Your control panel works in cooperation with a mail server, which provides mail services for your domains. After installation the mail server is configured automatically and is ready to serve, however, we recommend that you review the default settings to make sure that they satisfy your needs:
A dictionary attack is when someone tries to find out a valid user name and password by running a program that tries different combinations of dictionary words in different languages. Dictionary attacks can be successful because many users choose their passwords carelessly.
Note for Windows hosting users: To make this function work properly on Windows platforms, make sure that the Password must meet complexity requirements option is switched on in your server's Local Security Policy settings (the option is located in Start > Administrative Tools > Local Security Policy > Account Policies > Password policy).
Also notify your customers that they need to specify in their e-mail programs' settings the port 587 for outgoing SMTP connections, and be sure to allow connections to this port in your firewall settings.
With closed relay the mail server will accept only e-mail addressed to the users who have mailboxes on this server. Your customers will not be able to send any mail through your outgoing SMTP server, therefore, we do not recommend closing mail relay.
With relay after authorization, only your customers will be able to receive and send e-mail through your mail server. We recommend that you leave the authorization is required option selected, and specify allowed authentication methods:
Note for Windows hosting users: If you do not wish to use relay restrictions for networks that you trust, specify the network IP and mask in the Use no relay restrictions for the following networks: field (e.g., 123.123.123.123/16) and click the icon. To remove a network from the list, click the
icon corresponding to the network you wish to remove.
The relay hosts on the networks in the list are considered not to be potentially operated by spammers, open relays, or open proxies. A trusted host could conceivably relay spam, but will not originate it, and will not forge header data. DNS blacklist checks will never query for hosts on these networks.
There is also an option to allow open relay without authorization, which, by default, is hidden from the user interface. Opening mail relay without authorization is not recommended because it allows spammers to send unsolicited mail through your server. If you want to set the open relay, log in to the server's file system, locate the file root.controls.lock
in your Parallels Plesk Panel installation directory (PRODUCT_ROOT_D/var/root.controls.lock
on Unix and PRODUCT_DATA_D/var/root.controls.lock
on Windows platforms) and remove the line /server/mail.php3:relay_open
from this file. The open relay option will show in your control panel.
Selecting the Use of short and full names is allowed option will allow users to log in to their mail accounts by specifying only the left part of e-mail address before the @ sign (for example, username), or by specifying the full e-mail address (for example, username@your-domain.com).
To avoid possible authorization problems for e-mail users who reside in different domains but have identical user names and passwords, we recommend that you choose the Only use of full mail account names is allowed option.
Once you have set your mail server to support only full mail account names, you will not be able to switch back to supporting short account names until you make sure there are no encrypted passwords for mailboxes and user accounts with coinciding user names and passwords residing in different domains.
Note: If you wish to set up spam protection systems, such as SpamAssassin spam filter, or protection systems based on DomainKeys, DNS blackhole lists or Sender Policy Framework (SPF), proceed to the section Setting Up Spam Protection.