you
are editing Active Directory (removing or adding users), the Kerio Connect configuration must
also be edited (new user import or deleting an account).
Warning:
It is recommended to enable the Directory Service Lookup option in the Debug log (for more
information, see chapter 24.9) before starting the import process. Logged information about
the import process might help you where troubleshooting is necessary.
The Import and Export button located below the user list is also a menu. This menu includes
options of import from a directory service (NT domain, Active Directory, Novell eDirectory) or
import/export from/to a CSV file. Select an option to open the user import dialog:
There is an option to import user accounts from CSV files. Data in the file must follow certain
rules. Headlines of individual columns must correspond with Kerio Connect’s items. The
following items are supported:
89
Users
• MailAddress — user’s email address. Only the part preceding the at-sign should be
inserted. Any number of email addresses is accepted (e.g. jwayne, wayne, john,
john.wayne). Optional.
• Groups — groups where the user is subscribed. Multiple groups are allowed. Optional.
Columns can be ordered as wish, there are no rules to be followed. It is also possible to leave
some of them out (except the Name item).
When creating a file to be imported, bear in mind it is important that individual data items
are separated by commas (,) or semicolons (;). If semicolons are used, the process is simpler.
Create a table where standard item names (see above) are in caption and add corresponding
data. Multiple items can be included in MailAddress and Groups. Individual email addresses
and/or groups must be separated by commas:
Name;Password;FullName;Description;MailAddress;Groups
jsmith;VbD66op1;John Smith;Developer;jsmith;read,all
pblack;Ahdpppu4;Peter Black;Sales;pblack,black;sales,all
abird;SpoiuS158;Alexandra Bird;Head Assistant;abird,alexandra.bird;all
If commas are used as separators, additional separators must be used for MailAddress and
Groups items since commas used there as separators might collide with the other comma
separators. Quotes ("...") or apostrophes (’...’) can be used as separators:
Name,Password,FullName,Description,MailAddress,Groups
jsmith,VbD66op1,John Smith,Developer,jsmith,"reading,all"
pblack,Ahdpppu4,Peter Black,Sales,"pblack,black","sales,all"
abird,SpoiuS158,Alexandra Bird,Head Assistant,"abird,alexandra.bird",all
2. In Accounts → Users, click on Import and Export and select the Import from CSV file option.
3. In the opened dialog, enter the file path (see figure 8.16).
90
8.9 Import Users
4. Click on OK and wait until the file is uploaded. The User import dialog is opened providing
a list of all users defined in the CSV file (see figure 8.17).
If problems occur regarding the upload, it might be caused by the following reasons:
• Columns in the file are not labeled correctly. CSV file needs to include a line with
captions including column names, otherwise Kerio Connect cannot read the data.
Correct version:
Name;Password;FullName;MailAddress
silly;VbD66op1;Stephen Illy;silly
ewood;Ahdpppu4; Edward Wood;ewood,wood
Wrong version:
silly;VbD66op1;Stephen Illy;silly
ewood;Ahdpppu4; Edward Wood;ewood,wood
• Separators are not used properly. Proper way of how to use separators is
described above.
5. Check all users to be imported. Where many users are imported, the Check selected and
Uncheck selected buttons might be helpful.
• Check selected — all users marked by the mouse pointer (using the Shift and
Ctrl keys) will be checked.
6. Templates for email accounts can be selected and set in the Template menu. If there is no
template to be set, keep the default settings.
91
Users
For detailed information on templates and their application, see section 8.11.
Windows NT domain
Use the Import users from option to select a source from which users will be imported.
Windows NT Domain is used in this case.
In this case, the only required parameter is the NT domain name. The computer which Kerio
Connect is running on must be a part of this domain.
Do NOT import users this way if the domain controller runs on Windows 2000, Windows Server
2003 or Windows Server 2008! In such a case, import them from the Active Directory — see
below.
Warning:
Import of NT domain users works only if Kerio Connect is installed on the MS Windows
platform.
Within the import of user accounts from the LDAP database with Kerio Connect, sensitive data
may be transmitted (such as user passwords). It is possible to secure the communication by
using an SSL encryption.
Active Directory
Use the Import users from option to select a source from which users will be imported. Active
Directory is used in this case.
92
8.9 Import Users
To import users from Microsoft Active Directory, you need to specify the following
information:
• Active Directory domain name — the name of the domain users will be imported from
(the format is as in DNS domain — e.g. domain.com)
• Import from server — the name of the server, on which Active Directory for this
domain is running.
If a special port is specified for the LDAP(S) service, the port number can be added to
the server name (e.g.: mail1.company.com:12345).
• Login as user, Password — the username and password of the user who has an account
open in the domain. Write access rights are not required for saving and changing
settings.
• LDAP filter — this item is available upon clicking on Advanced. This option allows to
modify the request for LDAP server users will be imported from. It is recommended
that only experienced programmers use this option. For details about the query
syntax, see the instruction manual to your LDAP server.
• Within the import of user accounts from the LDAP database with Kerio Connect,
sensitive data may be transmitted (such as user passwords). It is possible to secure
the communication by using an SSL encryption.
93
Users
Novell eDirectory
Use the Import users from option to select a source from which users will be imported. Novell
eDirectory is used in this case.
To import users from Novell eDirectory, specify the following items:
• NDS organization — the name of the organization users will be imported from
• Import from server — the name or the IP address of the server, on which the service
for this domain is running.
If a special port is specified for the LDAP(S) service, the port number can be added
to the server name (e.g.: mail1.company.com:12345). Only Mac OS X includes the
Secure connection (LDAPS) option.
• Login as user, Password — the username and password of the user who has an account
open in the domain. Write access rights are not required for saving and changing
settings.
• LDAP filter — this item is available upon clicking on Advanced. This option allows to
modify the request for LDAP server users will be imported from. It is recommended
that only experienced programmers use this option. For details about the query
syntax, see the instruction manual to your LDAP server.
• Within the import of user accounts from the LDAP database with Kerio Connect,
sensitive data may be transmitted (such as user passwords). It is possible to secure
the communication by using an SSL encryption.
94
8.10 Exporting domain users to CSV files
User selection
Once all conditions are met (valid login data has been entered, the server is available, etc.),
click OK to view user list (see figure 8.21):
2. Templates for email accounts can be selected and set in the Template menu. If there is no
template to be set, keep the default settings.
For detailed information on templates and their application, see section 8.11.
3. Click on OK.
Note:
• If the users are imported from Active Directory, the platform on which Kerio Connect
is running is not important.
• Authentication type will be set for the users in accordance with where they were
imported from: Windows NT Domain for the NT Domain users and Kerberos 5 for
the Active Directory users.
1. Go to Accounts → Users.
95
Users
3. Click on the Import and Export button and select option Export to a CSV file (see
figure 8.22).
4. In the dialog just opened, select between opening and saving the file. The file name will
be created by the following pattern:
users_DomainName_date.CSV
Note: The CSV file can now be opened in a spreadsheet or text editor.
Defining a Template
You can define a template in the Configuration → Definitions → User Templates section. The
dialog window for creating or editing a template is almost identical to the dialog window for
creating a user account.
Name
Name of the template (unique name used for the template identification).
96
8.11 User Account Templates
Description
This field has two meanings. First, it is the template’s description that will be displayed
next to its name in the template list and, second, it is copied to the Description field in
the user account created with this template.
Authentication
The authentication method to be performed (for details, see chapter 8).
Domain
Selection of the domain for which the template will be used. Here you can choose one of
the local domains defined in Kerio Connect or you can decide not to specify any domain.
If no domain is specified, the template can be used for creating and editing user accounts
in any domain (general template).
97
Users
The other fields in the dialog window are the same as the fields in the user account dialog
window. The values entered here will be automatically entered into corresponding fields in
the created account. For details, see chapter 8.2.
A created template can be used immediately for creation of a user account in the Accounts →
Users section. If at least one template has been defined, then, upon clicking on Add, you can
choose whether to use a template or add a local user.
Only templates created for the particular domain or templates with an unspecified domain
(general domains) will be offered.
Once you choose a template a user account creation guide will be opened where appropriate
values will be entered into individual fields. For details, see chapter 8.2.
98
Chapter 9
User groups
User accounts within each domain can be sorted into groups. The main reasons for creating
user groups are as followed:
• Group addresses can be created for certain groups of users with aliases — mail sent
to this address will be delivered to all members of the group.
• Specific access rights can be assigned to a group of users. These rights complement
rights of individual users.
The Search field can be used in the same way as in the Users section. To read more about this
function, refer to chapter 8.6.
99
User groups
Name
Unique name of the group.
Description
Description of the group; may be left blank.
Note: By pressing the OK button, the dialog window can be closed and saved anytime. The
group will be created and the “skipped” fields will be filled with default values.
Mail Addresses
This step defines all desired email accounts (aliases) of the group. There might be no address
assigned to the group (unlike user accounts, the group address is not created automatically
from the group name and domain where the group is defined).
The group addresses can be added either directly during the group definition or in the Ac-
counts → Aliases section. The first method is recommended — it is easier.
100
9.1 Creating a User Group
Note: If user accounts are maintained in Active Directory (see chapter 10.1), their aliases can
be defined in Active Directory Users and Computers. Global aliases (in Accounts → Aliases)
cannot be defined this way.
Group members
Using the Add and Remove buttons you can add or remove users to/from the group. If there
are no user accounts created, a group may remain empty and users will be assigned to it when
their user accounts are defined (see chapter 8.2).
101
User groups
The group must be assigned one of the following three levels of access rights:
No rights
The users in the group will not be granted any administration rights
<your.domain> accounts
The user will be granted administration rights for user accounts, groups, aliases, mailing
lists and resource in the domain their account belongs to. For more information refer to
section 4.1.
102
9.2 Exporting group members
Group access rights are combined with user access rights. This implies that resulting
user rights correspond either with their own rights or with rights of the appropriate group
according to which ones have higher priority.
1. Go to Accounts → Groups.
2. Select the group users of which will be imported and double-click on it (or click on Edit).
3. In the Edit Group dialog go to the Users tab and click on Export (see figure 9.5).
4. In the dialog just opened, select between opening and saving the file.
users_DomainName_date.CSV.
103
User groups
Note: The CSV file can now be opened in a spreadsheet or text editor.
104
Chapter 10
Kerio Connect can also work with accounts or groups that are managed through an LDAP
database (currently, the Microsoft Corporation´s Active Directory as well as Apple OpenDirec-
tory database are supported). The benefits are as follows:
• user accounts can be managed from one location which reduces possible errors and
simplifies administration,
• access of Kerio Connect users to the Global Address List (GAL) of the directory service
from their mailboxes.
• the option of sharing information across multiple servers involved in the distributed
domain (for details, see chapter 11).
Example: A company uses a Windows 2000 domain as well as Kerio Connect. A new employee
was introduced to the company. This is what has been done until now:
2. The user has been imported to Kerio Connect (or an account using the same name has
been created and this name was verified by the Kerberos system).
3. Within the user creation or later, user information (full name and email address) has been
added to the public contact folder.
Note: Kerio Connect allows internally managed user accounts (stored in LDAP database) to be
added within the same domain. This can be helpful when creating an administrator account
that will be available even when the directory server cannot be accessed.
105
Mapping users from directory services
Warning:
• If the Active Directory server is not available it will not be possible to access Kerio
Connect. It is therefore recommended to create at least one local account with
read/write permissions.
• When creating a user account, ASCII must be used to specify username. If the
username includes special characters or symbols, it might happen that the user
cannot log in.
To make account mapping work, you will need to enable mapping in the administration
interface and to install the special module Kerio Active Directory Extension on the domain
server. Guidelines for these settings are provided in the following sections.
106
10.1 Active Directory
Username
Name of the user that has full (read and write) rights for the LDAP database in the
following form: xxxxx@company.com.
Password
Password of the user that have full (read and write) rights for the LDAP database.
107
Mapping users from directory services
Kerio Connect.
Warning:
SSL encryption is demanding in respect of connection speed and processor
operation. Especially when too many connections are established between the
LDAP database and Kerio Connect or a great amount of users are included in the
LDAP database, the traffic might be slow. If the SSL encryption overloads the
server, it is recommended to use the non-secured version of LDAP.
Warning:
If the domain has also an alternate directory sever, it is necessary to open the
Kerberos configuration file (krb5.conf or edu.mit.Kerberos) and define another
KDC record.
Click the Test connection button to check the defined parameters. The test is performed on the
server name and address (if it is possible to establish a connection with the server), username
and password (if authentication can be performed) and if Kerio Active Directory Extension are
installed on the server with Active directory (see chapter 10.1.2).
Note: Cooperation with the LDAP database that has been described above has nothing to do
with the built-in LDAP server. The built-in LDAP server is used to access contact lists from mail
clients (for details refer to the chapter 20). If Kerio Connect is installed on the same computer
as the Active Directory, it is necessary to avoid collisions by changing a port number for the
LDAP service (Configuration → Services).
Kerio Active Directory Extension is an extension to the Microsoft Active Directory service (Active
Directory from now on) with items that include specific information for Kerio Connect. By
installation of the extension you can integrate part of Kerio Connect into Active Directory.
This will simplify actions related to user administration.
108
10.1 Active Directory
Installation
Use the wizard to install Kerio Active Directory Extension. After you confirm the licensing
policy, select a destination directory. In the next step a window showing the installation
process will be displayed. At the left bottom corner you will find buttons that can be used
either to view the installation log (the View Log button) or to save the log to file (the Save Log
to File button).
Note:
1. According to the version of Microsoft Internet Explorer that you use, installation of the
Microsoft XML Parser component may be required. If the installation is required you
must install Microsoft XML Parser first, otherwise the Kerio Active Directory Extension
installation cannot be finished.
2. Only the English version of Kerio Active Directory Extension is available.
System requirements
Kerio Active Directory Extension in Windows 2000 Server supports both Active Directory NT
compatible and 2000 native types. In Windows 2003, Active Directory 2000 native and Active
Directory 2003 are supported.
Active Directory
Active Directory is a service that stores information about objects (users, groups, hosts, etc.) in
Microsoft Networks. Applications that support Active Directory use the service to learn about
parameters and rights of the objects. Active Directory is based on a structured database.
Users and groups in the domain are connected to the LDAP Active Directory database. Using
LDAP, user accounts can be managed from one location. This reduces possible errors and
109
Mapping users from directory services
simplifies administration. To add users and groups, use MMC (Microsoft Management Console).
New users or groups added to the domain connected to Active Directory with Kerio Connect
Administration will be stored into the local database of Kerio Connect only.
Run MMC from the menu Start → Settings → Control Panel → Administrative tools → Active
Directory Users And Computers.
In Active Directory Users And Computers select the Users section. Choose the New → User
option to run the wizard for creating a new account.
Warning:
When creating a user account, ASCII must be used to specify username. If the username
includes special characters or symbols, it might happen that the user cannot log in.
The standard version of the wizard is extended with a folder that will be used to create a new
account within Kerio Connect.
Now, check the Create a Kerio Connect mailbox option to create in the database all items
that Kerio Connect will need to work with. Define the basic email address of a user with
the Alias item (the user login name defined during the first step of the wizard will be used
automatically).
Other account parameters may be defined in Properties. Click on the new user account with
the right mouse button and select Properties in the context menu. Open the Kerio Connect
Account folder. This folder provides the following options:
110
10.1 Active Directory
E-mail Addresses
Definition of email addresses (aliases) for a particular user. Under the default settings,
each user has an email address created from the username and the name of the domain
where the account has been defined.
Forwarding
Here, forwarding of mail to the desired email address may be defined. The Forward to:
option can be used to forward mail addressed to the user to all addresses defined in this
entry.
The Deliver messages to both option can be used to forward the mail and to store it into
the local mailbox (copies of the messages will be sent to defined addresses).
Mailbox Limits
Mailbox limitations according to the Storage size and Number of messages may be defined.
Each limit option may be switched off by the Do not limit... option, thus the limitation will
be ignored within the mailbox.
111
Mapping users from directory services
Administration Rights
Definition of Kerio Connect administration rights. The menu provides the following
options to select from:
• No access to administration — no access the administration. This option is
used by default. We recommend creating a local account for the Kerio Con-
nect administration (see chapter 8). In case the Active Directory server is not
accessible, administration of Kerio Connect will still be possible if the account is
managed locally in Kerio Connect.
• Read only access to administration — user is allowed to access the administration
only to read it. User can login to the server administration and view settings but
is not allowed to make any changes.
• Read/write access to administration — full access to the administration. User is
allowed to read and write in the administration. As few users as possible should
be granted these rights for security reasons.
Group Definition
Within Kerio Active Directory Extension, group definition is almost identical to user account
definition; however, the wizard for creating new groups is extended by one step. This step
enables the administrator to define a primary email address that will be used by the group.
The Kerio Connect Account bookmark allows the administrator to define email addresses of the
group (the E-Mail Addresses button) as well as access rights to Kerio Connect administration
(the Administration Rights button).
112
10.2 Apple Open Directory
Warning:
• If the Open Directory server is not available it will not be possible to access Kerio
Connect. It is therefore recommended to create at least one local account with
read/write permissions.
• When creating a user account in Apple Open Directory, ASCII must be used to specify
username. If the username includes special characters or symbols, it might happen
that the user cannot log in.
To make account mapping work, you will need to enable mapping in the administration
interface and to install the special module Kerio Open Directory Extension on the domain
server. Guidelines for these settings are provided in the following sections.
113
Mapping users from directory services
Kerberos area must be specified against which the mailserver will be authenticated.
It is necessary that the name matches the name of Kerberos area specified in
the /Library/Preferences/edu.mit.Kerberos file, otherwise the settings will not
function properly. For detailed description on authentication against the Kerberos server
on Mac OS X operating systems, see chapter 26.3).
Hostname
DNS name or IP address of the server where the LDAP database is running.
For communication, the LDAP service uses port 389 as default (port 636 is used as default
for the secured version). If a non-standard port is used for communication of Kerio
Connect with the LDAP database, it is necessary to add it to the DNS name or the IP
address of the server (e.g. mail1.company.com:12345 or 212.100.12.5:12345).
Note: If the secured version of LDAP service is used for connection, it is necessary to
enter also the DNS name to enable the SSL certificate’s verification.
Username
Username of a user with full (read and write) rights for the LDAP database. either of the
root user or of the Open Directory administrator (admin for Mac OS X 10.3 or diradmin
114
10.2 Apple Open Directory
for Mac OS X 10.4 and higher). In case that the administrator’s username is used, it
is necessary to make sure the user is an OpenDirectory Administrator, not just a local
administrator on the OpenDirectory computer.
To connect to the Apple OpenDirectory database insert an appropriate username in the
following form:
uid=xxx,cn=xxx,dc=xxx
Password
Password of the user that have full (read and write) rights for the LDAP database.
Warning:
SSL encryption is demanding in respect of connection speed and processor
operation. Especially when too many connection are established between the
LDAP database and Kerio Connect or when too many users are included in
the LDAP database, the communication might get slow. If the SSL encryption
overloads the server, it is recommended to use the non-secured version of LDAP.
Click the Test connection button to check the defined parameters. The test is performed on
the server name and address (if it is possible to establish a connection with the server) as well
as the username and password (if authentication can be performed).
Note: Cooperation with the LDAP database that has been described above has nothing to do
with the built-in LDAP server. The built-in LDAP server is used to access contact lists from
mail clients (for details refer to the chapter 20). However, if the Kerio Connect is installed on
an Apple Open Directory server the LDAP listening port in Configuration → Services must be
changed to an alternate port to avoid a port conflict.
115
Mapping users from directory services
Kerio Open Directory Extension is an extension to Apple Open Directory service that allows
mapping of the accounts to Kerio Connect (Kerio Connect items are added to the LDAP
database scheme). When user accounts are created, edited or deleted in Apple Open Direc-
tory database, the changes are also made in Kerio Connect. In addition to that, Kerio Connect
users can access Apple Open Directory LDAP database contacts from their mailboxes (via the
public Contacts folder).
Installation
The installation package with Kerio Open Directory Extension can be downloaded from product
web pages of Kerio Technologies.
Warning:
When using configurations of Mac OS X servers of Master/Replica type, Kerio Open Directory
Extension must be installed to the master server, as well as to all replica servers, otherwise
the account mapping will not work.
If the configuration is as follows:
• Replica servers were created after installation of Kerio Open Directory Extension on
the Master server,
then Replica servers download the extension automatically from the Master server during
the creation process.
If you install Kerio Open Directory Extension on Replica servers by hand, the configuration
will not be affected.
System requirements
Kerio Open Directory Extension can be installed to Mac OS X 10.5 Leopard and later versions.
Apple Open Directory is a directory service shipped with Mac OS X Server systems. This
directory service is an equivalent to Active Directory created by Microsoft. As in Active Direc-
tory, it allows to store object information in a network (about users, groups, workstations,
etc.), authenticate users, etc.
116
10.2 Apple Open Directory
The information about users and groups in Apple Open Directory are stored in Open LDAP
database. When mapping accounts to Kerio Connect, all user accounts are stored in one place
and it is not necessary to import and administer them in both Apple Open Directory and Kerio
Connect. Only definitions of mailbox-specific configurations have to be done in Kerio Connect
(see chapter 8).
Warning:
When creating a user account in Apple Open Directory, ASCII must be used to specify
username. If the username includes special characters or symbols, it might happen that
the user cannot log in.
In Mac OS X Server, no other settings than Kerio Open Directory Extension installation are
usually necessary. It is only necessary to save usernames in ASCII. If the username includes
special characters or symbols, it might happen that the user cannot log in.
1. Mapping of user accounts from Apple Open Directory must be enabled and defined in
domain settings.
2. User authentication via Kerberos must be set in domain settings (for more information,
see chapter 7.7).
3. User authentication via Kerberos must be set in user settings (for more information, see
chapter 8.2).
4. If a contact is supposed not to be shown in the public Contacts folder, then go to the user
settings in Kerio Connect’s section Accounts → Users and uncheck the Publish in Global
Address List option.
117
Chapter 11
Distributed domain
If your company uses more Kerio Connect servers physically scattered (located in different
cities, countries, continents), you can now connect them together and move all users across
all servers involved into a single email domain (distributed domain).
The only prerequisite for the correct function of the distributed domain is user mapping from
a directory service.
After the distributed domain is configured, the users will be able:
• load balancing,
• sharing of local users and user groups (users and groups that are not mapped from
the directory service).
The setting and administration of distributed domains is only possible through Kerio Connect
Administration.
Distributed domain is a complex feature of Kerio Connect. For that reason, only basic
configuration is described in this manual. Configuration details and examples are described
in a standalone document — Kerio Connect 7, Distributed Domain.
11.1 Recommendations
Hardware configuration
118
11.2 Distributed domain setting
License
• Each server needs to have a separate license for the corresponding number of users
installed.
The master server will perform the following tasks, for example:
Make sure that a domain with identical name is used on all servers.
If not, create a new identical local domain (see chapter 7.2) or rename the existing domain (see
chapter 7.8).
The apply the following settings to all your Kerio Connect slave servers:
1. Go to Configuration → Domains.
2. Click on Distributed domains the wizard’s first page providing information on how to
proceed: Click on Next.
119
Distributed domain
3. Enter DNS name of the master server and username and password of a user with admin
rights for the master server (see figure 11.1).
4. The server will connect to the distributed domain. For immediate verification, click on the
Distributed Domains button again to open a list of all servers connected to the distributed
domain (see figure 11.3).
Note: The connection of a new domain will take effect on all servers in 5 minutes.
5. The network should use a directory service (Active Directory, Apple Open Directory or
other).
All servers added to the distributed domain need to be able to connect to the server
where the identical directory service is running (for information on how to map users
from directory service, see chapter 10).
6. Local domains are marked by a blue icon next to their names. If the distributed domain is
set correctly, the icon is red (see figure 11.2).
Warning:
Upon connection, slave servers inherit all domain settings of the distributed domain
(including settings of shared folders) from the master server.
Note: For other scenarios of distributed domain configuration, see the standalone document
Kerio Connect 7, Distributed Domain.
120
11.4 User accounts in distributed domains
Note: The domain can be disconnected only through its own administration interface. If you
are connected to a different server, click on its name in Configuration → Domains → Distributed
Domains.
For administration of domain aliases, mailing lists and resources, please use always the
administration interface on the home server.
Warning:
Even though you can keep creating and administrating local items in distributed domain,
it is strongly recommended not to do that. However, it can be beneficial to have one local
administration account to which it will be possible to connect in case that for example
a directory service server is not available.
121
Distributed domain
Warning:
The migration does not require stopping the servers but we recommend that you perform
a full back-up of the message store (see chapter 15.2).
It is recommended to perform migration either overnight or over a weekend.
Settings
Perform migration on the server to which you want to move the user accounts. Log in the
Kerio Connect Administration interface as an administrator.
2. Clicking on Migrate here in More actions starts migration of mailboxes to the target server.
Mailboxes will be moved one by one.
The Home server column shows migration status of the accounts (see figure 11.4):
Migration can be cancelled by the Cancel migration button, if necessary. All temporary files
will be removed and the mailbox will stay unchanged on the original server.
After the migration of each account, the administrator gets a message with information about:
migration result, its duration and size of the migrated mailbox.
To see which users (either local of from a directory service) have their account physically on
the current server, check Show only users from this server on the right side of the distributed
domain in the upper section of Accounts → Users.
122
11.5 Migration of user mailboxes in distributed domains
Warning:
If the migrated user shares any folders with local users (users that are not members of the
distributed domain), they will not be able to “see” from the new server.
123
Chapter 12
MX Records
Appropriate records must be entered into the DNS (DNS is a world-wide distributed database
of domain names) for each Internet domain (for example company.com). One of these records
is called a MX record (Mail eXchanger or the mailserver). An MX record for the domain
company.com might look like this:
company.com MX 10 mail.company.com
MX 20 smtp.provider.com
mail.company.com A 215.75.128.33
smtp.provider.com A 215.75.128.1
The other two records are A type (Address). These tell us which IP address is assigned to
a given computer (a MX record can only be assigned to a DNS name, but not an IP address).
Email Delivery
The sender’s mail client sends the email to its SMTP server. The server checks the recipient’s
address and if the domain contained within the address is qualified as local the email is saved
directly into the appropriate mailbox. If the domain is not local, the SMTP server finds the
name of the primary mailserver (SMTP) for the target domain from the DNS (by sending a DNS
request) and sends the email to this server. This saves it to a mailbox from which the recipient
downloads it using his/her email client.
124
12.1 Mail Delivery over the Internet
If the primary mailserver for the target domain is not accessible, the sending SMTP server tries
to contact the secondary server (the server with the next priority) and send the email there. If
no server listed in the MX record for the target domain is accessible the SMTP server will try to
send the mail again repeatedly in defined intervals. If it does not succeed after a certain time
the email is returned to the sender as undeliverable.
If, for example, only the secondary server is accessible the email is sent to this secondary
server. In principle, any SMTP server can function as a secondary (tertiary, etc.) server for
a domain.
ETRN Command
ETRN is a command of SMTP protocol. It serves for requesting emails stored on another SMTP
server. Typically, it is used in the following situations:
1. The client has its own domain (e.g. company.com) and his server is connected to the
Internet via a dial-up line. Dial-up must have a fixed IP address. The primary MX record
for the domain company.com is directed to the ISP’s SMTP server (e.g. smtp.isp.com).
When it is connected to the Internet, the client’s SMTP server sends an ETRN command
that informs that it is online and ready to receive mail. If the primary server has some
emails for the given domain, then it sends them. If not, it can send a negative response
or it need not reply at all. That’s why the client’s server must have the timeout to specify
how long it will wait for the response from the primary server.
Note: The primary server will create a new connection to the client’s server after the ETRN
command reception. This connection is used for mail transmission. If the client’s server
is protected by firewall, TCP port 25 must be accessible (open) to the Internet.
2. Let’s suppose that the domain company.com has a primary server smtp.company.com
and a secondary server smtp2.company.com. Both servers are permanently connected
125
Sending and Receiving Mail
to the Internet. Under normal circumstances, all messages for this domain are sent
to the primary server smtp.company.com. If failure of this server occurs (overloading,
disconnected line etc.), all messages are sent to the secondary server smtp2.company.com.
When the primary server becomes available it can send an ETRN command to the
secondary server to request stored mails. Communication is the same as in the previous
example (for detailed description of secondary SMTP server settings, see chapter 7.11).
Mail delivery is faster and more reliable in this way than waiting till the secondary server
sends the mails itself (see section Email Delivery). In addition, the ETRN command can be
used also for dial lines.
domain mailbox
The domain’s primary mailserver does not always need to be the server where user mailboxes
are stored. If the company to which the domain is registered connects to the Internet via
a dial-up line, it can have a Domain Mailbox at its ISP. A domain mailbox is an account where
mail for the entire domain is stored. The company’s mailserver can retrieve mail from this
mailbox (in certain time intervals) and sort the email into individual user mailboxes. The ISP’s
SMTP server, where the domain mailbox is stored, is listed as the primary mailserver for the
company’s domain in the MX records.
Domain mailbox receives the messages via SMTP protocol. Each message therefore contains
the body as well as the SMTP envelope. Only the body of the message is downloaded to the
domain mailbox. The envelope information is copied to a message header (depending on the
domain mailbox settings).
Kerio Connect performs authentication to the domain mailbox. Then it downloads messages
via POP3 and sorts them according to the rules specified in Kerio Connect. In order for the rule
to be sorted properly, it must contain the recipient information (either in any of the special
message headers or in the To or Cc fields). If there is no information about the recipient
contained in the message, the system returns it to the sender. However, if a special sorting
rule is created in Kerio Connect (see chapter 12.4), the messages without any recipient data
will be stored in a predefined user mailbox.
Note: It is recommended to specify a special X-Envelope-To: header for message sorting,
because it contains information about recipients. This helps you avoid situations where
a message addressed to multiple users is delivered several times according to the number
of recipients.
126
12.1 Mail Delivery over the Internet
IMAP
IMAP (Internet Mail Access Protocol) is an Internet protocol used for connections to
email servers, as well as for reading of messages and for other email transactions. IMAP
protocol is defined in RFC 3501.
In addition to downloading email to users’ local hosts, IMAP protocol enables
administration of email account on the server. It is, therefore, possible to access email
accounts from various client stations. Unlike POP3, IMAP protocol allows keeping email
on the server and handling it there (reading, removing, sorting to folders). It is also
possible to keep the email stored in the email client. This solution is helpful especially
if users have a time-limited Internet connection or can be connected to the server only
temporarily or irregularly and need to work with their email offline. Once reconnected to
the network, folders on the server and on the client are synchronized.
Another difference is that in case of IMAP protocol, email can be handled while items are
downloaded to the local store. In case of IMAP protocol, email headers are downloaded
first and user can select any of them to be opened as the first. When the message is
selected, it will be considered as a high-priority item and it can be read, moved to another
folder or otherwise manipulated while the other email is being downloaded.
127
Sending and Receiving Mail
POP3 IMAP
both secured and unencrypted (POP3S) both secured and unencrypted (IMAPS)
enables authorization enables authorization
works with a single folder only allows manipulations with folders (e.g.
moving messages between folders), all folders
are created and stored on the server
downloads entire messages (messages are downloads email headers first, message
displayed one by one as downloaded from bodies later
the server)
synchronous (it is not possible to handle asynchronous (individual messages can be
email while it is being downloaded, one must handled while email is being downloaded)
wait until the email is available on the local
disk)
only one client can be connected to the multiple clients can be connected to the
account account
128
12.2 SMTP server
Protection of the SMTP server enables users to define who will be allowed to use this server
and what actions he/she can perform. This way, the server is protected from being misused. If
the SMTP server is available from the Internet (anytime when at least one MX record is directed
to it and the port 25 is available for access), any client can connect and use the server to send
an email message. Thus the server can be misused to send spam messages. Recipients of such
email messages will see your SMTP server as the sender in the source text and might block
receiving messages sent from this server. Thus your company might be considered a spam
sender and your server can be added to a database of spam servers.
Kerio Connect provides a protection system that enables users to define who will be allowed
to send email via this server and where. Anyone can connect to the SMTP server to send
messages to local domains. However, only authorized users will be allowed to send email to
other domains.
Use the Relay control tab to set groups of allowed IP addresses and/or user authentication
against SMTP server.
129
Sending and Receiving Mail
even checked by SpamAssassin. However, this filter can be enabled by a special option in
the Spam Filter section on the Spam Rating tab if necessary (for more information, refer
to chapter 13.1).
