Skip to main content

Hermes SEG Administrator Guide

General Information

System

AD Integration

NOTE: This feature is only available with Hermes SEG Pro License. Hermes SEG requires a listing ...

Admin Authentication

Hermes SEG utilizes Authelia Authentication Server for controlling access to the the Hermes SEG A...

Admin Console Firewall

This feature is only available with Hermes SEG Pro License. The Admin Console Firewall allows ...

Network Settings

In this section you can setup the Hermes SEG network settings such as Hostname, IP address, Subne...

Console Settings

The Hermes SEG Console Settings sets the method you wish to access Hermes SEG machine which inclu...

Mail Queue

In this page, you can adjust the the Bounce and Max Queue Lifetime settings, Flush Mail Queue, Vi...

System Logs

System Logs allows you to set the Log Retention period, fetch system logs by date range/time and ...

System Backup

In this section will be able to configure one or more scheduled backup jobs for your Hermes SEG. ...

System Certificates

Hermes SEG allows you to manage SSL certificates in order to be used for console access over HTTP...

System Restore

The System Restore section will allow you to select a System Backup file from a CIFS (Windows Sha...

System Settings

The Postmaster E-mail Address MUST BE on a domain that the system currently delivers email for ...

System Status

System Status displays the following information: Version Build Edition Uptime System IP ...

System Update

NOTE: This feature is only available with Hermes SEG Pro License. System Update allows you to ch...

System Users

The System Users screen allows you to create, add and delete System Users (Figure 1). Figure 1 ...

Email Archive

In this section will be able to configure a scheduled archive jobs for your Hermes SEG. An Email...

System Reboot & Shutdown

Reboot System Click on the Reboot System button and wait for the system to finish the reboot p...

Gateway

Content Checks

Perimeter Checks

The Hermes SEG Perimeter Checks page allows you to set settings for any incoming email before the...

RBL Configuration

A RBL (Real Time Block List) is a mechanism for determining the reputation of a sender IP address...

Network Block/Allow

The IP & Network Override section will allow you to Permit or Deny specific IPs or Networks. The ...

Sender to Recipient Block/Allow List

The Sender Checks Bypass permits you to either Block or Allow sender email addresses or sender do...

Global Sender Block/Allow List

This page is under construction.

SPF Settings

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofi...

DKIM Settings

DomainKeys Identified Mail (DKIM) is a protocol that allows verifiable email transmission though ...

Antivirus Settings

The settings below control the behavior of the ClamAV antivirus engine. ClamAV is the default eng...

Antivirus Signature Feeds

The Hermes SEG default antivirus engine (ClamAV) is not very effective at detecting malware w...

Antivirus Signature Bypass

In this page, you can manage problematic Antivirus Signatures that cause too many false positives...

Antispam Settings

NOTE: This section requires any saved changes to be applied by clicking the Apply Settings button...

Custom Antispam Filter Tests

This page allows you to customize Spam filter tests scores to fit your needs. If you have problem...

Initialize Pyzor

Pyzor is a collaborative, networked system to detect and block spam using digests of messages.Pyz...

Initialize Vipul's Razor

Vipul's Razor is a distributed, collaborative, spam detection and filtering network. Vipul's Razo...

Clear Bayes Database

Occasionally, the Bayes Database can become corrupted or poisoned due to bad database training or...

Custom File Extensions

File Extensions are helpful in identifying files contained in incoming email attachments. File ex...

Custom File Expressions

File Expressions are helpful in identifying files contained in incoming email attachments. File e...

Message Rules

NOTE: This feature is only available with Hermes SEG Pro License. NOTE: This section requires an...

File Rules

File Rules allow you to create rules containing either block or allow actions for file extensions...

SVF Policies

SVF (Spam/Virus/File) Policies contain settings that determine the behavior of Hermes SEG in ...

Message History

Hermes SEG keeps a log and a copy of each email message it sends and receives for archiving p...

Encryption