Manual IKARUS Portal

Table of Contents

1 Dashboard

The dashboard is the start page in the IKARUS portal and appears automatically after login. It offers a quick overview over the whole account (email address, last login etc.) and over all activated IKARUS services.

The statistic shows a summary of the following products:

  • IKARUS (with/without ATP – Advanced Threat Protection)


2 Settings

The settings can be opened at the top right by clicking on the cogwheel icon.

In the settings, you can change the password and the design as well as activate the two-factor authentication for your own account.

Personal settings

At the bottom of each page, you will find the IKARUS support information and links to the remote maintenance applications.


4 Organisation

4.1 Overview

In the overview, you can see all subordinate instances that belong to your administration. To manage an organisation, switch to the respective organisation in the “Action” column.

All actions remain assigned to the user you are signed in with.


4.2 Users

Under the menu item users, you can see all accounts of the currently selected instance. You can edit them in the “Action” column on the right.

Use the “+” button to add new users by entering the email-address and choosing the suitable role.


The following roles are possible:

  • Administrator: Administrative user for own organisation as well as with all rights for all assigned organisations
  • Technician: Administrative user for own organisation exclusive user management as well as with all rights for all assigned organisations
  • Client Technician: Administrative user with all rights for all assigned organisations
  • Read Only Technician: Read-only users for own organisation as well as for all assigned organisations
  • User: Administrative user for a specific organisation
  • Read Only User: Read-only users for a specific organisation

New User

4.3 Logs

Here you will find the logs of all organisational changes. They also show from which account these changes were made.


4.4 Management/Settings

This is where you can make organisation-wide settings.



5.1 Ingoing

5.1.1 Routes

Apply for new routes or edit existing routes by clicking on the red plus at the bottom right. Click on “Settings” to access the settings for the respective set.

IKARUS inbound

5.1.2 Settings General

Configure a disclaimer by setting the option to enabled. The disclaimer is added to all transmitted e-mails.

IKARUS inbound general Virus filter

Define which actions should be taken in case of a virus detection and how to deal with password-protected archives.

IKARUS inbound virus filter Attachment filter

Block certain file types, also based on the sender. If this is to apply to all senders, enter “*” as a placeholder.

IKARUS inbound attachment filter HTML filter

The HTML filters build on each other. The auto conversion turns a pure HTML e-mail into an e-mail consisting of HTML and text.

“Remove HTML”: Deletes any HTML part from the email. To remove only certain parts, distinguish between tags that should be deleted and scripts. It is also possible to remove all scripts.

“Remove Notify Requests” removes read and receipt confirmations from emails.

“Convert TNEF” converts winmail.dat files back to standard emails.

“Advanced URL Defense” scans links not only when an email is received, but again each time the URL is clicked. This means that even delayed attacks are detected and blocked.

IKARUS inbound HTML filter Spam filter

Each email that is checked by IKARUS goes through various filters and is evaluated according to different criteria (e.g. SPF, dynamic word filters, rules…). The more plus points an email collects, the higher the probability that it is “real” spam. You can use the slider to determine how sensitively IKARUS should react.

The sliders shows the limit values for “possible spam”. Below you can determine how IKARUS should deal with “spam” and “possible spam”.

The example in the screenshot shows the following settings:

  • 0 points to 3 points: ok – no spam, no marking of the emails
  • 3 points to 7 points: possible spam
  • 7 points to 10 points: spam

IKARUS inbound spam filter Spam rules

Define rules to categorise emails, for example when the sender is on several blacklists but the recipient still wants to receive these emails.

  • Email section: Define the section the filter should apply to
  • Sender: The actual sender of the email that must not necessarily correspond to the sender displayed in the e-mail programme.
  • Recipient: Shows the address to which the email is sent. Allows to choose select a single address to be excluded from the spam filter.
  • Subject: Identify a certain text that is part of the subject.
  • Text: Identify a certain text sequence that can be found in the main part of the email.
  • Content: Shows the content of the email. It identifies the string used to perform a search for sender, recipient, subject or text. Note that the search is only performed for the string, without taking into account what comes before or after it (e.g. searching to “count” will also including “accounting” in the search results”.
  • Input: defines how to deal with the email if it was detected by the spam filter. Choose between regular email, possible spam or spam.
  • Counter: Counts how many times a rule was applied since its implementation. The reset-button will reset all counters.
  • Action: Rules can be deleted, edited or shifted upwards or downwards. Please note that the rules will apply from top to bottom using the first applicable rule. This means that the order of the rules is of importance.

IKARUS inbound spam filter add new spam rule

5.2 IKARUS – outgoing

The settings for outgoing routes (“Outgoing”) are identical to the settings for incoming routes described above.

