Manual IKARUS Portal

Table of Contents

1 Dashboard

The dashboard is the start page in the IKARUS portal and appears automatically after login. It offers a quick overview over the whole account (email address, last login etc.) and over all activated IKARUS services.

The statistic shows a summary of the following products:

  • IKARUS (with/without ATP – Advanced Threat Protection)


2 Settings

The settings can be opened at the top right by clicking on the cogwheel icon.

In the settings, you can change the password and the design as well as activate the two-factor authentication for your own account.

Personal settings

At the bottom of each page, you will find the IKARUS support information and links to the remote maintenance applications.


4 Organisation

4.1 Overview

In the overview, you can see all subordinate instances that belong to your administration. To manage an organisation, switch to the respective organisation in the “Action” column.

All actions remain assigned to the user you are signed in with.


4.2 Users

Under the menu item users, you can see all accounts of the currently selected instance. You can edit them in the “Action” column on the right.

Use the “+” button to add new users by entering the email-address and choosing the suitable role.


The following roles are possible:

  • Administrator: Administrative user for own organisation as well as with all rights for all assigned organisations
  • Technician: Administrative user for own organisation exclusive user management as well as with all rights for all assigned organisations
  • Client Technician: Administrative user with all rights for all assigned organisations
  • Read Only Technician: Read-only users for own organisation as well as for all assigned organisations
  • User: Administrative user for a specific organisation
  • Read Only User: Read-only users for a specific organisation

New User

4.3 Logs

Here you will find the logs of all organisational changes. They also show from which account these changes were made.


4.4 Management/Settings

This is where you can make organisation-wide settings.



5.1 Ingoing

5.1.1 Routes

Apply for new routes or edit existing routes by clicking on the red plus at the bottom right. Click on “Settings” to access the settings for the respective set.

IKARUS inbound

5.1.2 Settings General

Configure a disclaimer by setting the option to enabled. The disclaimer is added to all transmitted e-mails.

IKARUS inbound general Virus filter

Define which actions should be taken in case of a virus detection and how to deal with password-protected archives.

IKARUS inbound virus filter Attachment filter

Block certain file types, also based on the sender. If this is to apply to all senders, enter “*” as a placeholder.

IKARUS inbound attachment filter HTML filter

The HTML filters build on each other. The auto conversion turns a pure HTML e-mail into an e-mail consisting of HTML and text.

“Remove HTML”: Deletes any HTML part from the email. To remove only certain parts, distinguish between tags that should be deleted and scripts. It is also possible to remove all scripts.

“Remove Notify Requests” removes read and receipt confirmations from emails.

“Convert TNEF” converts winmail.dat files back to standard emails.

“Advanced URL Defense” scans links not only when an email is received, but again each time the URL is clicked. This means that even delayed attacks are detected and blocked.

IKARUS inbound HTML filter Spam filter

Each email that is checked by IKARUS goes through various filters and is evaluated according to different criteria (e.g. SPF, dynamic word filters, rules…). The more plus points an email collects, the higher the probability that it is “real” spam. You can use the slider to determine how sensitively IKARUS should react.

The sliders shows the limit values for “possible spam”. Below you can determine how IKARUS should deal with “spam” and “possible spam”.

The example in the screenshot shows the following settings:

  • 0 points to 3 points: ok – no spam, no marking of the emails
  • 3 points to 7 points: possible spam
  • 7 points to 10 points: spam

IKARUS inbound spam filter Spam rules

Define rules to categorise emails, for example when the sender is on several blacklists but the recipient still wants to receive these emails.

  • Email section: Define the section the filter should apply to
  • Sender: The actual sender of the email that must not necessarily correspond to the sender displayed in the e-mail programme.
  • Recipient: Shows the address to which the email is sent. Allows to choose select a single address to be excluded from the spam filter.
  • Subject: Identify a certain text that is part of the subject.
  • Text: Identify a certain text sequence that can be found in the main part of the email.
  • Content: Shows the content of the email. It identifies the string used to perform a search for sender, recipient, subject or text. Note that the search is only performed for the string, without taking into account what comes before or after it (e.g. searching to “count” will also including “accounting” in the search results”.
  • Input: defines how to deal with the email if it was detected by the spam filter. Choose between regular email, possible spam or spam.
  • Counter: Counts how many times a rule was applied since its implementation. The reset-button will reset all counters.
  • Action: Rules can be deleted, edited or shifted upwards or downwards. Please note that the rules will apply from top to bottom using the first applicable rule. This means that the order of the rules is of importance.

IKARUS inbound spam filter add new spam rule

5.2 IKARUS – outgoing

The settings for outgoing routes (“Outgoing”) are identical to the settings for incoming routes described above.

Here, too, there are detailed settings for the disclaimer and the desired behaviour when a threat is found in an e-mail.

IKARUS outbound

Advanced email search and the Greylist log are combined in one search. Well-known search criteria such as delivery status or infections are also included.

IKARUS search

5.4 Further settings

Active a SPF whitelist or an email address for forwarding.

IKARUS further settings


6.1 IP routes

6.2 Settings

6.2.1 General

Various routes are combined in one set. Here you can describe these sets.

IKARUS general settings

6.2.2 Virus filter

Decide how to react in case of a virus detection and how to deal with password-protected archives. Additionally you can set rules for a whitelist.

IKARUS virus filter

6.2.3 File type filter

Define how to deal with certain file types.

6.2.4 Category filter

Block categories that are defined according to international guidelines.

6.2.5 Category whitelist

Allow (“whitelist”) defined categories.

6.2.6 URL filter

Allow or block certain URLs.

6.2.7 Authentication routes

Assign a user name and password for dialling into the proxy service. The setting options correspond to those of the “IP Routes” described above.


Manage the Wi-Fi routes here. All other setting options are identical to those for IKARUS described above.


IKARUS Security Software GmbH Blechturmgasse 11
1050 Vienna

Phone: +43 (0) 1 58995-0
Sales Hotline:
+43 (0) 1 58995-500


Support hotline:
+43 (0) 1 58995-400

Support hours:
Mon – Thu: 8am – 5pm
Fri: 8am – 3pm

Remote maintenance software:
AnyDesk Download