• We value your experience with Plesk during 2024
    Plesk strives to perform even better in 2025. To help us improve further, please answer a few questions about your experience with Plesk Obsidian 2024.
    Please take this short survey:

    https://pt-research.typeform.com/to/AmZvSXkx
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Search results

  1. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    @cyxxnet Open a support ticket with us: Plesk Anti-spam and Virus protection, Plesk Firewall, Plesk Extensions, Plesk Security | Danami
  2. danami

    Question SPAM Whitelist before DNSBL-Service to allow (override) temporarily blocked domains e.g. from freemailers

    @W4ru You should note that our Warden Anti-spam and Virus Protection extension allows you to whitelist/blacklist by IP addreses / CIDR, envelope senders, envelope recipients etc. This all happens at the postfix level. So you instead of having to remove the whole RBL you can just add the IP...
  3. danami

    Farewell post

    Damn you will be missed @IgorG. You were a true professional!
  4. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    SpamAssassin 4.0 has been released! The release announcement can be found here. We've added the final release of SpamAssassin 4.0 for RHEL/AlmaLinux/CloudLinux/RockyLinux 8 and 9 to the danami-warden-testing repository. Admins wanting to upgrade to SpamAssassin 4.0 now can follow the...
  5. danami

    Resolved Juggernaut Security and Firewall Plesk Addon

    Thanks for the kind words. I'm glad that it's working for you :)
  6. danami

    Resolved Juggernaut Security and Firewall Plesk Addon

    @MacGyver I don't think that CSF supports multiple CIDRs like that. You can read the syntax in the "Advanced Allow/Deny Filters" seaction of the CSF readme.txt here: https://download.configserver.com/csf/readme.txt Also I really don't recommend blocking all access like that. Country blocks...
  7. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    1. AbuseIPDB is only used when looking up IP addresses though the Warden interface. It isn't used by Amavis directly so you would never go though your daily limit. 2. There is not cost for DCC (The licensing just prohibits packaging it). Here is documentation for how to compile and install...
  8. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    If you use the DQS plugin then you could remove zen.spamhaus.org leaving others in place. There are a lot of good DNSBLs like b.barracudacentral.org and spam.spamrats.com that are not related to SpamHaus. Also I generally recommend using DNSBLs because they are rejected at at the lower SMTP...
  9. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    Yes you can set the log level and log templates under Settings -> Filter Settings. This should help you: https://www.danami.com/clients/knowledgebase/120/How-can-I-view-what-SpamAssassin-rules-were-matched-by-a-message.html
  10. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    @Alex Presland As I mentioned you don't have to disable your DNSBLs when Warden is installed. In fact we highly recommend that you enable them. I also recommend that you look over the following KB article...
  11. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    1. If you have Juggernaut Firewall installed then you can ban IP addresses on the firewall though the Warden interface if you want. 2. The getting started has everything that you would need to do in order to configure Warden to it's fullest. It usually takes less than 10 minutes. You can view...
  12. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    No you can leave the DNSBLs in Plesk mail settings. Warden will query the Plesk database and will add them to the Postfix client restrictions automatically.
  13. danami

    Issue can't upgrade plesk on debian 9 to mariadb 10.

    @Thera Just a note that Debian 9 was end of life on 30 June 2022. You shouldn't be using it any longer as there are no more security updates from Debian or from Plesk.
  14. danami

    Question Block IP via SPF local rules

    Just a note that in our Warden Anti-spam and Virus protection 3.0 release we added the ability to reject IP addresses or CIDRs at the SMTP level. Take a look at the Mail Server Access section in our announcement...
  15. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    Warden Anti-spam and Virus Protection 3.0 has been released. SpamAssassin 4 Support, Restriction Management, Access Management and More! Announcements - Danami
  16. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    @Hangover2 don't worry we've aleady added postfix restriction managment and much much more in the next release :)
  17. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    @Hangover2 We do have a feature in the works that handles this use case.
  18. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    The next major release of Warden is going to be out soon which has a lot of improvements. In the mean time I recommend that you add stronger SMTP restrictions to Postfix as this will block the bulk of spam before it even goes to Amavis (so it will help with yours spam forward problem with...
  19. danami

    Input Warden Antispam & Virus Protection Extension for Plesk

    You would have to set the policy spam action to block or quarantine then spam will be rejected or quarantined.
  20. danami

    Forwarded to devs Saving the Mail Server Settings page resets smtpd_recipient_restrictions

    Thanks @IgorG. This really is needed as in our testing we can reject the bulk of spam using postfix's built in spam settings. All the developers would need to do is add a simple check to smtpd_recipient_restrictions to see if it was missing 'reject_unauth_destination then reset it: if...
Back
Top