Here, too, there are detailed settings for the disclaimer and the desired behaviour when a threat is found in an e-mail.

IKARUS outbound

Advanced email search and the Greylist log are combined in one search. Well-known search criteria such as delivery status or infections are also included.

IKARUS search


Under Certificates you can see the number of available IKARUS S/MIME certificates and the number of certificates currently in active use. The graphic also shows the number of mailboxes configured in IKARUS

In the table you will find an overview of your maliboxes and your available IKARUS S/MIME licences as well as their status and allocation. The overview contains all email addresses that have been configured as a known mailbox in IKARUS in an incoming route. The list can be filtered by mailbox, domain, and S/MIME status. By clicking on the Export button, the overview can be exported as a CSV file or Excel spreadsheet.

Inactive means that no certificate has been assigned to this mailbox and therefore no signing of the outgoing e-mail takes place.

Active means that this mailbox uses one of your SMIME certificates and outgoing emails are automatically signed when sent via IKARUS

In deactivation means that the certificate of this mailbox has been revoked. After a revocation period of maximum 14 days, the certificate is released and reappears in the list of your available certificates.

Under Actions, certificates can be requested for the respective mailbox by clicking on the + sign. Click on the upload icon to upload external certificates from third parties to manage them via IKARUS Note: Imported certificates are used like IKARUS S/MIME certificates and thus also counted towards the IKARUS contingent.


5.5 IKARUS – Encryption

The rules for encryption can be entered here
The rules are processed according to their priority and the first hit applies.

New rules require the following parameters:

  • Managed mailbox/domain
    • A mailbox managed by in this organization
    • Max. 20 entries per rule
    • Comma separated
    • To apply to all “ANY”
  • External mailbox/domain
    • A mailbox outside this organization to which mail is sent or from which mail is received
    • Max. 20 entries per rule
    • Comma separated
    • To apply to all “ANY”
  • Incoming rule
    • Not defined
      • No change to the lower prioritized rules
    • Do not decrypt
      • Encrypted emails are accepted and delivered encrypted
    • Optionally decrypt
      • Encrypted emails are decrypted if possible
        • DEFAULT
      • Always decrypt encrypted emails
        • unencrypted emails are accepted
        • Encrypted emails that cannot be decrypted will display an error message
      • Force decryption
        • only encrypted emails are accepted
      • Outbound
        • Not defined
          • no change to the lower prioritized rules
        • Neither sign nor encrypt
          • Emails are sent unsigned and unencrypted
            • DEFAULT
          • Sign only
            • Emails are signed and sent unencrypted
          • Optional encryption
            • Emails are signed and encrypted where possible
          • Enforce encryption
            • Emails are only sent signed and encrypted

Rules are added to the top of the table with priority 1

The table consists of:

  • Priority
    • Order in which the rules are processed
      • After a hit, no further steps are taken through the table
        • Exception for “Not defined”
      • This can be adjusted using the arrow keys
    • Managed mailbox/domain
      • Mailboxes / domains entered as a rule
    • External mailbox/domain
      • Mailboxes / domains entered in the rule
    • Incoming
      • How the incoming email should be handled
        • From external mailbox to Managed
      • Outgoing
        • How the outgoing email should be handled
          • From managed mailbox to external mailbox
        • Actions
          • Delete the rule
          • Edit the rule

If multiple rules are selected, you can also delete multiple rules

IKARUS - Encryption

5.6 Further settings

Active a SPF whitelist or an email address for forwarding.

IKARUS further settings


6.1 IP routes

6.2 Settings

6.2.1 General

Various routes are combined in one set. Here you can describe these sets.

IKARUS general settings

6.2.2 Virus filter

Decide how to react in case of a virus detection and how to deal with password-protected archives. Additionally you can set rules for a whitelist.

IKARUS virus filter

6.2.3 File type filter

Define how to deal with certain file types.

6.2.4 Category filter

Block categories that are defined according to international guidelines.

6.2.5 Category whitelist

Allow (“whitelist”) defined categories.

6.2.6 URL filter

Allow or block certain URLs.

6.2.7 Authentication routes

Assign a user name and password for dialling into the proxy service. The setting options correspond to those of the “IP Routes” described above.


Manage the Wi-Fi routes here. All other setting options are identical to those for IKARUS described above.


IKARUS Security Software GmbH Blechturmgasse 11
1050 Vienna

Phone: +43 1 58995-0
Sales Hotline:
+43 1 58995-500


Support hotline:
+43 1 58995-400

Support hours:
Mon – Thu: 8am – 5pm
Fri: 8am – 3pm
24/7 support by arrangement

Remote maintenance software:
AnyDesk Download