Monday, January 4, 2010

How to Configure a POP3 Server

As a network administrator, it is your responsibility to ensure the network's security. Keeping the network secure requires proper configurations of all network protocols, components and services. Each configuration is a direct reflection of your company's security, user and network policies, in that each configuration is outlined specifically in each given policy. The POP3 configuration is no exception to these rules. Without properly configuring your POP3 Server, you cannot block access, log attacks, or secure this portion of your network.

Instructions
  1. Step 1

    Open your IMail Administrator found within your POP3 server console. Expand the "Localhost" folder. Scroll down and expand the "Services" folder. Scroll down within "Services" and select "POP3."

  2. Step 2

    Select "Log Options" for your POP3 server. Begin with "Log To." Select the Log option of your choice from the drop-down list. Do not, however, choose "No Log" as it will not keep records which can aid you in pinpointing attacks or illegal or inappropriate use by users. Choose between "sysMMDD.TXT" which will send the log to the spool directory and label events by the month and day of its occurrence. Selecting "Windows Application" to store logs is a good choice, perhaps, for a small network, your best option for log storage for a large network is "Log Server."

  3. Step 3

    Select "Use APOP" to authenticate and encrypt user information and passwords. Select "Enable XTND XMIT command" only if you are using WinQVT\Net as it needs the "XTND XMIT" feature for the network to receive and transmit outbound messages.

  4. Step 4

    Select "Allow remote password changes" only if it is allowed per your company's User and Security Policy. This feature is not required and can prove to be dangerous as it may leave a window open to attackers. You can set up password changes such as reminders for users to change their after a predetermined amount of time. This task can easily be administered by enabling password changes within user authorizations and preferences.

  5. Step 5

    Select "Auto-deny possible hack attempts" to deny access to ports that have been ruled out as dangerous and vulnerable. Vulnerabilities would include access points which this will prevent, and dangers would include viewing, copying, or using sensitive or classified information after access is gained. Select "Enable Dedicated SSL link" to secure and encrypt network data. Do not use the default port; it is considered a known port and easy to attack. Use the port for SSL that is designated in your company's security policy.

  6. Step 6

    Edit "Hello" or "Welcome" messages. Select "Advance Tab." Change messages to prevent hackers. This message could be something as simple as a cyberlaw, US Code, or a list of penalties for attempting to breach your network. Select "Apply" once you have made this and all of the above changes.

No comments:

Post a Comment