Note: At the top of each Services page, the name of the Service, its Status (Running or Stopped), and a Start/Stop button appears. This allows you to Start or Stop individual Services from their respective web pages, as well as from the Service Administration page.
You can use the IMAP Settings page to configure the IMAP Server. IMAP4 lets users access remote messages stored on the mail server as if they were local. Users can read, move, delete mail, and create mailboxes on the server system. Since messages reside on the server, users can access their mailboxes from multiple machines.
Important: After making changes, click Save. Stop the service, wait 5-10 seconds and restart the service.
Plain Text Authentication Commands |
Base64 Encoded Authentication Commands |
LOGIN |
AUTH PLAIN |
A configurable registry key can be added to modify the sleep idle command when enabled. The default setting is 10000 milliseconds (10 seconds), if the registry key is not found.
Registry path: "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IMAP4D32\Parameters"
Name |
Type |
Data |
IdleSleepInterval |
REG_DWORD |
0x00002710 (10000) |
The text is limited to 400 characters or less. If over 400 characters is entered, the system will use the default message. To intentionally revert back to the default message, clear this field.
The Account Harvesting feature allows the IMail Administrator to control user authentication to prevent attempts by a client to continuously try and gain access and attain user names and passwords.
Tip: The Blacklist Duration is the length of time the IP address will be blocked and will remain in the Control Access list.
Note: POP3 and IMAP share the same registry settings for all Account Harvesting Prevention options. Changing an IMAP setting will also affect the POP3 setting.
Note: IMail Server uses OpenSSL Command Line Tool (v0.9.8e) which supports up to 4096-bit RSA and 2048-bit DSA. OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) network protocols and related cryptography standards required by them.
Save. Click to save your settings.
Related Topic