Users from IP address group
Use this option to define a group of IP addresses from which email can be sent to any
domain. Use the IP address group menu to choose an item from the list of groups defined
in Configuration → Definition → IP Address Groups. Use the Edit button to edit a selected
group or to create a new one (see chapter 19.1).
Users authenticated through SMTP server for outgoing mail
Users authenticated through SMTP server using a valid username and password will be
allowed to send email to any domain. Thus, all users that have their own accounts in
Kerio Connect will have this right.
Users authenticated through POP3 from the same IP address
Users authenticated through POP3 (username and password) will be granted relay access
from their IP address for a period of time given in the Allow SMTP relay for ... minutes
after successful POP3 login field.
Authentication by IP addresses is independent from authentication by usernames; therefore
users must meet at least one of these conditions. If both Users from IP address group and
Users authenticated through SMTP server... options are selected and the SMTP authentication
fails, Kerio Connect does not verify, if the user belongs to the allowed IP addresses.
130
12.2 SMTP server
Open relay
In this mode, the SMTP server does not check users who use it to send email. Thus any
user can send email messages to any domain.
Warning:
We recommend you not to use this mode if Kerio Connect is available from the
Internet (i.e. it uses a public IP address and port 25 is not blocked by a firewall).
If Kerio Connect is available from the Internet and uses a public IP address with
port 25 not behind the firewall, it is highly probable that it will be misused to send
spam. This could overload your Internet connection. This might also cause that
your server will be included in databases of spammer SMTP servers (see below).
131
Sending and Receiving Mail
132
12.2 SMTP server
133
Sending and Receiving Mail
SMTP server
DNS name or IP address of relay SMTP server.
Relay server port
Port where the relay SMTP is running. Typically the standard port 25 is used (this value
is also set as Default).
Relay server requires authentication
Use this option if relay server requires authentication of sender (Kerio Connect) using
username and password. Specify the User and Password entries.
Authentication
A method used for authentication at the parent server: SMTP AUTH Command or POP3
before SMTP.
First, the user authenticates to the POP3 account at the server. After this authentication
the user is known already and they can send email via the SMTP server. Username and
password used here will be used to login to the mailbox and no messages can be read.
Therefore you do not need to define mailbox in Configuration → Delivery → POP3 Down-
load to send an email message.
Use SSL if supported by remote SMTP server...
When sending a message, SMTP server attempts to use encrypted connection first (SSL). If
SSL connection is not supported, unencrypted connection will be used. Thus the maximal
possible security of sent messages is ensured.
Queue Options
In this tab, mail queue can be set. It can be viewed in
Status → Mail Queue.
Maximum number of delivery threads
Maximum number of delivery threads that will send messages from the queue (maximum
count of messages sent at one moment). The value should be chosen with respect to
processor capacity and to speed of the Internet connection.
Delivery retry interval
Interval that will be used for repeated retry attempts for sending an email message.
Bounce the message to sender if not delivered in...
If the message is not delivered in the time defined, it will be discarded and its header
including DSN will bounce to the sender. It will be also automatically removed from the
queue and no more delivery attempts will be taken by the server.
You can also use preset time units (minutes, hours, days) to specify the interval.
However, these time units will not be considered if the messages are delivered via relay SMTP
server.
Send warning to sender...
If the message could not be delivered by expiration of this period, sender will be sent
a warning (server will continue in sending attempts).
134
12.3 Aliases
Report language
Language that will be used for error, warning and informative reports (such as
information about non-delivered messages, viruses found, subscribing/unsubscribing
to/from mailing lists).
Note: Reports are stored in the reports subdirectory of the directory where Kerio Con-
nect is installed (UTF-8 coding is used). Administrator can modify individual reports or
add a new language report version.
12.3 Aliases
Use aliases to create virtual email addresses. The principle of virtual addresses is best
understood through examples:
1. Mr. Smith would like all his messages sent to info@company.com to be stored to the Info
public folder. This can be achieved by the following alias:
info → #public/Info
2. Messages sent to invalid addresses (addresses in which the part before @ does not
correspond with any user account nor alias) can be delivered to a specified user (typically
to the administrator). Use the following alias to achieve this:
* → Admin
If this (or the next) alias is not defined, Kerio Connect returns such messages to their
senders as undeliverable.
135
Sending and Receiving Mail
3. The * symbol is used as a substitution of any number of characters in an alias (e.g.: *sms*,
a*00*, etc.). The alias will be applied to all email addresses that conform to this mask.
4. To replace just one symbol or character in an alias, use the ? symbol. (for example, ?ime
stands for time, dime, etc.).
Each account or group can be associated with any number of aliases. It is also possible to bind
a new alias to an alias already existing. If a message is sent to a username, it is marked by
a flag so that the aliases not get looped. If such message arrives to the username marked by
the flag, it will be stored in the mailbox that belongs to the last unmarked alias:
jwayne → wayne
wayne → john.wayne
john.wayne → wayne
Note: Aliases can be used also for assigning another email address to a user or a group, or
forwarding messages for a user or a group to other addresses. However, it is recommended to
specify these settings directly during the process of user definition (see chapter 8.2), or group
definition (see chapter 9.1).
Defining Aliases
To define aliases, use the Accounts → Aliases section.
First you need to choose a domain for which the aliases will be defined. Aliases always relate
to one of the local domains. Therefore, you only need to use the local part of the email address
(i.e. the part preceding @) in the alias header.
Add the alias by clicking on the Add button. The following dialog window will be displayed:
136
12.3 Aliases
Alias
A virtual address (e.g. sales or john.wayne).
* asterisk
Description
Text description of the alias. May be left blank.
Deliver To
Where messages to this address will be sent to. Select the place where the messages will
be stored:
• Email address — an email address. Click Select to select a user or a group from
the list.
• Public folder — name of the public folder in this format: #public/Folder. This
item is active only in case at least one public folder of Mail type has been created.
The same dialog window will be displayed by clicking on the Edit button. Remove the alias
using the Remove button.
Alias Check
When creating more complex aliases (multiple aliases), it is easy to make mistakes (e.g. by
mistyping a name). Kerio Connect has an Alias Check feature that displays a list of local
accounts and external addresses to which the email will be delivered.
Use the Check Address button to check aliases. Enter the address that you would like to run
a check on (if an alias is selected in a list, it will be displayed as a choice). After the check has
been performed, the result is displayed (i.e. the list of addresses to which the alias will deliver
messages).
137
Sending and Receiving Mail
Retrieving POP3 mailboxes is controlled only by a scheduler (see chapter 12.7). It is important
to realize that mail will not be downloaded from remote POP3 accounts automatically when
a client connects to his/her Kerio Connect mailbox or sends an email.
Downloading of POP3 accounts disables antispam features which depend on reception of email
by SMTP (typically DNS blacklists and check of Caller ID and SPF sender servers. Configuration
and features of antispam filters are focused in chapter 13.
Remote mailboxes from which email should be retrieved can be defined in the Configuration
→ Delivery → POP3 Download section using the Accounts section.
138
12.4 remote POP3 mailboxes
Use the Add button to display a dialog box that allows users to add a new account (a remote
mailbox). With the General tab, set the basic parameters for accessing the mailbox and the
delivery method for the downloaded email.
POP3 server
The DNS name or IP address of the POP3 server where the mailbox is located.
Description
Any text description of the POP3 account
Deliver to address
All messages from the mailbox will be sent to one address. Here you can enter a local
user, a local group, an alias or an external email address. You can choose the local user
or group from a list using the Select button.
This dialog allows to search for a specified string and specify the settings for the
case-sensitivity. These options make the search faster, especially when searching through
too many users and groups in the domain.
139
Sending and Receiving Mail
Preferred header
The primary header entry that will be used for sorting. Here you can specify
a header entry (the name of the header without a colon) or choose one from the list
(X-Envelope-To, Received or Delivered-To). If the entry is not found in the mail
header or no address complies with any rule, other header entries are searched —
Resent-To and Resent-Cc, To and Cc. If an address is not found in these entries
the message will be delivered according to an implicit rule (described below) or will be
discarded.
You can define the following parameters with the Advanced tab:
Use SSL
The connection with the POP3 server will be secured (encrypted) by SSL.
SSL Mode
The security method for communication with the POP3 server. Options: Special port (the
SSL connection will be established on a port different from a standard POP3 port) or STLS
command (first, a non-encrypted connection will be made and once it is established it will
be switched to an encrypted mode using the STLS command). Contact the POP3 server
administrator for more information about securing communication with the POP3 server.
POP3 authentication
The POP3 server authentication method: Plain (the password is sent in its normal form)
or APOP (the password is encrypted to prevent tapping and misuse). Contact the POP3
server administrator for more information.
140
12.4 remote POP3 mailboxes
Retention policy
By default, messages downloaded via POP3 get deleted on the server. To keep them on
the server, check option Leave a copy of messages on the server.
You can also define for how long copies of downloaded messages will be kept on the
141
Sending and Receiving Mail
server.
For temporary remove of appropriate rules use matching fields next to the rule definitions.
Sorting Rules
Sorting rules define how messages downloaded from a remote POP3 mailbox will be delivered
to and divided between local users or forwarded to external email addresses. Use the Sorting
Rules tab to define sorting rules.
Sort Address
Email address that will be searched for in the selected message header entry. It must be
complete; a substring is not acceptable.
Deliver To
This entry defines the recipient of the message complying with the rule. Here you can
specify:
• local user or group of users — local users/groups of users can be selected using
the Select button,
• alias — enter an appropriate alias,
• external email address — any other email address.
142
12.5 Receiving Email Using ETRN Command
Note: To deliver messages to groups, you must assign addresses to these groups (or you
can create an alias). For details refer to chapter 9.
Description
A commentary on a sorting rule (e.g. purpose explanation)
Allow rule
This option is enabled by default.
For temporary remove of appropriate rules use matching fields next to the rule definitions.
• * → address (implicit rule) Email messages not complying with any rule will be
delivered to this user (group). If this rule is not defined, such messages will be
discarded.
No other usage of the asterisk character (e.g. for completing a part of an address) is allowed.
*@company.com → *@company.com
• The second rule sorts messages which, by any reason, cannot be sorted to any
particular user account.
* → admin@company.com
Note: If any other rule is placed above these rules, it will be processed before them. Rules
are always processed in the following order:
1. address@domain
2. *@domain
3. *
143
Sending and Receiving Mail
Server
The DNS name or IP address of the server.
Domain(s)
A list of domains for which the server stores email. Separate individual domains using
a semi-colon (;).
Description
A commentary on the ETRN server definition. May be left blank.
144
12.6 Internet Connection
Authentication is required
Enable this option if the server requires username/password authentication.
User, Password
Appropriate user name and password
Use the Edit button to change the settings for server access. Remove servers using the Remove
button. For temporary removal of this server, use matching fields next to the server definition.
The Options tab allows users to set the maximum delay time of dial-up line response.
Kerio Connect can either be installed on a computer that has a permanent connection to the
Internet (leased line, wireless connection, cable modem, xDSL, etc.) or on a computer with
a dial-up connection (analog or ISDN modem). Using the built-in scheduler you can set when
the mailserver will automatically dial out a connection and perform a mail exchange.
Online
Kerio Connect is permanently connected to the Internet. Outgoing mail is sent
immediately.
145
Sending and Receiving Mail
Offline
The server is not permanently connected to the Internet. Outgoing mail is stored in
a queue and is sent in time intervals set in the Scheduler.
Offline
Check the Use RAS to connect to Internet option if you intend to let the line dial within the
scheduled time intervals. Dial-up connection is available only on MS Windows. This option
is not supported in Linux and Mac OS X systems. Dial-up entries created in Windows
are offered in the Select RAS line menu. Kerio Connect can use the username and the
password which have been assigned to the appropriate dial-up connection by a user (the
Use user and password specified in system option) or you can enter the username and
password directly into this dialog (the Specify user and password option).
Warning:
The dial-up connection must be created for all users within the system (this can
be defined within definition of an appropriate connection).
Note:
• The Offline option can also be used when Use RAS to Connect to Internet is not checked.
Kerio Connect can run on a computer within a local network connected to the Internet
by a dial-up line. In the Online mode frequent and uncontrollable requests for dial-out
will be made. In the Offline mode Kerio Connect will request a dial-out only in the time
intervals set in the scheduler, which helps optimize connection costs.
• Kerio Connect uses the system telephone connection phone list (rasphone.pbk). No
other phone list can be used.
• The Online option does not switch off the scheduler. Although outgoing mail is sent
immediately, the mailserver can retrieve messages from remote POP3 accounts in
regular intervals. For details, see chapter 12.4.
• Details about setting the scheduler can be found in chapter 12.7.
12.7 Scheduling
Kerio Connect contains a built-in scheduler that can perform three types of actions:
146
12.7 Scheduling
Use the Add, Edit and Remove buttons to add, edit or remove an item in the list of scheduled
tasks. When adding a new item or editing an existing one a dialog window with the following
parameters will be displayed:
Every or At
Once in an interval (Every) or at a certain time (At). For example Every 10 Minutes or At
12:00 every day.
147
Sending and Receiving Mail
Optimal Scheduling
Optimal scheduling settings depend on the way the incoming mail is received and on the
Internet connection type available to Kerio Connect.
• If the computer with Kerio Connect is permanently connected to the Internet (Online)
148
12.8 Advanced forwarding
and all incoming email is received using the SMTP protocol (MX records for all local
domains point to the computer where Kerio Connect is installed and there is no remote
POP3 account or ETRN server) there is no need to set up any scheduling.
• If a permanent connection to the Internet is available and at least one POP3 account is
defined or mail reception is conducted using the ETRN command, scheduling must be
set.
In this case intervals between individual actions can be quite short (e.g. 5 minutes)
as the number of connections does not influence the cost and there is no need to
consider the time needed for dialing.
• If Kerio Connect is connected to the Internet via a dial-up line, it is not permanently
accessible from the Internet and mail reception is conducted using the ETRN command
or from remote POP3 mailboxes. In this case it is necessary to set up scheduling to
enable Kerio Connect to dial out, send mail from the queue and receive email when
needed.
In all of the above examples where scheduling is recommended, all options in the Action
field can be selected (Send mail in outgoing queue and Invoke mail transfer by sending ETRN
command to configured SMTP servers). If the mail queue is empty or no POP3 account is
defined, Kerio Connect will automatically move on to the next task.
Miscellaneous
149
Sending and Receiving Mail
Warning:
To activate or disable the option, restart of Kerio Connect is required.
150
12.8 Advanced forwarding
Warning:
However, it is necessary to bear in mind that synchronization issues may arise.
The menu at the top of the page allows you to choose from one of these policies:
No restrictions
Self explanatory.
Require secure authentication
Kerio Connect will always require secure user authentication. This implies that the
authentication must be performed by using one of these methods — CRAM-MD5,
DIGEST-MD5, NTLM, or the user must use an SSL tunnel (by enabling SSL traffic in their
email clients).
151
Sending and Receiving Mail
If users access their email by Kerio WebMail where no one of the authentication methods
can be applied, the SSL-secured HTTP protocol is used automatically.
Once the secured authentication is set, it is possible to allow non-secured connections
from a specified IP group. This group can be either selected from existing groups or
changed by clicking on Edit or a new one can be created.
Warning:
Do not apply this method if users use saving passwords on the server in SHA
format.
• LOGIN — user passwords are completely unprotected during transfer. If this method
is used, it is strongly recommended to enable SSL tunnel connection.
• NTLM — this method can be used only in case users are authenticated against an Active
Directory domain. It is applicable only to the user accounts that were imported from
Active Directory. Configuration of NTLM authentication is addressed in chapter 27.
152
12.8 Advanced forwarding
• PLAIN — user passwords are completely unprotected during transfer. If this method
is used, it is strongly recommended to enable SSL tunnel connection.
• APOP — the authentication method is not displayed in the list, Kerio Connect uses it
automatically to download POP3 accounts.
The server provides all the above mentioned authentication methods. They are ordered the
same way as in the table below (from CRAM-MD5). If the selected method is supported by the
client, the other methods will not be used. However, a problem may occur if the password is
stored in the secure format (SHA1). If this encryption method is used, only LOGIN and PLAIN
authentication methods can be used. If you select the secure CRAM-MD5 and DIGEST-MD5
methods, the system selects one of the secure authentication methods and it will be impossible
to log in to Kerio Connect. If the password is stored in the SHA format, disable all methods
but LOGIN and PLAIN.
Further recommendations:
• For all authentication methods, it is recommended to enable SSL login to the mail
clients.
153
Sending and Receiving Mail
Check Allow NTLM authentication for users with Kerberos authentication to allow users from
Active Directory to authenticate when attempting to log in to Kerio Connect. In order for the
NTLM authentication to be functional, both the computer as well as the user account have to
be parts of the domain used for authentication. The NTLM (SPA) authentication must be also
enabled in users’ mail clients.
To see what is necessary to be set in Kerio Connect to make NTLM authentication work
smoothly, refer to chapter 27.
In the Password guessing protection section the following parameters can be defined (see
figure 12.20):
Warning:
Each blocking action applies to a particular service only. This implies that if for
example a POP3 attack is detected, the user still can login via Webmail.
Account or IP address is blocked when the count of ten unsuccessful login attempts is reached
within one minute. After five minutes without an attack attempt, the service is unblocked
automatically for the IP address.
You can use button Unlock All Accounts Now to unlock all accounts which have not been
blocked by option Block user accounts probably targeted by password guessing yet.
154
12.8 Advanced forwarding
Warning:
Blocking of accounts upon unsuccessful login attempts is not identical with blocking in user
account settings (see section 8.2).
The Store Directory tab contains settings of directory for storing of messages, contacts, events,
etc. (user and public folders). Information about private and public folders, logs, messages
that are to be sent and files that are just being checked by antivirus are saved into the Store
Directory.
Warning:
It is not allowed to specify the Path to the store directory entry by a UNC path.
Warning:
Fulltext search may affect performance of your server. If the feature is disabled,
the search option is still displayed in WebMail but performed searches will have
no results.
Index path
Full path to the directory where fulltext search index will be stored.
Clicking on Refresh index allows to search in the data store directory and generate a new
search index. You can choose from various options: to create an index for a particular
user, particular domain or all Kerio Connect mailboxes.
Warning:
It is not allowed to specify the Path to the store directory entry by a UNC path.
155
Sending and Receiving Mail
User quota
Whenever a user reaches the defined value of their user account capacity (percentage),
they will receive an email warning. The warning message will be kept being sent in the
defined interval until the user account capacity occupied gets lower than the limit value.
If a user reaches their store quota, you can
enter the user’s email address (or administrator’s) in If a quota is reached, send a single
email to this address and they will be informed.
Note: To set mailbox size quota, go to the Quota section at the particular user (see
chapter 8.2).
156
12.8 Advanced forwarding
Warning:
Do not set the hard limit for 1, otherwise an error message or warning will be displayed
when a new mail is delivered.
157
Sending and Receiving Mail
Warning:
The Master Password cannot be used to access user accounts from email clients or via
Kerio WebMail. It is not a versatile administrator password (it is not possible to use it for
authentication to Kerio Connect administration).
Master authentication settings can be defined on the eponymous tab under Advanced Options:
Master Password
Define a password that will be used for access to all accounts. This password should be
known by as few persons as possible. If the Master Password arrives to an unauthorized
person, privacy of all user accounts on the server can be broken!
Confirm password
The password confirmation is required to eliminate typos.
HTTP Proxy
If Kerio Connect runs on a host behind a firewall, it can be connected to the Internet via a proxy
server. This feature can be useful for example for upgrade downloads or/and for searching
for new versions of Kerio Connect or antivirus application.
158
12.8 Advanced forwarding
Username
Insert your user name to connect to the particular proxy server.
Password
Insert your password to connect to the proxy server.
Update
The tab defines updates of new versions of Kerio Connect and automatic updates of the Kerio
Outlook Connector and the Kerio Outlook Connector (Offline Edition):
159
Sending and Receiving Mail
Warning:
If you want to participate in beta version testing, enable the Check also beta ver-
sions option. If the Kerio Connect is used in production, the beta versions are not
recommended — do not enable this option.
The installation package includes also automatic installations of the Kerio Outlook Connector,
the Kerio Outlook Connector (Offline Edition) and the Kerio Sync Connector for Mac.
The Current version available for clients field displays the information about the module
versions currently used (including build numbers).
• Kerio Outlook Connector — the package is updated for all users immediately upon
update of the server.
• Kerio Outlook Connector (Offline Edition) — the package is updated for all users
immediately upon update of the server.
• Kerio Sync Connector — users on client stations will be informed about available
updates for the Kerio Sync Connector. If they conform the dialog, the program gets
updated.
Kerio Connect performs automatic update checks for the Kerio Outlook Connector and the
Kerio Outlook Connector (Offline Edition). The update checks help avoid problems caused by
incompatibility of older server and newer plug-in versions or, vice versa, of newer server and
older plug-in versions. In case that there is a collision detected, users are informed that the
160
12.8 Advanced forwarding
1. Build numbers are different — plug-in is started along with the MS Outlook. Before each
startup of the MS Outlook, alert is displayed informing that the plug-in should be updated.
2. Version numbers are different — the plug-in refuses to connect to the server until it is
updated.
New versions of Kerio Outlook Connector, Kerio Outlook Connector (Offline Edition) and Kerio
Sync Connector are stored in the directory
Kerio\MailServer\webmail\download
Warning:
Update of plug-ins requires the HTTP or the HTTPS service to be running.
A server certificate can also be created in the Kerio Connect’s administration interface. For
detailed instructions, see chapter 16.
Note: If any problems regarding the update occur, enable the Update Checker Activity option
(detailed information can be found in chapter 24.9) in the Debug log settings. Logged
information might help you where any problems to be solved occur.
161
Chapter 13
Antispam control of SMTP server protects users from spam. Spam is an unwanted, usually
advertisement email. Spam are usually sent in bulk and the recipient addresses are obtained
by illegal means (e.g. by tapping the network communication).
Kerio Connect includes many options and features to dispose of spam. These features include
various filters, testing and monitoring technologies which help distinguish quite precisely
spam messages from desirable email.
To detect and eliminate spam, Kerio Connect uses the following methods and tests:
• SpamAssassin (detailed information on its features and settings, see section 13.4).
• Black/White lists (detailed information on their features and settings, see section 13.2).
• Proprietary filtering rules (detailed information on their features and settings, see
section 13.3).
• Caller ID (detailed information on its features and settings, see section 13.5).
• SPF (detailed information on its features and settings, see section 13.5).
Each test can be used separately or combined with the others. To achieve better efficiency, it
is recommended to combine as many antispam features as possible. The more tests are used,
the denser is the antispam filter and the less spam will be delivered to user’s mailbox. Also
the spam detection will be more successful which will reduce number of messages marked as
spam by mistake (so called “false positives”).
Each testing type uses specific methods to detect spam. There is, however, a feature most of
the tests have in common. For all methods except the Delayed response to SMTP greeting,
two actions can be set of what how spam messages would be handled. One action is denial of
such messages. The other is to raise the so called spam score (for details, see chapter 13.1).
Messages with a score too high awarded by multiple tests are discarded (individual scores are
summed). The first alternative may help reduce load on the server, the second one eliminates
better possible “false positives”.
To set Kerio Connect’s spam filter, go to Configuration → Content Filter → Spam Filter.
162
13.1 Spam Rating tab
The Spam Rating tab enables/disables spam rating and defines criteria for spam to be blocked
in case that the method of spam score raised by multiple tests is used:
163
Antispam control of the SMTP server
Warning:
1. If the value you set will be too low, every message will be
considered as a spam.
2. If efficiency of the spam filter declines, do not lower the
tag score or the block score. Better involve multiple tests
in the spam filter.
• Block score
If the rating reaches or exceeds the value set, the message is discarded.
If the value is too low, legitimate messages might be discarded along with spam.
Therefore, it is recommended to use the Forward the message to quarantine ad-
dress option when testing and optimizing the spam filter and specify an account
where copies of all blocked messages will be delivered and stored. Copy of any
message having reached or exceeded the Block score limit will be sent to the
specified mailbox. From time to time, simply scan discarded messages to check
that there is no legitimate message trapped.
Maximal block score allowed is 9.9. If the value is set to 10, the blocking is
disabled, so that messages are marked as spam but never blocked.
164
13.2 Blacklists tab
Note: If values for marking and blocking of the message are equal, all messages marked
as spam are discarded automatically.
Reached Tag score limit action
The X-Spam-Flag header is appended to the message and the message is delivered to the
recipient.
In addition to marking spam messages by the special header, it is possible to prepend
message’s subject with a text which will inform user or a sieve rule that the message is
a spam (such a rule can be created within creation of user accounts in the administration
interface — for details, see chapter 8.2).
The **SPAM** string is used as a default text. The string can be modified in the Mark the
message as spam section (for details, see below).
TIP:
If you use the [%s] referent for the Prepend message’s Subject with text entry
specification, the score evaluation (represented by asterisks) assigned by the
antispam protection system is inserted into this textfield. This implies that users
can define one of more custom antispam rules (depending on the number of
asterisks) in their mail server or in the Kerio WebMail interface.
165
Antispam control of the SMTP server
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
This applies to the following IP ranges: However, all IP addresses, though included in the
whitelist, are verified in the blacklist (Custom blacklist of spammer IP addresses). This
may be helpful when it is necessary to block any of these addresses.
166
13.2 Blacklists tab
167
Antispam control of the SMTP server
servers to find out whether they really are spam senders or not. Therefore, if you
use paid databases, it is possible and even more efficient to set higher scores than
in case of free databases. This is, however, only a general knowledge which cannot
be applied without exceptions. If you are familiar with a free database and you are
sure that it would be efficient, you can set higher scores for them as well.
If you combine multiple spammer databases, set lower spam scores since individual
SMTP servers may be included in multiple databases and their scores are summed.
Ask the DNS blacklist server directly
using of this option is recommended in cases where Kerio Connect uses a paid
spammer database where the license is associated with a particular IP address.
Queries are sent directly to the database, parent DNS servers will not be used for
the delivery.
Use this database
This option is enabled by default.
Note: Any time a delivered message is sent from an address which matches a blacklist
item, the information is recorded in the Security log (for details, see chapter 24.4).
Therefore, to test reliability of a new blacklist, include it to the list and set the Add spam
score to the message option to 0. Email will not be affected and each message matching
with the blacklist will be listed in the Security log.
Supported databases
SORBS
Spam and Open Relay Blocking System (SORBS) creates and maintains set of databases
of spammer IP addresses and domain names. By default, Kerio Connect includes two
aggregate zones of spammer databases containing all basic partial databases addressing
certain types of spammer servers:
168
13.3 Custom Rules
SpamCop
Kerio Connect supports SpamCop, a database of spammer IP addresses. For more
information on SpamCop, refer to http://www.spamcop.net/
SpamHaus SBL-XBL
The SpamHaus SBL-XBL database combines a database of spammer IP addresses with
a database of illegal exploits performed by third parties:
• Spamhaus Block List — SBL is a database of IP addresses of proved spammers.
These servers are verified to prove that they really are spammers.
• Spamhaus Exploit Block List — XBL is a database of IP addresses of illegal exploits
performed by third parties, including open proxy servers, worms and viruses
carrying harmful executable codes and other types of Trojan horse.
For more information on SpamHAUS SBL-XBL, refer to http://www.spamhaus.org/
The tab consists of two sections. One contains list of rules and their definition tools. The
latter covers settings of how messages blocked by server-defined rules would be handled.
169
Antispam control of the SMTP server
Rule Definition
On the tab, each filtering rule is represented by one line (see figure 13.5). Using matching
fields on the left you can activate or disable individual rules. This way you can switch the
rules temporarily on and off without the need to remove them and add them again.
When creating rules, bear in mind that their order in the list is very important. Individual rules
are processed in the same order as listed, downwards. Rules in the list can be reordered by
the arrow buttons on the right. Simply select a rule in the list and click the arrows to move it
up or down.
Rules can also be moved by the Drag and Drop method, i.e. by dragging and moving rules by
mouse.
It is essential to consider twice especially location of denial and allowance rules since once
these rules are processed, no other rules are applied. After rules where only score points
are added or taken off, other rules are processed unless all of them are applied or unless the
message matches a permission/denial rule.
Note: Rules tested against From and To headers have a peculiarity which might be beneficial.
If these rules go before the others, they will be tested on level of SMTP traffic. In case of
denial rules, messages matching such a rule are blocked even before accepted to the queue
of incoming messages. This decreases the load on the server. It helps the server avoid taking
several actions and using of several tools such as antispam tests and antivirus control which is
applied once a message is accepted to the queue of incoming messages. In case of permission
rules, no other rules are applied if they are tested on level of SMTP traffic. For detailed
description on testing of headers, see below (the Headers section).
Click the Remove and Remove unused buttons to delete rules from the list.
Use the Add button (or Edit) to open a dialog where rules can be defined or modified.
170
13.3 Custom Rules
Description
Comment on the rule (for use of administrator).
Header
Tested part of email message header. You can choose from various predefined options
(From, To, Cc, Subject and Sender) or create a custom one (i.e. X-Mailer). Do not use
colons while defining header names.
The From and To items slightly differ from the other ones. These items are checked for
the From and To headers in email and for headers included in SMTP envelopes. The From
item is compared with MAIL FROM: and the To item is compared with RCPT TO:. Any
other items are compared with headers included in the email itself only.
This implies the following facts:
Any other settings for blocked messages do not apply to messages rejected on SMTP
level. Any message meeting the denial rule is rejected and marked with the standard 553
error code (this code means that it is a persistent error and the SMTP server will not retry
to deliver it) and a DSN message is sent to the sender.
To rules regarding From and To items, a special exception regarding their order in the
rule list is applied (see above). If the From and To rules are starting the rule list (no
other rule precedes them), they are executed against the MAIL FROM: and RCPT TO:
headers on SMTP level. If there is even a single rule preceding these rules which is
tested against a different header, the message is automatically accepted in the queue
of incoming messages while the From and To rules are tested against From: and To:
171
Antispam control of the SMTP server
Warning:
The following testing methods are applied prior to custom
rules:
• Spam repellent
• Caller ID and SPF
• Whitelists/Blacklists
172
13.3 Custom Rules
Warning:
The examples imply that, when creating rules, it is also necessary to avoid
situations where one rule is unexpectedly influenced by another. This might
happen for example when users are subscribed in mailing lists and addresses
in MAIL FROM: and RCPT TO: do not match addresses in From and To headers
inside the message.
Type
Type of condition under which the entry will be tested. Available types:
• Is empty — the item is empty
• Is missing — the message does not contain the specified message header
• Contains address — the item contains a specific email address
• Contains address with domain — the item contains all email addresses from this
domain. Enter the mail domain, i.e. the second part of the email address right
from the @ character, in this field.
• Contains substring — the item contains specific string of characters (a word,
a piece of text, a number, etc.).
• Contains binary data — using this condition, the above-mentioned specific
characters as well as binary data that may be contained in spam messages can
be recognized. Binary data are characters that have a different meaning in each
character set (e.g. specific national characters).
Content
Required entry content (according to the selected type).
Note: If you select Contains address or Contains domain in the Type field, you can use the
“*” wildcard in the Content field (see figure 13.7).
173
Antispam control of the SMTP server
1. Suppose that you want that the server blocks all email sent from someone@domain.com.
Define a rule where the From entry will be tested. Choose the contains address condition
type (particular email address) and specify the Content entry using the email address
(someone@domain.com). In the Score entry specify a value — this should be equal or
higher than the value set in the Action tab.
2. A user has demanded regular messages with current special offers. These messages are
sent from info@offer.com and they are treated as spam by SpamAssassin. To override
this denial, we will create the following custom rule:
• Add spam score to the message — set a negative value that will decrease the
total score. You can also use the Treat the message as non-spam (overrides the
SpamAssassin score) option.
174
13.4 SpamAssassin
It is not recommended to use this option since most of spam message use false sender
addresses. This implies that the denial message cannot be delivered (the address to which
the DNS message is sent might not exist). Messages informing about denial of the original
messages are then waiting in a queue where there must be physically removed, otherwise,
the server attempts to send them every 30 minutes and discards the messages after two
or three days.
Forward the message to quarantine address
The address to which messages will be forwarded and where administrator or another
authorized person can check whether there are or there are not legitimate messages
included in the spam. Using this option is recommended since it helps you avoid losing
of non-spam email without any notification.
