Our cloud platform will deliver incoming email to your mail server from the network ranges below. Allow inbound TCP port 25 traffic from these network ranges:
==============================================================
Address Netmask (CIDR) Netmask
==============================================================
162.220.57.160 /28 255.255.255.240
192.198.203.80 /28 255.255.255.240
Our cloud platform can make LDAP (or Secure LDAP) queries of your user directory to create and maintain a list of active email addresses. This list of email addresses is used for multiple services including:
- Recipient Validation
- Directory Harvest Attack Prevention
- Group Based End-User Quarantine
- Auto Whitelisting
Allow inbound TCP port 389 (LDAP) or TCP port 636 (Secure LDAP) traffic from the network ranges below.
==============================================================
Address Netmask (CIDR) Netmask
==============================================================
54.36.34.208 /28 255.255.255.240
54.236.119.220 /32 255.255.255.255
66.70.237.240 /28 255.255.255.240
3.3 Enable Secure LDAP
Contact support for step-by-step instructions on enabling Secure LDAP with Microsoft Active Directory.
3.4 Update MX Records
Type Preference TTL Value
==============================================================
MX 10 86400 mx.gslb.iotsecure.io
MX 10 86400 mx.gslb.iotsecure.ai
3.5 Create or Update SPF Record
Sender Policy Framework (SPF) is an anti-fraud technology that can detect email spoofing. Our cloud platform fully supports SPF and block emails that attempt to spoof your domain name(s). An SPF record is not required to use our cloud service, however, it is highly recommended. Additional information on SPF is available on the
Sender Policy Framework Project website.
Creating an SPF Record
If your domain does not have an SPF record, you should create an SPF record as displayed below.
Type Value
==============================================================
TXT v=spf1 include:_spf.iotsecure.io ~all
Modifying an SPF Record
If you domain has an existing SPF record, you can simply add the value below to your existing record.
Value
==============================================================
include:_spf.iotsecure.io
4.0 Policy Configuration
4.1 Add Email Domain(s)
Log into your management portal.
Select E-mail Security > Anti-Spam > Configuration.
In the "Internet Domains" section click Add Domain.
A single domain should be entered in the Domain field.
Enter IP address for the mail server in the Mail Server(s) field. Multiple mail servers can be added seperated by comma.
When a new domain is added it will automatically be set to Activation Pending. Our support team will review and activate the new domain request within 24-hours.
4.2 Add LDAP Directory
In the LDAP Directories section click Add LDAP Directory. All fields are required. We recommend leaving the values populated by default. Click Add to save your LDAP Directory.
- Server(s): Enter the hostname or IP address of your directory server.
Example: adserver01.domain.com
- Port: Enter 389 for LDAP, 636 for Secure LDAP. Set SSL to "No" if port 389 is used
- Service Account: Enter the Distinguished Name for a service account with read-only access to your directory.
Example: CN=LDAP Service Account,CN=Users,DC=domain,DC=com
- Service Account Password: Password for the service account.
- Base DN: Provide the Distinguished Name for your directory. You should be able to get this information for the directory admin.
Example: CN=Users,DC=domain,DC=com
- Alert Email Address: Enter your email address
Example: youremail@domain.com
If the new directory does not appear, please refresh the page in your browser. You can test LDAP connectivity and run your first sync by clicking Sync Now. A green "success" bar will be displayed if the LDAP connection is successful. Otherwise, a red "failure" bar will be displayed.
4.3 Enable Recipient Validation
In the Internet Domains section click Edit then set recipient validation to Enabled each domain.
In the Email Quarantine section the following default values are set. It is recommended to leave them unchanged.
In the Compliance Policies section you can add entries to you organization's allowed or blocked list. Entries should be added one per line.
Only email addresses, domains and sub-domains can be added to these lists.
Examples:
user@domain.com (email address)
domain.com (domain)
blah.domain.com (subdomain only)
It is not recommended to include your own domains in the Whitelist Sending Domains section. This will allow messages with spoofed from addresses to pass through the spam filter. Please contact support if you have issues with e-mail delivery.
Quarantine Storage
Define the number of days quarantined e-mail will be stored on the cloud platform. Users will be able to view and release quarantined e-mail for this period of time.
Quarantine Notification Settings
Status: Select Enabled if you want users to receive notifications of quarantined e-mail
This will enable E-mail quarantine notifications for the users that have been fetched from your LDAP Directory.
Users: This will determine which users will receive quarantine notifications. It is recommended to select All.
Delivery Schedule: Quarantine notification e-mails will be delivered based on this schedule
A quarantine notification will be sent to a user if there is newly quarantined e-mail since the last notification.
Notification E-mail content: Do not change the From address. It is recommended to also keep the Subject and Message content unchanged.
Select the type of files that you want to be blocked as e-mail attachments. You can see a list of the file extensions included in a particular file type category by hovering your mouse above it.
Executables and scripts are blocked by default. It is highly encouraged to keep this enabled.