Table of Contents
1 Dashboard
The dashboard is the start page in the IKARUS portal and appears automatically after login. It offers a quick overview over the whole account (email address, last login etc.) and over all activated IKARUS services.
The statistic shows a summary of the following products:
- IKARUS mail.security (with/without ATP – Advanced Threat Protection)
- IKARUS web.security
- IKARUS wifi.security
2 Settings
The settings can be opened at the top right by clicking on the cogwheel icon.
In the settings, you can change the password and the design as well as activate the two-factor authentication for your own account.
3 Footer
At the bottom of each page, you will find the IKARUS support information and links to the remote maintenance applications.
4 Organisation
4.1 Overview
In the overview, you can see all subordinate instances that belong to your administration. To manage an organisation, switch to the respective organisation in the “Action” column.
All actions remain assigned to the user you are signed in with.
4.2 Users
Under the menu item users, you can see all accounts of the currently selected instance. You can edit them in the “Action” column on the right.
Use the “+” button to add new users by entering the email-address and choosing the suitable role.
The following roles are possible:
- Administrator: Administrative user for own organisation as well as with all rights for all assigned organisations
- Technician: Administrative user for own organisation exclusive user management as well as with all rights for all assigned organisations
- Client Technician: Administrative user with all rights for all assigned organisations
- Read Only Technician: Read-only users for own organisation as well as for all assigned organisations
- User: Administrative user for a specific organisation
- Read Only User: Read-only users for a specific organisation
4.3 Logs
Here you will find the logs of all organisational changes. They also show from which account these changes were made.
5 IKARUS mail.security
5.1 Ingoing
5.1.1 Routes
Apply for new routes or edit existing routes by clicking on the red plus at the bottom right. Click on “Settings” to access the settings for the respective set.
5.1.2 Settings
5.1.2.1 General
Configure a disclaimer by setting the option to enabled. The disclaimer is added to all transmitted e-mails.
5.1.2.2 Virus filter
Define which actions should be taken in case of a virus detection and how to deal with password-protected archives.
5.1.2.3 Attachment filter
Block certain file types, also based on the sender. If this is to apply to all senders, enter “*” as a placeholder.
5.1.2.4 HTML filter
The HTML filters build on each other. The auto conversion turns a pure HTML e-mail into an e-mail consisting of HTML and text.
“Remove HTML”: Deletes any HTML part from the email. To remove only certain parts, distinguish between tags that should be deleted and scripts. It is also possible to remove all scripts.
“Remove Notify Requests” removes read and receipt confirmations from emails.
“Convert TNEF” converts winmail.dat files back to standard emails.
“Advanced URL Defense” scans links not only when an email is received, but again each time the URL is clicked. This means that even delayed attacks are detected and blocked.
5.1.2.4 Spam filter
Each email that is checked by IKARUS goes through various filters and is evaluated according to different criteria (e.g. SPF, dynamic word filters, rules…). The more plus points an email collects, the higher the probability that it is “real” spam. You can use the slider to determine how sensitively IKARUS mail.security should react.
The sliders shows the limit values for “possible spam”. Below you can determine how IKARUS mail.security should deal with “spam” and “possible spam”.
The example in the screenshot shows the following settings:
- 0 points to 3 points: ok – no spam, no marking of the emails
- 3 points to 7 points: possible spam
- 7 points to 10 points: spam
5.1.2.5 Spam rules
Define rules to categorise emails, for example when the sender is on several blacklists but the recipient still wants to receive these emails.
- Email section: Define the section the filter should apply to
- Sender: The actual sender of the email that must not necessarily correspond to the sender displayed in the e-mail programme.
- Recipient: Shows the address to which the email is sent. Allows to choose select a single address to be excluded from the spam filter.
- Subject: Identify a certain text that is part of the subject.
- Text: Identify a certain text sequence that can be found in the main part of the email.
- Content: Shows the content of the email. It identifies the string used to perform a search for sender, recipient, subject or text. Note that the search is only performed for the string, without taking into account what comes before or after it (e.g. searching to “count” will also including “accounting” in the search results”.
- Input: defines how to deal with the email if it was detected by the spam filter. Choose between regular email, possible spam or spam.
- Counter: Counts how many times a rule was applied since its implementation. The reset-button will reset all counters.
- Action: Rules can be deleted, edited or shifted upwards or downwards. Please note that the rules will apply from top to bottom using the first applicable rule. This means that the order of the rules is of importance.
5.2 IKARUS mail.security – outgoing
The settings for outgoing routes (“Outgoing”) are identical to the settings for incoming routes described above.
Here, too, there are detailed settings for the disclaimer and the desired behaviour when a threat is found in an e-mail.
5.3 IKARUS mail.security – search
Advanced email search and the Greylist log are combined in one search. Well-known search criteria such as delivery status or infections are also included.
6 IKARUS web.security
6.1 IP routes
6.2 Settings
6.2.2 Virus filter
Decide how to react in case of a virus detection and how to deal with password-protected archives. Additionally you can set rules for a whitelist.
6.2.7 Authentication routes
Assign a user name and password for dialling into the proxy service. The setting options correspond to those of the “IP Routes” described above.
7 IKARUS wifi.security
Manage the Wi-Fi routes here. All other setting options are identical to those for IKARUS web.security described above.