13.4 SpamAssassin
To face spam, Kerio Connect uses SpamAssassin, a famous antispam filter. SpamAssassin
consists of several testing methods:
• Bayesian filter
• SURBL (Spam URI Realtime Blocklist) — this method tests links to websites possibly
included inside email against special online databases.
Note: For easier solution of problems regarding SpamAssassin that might arise, enable the
SpamAssassin Processing option in the Debug log settings. To read more on the Debug log, see
chapter 24.9.
Content evaluation
Content evaluation is based on statistical filtering using the message’s contents (keywords,
number of capital letters, message format, etc.). Each incoming message is assigned a numeric
score according to the number of characters significant for spam messages. A higher score
indicates a higher probability of spam.
Bayesian filter
Another module involved is the Bayesian filter. It is a special antispam filter which is able to
“learn” to recognize spam messages. This filter compares the individual spam characteristics
with actual messages. The method consists of two concurrent modes:
• “Learn” — users are involved in the learning process. Users have to reassign the
incorrectly evaluated messages to correct types (spam / non-spam) so that the filter
learns to recognize them in the future.
175
Antispam control of the SMTP server
200 unique spams and 200 unique hams (legitimate messages) must be collected to make the
filter work. This means that such messages must vary. Each spam message is involved only
once. Other occurrences of an identical message will be ignored.
Bayesian filter sums spams and hams learned by the learn and autolearn methods. The
SpamAssassin tab contains statistics that monitor how many messages have been marked
as spam or ham and whether the filter is already active or has not learn enough spam and
ham messages yet. Once activated, the learning process keeps on introducing new items in
the database.
Note: SpamAssassin checks only messages which do not exceed the size of 128 kB since spam
messages are mostly not so large and checking of large messages might overload or slow down
the server’s performance.
Since individual users must check the messages in the “Learn” mode, the spam evaluation
tools must be embedded in mail clients. By default, these tools include only MS Outlook with
the Kerio Outlook Connector and the Kerio WebMail interface. Users can click special buttons
in the toolbar to mark an incorrectly evaluated message as non-spam.
For email clients with IMAP accounts as well as for MS Entourage (for IMAP and Exchange
accounts), there is another method of how to teach the Bayesian filter. These users can mark
incorrectly classified messages by moving them to appropriate folders. If users want to mark
a message as spam, they can move such messages to Junk E-mail. To mark a message as not
spam, they can move it to Inbox.
TIP:
To use this method as efficiently as possible, set users a spam rule (either when creating
user accounts in Kerio Connect or by defining a corresponding sieve rule for incoming mail).
Any messages marked by Kerio Connect as spam will be automatically moved to the Junk
E-Mail folder. Messages that are incorrectly marked as spam can be moved to Inbox by hand.
Spam messages let in by mistake can be moved to the Spam folder manually. This ensures
proper and efficient learning and improvement of the Bayesian filter.
This part of the filter tests contents of messages (links to websites possibly included in
message bodies) against special online databases.
SpamAssassin can use multiple online databases. In Kerio Connect, it, however, uses only the
SURBL database since the other databases are already used for other tests.
176
13.5 Email policy records check
The check verifies whether IP addresses of the remote SMTP server are authorized to send
emails to the domain specified. Spammers thus have to use their real addresses and the
unsolicited emails can be recognized quickly using different blacklists.
There are two similar technologies available for performing “email policy” records check in
Kerio Connect. The first one is Caller ID created by Microsoft, the other one is a project named
SPF (Sender Policy Framework). Both technologies provide explicit verification of message
senders. During this verification process, the IP addresses of SMTP servers that send mail
from the specific domain are published. For each domain that supports at least one of the
above technologies, a TXT record is stored in DNS with a list of IP addresses that send email
from the specific domain. Kerio Connect then compares the IP address of the SMTP server with
IP addresses contained in this DNS record. This method guarantee verification of sender’s
trustworthiness for each message. If the DNS record does not contain the IP address the
message was sent from, such message has a falsified address and it is considered as spam.
This way, it is quite easy to distinguish, whether the message is spam or not.
Messages received from server that has no IP address list in the DNS record will be always
delivered. For the “email policy” purposes, these emails will not be considered.
To set Caller ID and SPF in Kerio Connect, use the tabs in Caller ID (Spam filter → Caller ID)
and SPF (Spam filter → SPF ) menu.
Warning:
SPF and Caller ID can be applied only to email delivered by SMTP. If email is downloaded
from the domain mailbox by POP3 protocol, email policy logs will not work.
Caller ID
177
Antispam control of the SMTP server
Warning:
With this option enabled, do not set the Block the message option for messages
with an invalid Caller ID.
178
13.5 Email policy records check
domain. Therefore the messages from these addresses should not be checked.
Warning:
To guarantee full functionality of Caller ID, do not set any other servers than the
backup ones as those not to be checked.
For detailed instructions on proper configuration of DNS entry settings for Caller ID, see the
official Microsoft web pages.
SPF
SPF is an open source equivalent to Caller ID developed by Microsoft. Both technologies can
be used simultaneously in Kerio Connect.
179
Antispam control of the SMTP server
Warning:
To guarantee full functionality of SPF, do not set any other servers than the backup
ones as those not to be checked.
Details about the SPF check are displayed in the Debug log, after the appropriate settings are
specified (for more information, see chapter 24.9).
1. Reception of spam by Kerio Connect is eliminated by 60 — 70 per cent. This also decreases
the load on the server since spam testing is very demanding.
2. The method has no so called false positives as there is no influence to the email which is
delivered legitimately. Settings
180
13.7 Recommended configuration of antispam tests
You can set either the SMTP greeting delay in the Spam repellent tab of Kerio Connect (Config-
uration → Content filtering → Spam filter):
Note: The settings in this tab apply only to the unsecured SMTP communication. The spam
distributing programs do not use the secured SMTP protocol for communication.
181
Antispam control of the SMTP server
tests. Notice that almost never the message blocking is not preferred to increasing of spam
score:
The essential setting is configuration of the Spam Rating tab (for details, see section 13.1). It
is recommended to leave most of the settings as predefined by default:
1. Make sure that the Enable Spam Filter Rating option is enabled. If the option is inactive,
enable it.
This option makes the filter consider and apply results of individual evaluations (spam
scores).
2. Make sure that the Enable rating of messages sent from trustworthy relay agents defined in
SMTP relay options option is inactive (unless you wish to check even messages sent from
trustworthy addresses).
• Block score — set this value to 9.9 points. This will ensure that only
“hundred-percent” spam messages are discarded by the server since users are not
even notified that such messages would have been blocked (unless at least one
of the Send bounce message to the sender or Forward the message to quarantine
address options are enabled).
Note: If you do not wish to block any messages no matter what the score is, set
the value to 10.0 points. This disables blocking of messages and keeps active only
the feature of marking as spam.
4. Make sure that the Send bounce message to the sender option is disabled.
Since spammers generally use invalid sender addresses in their headers, we will keep this
option disabled. It would be impossible to deliver responses to such messages and they
would be kept in the queue of outgoing email.
5. Finally, enable the Forward the message to quarantine address option and enter an email
address where all messages with the score higher than 10 points will be forwarded.
The option is helpful especially when setting and fine-tuning the antispam system. If
there are legitimate messages with their score too high, it will be discovered during an
opportune check of the mailbox where spam copies are delivered and stored. Later, this
option can be disabled and the mailbox removed.
182
13.7 Recommended configuration of antispam tests
Blacklists tab
Once the general configuration is completed, it is necessary to set individual testing methods.
The first test can be set on the Blacklist tab (for details, see section 13.2). The following
parameters are to be set here:
Warning:
Make sure that is no spammer SMTP server is included in the whitelist.
2. Custom blacklist of spammer IP addresses — the settings are similar as for whitelists, with
reversed reasons and results. Create an IP group where you involve all spammer SMTP
servers you know. This option is helpful especially for cases where antispam tests are not
able to recognize these servers.
At this moment, define actions that will apply to messages sent from SMTP servers
included in the custom blacklist:
• Two options are available on the Blacklists tab. Such messages may be blocked
or their spam score may be increased. In this example, the second option was
selected and 3 points will be added to the spam score. Three points are enough
to learn whether the message really is a spam since the message is evaluated by
multiple tests and other points would be added to the score.
3. Internet blacklists — check all databases available. Use the Edit button to open individual
databases and set spam score to 2 points (see figure 13.4).
Recommendation: Do not set message blocking for Internet blacklists, especially for the
free ones. These databases may be updated quite rarely or slowly and the information
involved might be unreliable. The lists might include non-spammer servers. Therefore,
use these databases better to add spam score to suspicious messages.
183
Antispam control of the SMTP server
Custom Rules
Another test for incoming email is a set of custom rules (for details, see section 13.3). Custom
rules can be created as needed:
1. Define corresponding rules for SMTP servers. If possible, set addition of only two or three
points for all spam rules. Since there are multiple rules defined, each test adds a score if
the message is considered a spam.
2. If there is a rule which blocks spam messages, set an address where copies of blocked
messages will be sent (see figure 13.11). The best way to do it is to create a special user
mailbox (for detailed information on creating of user accounts, refer to chapter 8).
SpamAssassin
It is not necessary to apply any special settings to the SpamAssassin filter. Any definitions of
the filter may be done on the SpamAssassin tab (for details, see section 13.4).
The only setting that needs to be changed on the tab is enabling of the Check every incoming
message in Spam URI Realtime Blocklist (SURBL) database option.
Caller ID tab
To read more on the Caller ID technology, see chapter 13.5. If you decide to use this
technology, it is strongly recommended to set the tab as follows:
1. Open the Caller ID tab under Configuration → Content Filtering → Spam Filter).
3. In the If the message has invalid Caller ID, then section, set spam rating to 3 points
(as explained above, spam messages are tested and scored by multiple tests so it is not
recommended to block it or to set individual scores too high).
4. It is also recommended to enable the Apply this policy also to the testing Caller ID records
option since most servers which employ the Caller ID technology use its testing mode so
far.
5. If you use an alternative (backup) SMTP server, specify its address in the Don’t check Caller
ID from IP address group entry.
184
13.8 Monitoring of spam filter’s functionality and efficiency
SPF
For closer description of the SPF technology, refer chapter 13.5. Recommended settings of the
SPF test is almost identical with the Caller ID settings. It is as follows:
1. Open the SPF tab under Configuration → Content Filtering → Spam Filter).
3. In the If the message has invalid Caller ID, then section, set spam rating to 3 points
(as explained above, spam messages are tested and scored by multiple tests so it is not
recommended to block it or to set individual scores too high).
4. If you use a backup SMTP server, enter its address in Don’t check SPF from IP address
group.
It is also recommended to support SPF by adding a record regarding SMTP servers which are
allowed to send email from your domains to your DNS records.
Spam repellent
Detailed information on Kerio Connect’s Spam repellent technology, refer to chapter 13.6. This
technology is not involved in spam rating and it is therefore only mentioned in this section.
The technology usually sorts out large volume of spam even before it is accepted in Kerio
Connect and thus decrease the load on the antispam tests and on the mailserver in particular.
1. Open the Spam Repellent tab under Configuration → Content Filtering → Spam Filter).
2. Enable the Delay SMTP greeting by ... seconds option and set the value to 25 seconds.
3. Enable the Do not apply delay for connection from option and select the local private
network as the IP group. This setting helps avoid delays of email sent from local user
accounts and delivery of internal messages.
4. Leave the Report the spam attack to the Security log option disabled (unless there is
a special reason to enable it). Records pointing at interruptions of SMTP connections
would otherwise make a large part of the log.
185
Antispam control of the SMTP server
Messages checked
Total number of all messages that have passed through the antispam filter (messages
sent form whitelist domains, for example, are not counted since they are not tested).
Spams detected (tagged)
All messages detected and tagged as spam.
Spams detected (rejected)
All messages blocked by the spam filter.
Messages marked by users as spam
All messages considered by the filter as not spam which were later marked as spam by
users (manually, by clicking on Spam or by moving it to the Spam folder).
Messages marked by users as not spam
Legitimate messages detected by the antispam filter improperly as spam— so called “false
positives”.
Graphical overviews
Kerio Connect also uses traffic charts to trace certain values regarding spam email. There are
several spam-related traffic charts which can be found in the Status → Traffic Charts section
(see chapter 23.5).
The following graphs focus on spam:
Connections/Rejected SMTP
The chart displays number of attempts of SMTP connection were rejected by the Spam
repellent tool in certain time period.
186
13.8 Monitoring of spam filter’s functionality and efficiency
Messages/Spam
With time dependence, the chart displays how large amount of spam is delivered to Kerio
Connect and when.
Logs
Problems that occur regarding the antispam filter might be solved with help of Kerio Connect’s
logs. In detail, logs are focused in chapter 24.
Spam
All messages marked as spam are recorded in this log (for details, see chapter 24.8).
Debug Log
Logging of particular information can be performed by this special log. Spam issues may
be worked out by using of the following information:
• Spam Filter — the option logs spam rating of each message which passed through
the Kerio Connect’s antispam filter.
• SPF Record Lookup — the option gathers information of SPF queries sent to SMTP
servers. It can be used for solving problems with SPF check.
• SpamAssassin Processing — the option enables tracing of processes occurred
during SpamAssassin antispam tests.
To learn where and how to set logging of particular information in the Debug log, refer
to chapter 24.9.
187
Chapter 14
In Kerio Connect, you can check all incoming emails for viruses. The control can be performed
by using two combinable methods. For this purpose, you can use either the internal Sophos
antivirus, or any of the external supported antiviruses.
Immediately after the installation of Kerio Connect, the internal Sophos antivirus is started. It
is possible to support it by enabling any other of the supported external antivirus applications.
Both antivirus programs can run concurrently. This provides for reliable protection of
your local network, since the virus databases updates will be performed faster (one of the
antiviruses can react to a new virus occurrence a couple of hours sooner than the other). The
update speed is a key element of the protection against new viruses.
Both antiviruses can be also switched off, but it is not recommended, because users are not
protected against infected emails.
Kerio Connect checks (independently of the antivirus) JPEG attachments for corruption and
presence of GDI+ exploit (a malicious code, usually with a virus, that can run the exploit upon
system breakdown). All messages with such attachment will be deleted automatically.
Besides cooperation with an antivirus program, Kerio Connect allows you to filter certain file
types from email attachments (using file extension or MIME type), regardless of whether they
are infected by a virus or not. To specify these options, go to the Configuration → Attachment
filtering section.
188
14.1 Integrated Sophos Anti-Virus
Warning:
If the time is significantly (several times) greater than the interval set for automatic
update, then the automatic updates are not working correctly. In this case we
recommend updating the database manually and to inspect the Error and Security
logs for a failure explanation.
The installed antivirus may not be run automatically. In such case, use the Options button to
specify advanced settings of the external antivirus program.
189
Antivirus Control of Email And Attachment Filtering
The following conditions must be met so that the antivirus is properly run:
• The antivirus must be installed on the same computer where Kerio Connect is running.
• The antivirus license must meet the conditions of the producer (usually the same or
higher number of users of the licensed version of Kerio Connect or a special server
license).
The interface between Kerio Connect and an antivirus program consists of special modules
(one for each antivirus). The mailserver administrator must select the appropriate module
for the antivirus to be used. If a module is selected and the corresponding antivirus is not
installed of does not work properly, Kerio Connect does not allow saving these settings. The
message stating that the antivirus control is not functional appears in the Error log.
Note: There are two exceptions to this behavior: incorrectly transferred configuration of Kerio
Connect (for more information, see chapter 30.2), or less licenses of antivirus than the licenses
of Kerio Connect. In such cases, Kerio Connect will work normally, but it will not be able to
send messages. This is because Kerio Connect wants to perform an antivirus check after
receipt, but the antivirus does not work. The message stating that the antivirus control is not
functional appears in the Error log.
In order for Kerio Connect and antivirus program to cooperate properly, specify an exception
for the store directory (or also for the *.eml files in case of older versions of some
antiviruses), so that the messages are not checked by the antivirus engine.
If the resident shield was set incorrectly, a dialog box is opened. The resident shield also
detects the eicar.com file (a testing antivirus generated by Kerio Connect to check for proper
settings of an exception in the resident shield).
190
14.4 Server responses to detection of a virus or a damaged/encrypted attachment
Each message is evaluated first by an antispam system, then by antivirus. This saves computer
time, since the antispam check is considerably less demanding than the antivirus check. If the
messages marked as spam are set to be discarded automatically (in the Spam Filter section),
all spam messages containing viruses will be discarded as well.
191
Antivirus Control of Email And Attachment Filtering
Filter rules
Displays individual filters. To the left of each filter there is a checkbox that you can use
to enable or disable the filter. Use these checkboxes to switch filters off without the need
to remove them.
After the Kerio Connect installation, there is a list of several predefined filters. All filters
are turned off and the administrator can choose to enable or remove them. This way for
example executables (.com and .exe), Visual Basic scripts (.vbs), etc. can be filtered.
Description
Text description of defined filter.
192
14.6 Antivirus control statistics
Statistics of the antivirus control enable monitor how many infected messages come in Kerio
Connect.
193
Chapter 15
15.1 Archiving
Kerio Connect can store copies of all messages (or only messages sent to the Internet) in
special archiving folders or re-send them to another SMTP server. This makes it possible to
keep archived email for a situation where it would be necessary to look up a particular message
or deleted messages (these can be reused by using so called email recovery which can be set
in the domain settings — for details, see chapter 7.4).
To configure backups, go to the Archiving tab under Configuration → Archiving and Backup:
194
15.1 Archiving
Warning:
UNC path is not allowed as path specification.
2005-W03 — a weekly archive format. The name includes year and week number. The
week number count starts on January 1 of the particular year. This implies that the count
does not necessarily match with the usual calendar week count (if January 1 is included
in the 52nd week, the week counts may collide). Every seven days, a new folder is created
(upon reception of the first message after the server’s midnight time).
2005-Jan-12 — a daily archive format. The name contains the year, day and month
during which the messages were archived. Every day, a new folder is created (upon
reception of the first message after the server’s midnight time).
Note: The interval for creating new archiving folders (implied from the name format)
is up to the Kerio Connect administrator. We recommend bearing in mind the number
of messages passing through the mailserver (or the number of local users). A greater
number of folders containing smaller numbers of messages are faster to access and easier
to comprehend.
Compress old archive folders in
Use this option to compress the archive except for the current folder (the last folder
created). However, it is not possible to browse through the compressed folders via email
clients.
Use the textfield to set time ( hour:minute) when the archive folder starts to compress.
It is recommended to set the time for night hours when the load on the server is low.
The first compression of the archive folder is performed upon Kerio Connect’s startup.
195
Email archiving and backup
By default, archive folders are available to the admin of the primary domain (see chapter 8.1).
The Admin can also assign access rights to archive folders for other users. This may be done in
Kerio WebMail (refer to the Kerio WebMail user guide) or in MS Outlook supported by the Kerio
Outlook Connector. However, since messages of all users are archived, only a confidential
administrator (or a tiny group of confidential persons) should be allowed to access these
folders.
These folders are available to users with corresponding rights only. By default, only the
admin of the primary domain is allowed to access the folders (the first account created in
the configuration wizard during the installation of Kerio Connect).
196
15.2 Back-up of user mailboxes and basic server configuration
Archive folders can also be made available for other users. The sharing is the same as for
other folder types. However, since messages of all users are archived, only a confidential
administrator (or a tiny group of confidential persons) should be allowed to access these
folders.
• user mailboxes,
• public folders,
• mailing lists,
• licenses,
• SSL certificates,
• SpamAssassin database.
Backups of user folders include various settings. To configure backups, go to the Backup tab
under Configuration → Archiving and Backup:
197
Email archiving and backup
Backup Schedule
On the Backup tab, backups can be scheduled in details. Two backup types can be scheduled:
• Differential backup — a partial backup, including all new files and files changed
since the last backup. These backups are not so bulky. Typically, partial backups
complement a full backup. If multiple differential backups in row are scheduled,
the newest backup always rewrites the previous one. This means that at most one
differential backup can be saved on the backup disk besides the full backup.
Note: If the method of differential backups is used, the most recent full and differential
should be used in case that a backup recovery is performed.
The backup schedule is defined by backup tasks. Each task includes settings for time when
the particular backup will be performed and selection of a backup type (see above). To add
anew backup task to the schedule, click on
Add. A backup schedule definition window is opened (see figure 15.4) that includes the
following setting options:
198
15.2 Back-up of user mailboxes and basic server configuration
Description
This is an optional item, it is used for better reference.
Schedule
The box includes two entries where day and time are selected for the backup. It is
recommended to perform backups at night (especially full backups) since backups might
overload the mailserver.
Backup type
Selection of either the full or differential backup type.
The Add button opens a definition of a new backup task. You can also click the Edit button to
edit a corresponding task or Remove to remove a task from the schedule.
Both backup types can be combined by using multiple tasks. Any number of backup tasks can
be defined. This depends on the user. Number of backup tasks may depend on:
1. Size of the data store which influences how long each backup takes and on its size. Both
problems might be easily solved by using differential backups.
2. Importance of data which might be lost. This implies that backups are typically more
frequent in companies where email communication and message storing is important. If
backups are performed frequently, minimum of data is lost in case of the server’s failure.
File settings
Backups are saved in compressed files (.zip) where the maximal size of 2 GB is allowed.
This box enables you to split the backup to several files of smaller size. The maximal file
size for splitting is set to 2 GB by default. If a file exceeds the value set in the dialog, the
file is not backed up.
199
Email archiving and backup
Rotation
Each backup of user folders is very space-demanding and it might be desirable to often
remove these backups. It is possible to set rotation where old backups are removed
automatically. Just specify number of backups to be kept in the Keep at most ... complete
backups. Whenever the number is exceeded, the oldest backup is rewritten by the new
one.
Other settings
Backup directory
The full path to the backup directory (in accordance with conventions of the operating
system on which Kerio Connect is running).
Enter the path in the text field or select it upon clicking on Select Folder.
The default backup store is in the directory where Kerio Connect is installed:
Kerio\MailServer\store\backup
Warning:
It is recommended to change the backup directory by setting the path to the
corresponding removable disk or another media where the backup will be stored
if available.
Warning:
Make sure that there is enough space in the backup storage directory (minimum
4GB) — if space is lacked, backup will not be performed.
If Kerio Connect is running on Windows, the path must be specified as UNC (see
figure 15.6).
If Kerio Connect is running on Linux or Mac OS X, the following options are allowed:
• Connect the backup server as a directory and specify the path to this directory in
the Backup Directory entry. Here is an example of a result:
/mnt/server-backup
200
15.2 Back-up of user mailboxes and basic server configuration
• Save the backup in a local directory and then, send it to the server (e.g. by using
the rsync synchronization utility). Here is an example of a result:
/backup/kms/backup
Warning
Specify an email address where notifications about the backup status will be sent by Kerio
Connect.
In addition to backups set in the schedule, it is also possible to make so called backup copies.
The copy is a kind of full backup. The copy can be enabled by the Start now button. The
current status of the backup process appears next to the button. In case of a backup recovery,
the copy is considered as a standard full backup and it is used for the recovery if it is the most
recent copy performed.
Troubleshooting
For cases when a problem regarding backups occurs and needs to be solved, Kerio Connect
allows logging of backups:
2. Right-click on the log pane to open a context menu, and select Messages.
201
Email archiving and backup
To launch Kerio Connect Recover, run the kmsrecover command from the directory where
Kerio Connect is installed.
Usage:
On Mac OS X and Linux it is necessary to enter a command on the following format, unless
having already been introduced in the file of the path system variable:
This means that it is necessary to add the ./ string before the utility name that will inform
the system that the command to be used is in the current directory.
You can also see these details and examples to individual attributes, by running the following
command.
Warning:
• Kerio Connect must be installed on the computer which the kmsrecover tool is
launched from.
• If Kerio Connect Recover is run without advanced parameters specified otherwise, all
items in the Kerio Connect’s data store, such as configuration files, licenses, mailing
lists and data, will be overwritten.
The Kerio Connect Recover tool allows setting of many advanced options for back-up data
recovery, as follows:
202
15.3 Data recovery from back-up
-d --domain Recovers (or lists with parameter -l) all backed-up data
for the specified domain..
-u --user Recovers (or lists with parameter -l) data of the
specified user.
-f --folder This option recovers the specified folder of the user
(this option requires setting of the -d and -u options).
-s --store This option sets where SpamAssassin databases,
mailing lists and emails (including events, notes,
contacts, etc.) would be unpacked and stored. By
default, the store on the Kerio Connect from which
kmsrecover was launched is used.
-c --cfgdir This option sets a directory where configuration files,
SSL certificates and licenses would be stored. By
default, the current folder from which the kmsrecover
command was started is used.
-m --mask This option allows to set which parts of the back up
would be recovered. It requires setting of mask with -m
<value> or--mask=<value>. <value> stands for any
combination mentioned below. Example: -m
cfg,license,sslca,sslcert — this command
recovers license, SSL certificates and configuration files.
cfg This argument recovers only configuration files
mailserver.cfg and users.cfg where server
configurations are defined.
203
Email archiving and backup
204
15.3 Data recovery from back-up
Warning:
If the parameter contains a space in a directory name, it must be closed in quotes.
For example:
kmsrecover "E:\backup 2"
205
Email archiving and backup
-s D:\tmp E:\backup (for recovery from the latest complete backup, i.e. combination
of the latest full and differential backup)
or
-s D:\tmp E:\backup\F20051009T220008Z.zip (for recovery from a particular
backup)
206
15.3 Data recovery from back-up
3. For security purposes, the backup directory is stored on the removable disk
/Volumes/backup
Solution:
The command must be run from the directory where Kerio Connect is installed.
Therefore, it is necessary to go to the directory:
/usr/local/kerio/mailserver
We want to recover the last complete backup (the most recent full and differential
backups or the most recent backup copy). Now, the command pattern depends on the
fact whether the path to the Kerio Connect directory is included in the path variable or
not. If the path is not set there, the command will be as follows:
./kmsrecover /Volumes/backup
Otherwise, it will be like this:
kmsrecover /Volumes/backup
The kmsrecover detects the path to the store (/store) automatically in the Kerio Con-
nect’s configuration file and uses it.
Recovery of a single user’s mailbox
• The directory with the backup is stored on an external disk,
• we need to get a single user’s mailbox from the backup,
• the entire mailbox and its content will be saved out of the Kerio Connect’s store
(folder /Temp).
./kmsrecover -d company.com -u wsmith -s /Volumes/Temp
/Volumes/backup/F20051009T220008Z.zip
207
Email archiving and backup
• .version.txt — the file is created at the start of the backup creation process and it
includes the following information:
• hostname — DNS name of the Kerio Connect host which the backup was
created for.
• @backup — the main directory of the backup. This directory includes the following
items.
208
15.3 Data recovery from back-up
• mailserver.cfg — a file with the Kerio Connect configuration. All settings done in
the administration interface are saved in mailserver.cfg.
• users.cfg — a file with user configuration. It involves all users and their parameters
set in the Kerio Connect’s administration interface.
• .summary.txt — the file is created at the end of the backup creation process and it
includes the following information:
• total_size — total size of the files (in bytes) which are backed-up in the
interval between creation of files .version.txt and .summary.txt.
209
Chapter 16
Server’s Certificates
The principle behind secure services in Kerio Connect (services encrypted by SSL — e.g. HTTPS,
IMAPS, POP3S, etc.) is that all communication between the client and the server is encrypted
to protect it from tapping and to prevent it from misuse of transmitted information. The
SSL encryption protocol used for this purpose uses an asymmetric cipher first to exchange
a symmetric key.
The asymmetric cipher uses two keys: a public one for encrypting and a private one for
decrypting. As their names suggest, the public (encrypting) key is available to anyone wishing
to establish a connection with the server, whereas the private (decrypting) key is available only
to the server and must remain secret. The client, however, also needs to be able to identify
the server (to find out if it is truly the server and not an impostor). For this purpose there is
a certificate, which contains the public server key, the server name, expiration date and other
details. To ensure the authenticity of the certificate it must be certified and signed by a third
party, the certification authority.
Communication between the client and server then follows this scheme: the client generates
a symmetric key and encrypts it with the public server key (obtained from the server
certificate). The server decrypts it with its private key (kept solely by the server). This method
ensures that the symmetric key is known only to the server and client.
Note: To provide maximum security for Kerio Connect, allow only SSL-secured traffic. This can
be set either by stopping all unencrypted services (see chapter 6) or by setting appropriate
security policy (refer to chapter 12.8). Once the server is configured, it is necessary to install
a certificate (even a self-signed one) or certificates on clients of all users using Kerio Connect’s
services.
210
16.1 Kerio Connect certificate
will not be displayed if you install the certificate (you can do this because you know
the certificate’s origin).
• The certificate date is valid (the certificate is valid for a certain limited period, usually
1-2 years).
• The name of the certificate does not correspond with the name of the server. The
certificate is issued for a certain server name (e.g. mail.company.com), which you
must also use in the client (this certificate has been issued for a fictitious name
keriomail).
Now, there are two options. One is to keep in Kerio Connect the self-signed certificate
generated during the mailserver’s installation, the other option is to get a certificate authorized
by a certification authority. It should be possible to install both types of certificates on client
stations. In both cases, it is necessary that the certificate is maintained in the Kerio Connect’s
Configuration → SSL certificates section (see figure 16.1).
211
Server’s Certificates
Attention: A new certificate will be used the next time Kerio Connect Engine is started. If
you wish to use it immediately, stop the Engine and then start it again.
The New button can be used to create a new certificate (the New certificate option) or to
demand on a new certificate (New certificate request). You will be asked to specify entries
in the Generate Certificate dialog. The Hostname and Country entries are required fields.
Show Details
Select a certificate and click on the Show details button to get details about the selection.
Import
Use this button to import a certificate, regardless if new or certified by a certification
authority.
Export...
Use this button to export an active certificate, a certification request or a private key.
Using this option you can send an exported certificate request to a certification authority.
Remove
Using this button you can remove a selection (a certificate or a certification request).
Set as active
Use this button to set the selected certificate as active.
212
16.2 Install certificates on client stations
Intermediate certificates
Locally
Add the “intermediate” certificate file to the /sslca directory and copy the server’s
certificate with the private key to the /sslcert directory. Both directories can be found
in the directory where Kerio Connect is installed.
Remotely
Certificates can be imported via the administration interface.
1. Open the server’s certificate and the “intermediate” certificate in any text editor.
2. In the “intermediate” certificate, select the certificate’s string and copy it to the server
certificate file next to the string of the server certificate. The certificate file should
then be as follows:
-----BEGIN CERTIFICATE-----
MIIDOjCCAqOgAwIBAgIDPmR/MA0GCSqGSIb3DQEBBAUAMFMxCzAJBgNVBAYTAl
MSUwIwYDVQQKExxUaGF3dGUgQ29uc3VsdGluZyAoUHR5KSBMdGQuMR0wGwYDVQ
..... this is a server SSL certificate ...
ukrkDt4cgQxE6JSEprDiP+nShuh9uk4aUCKMg/g3VgEMulkROzFl6zinDg5grz
QspOQTEYoqrc3H4Bwt8=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIDMzCCApygAwIBAgIEMAAAATANBgkqhkiG9w0BAQUFADCBxDELMAkGA1UEBh
WkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR
..... this is an intermediate SSL certificate which
signed the server certificate...
5BjLqgQRk82bFi1uoG9bNm+E6o3tiUEDywrgrVX60CjbW1+y0CdMaq7dlpszRB
t14EmBxKYw==
-----END CERTIFICATE-----
3. Save the certificate.
4. In the administration interface, open the SSL Certificates section.
5. Import the server’s certificate by using the Import → Import new certificate option.
• If MS Outlook extended by the Kerio Outlook Connector is used on the station and
secured HTTP traffic is desired between the server and the client (typically when the
Free/Busy server is used). In such a case, it is necessary to install the certificate,
otherwise the communication will not work.
213
Server’s Certificates
• If MS Entourage is used and its services are planned to be secured by SSL encryption.
In such a case, it is necessary to install the certificate, otherwise the communication
will not work.
• For connections to Kerio WebMail over HTTPS. If the certificate is not installed, an alert
is displayed upon each login informing you of this issue.
Internet Explorer is helpful where the certificate is to be installed to the MS Outlook store
(Internet Explorer and MS Outlook share the same certificate store) or where connection to
Kerio WebMail is to be performed over HTTPS.
1. Run Internet Explorer and specify the corresponding URL to login to Kerio WebMail.
SSL-secured protocol must be used for the connection to the server. This implies that
the URL should start with https:// (example: https://mail.company.com/).
