Content Checks

Perimeter Checks

The Hermes SEG Perimeter Checks page allows you to set settings for any incoming email before the...

RBL Configuration

A RBL (Real Time Block List) is a mechanism for determining the reputation of a sender IP address...

IP & Network Override

The IP & Network Override section will allow you to Permit or Deny specific IPs or Networks. The ...

Sender to Recipient Block/Allow List

The Sender Checks Bypass permits you to either Block or Allow sender email addresses or sender do...

Global Sender Block/Allow List

This page is under construction.

SPF Configuration

This page is currently under construction.

SPF Bypass

This page is currently under construction.

DKIM Configuration

NOTE: This feature is only available with Hermes SEG Pro License. NOTE: This section requires an...

DKIM Sender Bypass

This page is currently under construction.

DKIM Trusted Hosts

NOTE: This feature is only available with Hermes SEG Pro License. NOTE: This section requires an...

DKIM Sign

NOTE: This feature is only available with Hermes SEG Pro License. NOTE: This section requires an...

Antivirus Settings

The settings below control the behavior of the ClamAV antivirus engine. ClamAV is the default eng...

Antivirus Signature Feeds

The Hermes SEG default antivirus engine (ClamAV) is not very effective at detecting malware w...

Antivirus Signature Bypass

In this page, you can manage problematic Antivirus Signatures that cause too many false positives...

Antispam Settings

NOTE: This section requires any saved changes to be applied by clicking the Apply Settings button...

Custom Antispam Filter Tests

This page allows you to customize Spam filter tests scores to fit your needs. If you have problem...

Initialize Pyzor

Pyzor is a collaborative, networked system to detect and block spam using digests of messages.Pyz...

Initialize Vipul's Razor

Vipul's Razor is a distributed, collaborative, spam detection and filtering network. Vipul's Razo...

Clear Bayes Database

Occasionally, the Bayes Database can become corrupted or poisoned due to bad database training or...

Custom File Extensions

File Extensions are helpful in identifying files contained in incoming email attachments. File ex...

Custom File Expressions

File Expressions are helpful in identifying files contained in incoming email attachments. File e...

Message Rules

NOTE: This feature is only available with Hermes SEG Pro License. NOTE: This section requires an...

File Rules

File Rules allow you to create rules containing either block or allow actions for file extensions...

SVF Policies

SVF (Spam/Virus/File) Policies contain settings that determine the behavior of Hermes SEG in ...

Message History & Archive

Hermes SEG keeps a log and a copy of each email message it sends and receives for archiving p...