Page 111 - Mercury Manual.book
P. 111

P                                          limiting number of attempts  . . . 68
                                    Passwords                                  strict vs normal relaying controls  62
                                       changing . . . . . . . . . . . . . . . . . 4  Remote queues
                                       in mailing lists  . . . . . . . . . . . . 28  starting via ETRN . . . . . . . . . . 87
                                        POP3  . . . . . . . . . . . . . . . . . . 22  Retries  . . . . . . . . . . . . . . . . . . . . . 9
                                    Passwords, POP3  . . . . . . . . . . . . . 77  Rules
                                    PCONFIG . . . . . . . . . . . . . . . . . . 23  exact text match  . . . . . . . . . . . 41
                                    PCONFIG utility  . . . . . . . . . . . . . 23  S
                                    Pegasus Mail  . . . . . . . . . . . . 1, 7, 40
                                        addressbooks and MercuryH . . . 89  Service
                                                                               running Mercury as . . . . . . . . . . 5
                                        configuring to work with Mercury  .   Session logging
                                               23
                                        secondary queues and  . . . . . . . 10  MercuryI   . . . . . . . . . . . . . . . 91
                                    PH protocol . . . . . . . . . . . . . 2, 4, 89  MercuryP  . . . . . . . . . . . . . . . 78
                                                                               MercuryS  . . . . . . . . . . . . . . . 60
                                    PMAIL.USR  . . . . . . . . . . . . . . . . 22  Short-term blacklisting   . . . . . . . . . 68
                                    PMGATE.SYS   . . . . . . . . . . . . . . 23  Smart DNS Services  . . . . . . . . . . . . 3
                                    Policies . . . . . . . . . . . . . . . . . . . . 36  SMTP   . . . . . . . . . . . . . . . . . . . . 67
                                        actions  . . . . . . . . . . . . . . . . . 38  choosing a client module  . . . . . 73
                                        samples   . . . . . . . . . . . . . . . . 39
                                        sentinel and result files   . . . . . . 37  Spam
                                    Polling frequency                          and open relays   . . . . . . . . . . . 62
                                                                               and realtime blacklists (RBLs)   . 63
                                        core module . . . . . . . . . . . . . . . 7  detecting using Content Control   48
                                        MercuryC and MercuryE  . . . . . 74
                                    POP3                                    Special headers
                                                                               and MercuryD  . . . . . . . . . . . . 85
                                        account information in MercuryD 83  SRVANY  . . . . . . . . . . . . . . . . . . . 5
                                        global profile settings  . . . . . . . 78
                                        login name aliasing . . . . . . . . . 80  SSL certificate fingerprints  . . . . . . . 95
                                        user profile settings . . . . . . . . . 78
                                    Pornographic mail                          in MercuryI . . . . . . . . . . . . . . 93
                                                                               in MercuryP   . . . . . . . . . . . . . 80
                                        filtering using Content Control  . 48
                                    Postmaster   . . . . . . . . . . . . . . 6, 7, 8  in MercuryS   . . . . . . . . . . . . . 72
                                                                               overview and configuration   . . . 94
                                        referring errors to  . . . . . . . . . . . 8
                                    Primary Moderator  . . . . . . . . . . . . 26  Statistics . . . . . . . . . . . . . . . . . . . 14
                                    Primary moderator  . . . . . . . . . 26, 28  Substitution
                                                                               in template files  . . . . . . . . . . . 17
                                    Progressive backoff . . . . . . . . . . . . . 9
                                    Public Folders  . . . . . . . . . . . . . . . 19  Substitutions
                                                                               in policy commandlines . . . . . . 38
                                    Q                                          when specifying mailbox path . . . 7
                                    Queues . . . . . . . . . . . . . . . . . . . . 10  Synonyms . . . . . . . . . . . . . . . . . . 13
                                                                               in NDS mode . . . . . . . . . . . . . 22
                                    R                                       System messages window   . . . . . . . 14
                                    RASDIAL, RASDIAL95  . . . . . . . . 88  T
                                    Realtime Blacklists (RBLs)   . . . . . . 63
                                        actions resulting from  . . . . . . . 66  Template files
                                        finding services to use  . . . . . . . 65  mail server   . . . . . . . . . . . . . . 19
                                        how they work . . . . . . . . . . . . 64  overview . . . . . . . . . . . . . . . . 17
                                    Realtime Whitelists . . . . . . . . . . . . 64  Temporary files  . . . . . . . . . . . . . . 12
                                    Regular expressions                     TFILE aliases   . . . . . . . . . . . . . . . 20
                                        case sensitivity . . . . . . . . . . . . 57  Time zones  . . . . . . . . . . . . . . . . . . 7
                                        in Content Control  . . . . . . . . . 57  Transaction-level filtering   . . . . . . . 68
                                        in mail filtering   . . . . . . . . . . . 41  exempting systems from   . . . . . 61
                                        matching anywhere in text  . . . . 58  Transcripts  . . . . . . . . . . . . . . . . . 76
                                    Relaying                                U
                                        and aliases . . . . . . . . . . . . . . . 62  UIDL (POP3 command)   . . . . . . . . . 1
                                        controlling   . . . . . . . . . . . . . . 61
   106   107   108   109   110   111   112