2. This opens the Security Alert dialog box. In this dialog, click on View certificate.
Install certificate.
4. A certificate installation wizard is opened. There is nothing to be set in the wizard. Simply
confirm all settings and close the wizard to install the certificate.
Installation in Safari
SSL certificate is required whenever applications are to communicate with Kerio Connect by
SSL-secured services. The Kerio Connect certificate can be installed by using the Safari browser
(simply connect to the Kerio WebMail interface via https://):
1. Run Safari and specify the corresponding URL to login to Kerio WebMail. SSL-secured
protocol must be used for the connection to the server. This implies that the URL should
start with https:// (example: https://mail.company.com/).
2. Before the Kerio WebMail’s login page is opened, an alert is displayed informing that the
system is not able to authorize the server to which you are connecting since the certificate
is authorized by an unknown authority (see figure 16.3).
3. The alert dialog contains the Show certificate button. Click on it to show the certificate
(see figure 16.4).
214
16.2 Install certificates on client stations
4. Use the mouse pointer to move the certificate’s icon to the desktop, as shown at
figure 16.5.
1. On the desktop, click on the certificate. In the Add Certificates window (see figure 16.6),
select the System option in the Keychain menu (all system users will be allowed to use the
certificate) or Login (only authenticated users will be allowed to use the certificate). Click
OK to confirm changes.
215
Server’s Certificates
2. The Keychain Access application is started, asking for confirmation that you really want
to install the certificate. Confirm the dialog by entering username and password for an
account with administration rights.
216
Chapter 17
This chapter describes how to customize Kerio WebMail. You can customize a significant part
of the product. For example, the Kerio Connect 7 logo can be substituted by your company
logo and/or add your own localization file.
17.1 Skins
Kerio WebMail contains a couple of default skins (skin = Kerio WebMail appearance). These
skins are stored in the following directory:
Kerio\MailServer\web\custom\webmail\skins
Skins consist of cascading stylesheets (CSS) and images. Cascading stylesheets (CSS) enable
users to customize the appearance of web pages (colors, fonts, object offset, etc.). If a user
is able to work with cascading stylesheets and images, he/she can customize the most of the
Kerio WebMail interface. Users can either edit the default skins or create one’s own. The new
skin must be stored in
\Kerio\MailServer\web\custom\webmail\skins\xyz
17.2 Logo
At the top of each page of the Kerio WebMail interface, Kerio Technologies logo is displayed.
You can replace it with your own logo or any other image.
The logo can be changed either globally (it applies to all domains in Kerio Connect) or
individually for each domain.
If both domain as well as individual logos are set, the logos for the individual domains will be
of higher priority.
• Format: GIF
217
Kerio WebMail customization
To change the logo of the default WebMail skin, follow these instructions:
2. On the WebMail tab, check option Use custom logo in WebMail (see figure 17.1).
3. Click on Select and browse to set a path to the folder where the logo is saved.
Setting a custom logo for all Kerio Connect’s skins is a bit more difficult. The logo must be
copied manually to individual skins, as described below (for MS Windows):
3. To get the logo to all Kerio Connect skins, repeat the procedure separately for each skin.
218
17.2 Logo
• Format: GIF
To change the logo of the default WebMail skin for all domain users, follow these instructions:
2. Open domain settings edit dialog box and go to the WebMail Logo tab.
3. Check option Use custom logo for this domain in WebMail (see figure 17.2).
4. Click on Select and browse to set a path to the folder where the logo is saved.
Figure 17.2 Setting of custom Kerio WebMail logo for the domain
Setting a custom logo for all Kerio Connect’s skins is a bit more difficult. The logo must be
copied manually to individual skins, as described below (for MS Windows):
3. To get the logo to all Kerio Connect skins, repeat the procedure separately for each skin.
Note: If there is at least one of the files logo_domain.gif and logo.gif in the skin folder,
none of the global logos will be used. If the skin currently in use contains both the domain
logos as well as the individual ones, the domain logos will be used by default.
219
Kerio WebMail customization
17.3 Language
Currently, Kerio WebMail includes the following language versions:
If Kerio WebMail does not include the language localization you need, it is possible to create
a custom language version.
All language texts displayed in the Kerio WebMail interface are saved in separate localization
files. Localization XML files are stored in subdirectory /translations (in the directory where
Kerio Connect is installed). UTF-8 encoding is used.
The name of each file is created from the language abbreviation (e.g. de for German, en for
English etc.) and the suffix .def. Another language can be added anytime by creating the
relevant definition file. The administrator of Kerio Connect can therefore create a custom
language version by simply copying one of the definition files in a file with a new name and
translating the texts contained within.
XML format is delimited by <translation> tag. The individual rows must have the following
form:
<text id="head-user">User</text>
1. Copy the localization file from the source language (from which we will translate) to the
file named according to the new language.
The spellcheck in Kerio WebMail is based on comparing the phrases with the dictionary, and
it is therefore available only for the language versions available in the folder where language
databases for Kerio Connect are stored. These files can be found in under the myspell folder
where Kerio Connect is installed. The default language versions for the spellcheck dictionaries
are English and Czech. The other language versions can be copied in the myspell folder. In
order for the dictionaries to work properly, they must meet the myspell standard.
220
17.3 Language
Note: Dictionary files can be downloaded in compressed formats zip or oxt. Unpack them to
find aff and dic files purposed for installation.
To employ the dictionary in the spellchecker, it is necessary to set it as preferred in the Kerio
WebMail settings:
3. This opens the dialog divided to several tabs. Switch to the Mail composing tab.
221
Kerio WebMail customization
17.4 Keeping sessions between Kerio Connect and Kerio WebMail secure
Users often simply close their browsers without logging out of Kerio WebMail. In such cases,
the session is not interrupted and it can be misused more easily (the session is the more risky
the longer it takes). For this reason, it is possible to set session timeout. If user is not using
the session at this time (the session is idle), 5then the connection with the server gets lost upon
expiration of the idleness timeout. By default, the timeout is set for two hours.
Maximum time can also be set for sessions in addition to the session’s expiration time. The
maximum session time means the time since user’s connection. If users use the Kerio WebMail
interface as the main connection to their mailboxes, set the time at least to a value between 8
and 10 hours. Too short interval might cause inappropriate closure of a session (while a user
is editing a message, for example). This is not desirable.
Note: If the user has started composing a message and has not finished it yet and the
session expires, user authentication will be required for reconnection. After successful
re-authentication, the message can be finished and sent.
Another option of protection is to use automatic logout from Kerio WebMail upon change of
the client’s IP address. It might happen that a session of one user is hijacked by an attacker
(especially if SSL-secured HTTP is not used) to access the server. Connection of an attacker to
the session changes the client’s IP address.
Warning:
The “anti-hijack” protection cannot be applied if your ISP changes IP addresses during the
connection (e.g. in case of GPRS or WiFi connections).
4. Set maximal session time length — this time depends on frequency of use of the WebMail
interface. The default value is appropriate if WebMail is used as the main tool for accessing
email mailboxes.
5. If you do not connect via an ISP which changes IP addresses within sessions, it is
recommended to enable also the Force WebMail logout if user’s IP address changes option.
5 Idleness is when no request is sent to the server including autorefresh requests. This implies that the timeout is
applied only if user closes the Kerio WebMail interface without having logged out of it or if they simply go to another
page by rewriting the URL on the corresponding browser’s tab.
222
17.4 Keeping sessions between Kerio Connect and Kerio WebMail secure
Figure 17.4 Securing of the connection between the server and the Kerio WebMail interface
Warning:
This setting also applies to Kerio Connect Administration. In other words, if the WebMail
session timeout is set to 1 hour, the session timeout for Kerio Connect Administration is
also set to 1 hour.
223
Chapter 18
Kerio Connect offers a number of mechanisms which can be used to avoid cluttering of Kerio
Connect’s disk space and receiving/sending of email with extremely large attachments (video
and audio files, pictures, etc.) which might choke up your Internet line.
Kerio Connect includes special settings for limits for outgoing/incoming email and messages
from Kerio WebMail. It is also possible to set user quotas for mailbox size and number of
messages that can be included in the mailbox.
3. Check and set the Max. number of failed commands in SMTP session: option.
3. Check the Limit outgoing message size to option and set a size limit.
224
18.1 Message size limits
If the limit is set to 0, Kerio Connect behaves the same way as if no limit was set.
To set a limit for a particular domain, use the Kerio Connect’s administration interface:
3. Check the Limit outgoing message size to option and set a maximal size limit (in MB).
If the limit is set to 0, Kerio Connect behaves the same way as if no limit was set.
Setting of maximum message size can be used for the following purposes:
• to set maximum size of memory allocated in Kerio Connect to each HTTP POST
request.
Warning:
Maximal value of the limit is 128 MB.
For better understanding of the limit, here is an explanation of how a message written in Kerio
WebMail is sent to Kerio Connect. Each new message composed in the web interface is sent
by a browser via HTTP protocol using an HTTP POST request to Kerio WebMail. The interface
receives the message and processes it so that Kerio Connect can send it to the addressee by
SMTP protocol.
Each HTTP POST request contains one message including a message body, all headers and
attachments. The limit set by this option narrows size of any HTTP POST request directed
from the Kerio WebMail interface to Kerio Connect. This means that any limit set for requests
also limits size of email messages.
Size limit set for HTTP POST requests is applied to any files sent from Kerio WebMail to Kerio
Connect and it is applied to all Kerio Connect users. The default value for maximum size of
messages sent from Kerio WebMail is 20 MB. This limit should be generally satisfactory for
these purposes.
The minimum value for the limit is 2 MB. If a lower limit is set, Kerio Connect sets the value
back to 2 MB automatically.
If a message includes any attachments, they are encrypted by the Base64 method. This type
of encoding is able to increase the size of transmitted data even by one third (in case of binary
225
Limits and quotas
data). This means that, for example, the minimum 2 MB limit might also allow just 1 — 1,5 MB
attachments.
It is necessary that a memory allocation value is specified in Kerio Connect for HTTP POST
requests. The more bulky the request is the more memory must be allocated. This implies
that the size of the allocated memory changes according to changes in the size limit.
Warning:
Any time the limit is changed, it is necessary to restart Kerio Connect since the memory
allocation is changed as well.
To set limit for email sent via Kerio WebMail, open the Kerio Connect’s administration interface:
3. In the Maximum size of a message that can be sent from the WebMail interface entry, set
a limit for messages sent from WebMail.
226
Chapter 19
Tools
You can define IP address groups in Configuration → Definitions → IP Address Groups section.
Group of IP addresses of local ranges is entered automatically. This group can be edited,
removed or otherwise manipulated as well as other IP groups.
227
Tools
Click on Add to add a new group (or an item to an existing group) and use Edit or Delete to
edit or delete a selected group or item.
The following dialog window is displayed when you click on the Add button:
Add to a group
You can enter a new name (create a new group) or enter or select an existing one — this
adds the new item to an existing group.
Type
The type of new item. The options are as follows:
• a single IP address (Host),
• IP Range,
• net with corresponding mask (Net / mask),
• another IP address group (IP address group). This implies that address groups
are cascadable.
IP address
Parameters of new item (dependent on selected type).
Description
Commentary for the IP address group. This helps guide the administrator.
228
19.2 Time Ranges
When defining a time interval three types of time ranges (subintervals) can be used:
Absolute
— interval has explicit start and end dates, it does not repeat
Weekly
— interval repeats every week (on selected days)
Daily
— interval repeats every day (in selected hours)
If a certain time interval consists of multiple ranges of different types, it is valid in the time
defined by the intersection of absolute ranges with the union of daily and weekly ranges. In
symbols:
where
You can create, edit or delete time intervals in Configuration → Definitions → Time Ranges
section.
Clicking on the Add button will display the following dialog window:
229
Tools
Add to a group
Name (identification) of the time interval. You can enter a new name (create a new
interval) or select an existing one and add a new item to it.
Description
A text description (for informative purposes only).
From, To
The beginning and the end of the time range. Here you can enter the start and end time,
a day of the week or a date (depending on the interval type).
Valid on
The day of the week on which the interval will be valid. You can select certain days
(Selected days) or use one of the pre-set items (All days, Weekdays — Monday to Friday,
Weekend — Saturday and Sunday).
230
19.3 Administration Settings
Warning:
To deactivate the built-in administrator account, simply uncheck option Enable built-in ad-
ministrator account under Configuration → Administration Settings.
The same policy as for removing of any other administrator account is applied — see
section8.5.
231
Tools
To even increase security, remote administration can be enabled only for exclusive IP
addresses. The menu allow to select an IP address group to define addresses from which
web administration will be allowed and it is also possible to add an address group or edit
an existing one upon clicking on Edit.
232
Chapter 20
LDAP server
The built-in LDAP server enables access to public and private contacts (you can use either
the secured or the unencrypted access — for detail see chapter 6) stored in KMS for email
client programs supporting the LDAP protocol (Lightweight Directory Access Protocol). This
protocol is supported by all commonly used email clients. This protocol is supported by all
most common email clients.
LDAP server can enable users to access their personal contacts (i.e. contacts saved in their
own Contacts folder) and contacts in all subscribed public folders of the Contacts type.
• At least one LDAP service or Secure LDAP must be run in Kerio Connect.
• The user must have his/her contacts defined in the contacts folder or must have
subscribed at least one public or shared contact. No contacts will be found unless
this condition is met.
Note: If Kerio Connect is protected by a firewall and the LDAP service is intended to be
available, the appropriate ports must be open (389 for the LDAP service and 636 for Secure
LDAP). You should use the encrypted LDAP version.
To add a user or a group to the global public contact folder, go to the Kerio Connect’s
administration interface, section Users or Groups:
233
LDAP server
Details, such as address, phone numbers and birthdays can be edited directly in email clients
(Kerio Connect WebMail, MS Entourage, MS Outlook, etc.).
Warning:
If you uncheck option Publish in Global Address List and then enable it again, no change
performed before unchecking will take effect after reactivation of the option.
234
20.3 Configuring Email Clients
Security, Port
Select, whether the secure or non-secure version of LDAP protocol should be used. If you
do not use standard port insert a corresponding port number.
Note: TLS protocol (i.e. switching to secured mode by the STARTTLS command) is not
supported.
Search base
If you want to access all private and subscribed shared and public folders, leave the entry
blank or enter
fn=ContactRoot
Specify appropriate branch of the LDAP database in more details to limit access only to
certain folders. To better understand various alternatives, read the following examples:
• cn=wsmith@company.com,fn=ContactRoot
— it will be searched only through contact files of the user john@company.com
• fn=personal,fn=ContactRoot — it will be searched only through contact files
of users that are logged into the LDAP server. This option is identical with the
previous one, however, it is not necessary to specify username (or email address)
of the user. This feature can be used for example for configuration of more
clients, etc.
• fn=public,fn=ContactRoot
it will be searched only through public contact files
• fn=Contacts,cn=wsmith@company.com,fn=ContactRoot
— it will be searched only through the Contacts folder of the user
• fn=PublicContacts,fn=public,fn=ContactRoot
— it will be searched through the public PublicContacts folder only
The client configuration for enabling the search of contacts through LDAP is explained in the
following example using Microsoft Outlook Express.
The LDAP account is defined in the Tools → Accounts → Directory Service menu. New accounts
can be added by wizards. However, only basic parameters can be defined there. Therefore,
it is possible to set detailed parameters by selecting a corresponding account and clicking on
Properties.
General folder:
235
LDAP server
Server Name
DNS name or IP address of the host where Kerio Connect is running (e.g.
mail.company.com or 192.168.1.10).
236
20.3 Configuring Email Clients
Note: We recommend using the secure version of the LDAP service (SSL) for encrypted
user authentication.
Check names against this server when sending mail
If this option is enabled, personal email addresses will be searched for automatically
when a message is sent. This means that names can be used instead of full email
addresses in the To field (or Copy To or Blind Carbon Copy To). The appropriate email
addresses will be changed when the email is sent.
Note: If an inserted name cannot be found, the message will not be sent by Outlook
Express and the user must correct the name or insert the full email address. If there are
more addresses for one name, a dialog for user/address selection will be opened.
Advanced folder:
237
LDAP server
Search timeout
If there is a large LDAP database or the connection is slow, the search can take a long time.
This option defines the maximum length of time for searching through the database.
When this time expires, the searching is stopped, regardless whether any record has been
found or not.
Note: If the LDAP server is located within the same local network as the client, the search
should take almost no time.
Search base
Specify a location of contacts in the LDAP database (see above). If you leave this entry
blank, all subscribed folders will be scanned (public and shared).
238
Chapter 21
Mailing Lists
Kerio Connect allows for any number of mailing lists to be defined within each local domain.
Mailing lists are based on an email address shared by all users included in the group —
messages sent to the address are distributed to all members of the corresponding mailing
list. In addition to functions of simple user group, the following functions are available in
mailing lists:
• disallowing messages that contain certain features (e.g. messages where subject is not
defined).
All actions are executed by sending emails to special accounts. Mailing lists must be created in
the Kerio Connect Administration. All other actions may be taken by email sent and delivered
via SMTP.
Warning:
If POP3 access is used, it is not recommended to process messages from mailing lists. If you
plan to run mailing lists, the MX record for your server is required.
If any problems regarding mailing lists occur, the Debug log may be helpful (see chapter 24.9).
To obtain appropriate information, enable the Mailing Lists Processing log.
Administrator
User with Kerio Connect administration rights (read/write access — see chapter 8.1).
Administrator creates mailing lists and sets their parameters (moderators, policy, etc.).
For details, see chapter 21.2).
239
Mailing Lists
Moderator
Each mailing list should have at least one moderator. Moderators are allowed to take the
following actions:
• confirm or refuse a user login (if required by the mailing list policy),
• allow or deny postings to the mailing list (if required by the mailing list policy),
• receive error reports (e.g. reports about emails that could not be delivered),
• can be addressed by
<mailinglist_name>-owners@<domain>
Member
Any user subscribed to the mailing list is a member. Their email addresses may belong to
any domain — mailing lists are not limited only to the domain where they were created.
Mailing list members have the following rights:
• subscribe/unsubscribe (if the member is subscribed, he/she receives all messages
sent to the mailing list address)
• ask for help
• send messages to the mailing list (if required by the mailing list policy, each
message sent to the mailing list must be approved by a moderator)
Note: Each user may have more than one role (e.g. a moderator can be a member as well, etc.)
Before adding a mailing list make sure you have selected the correct domain from the drop
down menu at the top of the Mailing Lists dialog. Use the Add button to define a new mailing
list.
Name
Name of the mailing list. This name will be used as the email address of this mailing list
within the particular domain.
Example: There is a mailing list called discussion in the company.com domain which
will have the address discussion@company.com.
240
21.2 Creating a Mailing List
Warning:
Description
A commentary on the mailing list.
Language
Selection of a language that will be used for displaying informative and error reports
related to the mailing list. Thanks to this option, it is possible to create mailing lists in
various languages on one server. Message templates for individual languages are kept in
the reports subdirectory where Kerio Connect is installed. The UTF-8 encoding is used
for the files. Administrator can modify individual reports or add anew language report
version.
241
Mailing Lists
Comment
In the Comment tab, any text can be entered that will be delivered to every member newly
subscribed in the mailing list (upper entry). In the lower part, text that will be added as
a footer to each email sent to the mailing list can be specified. These fields may be left blank.
Note: A welcome message is sent only to those new members that have subscribed to the list
via email (for details, see section21.7). Members added to the mailing list through the Kerio
Connect Administration will not receive the welcome message.
Subscription
Rules for subscription of new members can be defined on the Subscription tab.
242
21.2 Creating a Mailing List
243
Mailing Lists
244
21.3 Posting rules
Reply-To
This item specifies which address will be used in the messages as the address for replies
(the Reply-To: item in email headers):
• Sender — the address of the original sender will be kept in the header. Responses
will be sent to the original sender only. If this alternative is chosen, the message
sent to the list will not be modified.
• This list — the address of the original sender will be substituted by the list
address. This means that the responses will be sent to all list members.
• Other addresses — the address of the original sender will be substituted by a user
defined email address. Responses to the messages can be sent to a particular
person, another mailing list, etc.
• Sender + this list — this setting enables delivery of email replies to users who are
not members of the mailing lists. Two situations may arise:
245
Mailing Lists
1. The user is a member of the mailing list — the reply will be delivered to the
mailing list’s address. The sender will obtain only one copy of the reply.
2. The sender is not a member of the mailing list — the reply will be delivered
both to the mailing list and to the sender’s mailbox. Otherwise, the sender
(non-member) would not receive the reply at all.
As implied, the option is beneficial if the mailing list is available both to members
and non-members.
Note: Do not combine this option with the Hide sender’s address and replace it
with an address on the list option. The combination would be pointless and Kerio
Connect would not allow saving it.
Any user can be either a moderator or a mailing list member — the specified email address
does not have to belong to any of the domains defined in Kerio Connect. In this dialog box,
only the administrator is allowed to appoint moderators. Mailing list members may be added
either by the administrator or they can subscribe via email (if the list policy allows this option
— see above).
New moderators/members can be added manually or by selection from the list (see
figure 21.5):
246
21.4 Moderators and Members
Figure 21.5 Creating a mailing list — adding the mailing list moderators
3. A dialog is opened where you can specify email address and user’s full name (this item
is optional). Users that belong to a local domain can be found using the Find user dialog
which can be opened by the Select button.
247
Mailing Lists
1. Click on Add.
3. The Find user dialog is opened which includes list of domains and users. Multiple users
can be selected for a domain by using the default Ctrl key (where Kerio Connect is running
on Mac OS X, use the Command key).
If the user you are searching cannot be found or the user list is to long, the Show only
entries containing substring entry can be used.
1. The file including the users must be saved in CSV format (such files can be created in any
spreadsheet program).
3. Headlines of individual columns must correspond with Kerio Connect’s items. The
following items are supported:
Email FullName
248
21.4 Moderators and Members
Columns can be ordered as wish, there are no rules to be followed. It is also possible to specify
only Email. Specification of FullName is optional.
Once the file is properly created and saved, you may continue creating the mailing list or, if
the mailing list has already been created and saved, you can open it by clicking on the Edit
button and switch to the Members tab:
1. Click on Add and in the button’s menu select the Import from CSV file (see figure 21.7).
2. In the opened dialog, enter the file path (see figure 21.8).
• Columns in the file are not labeled correctly. CSV file needs to include a line with
captions including column names, otherwise Kerio Connect cannot read the data.
249
Mailing Lists
Correct version:
Email;FullName
psycho@yahoo.com;Peter Sycho
mint@email.com;Maude Int
Wrong version:
psycho@yahoo.com;Peter Sycho
mint@email.com;Maude Int
2. Select the group users of which will be imported and double-click on it (or click on Edit).
3. In the Edit mailing list dialog go to the Members tab and click on Export (see figure 21.9).
250
21.5 Mailing list archiving
4. In the dialog just opened, select between opening and saving the file. The file name will
be created by the following pattern:
users_domainName_mailingListName_date.CSV.
Note: The CSV file can now be opened in a spreadsheet or text editor.
The archive of this mailing list can be read by any user of this server
If this option is enabled, all users with accounts in Kerio Connect have read rights for the
archive.
251
Mailing Lists
If an anonymous access is allowed for the NNTP service (see chapter 6), any user can read the
archive (even if they have no account in Kerio Connect).
Message templates may be edited in any editor that supports UTF-8 encoding. The Kerio Con-
nect administrator can modify these messages and reports or create a new language version
following the guide that is included.
Member Subscription/Unsubscription
If allowed by the list policy (see chapter 21.2), members may subscribe to the list via email.
The subscription is done by sending any message (even with blank message body) to the list
address of the following form:
<name_mailinglist>-subscribe@<domain>.
Example: A user wants to subscribe to a list called discussion in the company.com domain.
He/she sends a message with an empty message body from his/her email account to the
address
discussion-subscribe@company.com.
After sending this message the user will receive an email requesting confirmation of the
subscription. Once the user sends a response to this message, the user’s request will be
accepted. This response system guarantees the authenticity of the user.
According to the mailing list policy, the user will be either subscribed or will have to wait
for confirmation of a list moderator. If subscribed successfully, the new member will receive
a welcome message.
Members can unsubscribe by email at any time. The unsubscription can be done by sending
an email message with any content in the message body (it can be left empty) to the address
of the following form:
<name_mailinglist>-unsubscribe@<domain>.
252
21.7 How to use Mailing Lists
Example: A user intends to unsubscribe from the discussion mailing list in the company.com
domain. He/she sends a message with an empty message body from his/her email account to
the address
discussion-unsubscribe@company.com.
After sending this message the user will receive an email requesting confirmation of the
unsubscription. Once the user sends a response to this message, the user’s request will be
accepted. After a response to the request is received, the user will receive a report regarding
his/her unsubscription.
Message posting
If a user intends to send a message to the mailing list, he/she must send it to the list address
(e.g. discussion@company.com). According to the policy, the message will be either delivered
to each list member (including the sender if he/she belongs to list members) or forwarded
to list moderators for approval. If the message is forwarded to a moderator, a report will be
delivered to the sender (if defined — see chapter 21.2) and the message will be sent to the list
when allowed by a moderator. If the message is denied or not allowed by a moderator within
7 days, the sender will receive a report as well.
In each mailing list, special email addresses are generated automatically. These addresses are
used for special functions, such as member login, contact addresses of the list moderators,
etc. Each of these addresses has the following form:
<mailinglist>-<suffix>@<domain>
(e.g. to send a request to the discussion mailing list help within the company.com domain,
users will send a message to: discussion-help@company.com
Here the suffixes that can be used in the list address are listed:
• owner, owners — sending a message to the list moderators (there is no need to know
their email addresses),
253
Chapter 22
Resource scheduling
Kerio Connect includes a tool for sharing and booking of resources available in your company.
Resources are meeting rooms and other facilities, such as conference rooms, meeting rooms,
cars, etc.
Users can book resources by using calendar clients which can handle events and invitations.
The following clients are officially supported:
• MS Outlook extended by the Kerio Outlook Connector — settings are focused in the
user’s guide.
• Microsoft Entourage
• Apple iCal
In email clients, resources can be scheduled through creating new events in calendars. It
works in the same way as meeting planning. In addition to adding participants to a meeting,
it is now possible to add also any resource available in the Kerio Connect’s resource list. For
more detailed guidelines for resource scheduling, refer to the user’s guide.
Resource scheduling would not be of any help if the user could not have viewed whether
the resource was free or booked for the supposed time. This is possible with the Free/Busy
calendar which is used for meeting scheduling. A calendar is needed for each resource to make
reservation in the Free/Busy calendar work. For this reason, support for resources and their
management is built in Kerio Connect. The administration interface includes section Resources
where it is necessary to add all resources of your company.
254
22.1 Resource scheduling principle
available for the scheduled time or has been booked already. If users miss a working Free/Busy
calendar, they can subscribe shared or delegated folders to access resource calendars. Users
with rights for reservation of a particular resource can subscribe the calendar with read-only
rights so that they can see in their mailboxes when the resource is free or booked.
Reservation manager
As described above, the resource scheduling is outlined so that resources are managed
separately in the system. Moreover, there is a user with special rights called resource manager
in the system who can access resource calendars and change their events, move them, remove
them or create new ones. The main role of the resource manager is to solve possible collisions
and decide on priorities.
Resources can be also temporarily disabled in the system without the need to remove it for
good. This option is helpful especially when a resource is temporarily unavailable for any
reason (e.g. a car in servicing). Disabling of a resource results in the following consequences:
• users will not see the resource in the Resources public folder,
• the calendar of the resource will not be available for subscription or delegation,
• if a user reserves a disabled resource anyway, a DNS message will inform them that
the reservation cannot be delivered.
Resource details
By default, resource calendars do not show possible notes and message subject. If you wish
that resource calendars showed such information, follow these instructions:
2. Go to the directory where Kerio Connect is installed (Kerio\MailServer) and open the
mailserver.cfg file.
3. In the configuration file, find the resource for which you wish the details to be shown.
255
Resource scheduling
1. Click on Add.
2. In the dialog on the General tab, enter a name for the resource (see figure 22.1). Bear in
mind that the name will be used as the part of the email address preceding the at sign (the
local part). Therefore, diacritics, blanks and special symbols are disallowed.
Resources are divided in rooms and devices. In Kerio WebMail, rooms can be selected as
Location for events and appointments. Therefore, respect this system and set all rooms
and locations as rooms and any other facilities (e.g. overhead projectors, whiteboards,
microphones, cars, etc.) as devices.
4. Go to the Permissions tab and add all users who will be allowed to book the particular
resource item (see figure 22.2). These users will be allowed to view the item in their
clients and book them in scheduling dialogs.
• All users from the server — any user with an email account in the particular Kerio
Connect can book the item.
• All users from the domain — any user of the specified email domain is allowed to
book the item.
256
22.2 Creating resources
• Group — the item can be booked by any member of the specified group (to define
new groups, go to Accounts → Groups in the administration interface).
5. Set a reservation manager. This user is allowed to operate with the resource calendar. The
resource manager can delete or move reservations.
The default reservation manager is the domain administrator. If you want that resources
are managed by anyone else, set them as the reservation manager (by using the Select
button).
Note: In addition of creating and removing, resource items can also be put out of the list of
resource items (e.g. when a facility needs servicing). This can be done in the particular item’s
edit dialog box by checking the Resource is available option on the General tab.
257
Chapter 23
Status Information
Kerio Connect allows the administrator (or any other person) to view its activities in great
detail. Three kinds of information are available: status, logs and statistics.
• You can view the status of the mail queue, delivery tasks and connections to particular
Kerio Connect services.
• Logs are files where information about certain events (e.g. error and warning reports,
debugging information, etc.) are recorded. For detailed information on logs, see
chapter 24.
• Statistics contain detailed information about individual Kerio Connect services usage
such as received and refused messages, errors etc. Kerio Connect can also show
graphically the number of connections to individual services as well as the number
of processed messages for a given period.
The following chapters describe what information can be viewed and how its viewing can be
changed to accommodate the user’s needs.
• The file with the .env extension is the message’s SMTP envelope. This is used only for
communication between SMTP servers and is discarded when the message is saved to
the target mailbox.
A message is sent from the mail queue either after it reaches the queue or in a time period
defined in the scheduler — see chapter 12.7 for details. If the SMTP server sends messages
straight to the target domains (i.e. no relay SMTP server is used) a situation can arise in which
the message cannot be sent (no server for the target domain is available). In this case the
message returns to the queue and is sent again later.
258
23.1 Message Queue
Note: If the server is in Offline mode, the message returns to the queue and the server attempts
to send it again in a time specified in the scheduler (Next Try is only set in Online mode). If the
server is in Offline mode (usually dial-up lines) then it is better to send messages via a relay
SMTP server.
You may wish to check the mail queue if you suspect that messages are not leaving the server.
Viewing the queue directly on the disk is not very easy, and is actually impossible if you
administer Kerio Connect remotely. For this reason it is possible to view the mail queue
directly in the Kerio Connect Administration in the Status → Message Queue section.
In addition to message queue, the tab includes also statistical data regarding current number
of messages in the queue and their total size.
Each line of this window contains information about one message in the queue. The columns
contain the following information:
ID queues
Unique message identifier. This identifier also represents the file names under which the
message is saved in the mail/queue folder.
Created
Date and time when the message entered the queue.
Next Try
Date and time of the next attempt to send the message (you can set the attempts
interval and the number of attempts in the Configuration → SMTP Server section — see
chapter 12.2). ASAP stands for As Soon As Possible. This way sending messages that are
queued for the first time — in the Online mode they are sent immediately, in the Offline
they are queued and they are sent in scheduled time.
259
Status Information
Size
The size of the message (excluding the envelope).
From, To
The sender’s and recipient’s email addresses If the From field is empty, it is a DSN
message sent by Kerio Connect.
Status
Status of the message (reason why the message has not been sent) is described in this
column.
Authenticated Sender
Primary email address of the sender’s Kerio Connect account. As well as the Sender
IP item, this information can be used for user verification and possible detection of
spammer attacks.
Sender IP
IP address of the message sender. As well as the Authenticated Sender item, this
information can be used for user verification and possible detection of spammer attacks.
You can take the following actions using the buttons under the Mail Queue window:
Remove messages
Removes the selected message from the queue. Click this button to display a menu to
select messages to be deleted from the queue. You can delete only selected messages, all
messages or messages that meet specific criteria.
Auto refresh
Information provided in the Message Queue section is refreshed automatically within
each refresh of the page.
You can also check the Auto refresh option to reload data automatically every 5 seconds.
260
23.2 Message queue processing
In the Status → Message Queue section on the Message Queue Processing tab you can view
the active processes (when the process was created, which message is being processed, which
SMTP server it is being sent to, etc.) and check their status (antivirus control, sending, local
delivery, etc.).
ID
A unique message identifier (corresponds with the message ID in the mail queue and the
filename in the mail/queue directory).
Size
The size of the message (in bytes)
From, To
The sender’s and recipient’s email addresses
Status
The process status: Executing, Backup, Content filtering (checking for forbidden
attachment types), Antivirus control, Local delivery (if the message is saved to a local
mailbox), SMTP delivery (if the message is sent to a different SMTP server),
Terminating (end phase, terminating the process). The process does not need to pass all
the above listed phases — if, for example, mail backup is disabled the Backup phase will
be skipped.
Server
The SMTP server, to which the message is sent (in the SMTP delivery phase only)
Time
The time of the whole process (the length of time from the process start to its
termination)
261
Status Information
Percent
Information about the delivery process (displays percentage that has already been sent).
Information provided in the Active Connections section is refreshed automatically within each
refresh of the page.
You can also check the Auto refresh option to reload data automatically every 5 seconds.
Active Connections
Each line of this tab contains information about one connection. These are network
connections, not user connections (each client program can establish more than one
connection at one time in order to receive or send more messages at once). The columns
contain the following information:
Protocol
The protocol type that the client is using (or service to which it is connected). Names
correspond with the names of services in the Configuration → Services section. ADMIN
means connection to the Kerio Connect Administration program.
Extensions
Information whether the connected user connects by any special module.
Secure
Defines whether or not the connection will be secured by SSL (technical note: remote
administration allows secured connection only.
262
23.3 Active Connections
Time
How long the client has been connected. The timeout is used for certain services (i.e.
if there is no data flowing through the connection for a certain period of time, the
connection is terminated).
From
IP address from which the client is connected. The DNS name of the client can be
displayed here if the option Enable reverse DNS lookup for incoming connection is enabled
in the Configuration → Advanced Options section (see chapter 12.8). We recommend you
to enable this option only if you intend to monitor where clients connect from since
reverse DNS queries slow down traffic on the server.
User
The name of the connected user. In some cases the name is not displayed (for example
connections to the SMTP server — if user authentication is not required, the user remains
anonymous).
Info
More information about the connection (e.g. IMAP folder, administration program
version, etc.).
Information provided in the Active Connections section is refreshed automatically within each
refresh of the page.
You can also check the Auto refresh option to reload data automatically every 5 seconds.
The table on this tab lists all users connected to the Kerio WebMail interface. Each row of the
table contains information about a user (his/her email address), IP address used for connection
to Kerio Connect and the time when the connection ends.
263
Status Information
User
A user connected via Kerio WebMail to Kerio Connect.
Client address
IP address of the computer used for connection to Kerio Connect.
Expires
After a certain time of inactivity (1 hour), Kerio WebMail logs out users automatically for
security reasons.
Component
Three different components can be used to connect to the server: Kerio Web-
Mail (WebMail), Kerio WebMail Mini (WebMail Mini) and Kerio Connect Administration
(Administration).
Protocol
Type of protocol used for the connection — HTTP or HTTPS.
Information provided in the Active Connections section is refreshed automatically within each
refresh of the page.
You can also check the Auto refresh option to reload data automatically every 5 seconds.
264
23.5 Traffic Charts
Name
Name of the user folder following the ~user_name@domain/folder name pattern
Users
All users whose folder is currently opened are involved. Multiple users can be listed in
case of public or shared folders.
Reference count
Total number of users whose folder is currently opened. Multiple users can be listed in
case of public or shared folders. It is also possible that a folder is opened more than once
by a user.
Index loaded
This item informs if the index.fld file has been uploaded by the server. This file allows
various additional information display properly (flags, read-unread information, etc.).
Information provided in the Opened Folders section is refreshed automatically within each
refresh of the page.
You can also check the Auto refresh option to reload data automatically every 5 seconds.
Monitored parameter
Use the first field to choose the monitored parameter:
• Connections / HTTP — the number of connections to the HTTP service
• Connections/IMAP — the number of connections to the IMAP service
• Connections / LDAP — the number of connections to the LDAP service
• Connections / NNTP — the number of connections to the NNTP service
• Connections / Outgoing SMTP — the number of outgoing connections of the SMTP
service
• Connections / Rejected SMTP — number of rejected connections to the SMTP
service (connections blocked by the Spammer repellent filter)
• Connections/POP3 — the number of connections to the POP3 service
• Connections/SMTP — the number of connections to the SMTP service
• Messages / Received — the number of messages processed by the mailserver (the
total of outgoing and incoming SMTP messages and messages downloaded from
remote POP3 mailboxes)
• Messages / Spam — number of messages marked as spam by the antispam filter
265
Status Information
Time range
In the second field you can choose the time range you wish to monitor (the range can be
from 2 hours to 30 days). The selected time range is always understood as the time until
now (“last 2 hours”, “last 30 days”, etc.).
The legend below the graph shows the sampling interval (i.e. the time for which a sum of
connections or messages is counted and is displayed in the graph).
Example: If 2 hours is selected as the time range the sampling frequency is 20 seconds. This
means that a number of connections and/or messages is counted for the last 20 seconds and
is written into the graph.
The graph reloads automatically in an interval matching the sampling interval.
23.6 Statistics
Statistical data is displayed using the Status → Statistics section. Statistics are divided into
groups for better readability (e.g. “Storage Occupied”, “Messages sent to parent SMTP server”,
“Client POP3 statistics”, etc.). In each table, data of the same topic are gathered.
The Statistics section includes several buttons:
266
23.6 Statistics
Refresh
This button refreshes data provided in the statistics.
Reset
This button resets the statistics.
Save as...
Use this button to save the table with the current statistics as an HTML file.
Basic/Advanced mode
The statistics work in two modes:
• Basic mode — this mode involves only four most popular statistics — Server
Status, Storage Occupied, Antivirus Statistics and Spam Filter Statistics.
• Advanced mode — includes all statistics.
Warning:
All statistics are started upon the first startup of Kerio Connect or the last reset of the
statistics. In the lower right-hand corner in the Statistics section, date and time when the
statistics were started is provided.
267
Chapter 24
Logs
Logs are files where information about certain events (e.g. error and warning reports,
debugging information, etc.) are recorded. Each item is represented by one row starting
with a timestamp (date and time of the event). Events reported are in English only (they are
generated by the Kerio Connect Engine).
Save log
The Save log option enables saving of the entire log or its selected part in any file on the
disk.
The dialog options are as follows:
268
24.1 Log Settings
• Format — the log may be saved as in plain text (TXT) or in hypertext (HTML). If
the log is saved in HTML, the encoding and colors (where highlighting was used)
will be saved. If it is expected that the log would be processed by a script, it might
be better to save it in plain text.
• Source — the option enables saving of the entire log or a selected part of the text.
The Only selection option is not active by default. Once a part of the text in the
log is selected by the pointer, the option becomes active and the selected text can
be saved.
Highlighting
Kerio Connect enables to highlight any part of text in logs. This function is used for better
reference.
Click Highlighting to open a dialog box where highlighting can be added, changed and
removed by using the typical Add, Remove and Change Color buttons.
Log Settings
Select this option to open the Log debug dialog where you can set parameters for clearing
or saving logs.
The File Logging tab
269
Logs
• Enable logging to file — enables logging to a specified file. Use the File name entry
to specify a path where logs will be saved.
• Rotate regularly— select one of the following options:
• Every hour — log is saved once an hour and a new log file is started.
• Every day — log is rotated once a 24 hours.
• Every week — log is rotated once a week.
• Every month — log is rotated once a month.
• Rotate when file exceeds size — set maximum log file size (in kBs) in Max log file
size.
• Keep at most ... log file(s) — define how many log files will be stored. The oldest
file will be cleared after each rotation.
The External Logging tab
Open the External Logging dialog to set logging to a Syslog server or to a file. The three
options can be combined.
• Enable Syslog logging — use this option to enable logging to a Syslog server
• Syslog server — DNS name or IP address of the particular Syslog server.
• Facility — this entry helps Kerio Connect recognize where a log came from (Syslog
server can receive logs from various sources).
• Severity — set how important the log is (Syslog enables filtering of logs with
respect to their severity).
Clear log
Clears the log window (information is also removed from the appropriate file).
270
24.2 Config
Messages
Advanced parameters for the logs can be set using this option (for details, see below).
Available only in the Debug section.
24.2 Config
The Config log keeps complete history of configuration changes — this log tells us which user
performed individual administration tasks and when.
• [30/Jun/2004 13:09:48] — the date and time when the log was created
• Admin — the name of the user logged in for Kerio Connect administration.
271
Logs
• insert User set Name=’jwayne’... — parameters that were specified for the
new account
Other changes in configuration
A typical example is the backup cycle. After the Use button in Configuration / Backup
section is pressed, the time and date of each backup is inserted into the Config log.
[30/Jun/2004 09:29:08] Admin - Store backup started
• [30/Jun/2004 09:29:08] — date and time when the backup was started
• Admin — the name of the user logged in for Kerio Connect administration.
• Store backup started — information that the backup was started
24.3 Mail
The Mail log contains information about individual messages processed by Kerio Connect. The
log includes all message types:
• incoming messages,
• outgoing messages,
• [30/Nov/2005 17:57:14] — the date and time when the message was delivered
or sent.
• Recv/Sent — this section provides information whether the server has already
received the message or the message is just being sent. The status can therefore
be Sent or Recv (i.e. Received).
• Queue-ID: 438d6fb6-00000003 — the number generated by the server in the
queue of outgoing messages. It is an identifier which uses identical numbers for
all log lines associated with one messages. Each message is first received by the
272
24.3 Mail
server, then it is sent. This implies that at least two log lines must belong to each
message (for reception and sending). Moreover, each message can be delivered
to multiple users (each addressee has a special log line).
• Service: HTTP — protocol, that has been used by the server to receive the
message (HTTP, SMTP). This information is included in incoming messages only.
The information is not displayed for outgoing messages, it would be meaningless.
All outgoing messages are sent by SMTP.
• From: <jwayne@company.com> — email address of the sender.
• To: <jwayne@company.com> — email address of the recipient.
• Size: 378 — size of the message in bytes.
• User: jwayne@company.com — user account from which the message was sent.
• Sender-Host: 195.39.55.2 — IP address of the computer from which the
message has been sent.
• SSL: yes — informs whether the connection is SSL-secured (displayed for SMTP
only).
• Recipient: <thenry@company.com> — email address of the addressee.
• Result: delivered — information about the result of the delivery process.
• Status: 2.0.0 — code of the SMTP response (for detailed information, see
RFC 821 and 1893). If the code starts with the 2 digit, the message was delivered
successfully. If the code starts with the 4 or the 5 digit, the message delivery
failed.
Server-generated messages
Messages of this type are usually generated by Kerio Connect. If the delivery fails, the
sender receives a delivery status notification (DSN).
[30/Nov/2005 15:31:40] Recv: Queue-ID: 438db7cc-00000000,
Service: DSN, From: <>, To: <jwayne@company.com>, Size: 1650,
Report: failed
• [30/Nov/2005 15:31:40] — the date and time when the message was generated
• Recv: — this section provides information whether the server has already
received the message or the message is just being sent. The status can therefore
be Sent or Received.
• Queue-ID: 438db7cc-00000000 — the number generated by the server in the
queue of outgoing messages.
• Service: DSN — Delivery Status Notification; messages generated by Kerio Con-
nect.
• From: <> — this item is empty because the message was generated by the mail
server.
• To: <jwayne@company.com> — email address of the recipient.
• Size: 1650 — message size in bytes.
• Report: failed — the type of notification.
273
Logs
• [30/Nov/2005 19:09:11] — date and time when the message was received.
• Recv: — this section provides information whether the server has already
received the message or the message is just being sent. The status can therefore
be Sent or Received.
• Queue-ID: 438deac7-00000009 — the number generated by the server in the
queue of outgoing messages.
• Service: List — mailing list flag.
• <discussion@company.com> — email address of the sender.
• To: <jwayne@company.com> — email address of the recipient.
• Size: 1397 — size of the message in bytes.
• Answer: subscribe response — type of message.
Sieve
Messages generated by a user filter (e.g. autoreply).
24.4 Security
The Security log contains information related to Kerio Connect’s security. It also contains
records about all messages that failed to be delivered. The security log contains the following
types of events:
Viruses and forbidden attachments detected
Example: a message that contains a virus:
[16/Jun/2004 18:37:17] Found virus in mail from
<missgold18@hotmail.com> to <support@kerio.com>:
W32/Netsky.p@MM
• [16/Jun/2004 18:37:17] — the date and time when the virus was detected.
• Found virus in mail — action performed (information that the virus was
found).
• from <missgold18@hotmail.com> — email address of the sender.
• to <support@kerio.com> — email address of the recipient.
• W32/Netsky.p@MM — the type of virus contained in the message.
Messages rejected by spam filter
A message with high spam score:
[16/Jun/2004 18:37:17] Message from <missgold18@hotmail.com>
to <support@kerio.com> rejected by spam filter: score 9.74,
274
24.4 Security
threshold 5.00
• [16/Jun/2004 18:37:17] — the date and time when the message was rejected.
• from <missgold18@hotmail.com> — email address of the sender.
• to <support@kerio.com> — email address of the recipient.
• rejected by spam filter — action performed (rejection by spam filter).
• score 9.74, threshold 5.00 — SpamAssassin evaluation.
275
Logs
Antibombing
Server overload protection — see chapter 12.2, section Security Options.
[16/Jun/2004 18:53:43] Directory harvest attack from
213.7.0.87 detected
• [13/Apr/2004 17:44:02] — the date and time when the message was received.
• 212.76.71.93 — IP address used for sending the message.
• found in DNS blacklist ORDB — type of action (the address was found in
a database of blacklisted servers).
• from <emily.macdonald@nmc-uk.org> — email address of the sender.
• to <support@kerio.com> — email address of the recipient.
Wipe
User’s mobile device got lost or stolen and the administrator wiped all user data out of
the device (for details, see section 36.5).
Three types of records regarding wipe are used in the Security log. The first record
informs about initiation of the wipe process. This record is always included. At this stage,
the wipe process can be stopped. The second record type appears if the wipe process
is stopped and cancelled. The third record is logged if the wipe process is completed
successfully. The wipe is applied upon the next connection of the device to the server.
• An example of a record of an initiation of the wipe process is provided below:
[22/Aug/2006 12:30:23] Device with id
C588E60FCF2FB2C107FBF2ABE09CA557(user: jwayne@company.com)
will be wiped out by request Admin
• An example of a record of a cancellation of the wipe process is provided below:
[22/Aug/2006 12:36:51] Wiping out of the device
C588E60FCF2FB2C107FBF2ABE09CA557 (user: jwayne@company.com)
has been cancelled by Admin
• The third example shows information about successful wipe-out of the data on
276
24.5 Warning
the device:
[22/Aug/2006 12:31:11] Device C588E60FCF2FB2C107FBF2ABE09CA557
(user: jwayne@company.com), connected from: 192.168.44.178
has been irrecoverable wiped out
24.5 Warning
The Warning log displays warning messages about errors of little significance. Typical
examples of such warnings are messages stating that a user with administrator rights has
a blank password, that a user account of a given name does not exist or that a remote POP3
server is unavailable.
Events causing display of warning messages in this log do not greatly affect Kerio Connect’s
operation. They can, however, indicate certain (or possible) problems. The Warning log can
help if for example a user is complaining that certain services are not working.
24.6 Operations
The Operations log gathers information about removed and moved items (messages, contacts,
events, tasks and notes) in user mailboxes. It is helpful especially if a user does not manage to
find a particular message in their mailbox. The log tells us whether the desired message has
not been removed.
In addition to the items related information, the log also includes information about removing
and moving any folders in mailboxes.
Besides removals, the log also gathers information about moving folders (it treats them as
subfolders removed from the particular folder). Moving of folders is marked by a special flag.
277
Logs
Folder removal
[07/Aug/2008 12:14:57] {DELETE_FOLDER} Folder:
~jpalmer@company.com/Deleted Items/Work deleted
Folder movement
[07/Aug/2008 12:14:26] {MOVE_FOLDER} Protocol: HTTP/WebMail,
User: jpalmer@company.com, IP: 127.0.0.1, Old location:
~jpalmer@company.com/INBOX/Work&AO0-, New location:
~jpalmer@company.com/Deleted Items/Work, Items count: 3
24.7 Error
In contrast to the Warning log, the Error log displays errors of great significance that usually
affect the mailserver’s operation. The Kerio Connect administrator should check this log
regularly and try to eliminate problems found here. If this is not done, users are in danger
of not being able to use certain (or even all) services. They may also lose their messages or
security problems may occur (the mailserver can for example be misused to send spam email
or virus-infected email).
Typical error messages displayed in the Error log pertain to: service initiation (usually due to
port conflicts), disk space allocation, antivirus check initialization, improper authentication of
users, etc.
278
24.8 Spam
24.8 Spam
The Spam log displays information about all spam emails stored in Kerio Connect. Information
about individual spam messages are displayed in rows. The logs differ according to the mode
of spam detection. The Spam log lists also messages that have been marked as spam by Kerio
Connect, but the user marked them as regular messages.
• [06/Sep/2004 08:43:17] — date and time when the spam was detected.
• Message marked as spam with score: 8.00 — type of action (the message
was marked as spam because the score evaluated by spam filter was too high).
• To: jwayne@company.com — email address of the recipient.
• Message size: 342 — message size in bytes.
• From: wsmith@company.com — email address of the sender.
• Subject: — the subject of the message (empty in this case).
• [06/Sep/2004 08:40:39] — date and time when the message was marked as
spam.
• User jwayne@company.com — email address of the recipient.
• marked a message as spam — type of action (the message was marked as spam
by user).
• Folder: ~jwayne@company.com/INBOX — the folder where the message is
stored
• Size: 462 — message size in bytes.
• From: "Winston Smith" <wsmith@company.com> — email address of the
sender.
• Subject: Hallo — the subject of the message.
279
Logs
• [06/Sep/2004 08:43:32] — date and time when the message was marked as
not spam.
• User: jwayne@company.com — email address of the recipient.
• marked a message as not spam — type of action (the message was marked as
not spam by user).
• Folder: ~jwayne@company.com/Junk E-mail — the folder where the
message is stored (in this case, the folder for spam messages is required).
• Size: 500 — message size in bytes.
• From: "Winston Smith" <wsmith@company.com> — email address of the
sender.
• Subject: **SPAM** — the subject of the message.
Warning:
In addition, displaying too much information slows Kerio Connect’s performance. We
recommend that you only display information that you are interested in and only when
necessary.
280
24.9 Debug Log
Message Delivery
The Message Delivery section provides options for logging while message delivery is in
progress:
• Queue Processing — processing of the Mail Queue (sending and receiving
messages, re-scheduling, etc.)
• Remote POP3 Download — retrieval of remote POP3 mailboxes (Kerio Connect
in the role of a POP3 client) and sorting rules (when a message is received or
downloaded from a remote POP3 mailbox). The Remote POP3 download log
together with Alias Expansion can be helpful when you experience problems with
281
Logs
domain mailbox.
• SMTP Client — sending outgoing mail (communication between Kerio Connect
and the relay SMTP server or the target domain’s server). The log includes
commands and responses of the client and the server ordered by time when
individual events happened. Therefore, this log can be very helpful for resolving
problems regarding email sending.
• Mailing List Processing — mailing lists monitoring (logins, logouts, message
sending, moderators performance, etc.).
• Alias Expansion — processing of aliases (during reception of a message or its
download from a remote POP3 mailbox). The Alias processing log is used together
with Remote POP3 download to solve problems with domain mailbox sorting.
• Sieve Filters — filtering messages according to user filters.
Content Filters
The Content Filters section includes options for enabling/disabling logs tracing antivirus
and antispam control:
• Antivirus Checking — communication with the antivirus program, processing of
individual message attachments. This log can be used if the infected messages
are not detected by an antivirus program and are delivered to users.
• Spam Filter — the option logs spam rating of each message which has passed
through the Kerio Connect’s antispam filter.
• SPF Record Lookup — the option gathers information of SPF queries sent to SMTP
servers. It can be used for solving problems with SPF check.
• SpamAssassin Processing — the option enables tracing of processes occurred
during SpamAssassin antispam tests.
Message Store
The Message Store section enables logging of operations associated with data store,
searching, backups, etc.:
• Message Folder Operation — operations with user and public folders (opening,
saving messages, closing)
This log can be used for example to resolve problems regarding mapping of
public folders.
• Searching and Sorting — this log includes operations that server performs while
searching in email, calendars, contacts and tasks folders. Also operations
performed during sorting (e.g. alphabetical sorting of email messages, sorting
by date of reception, etc.) are logged.
• Quota and Login Statistics— the log may be helpful especially where a problem
regarding user quotas and related issues occurs.
• Store Backup — the report lists the backup process, browsing and backing up of
all folders. Use this report to be sure if the backup process is correct and if it
was not interrupted.
• Messages decoding — this log may be helpful where problems regarding decoding
of TNEF or uuencode messages occur.
282
24.9 Debug Log
• Items clean-out — this log helps scrutinize issues regarding automatic clean out
of messages in the Junk E-Mail and Deleted Items folders.
HTTP Server Modules
The HTTP Server Modules provides options that enable logging information regarding
traffic over an HTTP interface:
• WebDAV Server Requests — the log lists all operations related to the WebDAV
interface. It is useful especially for solving communication issues between Kerio
Connect and MS Entourage, NotifyLink, Kerio Sync Connector and iCal clients.
• PHP Engine Messages — the log gathers information related to the Kerio WebMail
interface. This information is an extension to the Error log and it can be used for
troubleshooting of Kerio WebMail issues.
• ActiveSync Synchronization — this log lists ActiveSync traffic performed between
mobile devices and Kerio Connect.
• KOC Offline Requests — this log helps shoot down issues that might occur in
communication between the Kerio Outlook Connector (Offline Edition) and Kerio
Connect.
• Kerio Blackberry Connector — this log helps to shoot problems with data
synchronization between Kerio Connector for BlackBerry and Kerio Connect
Auxiliary Modules
The Auxiliary Modules section provides the following logging options:
• User Authentication — external authentication of users (NT domain, Kerberos,
PAM)
• Network Connections and SSL — establishing connections to remote servers (on
the TCP level), DNS requests, SSL encrypting, etc.
• DNS Resolver— finding target domain SMTP servers through DNS MX record
lookup
• Directory Service Lookup — queries to the internal user database (Active Direc-
tory). This log can be used in case of problems with import of users from local
domains.
• Update Checker Activity — monitors communication with the update.kerio.com
server where new versions of Kerio Connect are stored.
• Thread Pool Activity — describes establishing, progress and closing of any
threads processed by Kerio Connect.
• Administration Console Connections — logs connections and activity of the Kerio
Administration Console.
• Domain rename — the log records events associated with domain renaming
processes.
• Connection Pool — the log records information about active and inactive HTTP
connections of Kerio Connect.
• Crash Management Activity — this option is shown only if Kerio Connect is
installed on Mac OS X. The log monitors the Mac Assist utility which gathers
information on failure of the spamserver, avserver or mailserver process and
283
Logs
Local Services
The Local Services section controls local services of Kerio Connect:
• Service Manager — it can help you target local services in general (message queue,
resource scheduling issues, etc.).
• Resource Service — it helps you target resource scheduling issues.
• GAL Service — this option may help you shoot down issues regarding contact
synchronization with the Global Address List.
• Distributed Domain Service — allows recording of all operations associated with
the distributed domain.
In Performance Monitor, open the System Monitor section. To add new objects for monitoring,
open the dialog window by clicking on the + button.
284
24.10 Performance Monitor (under Windows)
In Performance object select the Kerio Connect item. In the left button at the bottom select
statistics that you want to monitor. You can use any of the statistics offered by Kerio Connect
(see chapter 23.6, or the Status → Statistics section in the administration interface). Click on
the Explain button to get more information about the selected object.
Note:
• If the Kerio Connect item is not displayed in the Performance object field in the
object list, the Performance Monitor plug-in is not installed or it is incomplete. We
recommend running the Kerio Connect installation program again (see chapter 2.4).
• For detailed information about Performance Monitor see Help in Windows.
285
Chapter 25
Folder Administration
• mail folders
• contacts
• calendars
• tasks
• notes
It depends on the email client whether all folder types can be used. Kerio Connect officially
supports MS Outlook and MS Entourage, and both of these clients support all listed folder
types. All folders can be also accessed also from the Kerio WebMail interface and some of the
supported mobile devices.
Besides the folder types listed above, folders can be either personal or public. Personal folders
can be managed, viewed, created and deleted by a particular user in his/her own mailbox.
Public folders, on the other hand, can be created and managed by special access right, while
viewed by any user. Detailed description on public folders is provided in the following section.
By default (upon their creation), public folders are available to all users in the read only mode.
It is naturally possible to change their access rights as in case of other folders.
And what are public folders for? Above all, they can help share information across the
company. The most frequently used public folder is the contact folder including all contacts
in the company. This folder can be also generated automatically of the Kerio Connect’s user
accounts. Another well understandable example is a special calendar where all company
events, trainings and resource reservations (bookings of OHPs, meeting rooms, etc.) are
scheduled.
Public folders can be created only by users with appropriate access rights. By default, these
rules are assigned to the administrator of the Kerio Connect’s primary domain (the special
286
25.1 Public folders
administration account and its facilities are focused in section 8.1). This person can then
assign rights to any other users.
2. Click on the Public Folders button located in the right bottom corner of the window.
3. This opens a dialog where you can select one of the options (see figure 25.1).
Caution:
If you need to change this option when the system of public folders has already
been created, bear in mind that public folders will not show when viewed by users
and it will be necessary to create new ones.
Public folders can be created either in MS Outlook (extended with the Kerio Outlook Connector)
or in the Kerio WebMail interface or in MS Entourage.
In either case, new public folders are created by the same method as private folders. Check
the following example:
1. Open MS Outlook extended with working Kerio Outlook Connector or Kerio WebMail as an
administrator of the primary domain or as a user with rights for creation of public folders
(rights and their settings are described in section 25.1.3).
287
Folder Administration
2. In the folder tree, select the Public folders root and create a new folder as if you created
a private folder (using the context menu).
3. Once the folder is created, all users have the read only access to it automatically. If
you want to assign improved privileges to any user, follow the standard sharing settings
(details are provided in Kerio Connect 7, User’s Guide).
Public folders will be shared automatically with all selected users as subfolders of the Public
folders root.
Rights for public folders can be assigned by any user with Kerio Connect administration rights:
2. Use the cursor to select the user to assign rights to and open the settings dialog (e.g. by
the Edit button).
3. In the dialog, go to the Rights tab and enable option This user has the administrator rights
to the public folders.
288
25.2 Viewing public folders in individual account types
289
Chapter 26
Kerberos Authentication
• MS Windows — logs are located in the Start → Settings → Control Panel → Administra-
tive Tools → Event Viewer menu
However, this applies only to the Kerberos client. Logging of traffic at the server’s side
can be performed by adding the following configuration into the /etc/krb5.conf file:
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
Note: Settings of logging at the server’s side is regards Kerberos MIT (US
implementation of Kerberos applied in the Active Directory and the Apple Open Di-
rectory). Setting of Kerberos Heimdal logging (European implementation of Kerberos
which can be found in several Linux distributions) may be different. 6
• Mac OS X Server — logs in the Server Admin application (see chapter 26.4)
• Kerio Connect — logs can be found in the Logs section of the administration interface.
In this case, the Warning, Error and Debug logs are to be considered (User Authentica-
tion must be running). For detailed description on individual logs, refer to chapter 24.
6 The Kerberos Heimdal’s client is also included in the Linux installation packages of Kerio Connect. It is, however, not
important which version is used on the server (Key Distribution Center) and which is used at the client (Kerio Connect
in this case) since the protocol is the same and no problems should occur in the cooperation of the server and the
client side.
290
26.1 Kerio Connect on Windows
Specify the domain name in the Advanced dialog (see figure 26.1) and ensure that:
2. Kerio Connect uses Active Directory Controller as the primary DNS server — this should
be done automatically by adding the host in the domain (see item 1).
If the network configuration requires authentication against multiple domain controllers
at a time, add all domain controllers where Kerio Connect will be authenticated as DNS
291
Kerberos Authentication
servers. In this case, however, a special configuration of DNS servers is required. Either it
is necessary to set DNS servers to forward queries to each other (if the query is not found
in the proper database, it is forwarded to the domain controller) or all DNS servers must
share the same primary parent DNS server.
3. time of Kerio Connect and Active Directory is synchronized — this should be done
automatically by adding a host to the domain (see item 1).
2. DNS server (IP address or DNS name of the computer where Apple Open Directory is
running) is set correctly at the computer with Kerio Connect.
3. time of Kerio Connect and Open Directory is synchronized — this should be done
automatically by adding a host to the domain (see item 1).
Warning:
Within authentication against a standalone Kerberos server Kerio Connect does
not save user passwords in its database.
2. DNS server must be set correctly at Kerio Connect’s host (Key Distribution Center uses DNS
queries).
3. Time of Kerio Connect and Key Distribution Center (all hosts included in the Kerberos
area) must be synchronized.
292
26.2 Kerio Connect on Linux
Using the Kerbtray utility, it is possible to test whether Kerio Connect is able to authenticate
against the Key Distribution Center.
This can be checked from the computer where Kerio Connect will be installed. To check
authentication from MS Windows, use the Kerbtray utility (see figure 26.2) which can be
downloaded for free at the Microsoft’s website. If no allocated tickets are found by Kerbtray,
authentication does not work and it is necessary to enable it in KDC and start it.
When the previous steps are followed successfully, set authentication in Kerio Connect on the
Advanced tab under Configuration → Domains, (see chapter 7.7.
293
Kerberos Authentication
1. Kerio Connect’s host uses the domain controller of the Active Directory domain as the
primary DNS server.
If the network configuration requires authentication against multiple domain controllers
at a time, add all domain controllers where Kerio Connect will be authenticated as DNS
servers.
2. Time of the Kerio Connect host and the Active Directory must be synchronized.
[libdefaults]
ticket_lifetime = 24000
default_realm = COMPANY.COM
dns_lookup_realm = false
dns_lookup_kdc = yes
[realms]
COMPANY.COM = {
kdc = server.company.com
admin_server = server.company.com
default_domain = company.com
}
[domain_realm]
.company.com = COMPANY.COM
company.com = COMPANY.COM
[kdc]
profile = /var/kerberos/krb5kdc/kdc.conf
[appdefaults]
pam = {
debug = false
ticket_lifetime = 36000
renew_lifetime = 36000
forwardable = true
294
26.2 Kerio Connect on Linux
krb4_convert = false
}
If authentication against the Kerberos server works in full functionality, it is possible to set
authentication at Kerio Connect. To set this, go to the Directory Service a Advanced tabs in
Configuration → Domains.
1. Kerio Connect must belong to the Kerberos area (Open Directory domain) against which it
authenticates. If Kerio Connect is not the area member, the Kerberos system will not be
working and the users will have to use a local password, i.e. different from the password
for the domain.
2. The DNS service must be set correctly on the Kerio Connect’s host.
3. Time of the Kerio Connect host and the Open Directory must be synchronized.
[libdefaults]
ticket_lifetime = 24000
default_realm = COMPANY.COM
dns_lookup_realm = false
dns_lookup_kdc = yes
[realms]
COMPANY.COM = {
kdc = server.company.com
admin_server = server.company.com
default_domain = company.com
}
[domain_realm]
.company.com = COMPANY.COM
company.com = COMPANY.COM
295
Kerberos Authentication
[kdc]
profile = /var/kerberos/krb5kdc/kdc.conf
[appdefaults]
pam = {
debug = false
ticket_lifetime = 36000
renew_lifetime = 36000
forwardable = true
krb4_convert = false
}
If authentication against the Kerberos server works in full functionality, it is possible to set
authentication at Kerio Connect. To set this, go to the Directory Service a Advanced tabs in
Configuration → Domains.
• usernames and passwords of all users created in Kerio Connect must be defined
in the Key Distribution Center (required for authentication in Kerberos).
Warning:
Within authentication against a standalone Kerberos server Kerio Connect does
not save user passwords in its database.
2. The DNS service must be set correctly at Kerio Connect’s host (Key Distribution Center uses
DNS queries).
3. Time on the Kerio Connect host must be synchronized with time at the Key Distribution
Center (all hosts included in the Kerberos area needs synchronized time).
296
26.2 Kerio Connect on Linux
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
[libdefaults]
ticket_lifetime = 24000
default_realm = COMPANY.COM
dns_lookup_realm = false
dns_lookup_kdc = yes
[realms]
COMPANY.COM = {
kdc = server.company.com
admin_server = server.company.com
default_domain = company.com
}
[domain_realm]
.company.com = COMPANY.COM
company.com = COMPANY.COM
[kdc]
profile = /var/kerberos/krb5kdc/kdc.conf
[appdefaults]
pam = {
debug = false
ticket_lifetime = 36000
renew_lifetime = 36000
forwardable = true
krb4_convert = false
}
Using the kinit utility, it is possible to test whether Kerio Connect is able to authenticate
against the Key Distribution Center Simply open the prompt line and use the following
command:
for example:
297
Kerberos Authentication
If the query was processed correctly, you will be asked to enter password for the particular
user. Otherwise, an error will be reported.
Then, perform corresponding settings in Kerio Connect (see chapter 7.7).
298
26.3 Kerio Connect on Mac OS X
1. Open the System Preferences application and click on Network (see figure 26.3)
2. to open the Network dialog box. On the TCP/IP tab, specify the IP address of the Active
Directory server in the DNS servers entry.
To connect the computer to the Active Directory domain, use the Directory Access utility (Appli-
cations → Utilities) which is included in all basic Apple Mac OS X systems. For the configuration,
follow these instructions:
1. Run the Directory Access application and enable the Active Directory service in the Services
section (see figure 26.4). Enter authentication name and password. The user who makes
changes in the application needs administration rights for the system.
299
Kerberos Authentication
2. Enable the service, click on Configure and specify the Active Directory domain name (see
figure 26.5).
3. Click on Bind and set username and password for the Active Directory, administrator.
The administrator will be allowed to add computers to the Active Directory domain (see
figure 26.6).
If all settings are done correctly, it will take only a few seconds to connect the computer to the
domain.
Kerberos settings
Once Mac OS X is successfully connected to the Active Directory domain, the special
edu.mit.Kerberos file is created in the /Library/Preferences/ directory. Make sure that
the file has been created correctly. You can use the following example for comparison:
# WARNING This file is automatically created by Active Directory
# do not make changes to this file;
# autogenerated from : /Active Directory/company.com
300
26.3 Kerio Connect on Mac OS X
# generation_id : 0
[libdefaults]
default_realm = COMPANY.COM
ticket_lifetime = 600
dns_fallback = no
[realms]
COMPANY.COM = {
kdc = server.company.com. :88
admin_server = server.company.com.
}
Using the kinit utility, it is possible to test whether Kerio Connect is able to authenticate
against the Active Directory Simply open the prompt line and use the following command:
for example:
If the query was processed correctly, you will be asked to enter password for the particular
user. Otherwise, an error will be reported.
Kerio Connect can either be installed on the server with the Apple Open Directory directory
service or on another server.
If Kerio Connect is installed on the same server as Open Directory, it is not necessary to
perform any additional configuration besides installation of the Kerio Open Directory Extension
installation. If it is installed on another computer, external authentication through Kerberos
to Open Directory must be set.
Kerio Connect can be installed on servers with Mac OS X 10.3 and higher. The settings are
similar for both versions. The following description applies to configuration on Mac OS X
10.4, any discrepancies will be mentioned.
2. On the Services tab, check the LDAPv3 item (see figure 26.7).
301
Kerberos Authentication
3. On the Services tab, use the mouse pointer to park the DAPv3 item and click on Configure.
5. This will open a dialog box where IP address and name of the server can be specified. Enter
IP address or DNS name of the server where the Apple Open Directory service is running.
Once the server is specified, click on the Manual button (not necessary in the Mac OS X
10.3 version) and enter a name in the Configuration name text box (this item is used for
reference only).
6. Save the configuration and select Open Directory Server in the LDAP Mappings menu.
7. Once Open Directory Server is selected, the dialog for specification of the search suffix
is opened (Search Base Suffix). The suffix must be entered as shown in the example in
figure 26.8:
od.company.com → dc=od,dc=company,dc=com
302
26.3 Kerio Connect on Mac OS X
The figure implies that the suffix must be specified as follows: dc=subdomain,dc=domain.
Number of subdomains in the suffix must meet the number of subdomains in the server’s
name.
8. Now, authentication will be set for the Open Directory server. Switch to the Authentication
tab (see figure 26.9).
10. Enter the name of the Open Directory server to the Directory Domains list. Click on Add.
The Directory Access application automatically enters the Open Directory name specified
on the previous tab. Simply confirm the offer.
303
Kerberos Authentication
ticket_lifetime = 600
dns_fallback = no
[realms]
COMPANY.COM = {
kdc = server.company.com. :88
admin_server = server.company.com.
}
Using the kinit utility, it is possible to test whether Kerio Connect is able to authenticate
against Kerberos. Simply open the prompt line and use the following command:
kinit -S host/server_name@KERBEROS_REALM user_name@REALM
for example:
kinit -S host/od.company.com@COMPANY.COM thenry@COMPANY.COM
If the query was processed correctly, you will be asked to enter password for the particular
user. Otherwise, an error will be reported.
Now, simply change configuration in Kerio Connect:
304
26.3 Kerio Connect on Mac OS X
parameters on the Directory Service and the Advanced tabs (the Apple Open Direc-
tory realm must be specified in the Kerberos 5 entry)
Warning:
Kerberos realm specified on the Advanced tab must be identical with
the name of the Kerberos realm specified in the file
/Library/Preferences/edu.mit.Kerberos
In particular, it must match the default_realm value in this file. By
result, the line may be for example default_realm = COMPANY.COM
• usernames and passwords of all users created in Kerio Connect must be defined
in the Key Distribution Center (required for authentication in Kerberos).
Warning:
Within authentication against a standalone Kerberos server Kerio Connect does
not save user passwords in its database.
2. The DNS service must be set correctly at Kerio Connect’s host (Key Distribution Center uses
DNS queries).
3. Time on the Kerio Connect host must be synchronized with time at the Key Distribution
Center (all hosts included in the Kerberos area needs synchronized time).
305
Kerberos Authentication
Using the kinit utility, it is possible to test whether Kerio Connect is able to authenticate
against Kerberos. Simply open the prompt line and use the following command:
for example:
kinit -S host/mail.company.com@COMPANY.COM
If the query was processed correctly, you will be asked to enter password for the particular
user. Otherwise, an error will be reported.
When the previous steps are followed successfully, set authentication in Kerio Connect on the
Advanced tab under Configuration → Domains, (see chapter 7.7.
After Mac OS X Server’s startup, make sure that both the Open Directory service and the
Kerberos server are running. This can be done in the Server Admin application (Applications
→ Server → Server Admin).
The welcome dialog of Server Admin consists of two basic sections. The left one includes
a list of hosts and services which are running at these hosts. This section also includes the
host where the Open Directory service is supposed to be started. If the service is already
running, it is bold and marked with a green symbol (see figure 26.10).
306
26.4 Starting Open Directory and Kerberos settings
The right section usually includes information about the selected service, its logs and settings.
The directory service should be started automatically by the first startup of the Mac OS X
Server. If it is not running, mark it by the mouse pointer and click the Start Service button
at the toolbar. In the right section of the window, find out which Open Directory services are
and which are not running (see figure 26.10). The Kerberos entry is important. If the Kerberos
server is running, no additional settings are required. If not, check out the following issues:
1. On the Settings tab, the server must be set as Open Directory Master. Authentication is
required to edit these settings. Use username and password of the administrator account
which was created in the Open Directory, for example the diradmin user (see figure 26.11).
3. DNS name (hostname) of the server where Open Directory is running must be set correctly.
307
Kerberos Authentication
If the query was processed correctly, you will be asked to enter password for the particular
user. Otherwise, an error will be reported.
Note: Logs available on the Logs tab can be helpful for troubleshooting.
308
Chapter 27
NTLM (NT LAN Manager) is an authentication type used on Windows for authentication against
an Active Directory (or NT) domain.
• NTLM authentication can be used only in case users are authenticated against an Active
Directory domain. It is applicable only to the user accounts that were imported from
Active Directory (see chapters 10 and 8.9).
• In order for the NTLM authentication to be functional, both computers as well as user
accounts have to belong to the domains used for authentication.
• To make NTLM relevant it is necessary that users use clients with support for NTLM
(SPA) authentication (e.g. MS Outlook).
2. In the administration interface, go to Configuration → Advanced Options and enable the Al-
low NTLM authentication for users with Kerberos authentication (for Active Directory users)
option on the Security Policy tab. Enable this option to allow Active Directory domain users
to authenticate at Kerio Connect upon their logon.
309
NTLM authentication settings
310
Figure 27.2 Enabling the Allow NTLM authentication for users with Kerberos authentication option
3. In the administration interface, open the Accounts → Users section and set the Windows
NT Domain option for user authentication. These parameters can be set on the General
tab (see figure 27.3).
311
NTLM authentication settings
2. Select a Kerio Connect (MAPI) account and click on Change (see figure 27.4).
3. In the account settings just opened, go to the Account tab and enable the Secure Password
Authentication option (see figure 27.5).
312
27.1 Setting NTLM in MS Outlook extended by the Kerio Outlook Connector
313
Chapter 28
An email account is a group of parameters describing the incoming and outgoing mail servers
and the conditions for their use. Most email clients allow switching between multiple accounts.
Let’s create a new account that will be used for retrieving and sending messages via Kerio
Connect.
Note: The following description of settings was created using the MS Outlook Express 6.0 email
client. However, basic account settings are very similar in all email clients.
314
28.2 Web browsers
Directory Service
You can use the Kerio Connect LDAP server as a directory service (for details refer to
chapter 20)
315
Kerio Connect Environment
browsers, in text-based browsers such as Lynx or Links, on PDA devices, on cellular phones,
etc. Kerio WebMail Mini does not use CSS and JavaScript.
To use the secured access to the Kerio WebMail interface (by HTTPS protocol), the browser
must support SSL encryption. If this can be configured (e.g. in MS Internet Explorer) we
recommend enabling support for SSL 3.0 and TLS 1.0.
28.3 Firewall
Quite often, Kerio Connect is installed on a local network protected by a firewall or directly
on the firewall host. To assure connectivity the system administrator then has to set several
settings.
Ports
If the mailserver is to be accessible from the Internet, certain ports have to be opened (mapped)
in the firewall. Generally, any open port means a security hole; therefore, the less mapped
ports you have the better.
When mapping ports for Kerio Connect the following rules should be followed:
• Port 25 must be mapped if you would like the SMTP server to be accessible from the
Internet. This must be done if an MX record for the given domain (or more domains)
points to the mailserver. In this case it is necessary to enable antispam protection
(see chapter 13) and relay control (see chapter 12.2), so that the mailserver cannot be
misused. Any SMTP server on the Internet can connect to your SMTP server to send
email to one of the local domains. For this reason access must not be restricted to
a selected IP address group.
If all incoming mail is to be downloaded from remote POP3 mailboxes, port 25 does
not need to be opened.
• Ports for other services (POP3, IMAP, HTTP, LDAP and Secure LDAP) need to be opened
if clients wish to access their mailboxes from locations other than the protected local
network (typically notebook users). In this case we strongly recommend using only
secure versions of all services and opening only the appropriate ports on the firewall
(i.e. 636, 443, 993, 995).
• If subnets or IP address ranges from which remote clients connect can be defined, we
recommend allowing access to ports only from these addresses. This is not possible
if the user travels world-wide and connects to the Internet randomly using many
different ISPs.
316
28.3 Firewall
Dial-up Connection
If Kerio Connect and a firewall run on the same machine that is connected to the Internet via
a dial-up line, a request may arise asking that the mailserver use a different dial-up connection
(e.g. via a different ISP) than the firewall for accessing the Internet. The firewall then has to
know both of these connections or it will block the packets going through the connection used
by the mailserver (no unknown packet is allowed to pass the firewall — neither outgoing or
incoming).
317
Chapter 29
Deployment Examples
This chapter shows how to set Kerio Connect in different conditions. Each example is
essentially an applied Quick Checklist (see chapter 1.2) for a given situation. These examples
should help you set up Kerio Connect quickly and easily for your company.
1. The company has the domain company.com and a primary MX record points to the
computer where Kerio Connect will be installed (the name of the computer in DNS is
mail.company.com) .
4. The company uses the NT domain DOMAIN and users will be authenticated in this domain.
5. The production department will have an address production@company.com and the sales
department will have the address sales@company.com
6. Some users would like Kerio Connect to download messages from their mailboxes on the
Internet and deliver them to their local mailboxes
7. AVG 7.0 antivirus program will be used for checking mail for viruses and no EXE, COM, BAT
and VBS attachments can be sent.
8. Remote administration of Kerio Connect will only be allowed from the IP address
67.34.112.2 (external administrator).
Implementation
1. In the Configuration → Domains section, create the primary local domain company.com
and enter the server’s DNS name mail.company.com. In the Authentication tab enter the
name of the NT domain DOMAIN.
2. In the Accounts → Users section, use the Import and Export button to import all users from
the domain. This way the users will not have to be added manually.
318
29.2 Dial-up Line + Domain Mailbox
3. In the Accounts → Groups section, create the groups Production and Sales and add
appropriate users to them.
4. In the Accounts → Aliases section, define the aliases production and sales to be delivered
to the corresponding user groups.
6. Outgoing mail will be sent directly to the target domains. On the SMTP delivery tab in
the Configuration → SMTP server section, select the Deliver directly using DNS MX records
option.
7. In the Configuration → Delivery → POP3 Download section, define retrieval of email from
requested external mailboxes. For each mailbox, select a user to whom messages from the
mailbox will be delivered.
8. Set up scheduling for downloading of mail from the remote mailboxes. The leased line is
fast and is connected permanently so messages from the mailboxes can be downloaded
quite often. Set scheduling every 10 minutes (Every 00:10). Outgoing mail is sent
immediately and no mail is received using ETRN — only tick Receive POP3 mailboxes.
9. In the Configuration → Content Filter → Antivirus section, enable antivirus control and
choose the AVG 7.0 module. In Configuration → Content Filter — Attachment Filter, enable
filtering and set forbidden files, i.e. *.exe, *.com, *.bat and *.vbs.
10. In the Configuration → Definitions → IP Address Groups section, create a group named
Remote administration and assign it a single IP address (host) 67.34.112.2.
11. In the Configuration → Remote Administration section, tick Enable administration from
network and Only from this IP address group. Choose the created group Remote adminis-
tration here.
1. The company uses the domain othercompany.com and all messages sent to this address
are stored in a domain mailbox entitled other company at the server pop3.isp.com with
the username othercompany and password password
smtp.isp.com,
319
Deployment Examples
if the user authenticates by username and password (the same situation as in case of
POP3).
4. During working hours (Mon-Fri 8:00-17:00) mail will be downloaded every hour and after
working hours at 20:00, 0:00 and 5:00
Implementation
2. In the Accounts → Users section, create user accounts for all local users.
3. The server will connect to the Internet using a dial-up connection (that already exists in
the system). In the Configuration → Delivery → Internet Connection section, choose the
Offline option, tick the field Use RAS to connect to Internet, choose the requested RAS
connection and enter the appropriate username and password.
4. All outgoing mail will be sent to a relay SMTP server. On the SMTP Delivery tab in
the Configuration → SMTP server section, select Use relay SMTP server and enter its
name — smtp.isp.com. The server requires authentication — enable the option Relay
server requires authentication and fill in the appropriate username and password. Set the
authentication type to SMTP AUTH Command.
6. In the Configuration → Delivery → POP3 Download section, Sorting Rules tab, set sorting
rules for individual users’ email addresses.
7. In the Configuration → Definitions → Time Ranges section, create a time interval Working
hours, containing the range 8:00:00-17:00:00 valid from Monday through Friday, to be
used in scheduling.
8. Set up scheduling for message retrieval from the POP3 box and sending of messages from
the mail queue. Add scheduling for every hour (Every 1:00) valid at the time interval
Working hours and three scheduling items for certain times (At) that will be valid all the
time. For all schedulings check the
320
29.3 Dial-up Line + ETRN
Receive POP3 mailboxes but also Send mail in mail queue, so that all possible outcoming
messages get sent.
1. The company uses the domain thirdcompany.com and the primary MX record points to
the computer where Kerio Connect is installed (its DNS name is mail.thirdcompany.com).
etrn.isp.com,
which supports the ETRN command and requires authentication by username and
password.
3. The computer is connected to the Internet via a dial-up line (a static IP is assigned, to
which the DNS name mail.thirdcompany.com is assigned).
smtp.isp.com,
5. During working hours (Mon-Fri 8:00-17:00) mail will be downloaded every hour and after
working hours at 20:00, 0:00 and 5:00
Implementation
2. In the Accounts → Users section, create user accounts for all local users.
3. The server will connect to the Internet using a dial-up connection (that already exists in
the system). In the Configuration → Delivery → Internet Connection section, choose the
Offline option, tick the field Use RAS to connect to the Internet, choose the requested RAS
connection and enter the appropriate username and password.
4. All outgoing mail will be sent to a relay SMTP server. On the SMTP Delivery tab in
the Configuration → SMTP server section, select Use relay SMTP server and enter its
name — smtp.isp.com. The server requires authentication — enable the option Relay
321
Deployment Examples
server requires authentication and fill in the appropriate username and password. Set the
authentication type to SMTP AUTH Command.
server: etrn.isp.com,
domain: thethirdparty.com,
7. Set up scheduling for sending and downloading of messages. Add scheduling for every
hour (Every 1:00) valid at the time interval Working hours and three schedulings for certain
times (At) that will be valid all the time. For all schedulings tick the On-demand mail relay
option (i.e. receiving mail using ETRN) but also Send mail in mail queue.
322
Chapter 30
Problem description
User’s folder or even his/her entire mailbox is not displayed correctly. The damaged folder
seems to be empty or some messages are missing.
This problem might be caused by discrepancies between the index.fld special file and the
#msgs directory in a Kerio Connect’s mail folder.
For better understanding, let us explain how Kerio Connect handles messages. Email messages,
contacts, events, tasks and notes are saved to a store as a folder tree. This store is represented
by the \store directory which is further divided to domains, user mailboxes and folders
included in these mailboxes. Each folder contains several directories and files where email
messages as well as information regarding these messages are stored.
We will focus on the #msgs directory where messages in the format of .eml files are stored
and on the special index.fld file which is used by Kerio Connect to orientate in the #msgs
directory while communicating with email clients. This file is created for each mail folder
upon the first startup of Kerio Connect.
The index.fld file includes list of messages contained in the folder as well as specific
information regarding these messages. Each line of the file represents record of one email
message stored in the folder.
The index.fld file and the #msgs directory are saved in every folder created in each user
account. The following path can be used as an example:
\Kerio\MailServer\store\mail\company.com\nmandela\INBOX
1. In administration interface go to Accounts → Users and select the user whose account is
the issue.
2. Click on More Actions → Reindex Mailbox to run check and possible fixing of index files of
the particular user(s).
323
Troubleshooting in Kerio Connect
Note: Length of reindexing depends on the size of the mail folder — it can take from a few
minutes to several hours.
2. Click on Public Folders → Reindex Mailbox to run scanning and possible fixing of index
files of public folders.
Note: Length of reindexing depends on the size of the mail folder — it can take from a few
minutes to several hours.
The simplest way to transfer data and configuration files to a new store is to perform a full
back up of the entire Kerio Connect and then use it in the new Kerio Connect store. The full
back up involves all data (the store folder) and configuration files including licenses and used
SSL certificates (see section 15.2).
To prepare conditions for transfer of Kerio Connect’s data and configuration to a new host,
follow these guidelines:
1. Execute a full back up of the original Kerio Connect (see chapter 15.2).
4. Use the Kerio Connect Recover tool to unpack the backup to the new Kerio Connect store.
5. Optionally (but it is recommended), make backups of the myspell folder and copy it to the
new store if other than default dictionaries are used for spellcheck in the Kerio WebMail
interface (for details on this topic, see section 17.3).
324
Chapter 31
Kerio Outlook Connector is a special module for MS Outlook extending cooperation between
Kerio Connect and MS Outlook. This module helps keep data which must be available to users
saved on the server. This data include email folders, calendars, tasks, contacts, notes as well
as public folders.
In addition to the standard Kerio Outlook Connector, Kerio Technologies has also developed
a new tool, Kerio Outlook Connector (Offline Edition). Kerio Outlook Connector (Offline Edition)
brings many advantages lacked in Kerio Outlook Connector. As suggested by the name of the
module, the main advantage of Kerio Outlook Connector (Offline Edition) is working offline in
MS Outlook, most useful probably for notebook users. Other advantages are searching through
message bodies and so called grouping. For more information on Kerio Outlook Connector, see
section 31.1.
• Email, events, notes, contacts and tasks are stored in Kerio Connect. Therefore, they
are available via the Internet from anywhere. You can connect either by MS Outlook,
by Kerio WebMail or via another email client.
• MS Outlook can be switched to offline mode. This implies that you can manage your
email items also from home or on your business trips. This means that your email
can be managed even there where the Internet connection is too slow or there is no
connection at all. After reconnection to the Internet (switching to online mode), Kerio
Outlook Connector synchronizes all changes with the mailserver and sends mail from
Outbox.
• Kerio Outlook Connector allows setting of rules for incoming email. These rules are
stored at the server, so they are applied globally — i.e. mail will be sorted in the same
way in Kerio WebMail and other email clients.
325
Kerio Outlook Connector
• Along with Kerio Connect, Kerio Outlook Connector provides a proprietary antispam
strategy.
For correct functioning of the module, the HTTP(S) service must be running in Kerio Connect
— this protocol is used for any traffic from and to Kerio Connect.
Kerio Outlook Connector is localized for the languages listed in table 31.1.
Language of the Kerio Outlook Connector is set automatically in accordance with the language
version set in MS Outlook. If a language set MS Outlook is not available in the Kerio Outlook
Connector, English is used automatically.
Specific options and settings in MS Outlook are focused in the Kerio Connect 7, User’s Guide).
Warning:
Kerio Outlook Connector (Offline edition) communicates with the server via the MAPI based
on HTTP(S) protocol. Therefore, it is necessary to run HTTP(S) service on the server and map
the corresponding port(s) on the firewall protecting the server.
326
31.1 Kerio Outlook Connector (Offline Edition)
To get the Kerio Outlook Connector installation package, follow these guidelines:
1. In your browser, enter your mailserver’s URL address following the pattern
http://server_name/ (e.g. http://mail.company.com/).
2. If the address is correct, the Kerio WebMail login page is opened. Click on the Integration
with Windows link displayed at the bottom of the login dialog.
3. This opens the Integration with Windows page. Simply click on Download Kerio Outlook
Connector.
Installation wizard is used for the Kerio Outlook Connector installation. Once the installation
is completed, it is necessary to set a profile and an email account explicitly.
Warning:
• MS Outlook must be installed and at least once started on the computer prior to the
Kerio Outlook Connector (Offline Edition) installation, otherwise the application will
not function properly.
• If you have used another mailserver (e.g. Exchange) and now you are switching to
Kerio Connect, it is necessary to create a new profile in MS Outlook.
In the majority of cases, upgrade from Kerio Outlook Connector to Kerio Outlook Connector
(Offline Edition) is smooth. At the beginning of the installation, a convertor is started which
converts all Kerio profiles of the particular user to profiles for Kerio Outlook Connector. If
the station is connected to the Kerio Connect, the Kerio Outlook Connector’s local database is
created automatically and updated..
Special cases:
327
Kerio Outlook Connector
1. In the profiles dialog (Start → Settings → Control Panel → Mail → View Profiles), select
the Kerio profile and click on Properties.
2. In the wizard, click on User Accounts.
3. On the following page, double-click on the Kerio account and confirm settings by
the OK button. Conversion to Kerio Outlook Connector profile is then finished
automatically.
This procedure must be taken for each profile with Kerio account.
In MS Outlook, any number of user profiles can be created. Using of multiple user profiles is
essential especially in the following situations: either the computer is accessed by multiple
users and each of them needs his/her own email address or a user can access multiple
mailboxes and wants to use different settings for each of them. In other cases, one profile
for one or more email accounts is sufficient.
Settings for a new profile can be configured in the Start → Settings → Control Panel → Mail
menu:
2. Click on the Add button to create a new profile and enter its name. Any name can be used.
3. This opens the email account wizard, where a new account can be created. In the dialog,
simply enable the Manually configure server settings or additional server types option.
4. In the Choose e-mail service dialog, select the Other option and enable Kerio Connect (KOC
Offline Edition) (see figure 31.1). Click on Next.
5. On the Accounts tab set basic parameters for connection to the mailserver (see figure 31.2):
328
31.1 Kerio Outlook Connector (Offline Edition)
329
Kerio Outlook Connector
Server Name
DNS name or IP address of the mailserver (for help, contact your network
administrator).
Username
Username used for logging to the mailserver. If the user does not belong
to the primary domain, a full user name including domain is required
(jwayne@company.com).
Password
Enter your username.
330
31.1 Kerio Outlook Connector (Offline Edition)
Save password
If you check this option, MS Outlook will remember your password and you will not
be asked to enter it again from that time on. If there are multiple persons that access
the computer, it is not recommended to check the option for security reasons.
Press the Retrieve Info button to test if correct user data has been specified and if
the connection to Kerio Connect works properly. If the test is finished successfully,
a corresponding User Name and Email Address are automatically filled in.
6. By default, any traffic between Kerio Connect and MS Outlook is secured by SSL. If there are
no problems encountered regarding encrypted traffic, it is recommended to keep settings
unchanged.
31.1.2 User profile creator — automatic installation and configuration of user profiles
Kerio Technologies have developed ProfileCreator, a special tool allowing to create user email
profiles on client stations automatically.
The main benefit of this tool is that, by using a simple script, user profiles can be created in
batches. Guidelines for ProfileCreator are provided in the following sections.
ProfileCreator is a tool for Windows started from the command line. It is located in the
directory where the Kerio Outlook Connector is installed. It can be started by command
ProfileCreator.exe. When the command is used, guidelines for Profile Creator are
displayed.
Note:
• Options in square brackets are optional.
• Parameter /password is obligatory for online mode. To add your password later, use
the /offline option (you can enter the password when MS Outlook is launched).
331
Kerio Outlook Connector
Option Description
MS Outlook is installed on client stations. A user installs the Kerio Outlook Connector and runs
ProfileCreator in order to create an email profile and set the initial configuration of the Kerio
account. To get and start ProfileCreator, follow these guidelines:
1. In your browser, enter your mailserver’s URL address following the pattern
http://server_name/ (e.g. http://mail.company.com/).
2. If the address is correct, the Kerio WebMail login page is opened. Click on the Integration
with Windows link displayed at the bottom of the login dialog.
332
31.1 Kerio Outlook Connector (Offline Edition)
3. In the Integration with Windows page just opened, click on Click here to auto-configure
Kerio Outlook Connector.
4. Depending on your browser and its settings, the tool gets downloaded and launched
automatically or it only gets downloaded and you can run it by double-clicking on the
tool’s icon.
5. The script now creates a new profile and pre-configures your Kerio account.
6. Click on Retrieve Info in the configuration to check whether the password is correct and
whether the login data can be used for connection to the server.
This option is useful for companies which use Active Directory, map user accounts from the
directory service to Kerio Connect and want to install the Kerio Outlook Connector (Offline
Edition) as an MSI package remotely on user workstations. This is a standard option provided
by Microsoft Corporation’s servers. Upon completion of installation of both applications, it
is possible to set a new profile in MS Outlook and preset the Kerio account remotely. Then,
users can simply authenticate by the password for their Kerio Connect mailbox (unless NTLM
authentication is used) within their first connection, without the need to enter their username
or Kerio Connect address.
333
Kerio Outlook Connector
Warning:
The guidelines provided below will help you to install both MS Outlook and the
Kerio Outlook Connector. If you want to install both, bear in mind that MS Outlook
must be installed on the computer prior to the Kerio Outlook Connector.
1. On any computer available through a network, create a new directory. Set access
rights to this directory so that all domain users have read only rights (right-click to
open the context menu, select the Share option and set rights on the Sharing and
Security tabs).
2. Move Kerio Outlook Connector MSI packages (one for 32-bit and the other for the
64-bit version of MS Outlook) and Kerio Updater Service to the created directory.
For all MSI packages use command msiexec.exe which will run installation and copy
essential files to the shared folder.
For the command, use the following pattern:
msiexec.exe /a kerio-connect-koff-7.3.0-win64.msi
Note: Bear in mind that it is necessary to set the just created shared directory as the
destination directory.
3. Check availability of the package from any client computer.
4. On the domain server, go to Start → Control Panels → Administrative Tools → Active
Directory Users and Computers.
5. In that menu, set policy for MSI packages installation. The policy can be set either for
the entire domain or it is possible to create an organization unit for selected users.
Note: To create a new organization item, follow these instructions:
a. Right-click on the domain name and select New → Organization Unit in the
context menu.
b. Enter a name for the new organization item and save it by clicking on OK.
6. Right-click on the domain name or on the new organization item and select the Prop-
erties option in the menu. In the dialog just opened, switch to the Group Policy tab.
Click on New and enter a name for the new group policy (see figure 31.3).
7. Click on Edit (the new item must be selected) to open the group policy editor.
8. Go to the new group policy under Computer Configuration → Software Settings →
Software Installation.
9. Right-click on Software Installation and select the New → Package option.
10. Enter the UNC path to the packages — for example:
\\server_name\share\kerio-connect-koff-7.3.0-win32.msi
, \\server_name\share\kerio-connect-koff-7.3.0-win64.msi
\\server_name\share\kerio-updaterservice-1.1.0-win32.msi
11. Select a deployment method for each package (see figure 31.4). You can use any of
the offered options, but it is recommended to select
Assigned.
334
31.1 Kerio Outlook Connector (Offline Edition)
335
Kerio Outlook Connector
New.
b. Add a name and optionally also a description.
c. In the text field, enter the following text:
Root\cimv2;Select * from Win32_Product where name = "Kerio
Outlook Connector (Offline Edition)"
d. Save.
336
31.1 Kerio Outlook Connector (Offline Edition)
Warning:
If this procedure fails, please check whether the MSI package and the profile
creator script are available from all client computers and that appropriate rights
are set.
• MS Outlook 2010 and Kerio Outlook Connector (Offline Edition) is installed for the
first time on the computer, i.e. user profile has not been created yet.
In this case, follow the standard procedure — the module’s installation file recognizes
the MS Outlook 2010 version and is installed correctly.
• There are already a 32-bit version of MS Outlook 2010 and Kerio Outlook Connector
(Offline Edition) installed on the computer.
For successful installation follow the instructions provided in this chapter.
337
Kerio Outlook Connector
It should not be necessary to create a new profile and the user should be able to use their
profile immediately after the synchronization.
The same procedure can be used for downgrading from 64-bit to 32-bit version.
Warning:
MS Outlook must be installed and at least once started on the computer prior to the Kerio
Outlook Connector (Offline Edition) installation, otherwise the application will not function
properly.
Upgrades of Kerio Outlook Connector are performed automatically. If a new version of Kerio
Outlook Connector is available, the module is updated immediately upon the startup of MS Out-
look.
Since Kerio Connect 7.2, it is highly recommended to update Kerio Outlook Connector with
Kerio Updater Service. Install this service and the new installation of Kerio Outlook Connector
on all computers. On computers with Kerio Outlook Connector already installed, you can add
installation of Kerio Updater Service with the distribution via the domain policy (see section
Remote configuration of a profile on multiple user workstations in chapter 31.1.2).
The automatic update includes check of versions of Kerio Connect and the Kerio Outlook
Connector. If versions of the server and the client do not match, the user is informed that
a different version of Kerio Connect is installed on the server and that the client should be
updated. Upon confirmation, the version is upgraded/updated immediately (or downgraded).
338
31.1 Kerio Outlook Connector (Offline Edition)
Note: If the server and client differ only in their build numbers (numbers in the notification are
the same), the client will work even if the update is rejected. If, however, version numbers are
different (for example 6.7.0 versus 6.7.1), Kerio Outlook Connector cannot be started unless
updated.
Warning:
When the update is completed, MS Outlook is restarted automatically.
Kerio Outlook Connector supports both modes, online and offline. Online mode is the standard
MS Outlook mode which requires connection to Kerio Connect. Offline mode allows running
of MS Outlook and working there without connection to Kerio Connect. This requires all
email, events, tasks, etc. being stored in the local message store on the client station. Upon
connection to Kerio Connect, it is possible to synchronize changes with the corresponding
account in Kerio Connect.
The offline mode is helpful especially for users with notebooks who make frequent business
trips and need their email accounts even when they are not currently connected to the Internet.
Upon switching to online mode, all new messages, events and tasks are synchronized with the
server’s store automatically.
Kerio Outlook Connector informs of switching between online and offline modes and about
current synchronization progress and status by a special icon in the systray’s notification area
(see figure 31.6). The icon informs about the following situations:
• MS Outlook is running in the offline mode — red down-arrow is displayed at the icon.
By default, the online mode is set in MS Outlook. To switch to the offline mode, click on Work
offline in the File menu available on the main toolbar.
339
Kerio Outlook Connector
If you close MS Outlook in the offline mode, it will be opened in offline mode next time it is
started. If you want to change this, disable the offline mode manually in the File menu.
Synchronization
Upon startup of MS Outlook, the currently opened folder is primarily synchronized.
Any folder saved in Kerio Connect can be synchronized in any of these two modes:
• Synchronization of header and message body in plain text — this option concerns
synchronization of smaller data volume. However, it is necessary to decide whether
you will not miss possible attachments in your email. When connected online again,
the attachments are included in corresponding messages anyway.
In default mode, synchronization of Kerio Connect and the Kerio Outlook Connector works as
follows:
• Other email folders — only message headers and body in plain text are synchronized.
1. Right-click the selected folder and choose Properties from the pop-up menu.
2. In the Properties window switch to the Folder Synchronization tab (see figure 31.7).
340
31.2 Kerio Outlook Connector
Warning:
If you do not wish to synchronize the folder, disable the Enable synchronization of the folder
option. However, any items already included in the folder will be kept synchronized.
Conflicts
Synchronization conflict occurs when a message, event or any other item is changed both
on the server and in Kerio Outlook Connector in the time between synchronizations. In such
cases, the Kerio Outlook Connector is not capable of recognizing which change is the wanted
(later) one.
If a conflict occurs during the synchronization, the item saved on the server beats the other
one. The winning item is saved in the corresponding folder. The beaten item is saved in
a special folder called Conflicts. This folder is available only in MS Outlook. This implies that
it is not available in Kerio WebMail or another email client.
Both items can be compared to select the correct one. If the server have primarily selected the
wrong version (the older one), it is possible to move it from the
Conflicts folder to the correct directory manually and simply remove the other version.
Each conflict is announced by a special message sent to MS Outlook. Its subject is Message in
conflict!. Conflict information includes name of the message, event, contact or another item in
conflict and its location in mailbox (folder). Local version of the item is moved to the Conflicts
folder. If this version is up-to-date, exchange it with the version in the particular folder.
• Email, events, notes, contacts and tasks are stored in Kerio Connect. Therefore, they
are available via the Internet from anywhere. You can connect either by MS Outlook,
by Kerio WebMail or via another email client.
• Kerio Outlook Connector allows setting of rules for incoming email. These rules are
stored at the server, so they are applied globally — i.e. mail will be sorted in the same
way in Kerio WebMail and other email clients.
341
Kerio Outlook Connector
Warning:
Kerio Outlook Connector cannot be used on the terminal server.
Kerio Outlook Connector also includes Help which can be triggered from the MS Outlook’s
toolbar (Help → Kerio Outlook Connector Help).
Kerio Connect, MS Outlook and Kerio Outlook Connector communicate via Microsoft’s open
MAPI interface. MAPI (Messaging Application Programming Interface) is a versatile interface
for email transmission. It is a software interface that enables any MAPI client to communicate
with any mailserver (MS Outlook and Kerio Connect in this case). MAPI is used especially for
writing of various modules for MS Outlook.
For proper functionality of the Kerio Outlook Connector, the following services must be
running in Kerio Connect:
• HTTP(S) — the protocol is used for automatic updates of the Kerio Outlook Connector
and also for communication with the Free/Busy server.
• IMAP(S) — the MAPI interface uses the IMAP protocol in Kerio Connect.
Warning:
In addition to the services listed above, it is also necessary to map corresponding ports on
the firewall protecting the server. Otherwise, services will not be available from the Internet
(for details, see section 2.3).
Note:
• Kerio Outlook Connector provides support for digital signatures. The function and
settings for digital signatures are described in standard MS Outlook help.
Specific options and settings of the Kerio Outlook Connector on the client side are focused in
the Kerio Connect 7, User’s Guide).
TIP:
If you need to work with your email also offline, replace the standard Kerio Outlook Connec-
tor by the Kerio Outlook Connector (Offline Edition) (see chapter 31.1).
Kerio Outlook Connector is localized for the languages listed in table 31.3.
342
31.2 Kerio Outlook Connector
Language of the Kerio Outlook Connector is set automatically in accordance with the language
version set in MS Outlook. If a language set MS Outlook is not available in the Kerio Outlook
Connector, English is used automatically.
Manual installation of the Kerio Outlook Connector for Kerio Connect is performed by the
installation wizard. Once the installation is completed, it is necessary to set a profile and an
email account explicitly.
Warning:
• MS Outlook must be installed on the computer prior to the Kerio Outlook Connector
installation, otherwise the application will not function properly.
Profile creation
The user profile is a file where personal information in MS Outlook is stored. The profile is
essential in the following situations: either the computer is accessed by multiple users and
each of them needs his/her own email address and personal settings or a user can access
multiple mailboxes and wants to use different personal settings for each of them. Settings for
a new profile can be configured in the Start → Settings → Control Panel → Mail menu:
1. In the just opened Mail Setup — Outlook dialog, click on Show Profiles (see figure 31.8).
2. The Mail dialog is opened (see figure 31.9) where profiles and user accounts may be
administered.
343
Kerio Outlook Connector
3. Click on Add. A dialog box is opened with a blank entry for specification of the new
profile’s name. Any string is allowed as the name.
4. The new profile is empty (i.e. no email account is created in it). Therefore, the wizard
where a new account can be created is started automatically once a new profile is created.
344
31.2 Kerio Outlook Connector
Email accounts or an address book can be added or changed in the first dialog of the
wizard. Once you create an account, select — Add a new email account (see figure 31.10).
5. In dialog two, select the Additional server types option (see figure 31.11) and click on Next.
6. The next step allows selection of a server type. Select Kerio Connect.
7. In the next step, the settings for Kerio Outlook Connector are defined. This can be done
using two tabs in the Kerio Outlook Connector window:
345
Kerio Outlook Connector
Server Name
DNS name or IP address of the mailserver.
346
31.2 Kerio Outlook Connector
Warning:
NTLM (SPA) can be used only if Kerio Connect is installed on Windows
operating systems.
Username
Username used for logging to the mailserver. If the user does not belong to the
primary domain, a complete email address is required (jwayne@company.com).
Password
User password.
Press the Check connection button to test if correct user data has been specified and
if the connection to Kerio Connect works properly. If the test is finished successfully,
a corresponding User Name and Email Address are automatically filled in.
347
Kerio Outlook Connector
Use the Advanced Settings tab to change some of the communication settings.
HTTP port
The HTTP(S) protocol uses the Free/Busy calendar and applications for automatic
updates of Kerio Outlook Connector. Port number must be identical with the port
number for the HTTP(S) service used by Kerio Connect.
Timeout
Time spent by the application waiting for a response from Kerio Connect.
The Default Values button changes all settings to their default values.
Connection name
Kerio Outlook Connector Store is used by default. This name can be changed.
Name and its visibility, email address and a Reply-To address can be set in the Name tab.
348
31.2 Kerio Outlook Connector
Name
The name that appears in sent email messages.
Email Address
The email address from which the messages are sent.
8. Click OK to confirm and save the settings and to close the wizard. The profile created
can be found in the list provided on the Mail page. Now, two options of profile modes are
available (see figure 31.9):
• Always use this profile — this option sets the new profile as default. Then, the
profile including the new account is opened automatically upon each startup of
MS Outlook.
• Prompt for a profile to be used — if this option is used, a menu is opened providing
a list of all profiles (see figure 31.15). Upon each startup of MS Outlook, one of
these profiles can be selected.
Warning:
Each MS Outlook profile may be used only by one account
connected via Kerio Outlook Connector. Functionality of POP3
and IMAP accounts located in the same profile is not affected
by Kerio Outlook Connector Store.
Note: If you use MS Outlook 2000, make sure that you add Kerio Connect and
MS Outlook Address Book items during configuration. In higher versions of MS Out-
look, Outlook Address Book is added automatically.
349
Kerio Outlook Connector
In order for Kerio Outlook Connector to work properly, it is necessary to set the [Kerio Outlook
Connector Store] as the default data file. If the file has not been selected automatically before,
it can be specified in the Tools → Email Accounts→ View or Change Existing Email Accounts
menu. The Email Accounts window contains the Deliver new email to the following location
option, where Kerio Outlook Connector Store can be selected.
Kerio Outlook Connector can also check whether the Kerio Outlook Connector Store is selected
as a default message store. By default, the check is enabled and if the Kerio Outlook Connector
Store is not selected as a default store when MS Outlook is started, a warning is displayed.
350
31.2 Kerio Outlook Connector
This option can be enabled/disabled in the Tools → Options → Preferences menu (with the
Kerio Technologies logo).
Upgrades of Kerio Outlook Connector are performed automatically. If a new version of Kerio
Outlook Connector is available, the module is updated immediately upon the startup of MS Out-
look.
When the update is completed, MS Outlook is restarted automatically. The update process and
the restart takes up to two minutes.
The automatic update includes check of versions of Kerio Connect and the Kerio Outlook
Connector. If versions of the server and the client do not match, the user is informed
that a different version of Kerio Connect is installed on the server and that the client
should be updated (see figure 12.24). Upon confirmation by the YES button, the version is
upgraded/updated immediately (or downgraded).
If the server and client differ only in their build numbers (numbers in the notification are the
same), the client will work even if the update is rejected. If, however, version numbers are
different (for example 6.4.0 versus 6.4.1), Kerio Outlook Connector cannot be started unless
updated.
351
Chapter 32
Since 7.2, Kerio Connect supports Microsoft Outlook for Mac 2011.
1. The tool is available for download and startup on a special page called Integration
with Mac OS X. To open this page, use the following URL address in your browser:
http://server_name/integration (e.g. http://mail.company.com/integration) or
go to the Kerio WebMail’s welcome page and click on the Integration with Mac OS X link.
2. On the Integration with Mac OS X page just opened, click on the Auto-configure Outlook
link. The tool gets downloaded to the workstation and the Outlook is configured with the
installation wizard.
Note: For details on automatic configuration of Microsoft Outlook for Mac 2011, refer to the
Kerio Connect 7, User’s Guide.
1. In the Tools menu, select Accounts. In the dialog for administration of accounts (see
figure 32.1), click on the icon for creation of a new Exchange Account.
352
32.2 Manual Configuration of Microsoft Outlook for Mac
2. This opens an Exchange account settings dialog (see figure 32.2). Fill in the information
as follows:
E-mail address
The email address of the user.
Authentication method
Select the User Name and Password authentication method.
User name
Username used for login to Kerio Connect.
If the user account is defined in the primary domain, enter username without the at
(@) symbol and domain. Otherwise, it is necessary to use pattern username@domain
(e.g. jsmith@company.com).
Password
The password used for accessing your account in Kerio Connect.
Configure automatically
If this option is enabled, the application attempts to connect automatically.
353
Support for Microsoft Outlook for Mac 2011
Server
If option Configure automatically is disabled, you can enter the address of the email
server.
354
Chapter 33
The support for iCalendar in Kerio Connect enables various applications which can handle
the format (such as MS Outlook 2007, Apple iCal, Mozilla Calendar, Lotus Notes and Ximian
Evolution) to publish and subscribe to calendars via Kerio Connect.
For manipulation with calendars, MS Outlook 2007 uses iCalendar (iCal), a standard format for
exchange of calendar data.
Kerio Connect supports the iCal format and it is, therefore, possible to subscribe calendars
stored on Kerio Connect in MS Outlook as well as to publish calendars at Kerio Connect’s
accounts. In addition to subscription to their own calendars, users can also subscribe to
calendars shared by other users.
Warning:
In MS Outlook, subscribed calendars are available only in the read-only mode. Published
calendars are available on the server for reading only (this implies that it is not edit
published calendars when accessed by Kerio WebMail, for example).
After authentication, the traffic is performed by the HTTP protocol. Therefore, the service
must be running in Kerio Connect. In addition to this, it is also necessary to map the
corresponding port on the firewall protecting the server. Otherwise, the service will not be
available from the Internet (for details, see section 2.3).
Subscription and publishing of calendars may be useful especially to view calendars of users
who do not have an account in Kerio Connect or to publish calendar in the Internet.
Specific options and settings in MS Outlook are focused in the Kerio Connect 7, User’s Guide).
355
Support for iCalendar
Warning:
In Windows Calendar, subscribed calendars are available only in the read-only mode.
Published calendars are available on the server for reading only (this implies that it is not
edit published calendars when accessed by Kerio WebMail, for example).
Subscription traffic is performed by the HTTP or the HTTPS protocol. Publishing of calendars
is performed via HTTPS only. This implies that it is necessary that the service is running in
Kerio Connect and a valid Kerio Connect’s SSL certificate must be installed on the Windows
Calendar host. In addition to this, it is also necessary to map the corresponding port on the
firewall protecting the server. Otherwise, the service will not be available from the Internet
(for details, see section 2.3).
The Windows Calendar application supports iCalendar which is a standard format used for
exchange of calendar data. The iCalendar built in Kerio Connect enables Kerio Connect to
support cooperation with Windows Calendar.
Note: If calendars published as subfolders of the main calendar called Calendar, all events will
also be displayed in the Free/Busy calendar.
Specific options and settings of Windows Calendar are focused in the
Kerio Connect 7, User’s Guide).
356
33.3 Apple iCal
Warning:
In Apple iCal, subscribed calendars are available only in the read-only mode. Published
calendars are available on the server for reading only (this implies that it is not edit
published calendars when accessed by Kerio WebMail, for example).
Since Apple iCal for Mac OS X Tiger, it is possible to synchronize locally stored calendars with
calendars on Kerio Connect. The Kerio Sync Connector (see chapter 41) is required for this
purpose.
Subscription and publishing of calendars are performed by HTTP (in this case, it is not possible
to use HTTPS). Therefore, the HTTP service must be running in Kerio Connect. In addition to
this, it is also necessary to map the corresponding port on the firewall protecting the server.
Otherwise, the service will not be available from the Internet (for details, see section 2.3).
As suggested by the name, the iCalendar (also known as iCal) format is applied to calendar
management. iCal is a standard format used for exchange of calendar data. The iCalendar
built in Kerio Connect enables Kerio Connect to support cooperation with Apple iCal.
Note: If calendars published as subfolders of the main calendar called Calendar, all events will
also be displayed in the Free/Busy calendar.
Specific options and settings in Apple iCal are focused in the Kerio Connect 7, User’s Guide).
3. Read access rights are set automatically for all users under the particular domain and all
Kerio Connect users. These rights can be changed through the context menu of the new
folder (pop-up menu → Access rights).
6. Publish this calendar to the folder created in Kerio Connect. For publishing, use the
following URL pattern:
http://server_name/ical/public/folder_name
357
Support for iCalendar
http://mail.company.com/ical/public/Calendar
7. Use your browser to run Kerio WebMail and check whether the publishing has been
completed successfully.
358
Chapter 34
CalDAV support
Kerio Connect supports CalDAV which is an extension for the WebDAV interface designed for
exchange of calendar data. For details on this protocol, see http://www.caldav.org/. CalDAV
standard is defined in RFC 4791.
CalDAV is an HTTP-based protocol. Therefore, the HTTP(S) service is required in Kerio Connect
for its support.
The protocol can be used for synchronization of calendars, scheduling of meetings with
assistance of the Free/Busy server and delegating of calendars to other Kerio Connect users.
Apple iCal
http(s)://<servername>/caldav
for example:
http(s)://mail.company.com/caldav
Warning:
If there is no important reason for manual configuration, configure the CalDAV
account with the iCal Config Tool (section 34.2). In addition to the account, this
tool will configure also the Directory Utility where it sets Kerio Connect as an Open
Directory server. This setting will make delegation of calendars fully functioning.
Without this setting, subscription of delegated folders only is available.
359
CalDAV support
Apple iCal supports the CalDAV protocol since Mac OS X 10.5 Leopard. Support of Kerio
Connect currently allows:
• synchronization of calendars,
• scheduling of meetings,
• delegation of calendars,
• setting of private events in calendars (featured on Apple iCal 3.0.3 and higher).
Warning:
Starting of CalDAV synchronization in Apple iCal automatically disables calendar
synchronization via Kerio Sync Connector. Synchronization of contacts, if defined, is not
interrupted.
Kerio Technologies developed the iCal Config Tool which allows automatic configuration of
CalDAV accounts in Apple iCal on Mac OS X 10.5 Leopard and higher.
In addition to configuration of the CalDAV account, the tool sets Kerio Connect as an Open
Directory server in Directory Utility on the client computer. Thanks to this setting, the user
can use full delegation features in their Apple iCal.
1. The tool is available for download and startup on a special page called Integration
with Mac OS X. To open this page, use the following URL address in your browser:
http://server_name/integration (e.g. http://mail.company.com/integration) or
go to the Kerio WebMail’s welcome page and click on the Integration with Mac OS X link.
2. On the Integration with Mac OS X page just opened, click on the Auto-configure iCal link.
The tool gets downloaded to the workstation and the CalDAV account is configured with
the installation wizard.
360
34.2 CalDAV account in Apple iCal
• username and password for an account with administration rights for the workstation.
Note: For details on automatic configuration of CalDAV accounts in Apple iCal, refer to the
Kerio Connect 7, User’s Guide.
361
Chapter 35
CardDAV support
Kerio Connect supports the CardDAV protocol developed for the purpose of contact exchange.
CardDAV is an HTTP-based protocol. Therefore, the HTTP(S) service is required in Kerio Con-
nect for its support.
You can use this protocol to synchronize all your contacts. Both manual and automatic
configuration is available. The Auto-configure Address Book option is used for this purpose.
Warning:
If the user has installed and configured the latest version of Kerio Sync Connector,
synchronization of contacts over Kerio Sync Connector is stopped automatically upon
setting a CardDAV account.
However, it is recommended to uninstall Kerio Sync Connector before running the
autoconfig tool.
1. The tool is available for download and startup on a special page called Integration
with Mac OS X. To open this page, use the following URL address in your browser:
http://server_name/integration (e.g. http://mail.company.com/integration) or
go to the Kerio WebMail’s welcome page and click on the Integration with Mac OS X link.
Warning:
The autoconfiguration tool must be downloaded from the server of the name for
which the SSL certificate is issued.
If you are not sure about this issue, download a new certificate from the
integration page to your workstation first and then install the autoconfig file for
Apple Address Book.
2. On the Integration with Mac OS X page just opened, click on the Auto-configure Address
Book link. The tool gets downloaded to the workstation and the CardDAV account is
configured with the installation wizard.
362
35.2 Manual configuration of CardDAV accounts
• username and password for an account with administration rights for the workstation.
2. In Address Book create a new account with the following parameters (see figure 35.1):
363
CardDAV support
• Username — user(domain)
Warning:
Username and domain must include the parenthesis. Example:
jsmith(company.com)
If the user belongs to the primary domain, you can use
username without domain.
364
Chapter 36
Support for the ActiveSync protocol allows users to synchronize their email, calendars,
contacts and tasks with mobile devices with Microsoft Windows Mobile, Palm OS, Symbian and
OS X operating systems (for updated list of supported mobile devices, see section 36.2). The
ActiveSync protocol is based on HTTP(S). For network connections, it uses WiFi, GPRS, UMTS
and other technologies.
Kerio Connect includes direct support for the protocol and therefore there is no need to install
any supportive utility if the device also supports ActiveSync. If the device does not support
the protocol, it is necessary to install an application which allows the synchronization on
the device. Descriptions of configuration are provided in manuals of the particular devices,
as well as in the user’s guide chapter Data synchronization with mobile devices where simple
guidelines for setting of synchronization are provided for each device supported.
And also, no settings in Kerio Connect are required for the support. The only requirement
is that the HTTP(S) service must be running on the default port (i.e. port 80 for HTTP and
port 443 for the SSL-secured version). On most of supported mobile devices, ports cannot be
changed to non-standard ports.
Warning:
In addition to running of services on the server, it is also necessary to map corresponding
ports for HTTP and HTTPS on the firewall protecting the server. Otherwise, the service will
not be available from the Internet (for details, see section 2.3).
365
Support for ActiveSync
This synchronization method as well as its options and usage is addressed in chapter Support
for ActiveSync.
This synchronization method does not require connection of the device to a desktop computer.
The technology allows to connect over HTTP(S) ActiveSync protocol directly to the mailserver
and synchronize mailbox folders with folders on the mobile device. On devices with an
Internet connection, users can synchronize their data any time and, on newer devices, it is
also possible to perform online synchronizations by using the DirectPush technology.
• mail folders,
• contacts,
• calendar,
• tasks — tasks synchronization is available only on devices with Windows Mobile 5.0
and later.
The following parameters must be set for the direct synchronization with the server:
• The HTTP(S) service must be running in Kerio Connect. For connections to the server
from the Internet, it is necessary to enable an appropriate port (usually only for the
HTTPS service) at the firewall behind which Kerio Connect is running.
• For connections via the HTTPS protocol (recommended for security reasons), it is
necessary to have installed a trustworthy certificate (see chapter 36.4).
• The configuration of the device must allow connection to Kerio Connect. The
configuration requirements depend on device:
Windows Mobile
In Windows Mobile systems, it is necessary to set the ActiveSync application so
that it can connect to the server. The configuration may vary in different versions
of Windows Mobile. It usually works like this: in ActiveSync open Menu and
in the Add Server Source field enter the Kerio Connect’s Internet name along
with username and password for connection to the account. These settings are
addressed in detail in the User’s Guide. The linked page also includes simple
instructions for configuration of the ActiveSync application (for all supported
versions of Windows Mobile).
366
36.1 Synchronization methods
Nokia E-series
Nokia Eseries and some of the Nokia Nseries mobile devices support the Ac-
tiveSync protocol if the Mail For Exchange application (developed by Nokia) is
installed on the device. Installation and settings are addressed in detail in the
User’s Guide.
This synchronization method is performed out of Kerio Connect and its description can be
found in ActiveSync user’s guides and in device manuals.
Warning:
Settings described here apply only to Windows Mobile.
For successful data synchronization by using the ActiveSync desktop application, the following
conditions must be met:
• The mobile device must include any version of the ActiveSync application (all
supported versions of Windows Mobile operating systems include the application).
Synchronization with the server via desktop applications is performed in a way that MS Out-
look can access the data on the server (thanks to the connected and authenticated email
account). MS Outlook is synchronized along with the ActiveSync desktop application while
367
Support for ActiveSync
the desktop application can be synchronized with the device upon a connection. The process
also works the other way round. After a successful connection, new data is synchronized
via the ActiveSync desktop application with MS Outlook. This client applies the data in Kerio
Connect folders.
One of the advantages of synchronization via MS Outlook and the desktop application is the
possibility to synchronize all folder types stored at the server (including tasks and notes in
any device versions).
• ActiveSync 2.5 (Windows Mobile 5.0, Windows Mobile 6.0, Apple iPhone OS 2.0)
• ActiveSync 12 (Windows Mobile 6.0, 6.1 and 6.5, Apple iPhone OS 3.0)
Note: In this case, the number of the ActiveSync version refers to the protocol version, not to
the desktop application.
Kerio Connect supports several mobile devices. Table 36.1 provides a list of supported devices
running on Windows Mobile.
Note: Kerio Connect supports both Windows Mobile for Pocket PC and the edition for
Smartphone devices (mobile devices without touchscreens).
Detailed information on individual features of the device and its configuration are
provided in guides to particular devices. Configuration of ActiveSync in the device which
allows connection of the device to Kerio Connect and successful data synchronization
is addressed in chapter Synchronization over ActiveSync in Kerio Connect 7, User’s Guide
(Kerio Connect 7, User’s Guide).
Different system versions allow different cooperation options. Older versions of Windows
Mobile do not support all Kerio Connect features. Features available on individual supported
operating systems and their versions are shown in table 36.2.
368
36.2 Supported versions of ActiveSync and mobile devices
369
Support for ActiveSync
36.3 RoadSync
Kerio Connect supports RoadSync 4.0 and higher developed by DataViz. RoadSync enables
synchronization between Kerio Connect and mobile devices. The synchronization is performed
by the ActiveSync protocol.
• Email,
• Calendar,
• Contacts,
• Symbian UIQ,
• Symbian S80,
For details on RoadSync and supported devices, see the DataViz website at
http://www.dataviz.com/.
Warning:
For security reasons, it is recommended to synchronize only by the HTTPS protocol, since
ActiveSync uses only unencrypted user login data for authentication at the server.
For description on encryption of services running in Kerio Connect, see chapter 16. This
method requires a valid SSL certificate installed on the device.
370
36.4 SSL encryption
• Date of the certificate must be valid and correct date and time must be set in the
device.
• The certificate must include a valid name of the email domain for which Kerio Connect
is used.
Valid certificates for encrypted traffic can be either certificates issued by trustworthy
certification authorities (these certificates can be quite expensive, however, they avoid
possible installation difficulties) or a certificate issued by an internal certification authority
or a so-called self-signed certificate generated in Kerio Connect (for details, see chapter 16).
Windows Mobile requires certificate encoded in the DER X.509 format. The .cer extension is
required. The simplest method to get and install a certificate is to download it to the device
by a browser.
Warning:
Security rules in Smartphone devices with Windows Mobile 2005 forbid installation of new
root certificates. In such cases, it is necessary to enable installation of root certificates in
the device registry first (the instructions are provided below).
1. If you need to install the certificate on Windows Mobile 5.0 Smartphone Edition, it is
necessary to follow instructions provided in section Allowing installation of a root cer-
tificate in WM 5.0 Smartphone Edition. In other cases, start the installation by step 2.
3. In the URl textfield, enter the server’s address following the pattern
http://server_name/server.cer
371
Support for ActiveSync
(e.g. http://mail.company.com/server.cer)
or
https://server_name/server.cer
(e.g. https://mail.company.com/server.cer)
4. A dialog is displayed asking whether the certificate should be downloaded to the device.
Click OK to confirm the action.
5. Next, you’ll be asked whether the certificate should be installed and used. Again, click on
the OK button.
1. Find and download regeditSTG.zip (available for free) and unpack it.
2. Move the editor to the mobile phone (e.g. by using the MS ActiveSync desktop application).
Warning:
It is necessary that the file is saved in the phone, not on the memory card.
6. Now, it is possible to download the certificate from the server and install it as described
in section 36.4.
372
36.5 Remote deletion of the device data (Wipe)
Warning:
So called “hard reset” removes the registry changes (it is necessary to repeat the
settings if needed).
1. Select the user whose data will be removed from the device.
2. Right-click to open the pop-up menu and select More Actions → Mobile Devices.
373
Support for ActiveSync
3. This opens a dialog where mobile devices of the particular user can be administered (see
figure 36.1).
4. Select the device where the data should be wiped out and click on Wipe.
Warning:
The wipe-out process will be completed upon the next connection of the device to Kerio
Connect. Users who have lost their devices should be informed that they should not run
the synchronization if they find it and they should contact the administrators and ask them
to cancel the wipe-out before the device is used again. The wipe action process can be
cancelled by the Cancel Wipe button which appears when the Wipe button is used.
Details of the wipe process are recorded in the Security log (the Security log is addressed in
section 24.4).
374
36.6 Removing a device from the administration of mobile devices
1. In Accounts → Users, select a user whose devices are not used any longer.
2. Right-click on the account to open a pop-up context menu and select Mobile Devices.
3. This opens a dialog where mobile devices of the user can be administered (see figure 36.1).
4. Select the device where the data should be wiped out and click on Remove.
Kerio Connect Administration includes a special option in the Debug log (for details on the
Debug log and its options, see section 24.9). The traffic log can be started as described below:
3. Click on Messages.
375
Support for ActiveSync
Once the log is set, run the synchronization of the device and the server to make the log.
2. Right-click on the created log and choose Save log from the pop-up menu (see
section 24.1)..
On Windows Mobile, the ActiveSync application includes special logs for each synchronization
performed that can be helpful when solving traffic issues. Logs can be enabled/disabled in the
Advanced section of the ActiveSync application.
376
36.8 Troubleshooting
Exchange Server0.txt
Exchange Server1.txt
Exchange Server2.txt
These logs may be helpful especially when solving issues in cooperation with the Kerio Tech-
nologies technical support.
36.8 Troubleshooting
Problem description
User’s attempts to synchronize a subscribed folder fail.
Solution
In ActiveSync configuration, perform these settings:
1. In ActiveSync configuration, remove the folder from the list of synchronized folders.
Figure 36.4 Removing a damaged folder from the list of synchronized folders
2. Use so called “soft reset” to reboot the device.
3. Synchronize the device with the server (without the damaged folder).
4. If the synchronization has been completed successfully, add the folder to the list and
repeat the synchronization.
5. If even now the synchronization is not successful, please contact Kerio Technologies
technical support.
377
Support for ActiveSync
Problem description
User’s synchronization of folders subscribed for synchronization fail.
Solution
In ActiveSync configuration, perform these settings:
1. In ActiveSync configuration, remove (uncheck) all folders from the list of
synchronized folders (see figure 36.5) and save settings.
Figure 36.5 Removing all folders from the list of synchronized folders
2. Use so called “soft reset” to reboot the device.
3. Add the removed folders to the list again and repeat the synchronization.
4. If even now the synchronization is not successful, please contact Kerio Technologies
technical support.
Note: Besides this method, it is also possible to remove the entire account in ActiveSync
and configure it again upon the next restart of the devices. Synchronized data will be
removed from the device. When a new account is created this data is usually correct.
Various solutions can be applied. Above all, it is necessary to check if the following conditions
are met:
• It is necessary that Internet connection is set properly on the device so that the device
can connect to Kerio Connect.
• in Kerio Connect, the HTTP(S) service must be enabled on standard ports (most devices
do not support setting of non-standard ports for traffic).
378
36.8 Troubleshooting
• If the user connects to the server from the Internet, it is necessary to check that
standard ports of the HTTP(S) protocol are enabled at the firewall.
379
Chapter 37
37.1 NotifySync
NotifySync is an implementation of ActiveSync for BlackBerry devices that allows to
synchronize:
37.2 AstraSync
AstraSync is an implementation of ActiveSync for BlackBerry devices that allows to
synchronize:
380
Chapter 38
Kerio Connector for BlackBerry is a special module allowing cooperation of Kerio Connect
with BlackBerry Enterprise Server. This module allows users access their data also from their
BlackBerry devices. This data include email folders, calendars, tasks, contacts and notes.
For detailed information on this installation and use, refer to the
Kerio Connector for BlackBerry manual.
Scheme 38.1 shows process of communication between Kerio Connect, BlackBerry Enterprise
Server, Kerio Connector for BlackBerry module and BlackBerry devices.
Kerio Connector for BlackBerry communicates with Kerio Connect via HTTPS (port 443). Kerio
Connector for BlackBerry forwards messages to BlackBerry Enterprise Server via MAPI. Black-
Berry Enterprise Server then synchronizes messages with BlackBerry device(s).
The same procedure is followed for synchronization in the other direction.
Warning:
During installation, Kerio Connector for BlackBerry connects to Kerio Connect via TCP/UDP
protocol on port 44337.
The following communication during synchronization is similar, but it uses HTTPS on port
443.
Check that the Kerio Connector for BlackBerry host is allowed to access the Kerio Connect
server.
381
Kerio Connector for BlackBerry
Note: As all (including all future) updates of the BlackBerry Enterprise Server and Kerio
Connector for BlackBerry will use this account and password, it is recommended to
use a local account with administration rights that will be excluded from the domain’s
password change policy.
If you change password for this account, communication between BlackBerry Enter-
prise Server, Kerio Connector for BlackBerry and Kerio Connect gets interrupted.
Warning:
For better reference and transparency we decided to use descriptive names in the text. For
your purposes, use usernames following your policy.
The only exception is the BES_Administrator account. During installation of BlackBerry
Enterprise Server this account is created with the fixed username admin which cannot be
changed.
The recommended minimal configuration of the computer for installation of BlackBerry Enter-
prise Server (BES), Kerio Connector for BlackBerry and possibly also Kerio Connect:
• CPU 2 GHz, 2 GB RAM for Kerio Connector for BlackBerry and for the BES server (if
installed on the same computer as Kerio Connect, see the manual).
Warning:
Recommended maximum number of active BlackBerry devices is 50.
382
38.2 Installation
• Active Directory.
Note: The Active Directory service is required only for BES server installation. No
active users are required to be included.
• The BlackBerry Enterprise Server installation package for Exchange in version 5.0
or later or BlackBerry Enterprise Server Express in version 5.0 or higher and
corresponding license keys.
The BlackBerry Enterprise Server Express installation package and license keys are
available at:
http://na.blackberry.com/eng/services/business/server/express/
• Installation file of the Kerio Connector for BlackBerry module in the same version as
Kerio Connect.
38.2 Installation
To get prepared for synchronization of BlackBerry device with Kerio Connect, appropriate
modules must be installed, following this order:
Warning:
If Windows Domain Controller is missing in the network, it is possible to use
the computer on which Kerio Connector for BlackBerry and BlackBerry Enterprise
Server will be installed for this purpose.
383
Kerio Connector for BlackBerry
If BlackBerry Enterprise Server has been installed or/and connected to an Exchange server,
it is necessary to uninstall it (including SQL databases).
Although it is possible to install BlackBerry Enterprise Server and Kerio Connect on one
computer, it is recommended to separate these installations to avoid possible technical issues
such as low performance and RAM load.
The following sections describe two scenarios: the recommended installation on two separate
computers and installation of all components on a single computer.
Warning:
However, Kerio Technologies does not provide technical support for BlackBerry Enterprise
Server. Should any issues with BES arise, please contact the technical support of the
manufacturer (Research In Motion Limited).
Warning:
For detailed information on installation of all components, refer to the
Kerio Connector for BlackBerry manual.
To get prepared for synchronization of BlackBerry device with Kerio Connect, in case of
installation on two computers, it is recommended to install components in this order
(provided that operating systems have already been installed):
384
38.2 Installation
Computer 1
1. Kerio Connect 7.1 or higher.
Computer 2
1. Active Directory
Note: Install Active Directory only in case that the service is not available yet.
Otherwise, it is possible to add the computer to an existing AD domain.
2. Kerio Connector for BlackBerry in version identical with version of Kerio Connect
3. BlackBerry Enterprise Server
Warning:
For detailed information on installation of all components, refer to the
Kerio Connector for BlackBerry manual.
2. Active Directory
Note: Install Active Directory only in case that the service is not available yet. Otherwise,
it is possible to add the computer to an existing AD domain.
385
Kerio Connector for BlackBerry
4. Kerio Connector for BlackBerry in version identical with version of Kerio Connect
386
Chapter 39
MS Entourage support
MS Entourage is a mail client for Mac OS X, supported by Kerio Connect. This support uses the
interface for MS Exchange in Entourage and it includes:
• support for groupware data such as mail, calendars, contacts and public folders,
• learning of the Bayesian filter by moving folders to Junk E-mail or INBOX (for detailed
information, see chapter 13.1).
Cooperation of Kerio Connect with MS Entourage is supported directly. This means that no
extension is required to be installed at client stations. It is only necessary to set correctly the
basic parameters for an Exchange account.
For proper functionality of Microsoft Entourage, the following services must be running in
Kerio Connect:
• HTTP(S) — Kerio Connect uses this service to communicate with the WebDAV interface
and with the Free/Busy server.
• LDAP(S) — used for searching for contacts in the Kerio Connect’s LDAP database.
Warning:
In addition to configuration of the services on the server, it is also necessary to map
corresponding ports on the firewall protecting the server. Otherwise, services will not be
available from the Internet (for details, see section 2.3).
Go to Kerio Connect product pages to see the supported versions of the mail client and of the
Mac OS X operating system on which the client can be installed.
Warning:
Kerio Connect does not support the Exchange Web Services protocol.
Support for MS Entourage by Kerio Connect depends on version of MS Entourage. Details are
provided in table 39.1.
387
MS Entourage support
Warning:
Each user profile in MS Entourage can be used for an only Exchange account. Any other
account will be dysfunctional. Functionality of POP3 and IMAP accounts is not affected by
the account settings.
If any problem occurs regarding communication of Kerio Connect and an Exchange account
in MS Entourage, enable the WebDAV Server Requests option in the Debug log (to see where
and how to enable the option, refer to chapter 24.9). The corresponding log may help when
solving any related problems.
Specific options and settings on client side are focused in the Kerio Connect 7, User’s Guide).
The configuration script first sets the account so that it communicates only with SSL-encrypted
versions of protocols. For this reason, the utility needs a valid SSL certificate. It therefore
downloads the active SSL certificate from Kerio Connect. To make the certificate work properly,
it must be issued against the DNS name of the Kerio Connect host. Otherwise, the account is
set so that the certificate is not required and unsecured protocols will be used.
Warning:
If the script has already been used and MS Entourage 2008 reports that the traffic would not
be secure because it is not possible to communicate via SSL, please restart MS Entourage.
Upon the restart, the application should work correctly in the secure mode.
388
39.1 Automatic configuration of Exchange accounts
To get the autoconfig script, go to the Integration with Mac OS X page. For this purpose, use
this URL: http(s)://server/integration.
389
Chapter 40
Kerio Connect supports standard Mac OS X Apple Address Book. This support includes the
option of searching for contacts in the Kerio Connect’s LDAP database and, since Mac OS X
10.3, also of bi-directional synchronization of contacts with Kerio Connect’s user accounts .
Support for individual options on individual Mac OS X versions is shown in table 40.1.
Kerio Connect supports Apple Address Book for the following versions:
Table 40.1 Support for Apple Address Book on individual Mac OS X versions
To enable traffic between Kerio Connect and Apple Address Book, the following services must
be running in Kerio Connect (enabled in the administration interface):
• LDAP(S) — this service is required for searching in the Kerio Connect’s LDAP database.
390
Warning:
In addition to configuration of the services on the server, it is also necessary to map
corresponding ports on the firewall protecting the server. Otherwise, services will not be
available from the Internet (for details, see section 2.3).
Apple Address Book and Kerio Sync Connector settings are described in
Kerio Connect 7, User’s Guide.
391
Chapter 41
Kerio Sync Connector is a special application which enables bi-directional data synchronization
between Kerio Connect and the Apple iCal or the Apple Address Book application:
Warning:
Kerio Sync Connector does not support synchronization of distribution
lists.
The main benefit of Kerio Sync Connector is that the synchronization for both applications
can be set at a single point.
For data synchronization, Kerio Sync Connector uses the WebDAV protocol. Therefore, HTTP
and HTTPS services must be running in Kerio Connect.
Warning:
In addition to configuration of the services on the server, it is also necessary to map
corresponding ports on the firewall protecting the server. Otherwise, services will not be
available from the Internet (for details, see section 2.3).
Specific options for the Kerio Sync Connector are focused in the Kerio Connect 7, User’s Guide.
Recommendation for Mac OS X 10.6 Snow Leopard and Mac OS X 10.7 Lion:
For synchronization of calendars and contacts, use the native calendar synchronization in
Apple iCal via the CalDAV protocol (see chapter 34) and the native contact synchronization
in Apple Address Book via the CardDAV protocol (see chapter 35).
392
41.1 Installation
41.1 Installation
Kerio Sync Connector can be installed on workstations with operating systems Apple Mac OS X
10.4.11 and higher. The installation is performed with the kerio-ksc-6.7.0-1069.mac.dmg
installation package which is available for free at Kerio Technologies website. Follow these
installation instructions:
2. The Finder opens the installation package as a disk and offers the Kerio Connect Installer
executable installation file.
Traffic logs
Traffic between Kerio Connect and the Kerio Sync Connector can be logged both at Kerio
Connect or/and at the Kerio Sync Connector:
• Kerio Connect
1.Open the Debug log.
2.Right-click on the log pane to open a context menu, and select Messages.
3.In the Logging Messages box just opened, enable the WebDAV Server Requests
option (see figure 41.1).
Once your problems are solved, it is recommended to disable the logging.
• Kerio Sync Connector
1. Go to System Preferences → Kerio Sync Connector and switch to the Advanced
tab.
2. Check the Enable debug logging option (see figure 41.2).
The log can be found in the Console application (Applications → Utilities →
Console).
393
Kerio Sync Connector for Mac
Synchronization fixing
The synchronization fix may help where problems with synchronized data occur. The fix
will result in generation of a copy of data on the server or in the client. The copy replaces
the opposite side’s data so that both stores include identical data. The risk is that a part
of the data having been saved since the last synchronization may be lost in the fix.
Follow these synchronization fix instructions:
394
41.2 Synchronization troubleshooting
1. Go to System Preferences → Kerio Sync Connector and switch to the Advanced tab.
2. Click on Repair.
3. In the dialog box just opened, select if the data on the server beat the data on
the client during the synchronization, or vice versa. Click OK to initiate the
synchronization.
395
Chapter 42
Kerio Connect supports some groupware features of IMAP and Entourage accounts in Apple
Mail 10.4 and higher. The support enables to display events, contacts and task folders in the
email client.
Cooperation of Kerio Connect with Apple Mail is supported directly. This implies that it is not
necessary to install any extensions to client stations. However, it is necessary to enable the
support in the Kerio Connect’s configuration file:
1. Stop Kerio Connect — before any manual edits in configuration files, it is necessary to stop
Kerio Connect Engine first.
2. In the directory where Kerio Connect is installed, look up the mailserver.cfg file and
open it.
If the file is being edited on Mac OS X or Linux operating systems, login to the system as
the root user (a special user with full access rights to the system).
3. Search the line including the IMAPFullListing value and rewrite the 0 digit with the 1
value.
Setting of the full support for IMAP in Kerio Connect results in the situation where all users
using IMAP to access their email share all types of folders and subfolders (email messages,
calendars. contacts, tasks) in their email clients. However, these folders will be showed
as email folders where any event, contact and task will be displayed as an email message
with an attachment in the .vcf (contact) or .ics (event, task) format. For this reason, it
is recommended to consider carefully whether the full support for IMAP in Kerio Connect is
really efficient.
For proper functionality of Apple Mail accounts, the following services must be running in
Kerio Connect:
396
Warning:
In addition to configuration of the services on the server, it is also necessary to map
corresponding ports on the firewall protecting the server. Otherwise, services will not be
available from the Internet (for details, see section 2.3).
Specific options and settings in Apple Mail are focused in the Kerio Connect 7, User’s Guide).
397
Chapter 43
Kerio Connect provides support for Apple iPhone 2.0 and higher. Kerio Connect supports lots
of features:
• allows email sending and receiving via IMAP, POP3 and SMTP and synchronization with
desktop applications (Apple Mail and Outlook Express) via Apple iTunes.
• allows synchronization of contacts and calendar with desktop applications via Apple
iTunes. Calendar and contacts can be also synchronized with applications Apple iCal,
Apple Address Book and Microsoft Outlook (XP, 2003 and 2007).
• Safari supports both full version of Kerio WebMail and Kerio WebMail Mini.
Warning:
In full version of Kerio WebMail, it is not possible to edit existing
contacts, events, tasks and notes.
To enable Apple iPhone support in Kerio Connect, installation of iTunes 7.3 or higher on user
stations is required. iTunes is used for synchronization of desktop clients with Apple iPhone.
Synchronization between desktop applications and Apple iPhone requires the following
operating systems:
Warning:
If traffic between Kerio Connect and mail client is running on port 25, a problem might occur
with email sending. Since public WiFi networks often do not support traffic on unencrypted
protocols, SMTP on port 25 can be blocked. In such case users cannot send email out of the
network. However, SMTPS on port 465 is usually allowed. For this reason, it is recommended
to set users’ email clients to SMTPS encryption.
398
43.1 Apple iPhone OS 2.0 and higher
• email,
• calendar,
• contacts.
• Apple iPhone fully supports so called “Device Wipe”, the device clean-up feature. In
short, the device can be cleared (for details, see section 36.5) remotely in case that it
gets lost or stolen.
• DirectPush Technology — this technology allows mobile devices to keep open HTTP(S)
connection with the server. Whenever a new item is received or any change is
performed in any folder, changes are synchronized immediately.
• Global Address Lookup — this feature allows look-up of email addressed in contact
folders.
Newly, the following features have been introduced for Apple iPhone OS 3.X :
• standard iCalendar (allows to download shared and public calendars for reading),
In addition to features described above, the system introduces other improvements, such as:
• the Copy&Paste method both for text and graphic items during email composition,
• while composing an email message, it is possible to switch the client to the horizontal
position,
• notes synchronization with desktop applications Apple Mail and MS Outlook via Apple
iTunes.
No special settings are required on the server to allow these features, only make sure that
LDAP(S) and HTTP(S) services are running. For more detailed guidelines for the device settings,
refer to the user’s guide.
399
Chapter 44
Technical Support
Kerio Technologies provides free email and telephone support for Kerio Connect to registered
users. For contacts, see the end of this chapter. Our technical support staff is ready to help
you with any problem you might have.
You can also solve many problems alone (and sometimes even faster). Please perform the
following before you decide to contact Kerio Technologies technical support:
• Try to look up the answer in this manual. Its chapters describe the functions of Kerio
Connect and how to use them for optimizing server settings in detail.
• Another useful information source is the discussion forum of Kerio Connect users
— go to http://forum.kerio.com/ and the knowledge base that can be found at
http://www.kerio.com/support/.
In the lower part of the Kerio Connect Administration’s welcome page you can find buttons
Suggest Idea and Contact Technical Support (see figure 44.1).
400
44.1 Kerio Connect Administration
Suggest Idea
Kerio Technologies do their best to keep bringing enhancements and improvements to their
products. However, if you miss any feature in Kerio Connect, do not hesitate to contact Kerio
Technologies.
You can use the Suggest Idea button on the Kerio Connect Administration’s welcome page to
open a special dialog box (see figure 44.2) allowing to Create Account by entering your name
and email.
You will be redirected to another page where you can enter any suggestion or remark.
If you specified your name and email address in the Suggest Idea dialog, you will be informed
about your idea process status and any related changes.
You can edit your name and email address any time under Configuration → Administration
Settings in Suggest Idea Account Settings (see figure 44.3).
401
Technical Support
402
Contact Technical Support
Should you come upon any difficulty while using Kerio Connect, you can use the Contact Tech-
nical Support button to contact our technical support. Clicking on the button displays a dialog
box (see figure 44.4) asking you to enter information for our technical support department.
Your name and email address will be prefilled (you can change it). Next:
We recommend you aggree with sending information about Kerio Connect. Our technical
support personnel will use it for easier and fast problem solving.
403
Appendix A
Legal Notices
Apple , iCal , Mac OS , Safari, Tiger, Panther , Open Directory logo, Leopard , Snow
Leopard and Lion are registered trademarks or trademarks of Apple, Inc.
Palm , Treo, Pre and VersaMail are registered trademarks or trademarks of Palm, Inc.
Red Hat and Fedora are registered trademarks or trademarks of Red Hat, Inc.
SUSE , openSUSE and the openSUSE logo are registered trademarks or trademarks of Novell,
Inc.
Nokia and Mail for Exchange are registered trademarks of Nokia Corporation.
404
SpamHAUS is registered trademark of The Spamhaus Project Ltd.
Android and Nexus One are trademarks of Google Inc. This trademark can be used only in
accord with Google Permissions.
405
Appendix B
Apache Lucene
Apache Lucene is a Java library for text searching.
Copyright 1999-2009, The Apache Software Foundation
Copyright 1995-2008 International Business Machines Corporation
Copyright 2001, Dr Martin Porter
Copyright 2002, 2003, 2004, 2005, Marc Prud’hommeaux
Copyright 2002, Richard Boulton
Copyright 2002-2003, Geir Landrö
Copyright 2001-2004 Unicode, Inc.
Copyright 2009 by www.imdict.net
Berkeley DB
Berkeley DB (BDB) is a computer software library that provides a "high-performance"
embedded database, with bindings in C, C++, Java, Perl, Python, Ruby, Tcl, Smalltalk,
and many other programming languages.
The Regents of the University of California. All rights reserved.
Copyright 1987, 1993 The Regents of the University of California. All rights reserved.
bindlib
DNS resolver library, linked by PHP on Windows.
Copyright 1983, 1993 The Regents of the University of California. All rights reserved.
Portions Copyright 1993 by Digital Equipment Corporation.
Bluff
Bluff is a JavaScript port of the Gruff graphing library for Ruby. The Gruff library is
written in Ruby.
Copyright 2008-2009 James Coglan.
Original Ruby version 2005-2009 Topfunky Corporation.
excanvas
The ExplorerCanvas library allows 2D command-based drawing operations in Internet
Explorer.
Copyright 2006 Google Inc.
406
Kerio Connect Configuration Wizard for Linux is distributed under GNU General Public
License, version 3.
To download the complete source code, please go to http://download.kerio.com/archive/
CppSQLite
A C++ wrapper around the SQLite embedded database library .
Copyright 2004 Rob Groves. All Rights Reserved.
Firebird 2
This software embeds modified version of Firebird database engine distributed under
terms of IPL and IDPL licenses.
All copyright retained by individual contributors — original code Copyright 2000 In-
prise Corporation.
The modified source code is available at
http://download.kerio.com/archive/
Heimdal Kerberos
Heimdal Kerberos is used only in Linux-oriented Kerio Connect versions.
Heimdal is an implementation of Kerberos 5, largely written in Sweden. It is freely
available under a three clause BSD style license (but note that the tar balls include
parts of Eric Young’s libdes, which has a different license). Other free implementations
include the one from MIT, and Shishi. Also Microsoft Windows and Sun’s Java come with
implementations of Kerberos.
Copyright 1997-2000 Kungliga Tekniska Hogskolan (Royal Institute of Technology,
Stockholm, Sweden). All rights reserved.
Copyright 1995-1997 Eric Young. All rights reserved.
Copyright 1990 by the Massachusetts Institute of Technology
Copyright 1988, 1990, 1993 The Regents of the University of California. All rights
reserved.
Copyright 1992 Simmule Turner and Rich Salz. All rights reserved.
libcurl
Libcurl is a free and easy-to-use client-side URL transfer library. It supports the following
protocols: FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE and LDAP.
Copyright 1996-2008, Daniel Stenberg.
libiconv
Libiconv converts from one character encoding to another through Unicode conversion.
Copyright 1999-2003 Free Software Foundation, Inc.
Author: Bruno Haible
Homepage: http://www.gnu.org/software/libiconv/
407
Appendix B Used open source software
The libiconv library is distributed and licensed under GNU Lesser General Public License
version 3.
Kerio Connect includes a customized version of this library. Complete source codes of
the customized version of libiconv library are available at:
http://download.kerio.com/archive/
libmbfl
libmbfl is a streamable multibyte character code filter and converter library. The libmbfl
library is distributed under LGPL license version 2.
Copyright 1998-2002 HappySize, Inc. All rights reserved.
The library is available for download at:
http://download.kerio.com/archive/
libspf2
libspf2 implements the Sender Policy Framework, a part of the SPF/SRS protocol pair.
libspf2 allows Sendmail, Postfix, Exim, Zmailer and MS Exchange check SPF records. It
also verifies the SPF record and checks whether the sender server is authorized to send
email from the domain used. This prevents email forgery, commonly used by spammers,
scammers and email viruses/worms (for details, see http://www.libspf2.org/).
Copyright 2004 Wayne Schlitt. All rights reserved.
libstdc++
C++ Standard Library is a collection of classes and functions, which are written in the
core language and part of the C++ ISO Standard itself.
Copyright 2001, 2002, 2004 Free Software Foundation, Inc.
libxml2
XML parser and toolkit.
Copyright 1998-2003 Daniel Veillard. All Rights Reserved.
Copyright 2000 Bjorn Reese and Daniel Veillard.
Copyright 2000 Gary Pennington and Daniel Veillard
Copyright 1998 Bjorn Reese and Daniel Stenberg.
Mail-SpamAssassin
This product includes software developed by the Apache Software Foundation
(http://www.apache.org/).
SpamAssassin is trademark of Apache Software Foundation.
myspell
Spellcheck library.
Copyright 2002 Kevin B. Hendricks, Stratford, Ontario, Canada And Contributors. All
rights reserved.
OpenLDAP
Freely distributable LDAP (Lightweight Directory Access Protocol) implementation.
Copyright 1998-2007 The OpenLDAP Foundation
408
Copyright 1999, Juan C. Gomez, All rights reserved
Copyright 2001 Computing Research Labs, New Mexico State University
Portions Copyright1999, 2000 Novell, Inc. All Rights Reserved
Portions Copyright PADL Software Pty Ltd. 1999
Portions Copyright 1990, 1991, 1993, 1994, 1995, 1996 Regents of the University of
Michigan
Portions Copyright The Internet Society (1997)
Portions Copyright 1998-2003 Kurt D. Zeilenga
Portions Copyright 1998 A. Hartgers
Portions Copyright 1999 Lars Uffmann
Portions Copyright 2003 IBM Corporation
Portions Copyright 2004 Hewlett-Packard Company
Portions Copyright 2004 Howard Chu, Symas Corp.
OpenSSL
An implementation of Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS
v1) protocol.
This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit (http://www.openssl.org/).
This product includes cryptographic software written by Eric Young.
This product includes cryptographic software written by Tim Hudson.
PHP
PHP is a widely-used scripting language that is especially suited for Web development
and can be embedded into HTML.
Copyright 1999-2006 The PHP Group. All rights reserved.
This product includes PHP software, freely available from http://www.php.net/software/
sdbm
This product includes software developed by the Apache Software Foundation
(http://www.apache.org/)
ScoopyNG
This product includes software developed by Tobias Klein.
Copyright 2008, Tobias Klein. All rights reserved.
zlib
General-purpose library for data compressing and decompressing.
Copyright 1995-2005 Jean-Loup Gailly and Mark Adler.
409
Glossary of terms
DoS attack
DoS (Denial of Service) is a type of attack when too many concurrent requests overload the
system; the server is no more able to respond to the requests of authorized users or fails.
DSN
DSN (Delivery Status Notification) is an information about the email message delivery status.
There are a couple of different types of delivery status notification. Unless otherwise specified,
users receive only the error messages from the mailserver (deferred, failure).
Email address
An email address determines the sender and recipient of a message in electronic
communication. It consists of a local part (before the @ character) and a domain part (after the
@ character). A domain specifies where email be delivered to (a company), a local part specifies
a particular recipient within this domain.
ETRN
If you receive email using the SMTP protocol and your server is not permanently connected to
the Internet, email can be accumulated at another SMTP server (typically a secondary server
for a given domain). When it is connected to the Internet, the SMTP server sends an ETRN
command (command of SMTP protocol) and asks for stored emails to be transmitted.
If the given SMTP server doesn’t have any messages stored, it doesn’t need to reply at all.
That’s why it is necessary to define a timeout period. If the SMTP server doesn’t receive any
emails, it terminates the connection after the specified timeout.
Firewall
Software or hardware device that protects a computer or computer network against attacks
from external sources (typically from the Internet).
Free/Busy
The Kerio Connect’s built-in Free/Busy server is a server using HTTP to provide information
on busyness and free time of other Kerio Connect users without details of individual events
being displayed.
IMAP
Internet Message Access Protocol (IMAP) enables clients to manage messages stored on a mail
server without downloading them to a local computer. This architecture allows the user to
access his/her mail from multiple locations (messages downloaded to a local computer would
not be available from other locations).
It is possible under certain conditions to access the email account using both IMAP and POP3
protocols.
410
IP
IP (Internet Protocol) is a protocol which uses its data part to convey all the other protocols.
The most important information in its header is the source and destination IP address, i.e. by
which host the packet was sent and to which host it should be delivered.
IP address
IP address is a unique 32-bit number used to identify the host in the Internet. It is represented
by four bytes in the decimal system (0-255) separated by dots (e.g. 200.152.21.5). Each
packet includes the information on where the packet was sent from (source IP address) and to
which host it should be delivered (destination IP address).
Kerberos
Protocol for secure user authentication in network environments. It was designed by MIT
(Massachusetts Institute of Technology) within the Athena project. The protocol is based on
such principles where the third side is trustworthy. Users use their passwords to authenticate
to the central server (KDC, Key Distribution Center) and the server sends them encrypted
tickets which can be used to authenticate to various services in the network.
LDAP
LDAP (Lightweight Directory Access Protocol) is an Internet protocol used to access directory
services. Information about user accounts and user rights, about hosts included in the
network, etc. are stored in the directories. Typically LDAP is used by email applications to
search for email addresses and to delivery management (Microsoft Active Directory).
Mailbox Account
A place where email is stored on a server. Clients can download emails from an account (using
POP3 protocol) or work with messages directly at the server (using IMAP or WebMail).
The account is physically represented by a directory on a disk. The directory is created in
the Kerio Connect directory (mail/user_name). Other subdirectories representing individual
folders are created in this directory.
Mailboxes are not created during the definitions of users, the concrete mailbox is created after
the first email to this mailbox is received.
MAPI
MAPI (Messaging Application Programming Interface) is an application programming interface
(API) designed by Microsoft. Any software that supports MAPI can communicate with any
mailserver (Kerio Connect) and send and receive data via this interface regardless of their type
and software provider.
MX Records
One of the record types that might be saved in DNS. It includes the information about the
mailserver for a particular domain (information about which SMTP server email for this
domain should be sent to). Multiple MX records may be defined with different MX preference
values to denote priority.
411
Glossary of terms
NNTP
NNTP (Network News Transfer Protocol) is a simple text protocol that allows for distribution,
retrieval and posting of messages on the Internet.
Notifications
Short message (notification) about a particular event — e.g. new email. It is usually sent as
a text message (SMS) to a cellular phone.
POP3
Post Office Protocol is a protocol that enables users to download messages from a server to
their local computer. It is suitable for clients who don’t have a permanent connection to the
Internet.
Unlike Internet Message Access Protocol (IMAP), POP3 does not allow users to manipulate
messages at the server. Mail is simply downloaded to the client where messages are managed
locally. POP3 enables access only to the INBOX folder and it does not support public and
shared folders.
Port
16-bit number (1-65535) used by TCP and UDP for application (services) identification on
a given computer. More than one application can be run at a host simultaneously (e.g. web
server, mail client, web client — web browser, FTP client, etc.). Each application is identified by
a port number. Ports 1-1023 are reserved and used by well known services (e.g. 80 = WWW).
Ports above 1023 can be freely used by any application.
RFC
RFC (Request For Comments) is a set of deliberately recognized standards. It is a set of indexed
documents where each document focuses a particular area of network communication.
SMTP
Simple Mail Transfer Protocol is used for sending email between mail servers. The SMTP
envelope identifies the sender/recipient of an email.
Spam
Unwanted, usually advertisement email. Spam are usually sent in bulk and the recipient
addresses are obtained by illegal means.
SSL
A protocol used to secure and encrypt the TCP connection. Secure Socket Layer was originally
designed by Netscape to secure transmission of web pages using HTTP protocol. Today it is
supported by almost all standard Internet protocols — SMTP, POP3, IMAP, LDAP, etc.
At the beginning of communication, an encryption key is requested and transferred using
asymmetrical encryption. This key is then used to encrypt (symmetrically) the data.
Subnet mask
Subnet mask divides an IP address in two parts: network mask and an address of a host in
the network. The mask has the same format as IP addresses (e.g. 255.255.255.0), but it is
displayed as a 32-bit number with certain number of left-to-right oriented ones and zeros
(mask cannot include other values). Number one in a subnet mask represents a bit of the
412
network address and zero stands for a host’s address bit. All hosts within a particular subnet
must have identical subnet mask and network part of IP address.
TLS
Transport Layer Security. A later version of SSL, in fact it may be considered as SSL version
3.1. This version is standardized by IETF.
WebDAV
Using WebDAV (Web Distributed Authoring and Versioning), users can group-edit and organize
files located on servers.
WebMail
Interface used by Kerio Connect to enable access to email through a web browser. Several user
settings (such as message filtering, password, etc.) can be also changed using Kerio WebMail.
413
Index
414
conflicting software 14 IP address 411
D K
deployment examples 318 Kerberos 63, 77, 411
domain mailbox 126 authentication 290
X-Envelope-To: 126 Kerio
domains Assist 33
alias 61 Kerio Connect Engine 31
footers 56 Kerio Connect Monitor 31, 31
primary 55 Linux 33
DoS attack 410 Mac OS X 32
DSN 410 Windows 31
Kerio Connector for BlackBerry 381
E Kerio Open Directory Extension
email address 410 authentication settings 113
ETRN 125, 143, 148, 410 installation 116
Kerio Outlook Connector 325, 325, 341
F automatic update 338, 351
firewall 316, 410 conflict 341
folders data file settings 350
public 286 installation 326, 343
Free/Busy 410 MAPI 342
Offline Edition 325, 325
G offline mode 339
groups online mode 339
IP address 49, 130, 227, 232 profile 328
user groups 79, 99 ProfileCreator 331
synchronization 340
H Kerio Sync Connector for Mac 392
HTTP 48 Kerio WebMail 217
HTTP Proxy 158 dictionaries 220
language 220
I localizations 220
iCal Config Tool 360 spellcheck 220
IMAP 47, 314, 315, 316, 410 Kerio WebMail logo 217
import
user groups 89 L
installation LDAP 105, 411
Linux DEB 19 client settings 234
Linux RPM 18 server 233
Mac OS X 20 service 47
MS Windows 15 Linux
Internet connection 145 server’s startup 19, 20
IP 411
415
Index
logs 268 O
Config 271 Open Directory 116, 301
debug 280 Kerio Open Directory Extension 116
error 278 Open Directory Extension 301
mail 272 settings 117
operations 277
security 274 P
settings 268 PAM 63, 77
spam 279 Performance Monitor 31, 284
warning 277 POP3 47, 314, 316, 412
port 49, 412
M ports 316
mailbox account 411 product registration 39
mailing lists 239 at the website 39
administrator 239 importing license key 43
aliases 253 licensing policy 45
archiving 251 registration of the full version 41
member 240 registration of the trial version 40
member import 248 Software Maintenance 45
moderator 240 with the administration interface 39
new 240 profile
MAPI 411 new 343
master authentication public folders 286
master password 157 client support 288
messages in queue 258 domain 287
queue viewing 259 global 287
Microsoft Entourage 387 new 287
Microsoft Outlook for Mac 2011 rights 288
Auto-configure Outlook 352
MS Outlook R
iCal 355 RAS 146
iCalendar 355 reindexing mail folders 323
web calendar 355 relaying 125
MX Records 124, 411 Remote POP3 mailboxes 138
resources 254
N administration 255
NNTP 47, 412 disabling 255
notifications 412 new 256
NT domain 64 resource scheduling 254
user import 92 restoring deleted items 57
NTLM authentication 309 RFC 412
MS Outlook configuration 312 RoadSync 370
416
S store directory 155
scheduling 146 Subnet mask 412
time ranges 147, 228, 229 system requirements 13
services 46
skins 217 T
cascading stylesheet 217 technical support 400
SMTP 46, 124, 129, 280, 412 TLS 413
Sony Ericsson 373 TNEF 150
spam 162, 412
Bayesian filter 175 U
Caller ID tab 177 Unix-to-Unix decoding 150
custom rules 169 Unix-to-Unix encoding 150
default settings 181 update
email evaluation 175 Kerio Connect 159
email policy 177 Kerio Outlook Connector 159
graphs 186 Kerio Sync Connector 159
Internet spammer databases 165 user accounts 73
logs 187 quota 80
rules 170 templates 96
SMTP greeting delay 180 uudecode 150
SORBS 168 uuencode 150
SpamAssassin 163, 175
SpamCop 169 W
SpamHAUS SBL-XBL 169 Web Administration
Spam Rating 163 access rights 36
SPF 179 supported browsers 35
statistics 186 user login 35
SURBL 176 WebDAV 413
WPBL 169 WebMail 413
spamserver 33 Windows Calendar 356
SSL 210, 412 Windows NT domain 77
SSL certificate 210
intermediate 213 X
Safari 214 X-Envelope-To: 150
417
418