Quick Start Guide IKARUS Admin Console

Dashboard

The new dashboard contains all of the known data from the previous IKARUS interface. It provides an overview of the entire account or all activated IKARUS services.

The summary shows statistics on:

  • IKARUS mail.security (with/without APT protection)
  • IKARUS web.security
  • IKARUS wifi.security
Dashboard

Dashboard

Dashboard – Settings

This is where the reports can be configured.

Dashboard - Settings

Dashboard – Settings

Dashboard – Search

An advanced email search and the grey list log are combined in one search. Search criteria that are already known, such as delivery status or virus infections, are also included.

Dashboard - Suche

Dashboard – Search

IKARUS mail.security – Inbound or Outbound

This is where you can request new routes or edit existing routes. Click on “Settings” to access the settings of the respective set.

IKARUS mail.security - Inbound bzw. Outbound

IKARUS mail.security – Inbound or Outbound

IKARUS mail.security – General

This is where you can configure a disclaimer.

IKARUS mail.security - General

IKARUS mail.security – General

IKARUS mail.security – Virus Filter

This is where you can define what is to happen when a virus is found and how password-protected archives should be dealt with.

IKARUS mail.security - Virus Filter

IKARUS mail.security – Virus Filter

IKARUS mail.security – Filetype Filter

This is where you can block certain file types, for example on the basis of the sender. If you want this to apply to all senders, enter an “*” as a placeholder.

IKARUS mail.security - Filetype Filter

IKARUS mail.security – Filetype Filter

IKARUS mail.security – HTML-Filter

The HTML filters all build on each other.

Autoconversion turns an email containing only HTML email into an email consisting of HTML and text.

HTML Removal deletes any HTML sections from the email. If only some parts of it are to be deleted, you can distinguish between the tags that are to be removed and the scripts. It is also possible to remove all scripts.

In the HTML filter, you can enable the new feature “Advanced URL Defense“, which further minimises the risks of spear phishing and ransomware. It extracts and analyses even hidden links in attachments or downloads, and detects manipulated URLs and redirects. In addition, any linked websites are scanned for phishing features.

“Remove Notify Requests” removes read receipts and acknowledgements of receipt from e-mails.

“Convert TNEF” converts winmail.dat files back into standard emails.

IKARUS mail.security - HTML-Filter

IKARUS mail.security – HTML-Filter

IKARUS mail.security – Spam Filter

Each e-mail message checked by IKARUS passes through numerous filters and is evaluated according to various criteria (e.g. SPF, dynamic word filter, rules, etc.). The more minus points allocated to an e-mail, the higher the probability that it is ‘true spam’. You can use the slider to define the level of sensitivity of IKARUS mail.security when it reacts.

The slider shows the threshold values for ‘possible spam’. The actions that should be taken for spam or possible spam can be set below.

The example in the screenshot shows the following settings:

0 points to 3 points: everything in order, no spam, no marking of emails

3 points to 7 points: possible spam

7 points to 10 points and higher:  spam

IKARUS mail.security - Spam Filter

IKARUS mail.security – Spam Filter

IKARUS mail.security – Spam Rules

Rules can be defined to categorise emails: for example, if a sender is on multiple blacklists but the user wants to continue receiving emails until the clean-up is complete.

E-mail log: This is where you define what the filter should focus on.

Sender: This is the actual sender (the ‘envelope sender’) of the e-mail, but this does not necessarily correspond to the sender identified in the e-mail programme.

Recipient: This shows to whom the e-mail was sent. This is also where you can select a single address that will be excluded from the spam filter.

Subject: This is where you can identify a specific part of the text that is part of the subject.

Text: This is where a specific text sequence can be identified, which can be found in the main part of the e-mail.

Content: This is where you can find the content. It identifies the character string used to perform a search for sender, recipient, subject or text. It should be noted that the search is performed only for the string, without taking into account what comes before or after it. For example, if a search is made for the text “count”, the word “accounting” is included in the search result.

Input: This determines what happens to an email when it is selected by the spam filter. The possible selections that could be made are regular, possible or spam.

Counter: This is where you can count how often the rule has been applied since it was implemented. The counter can be reset for all rules using the function “Reset all counters”.

Action Rules can be deleted, edited, moved up or down. It should be noted that the rules are processed from top to bottom, using the first applicable rule. This means that the order of the rules is relevant.

IKARUS mail.security – Spam Rules

IKARUS mail.security – Spam Rules

IKARUS mail.security – Outbound

The settings for outgoing routes (‘outbound’) are identical to those settings for incoming routes as described above.

Under outgoing you will find the detailed settings for the disclaimer and what actions have been requested if a threat is found in an email.

IKARUS mail.security - Outbound

IKARUS mail.security – Outbound

IKARUS mail.security – Settings

This is where you can activate an SPF whitelist and an email address for forwarding.

IKARUS mail.security - Settings

IKARUS mail.security – Settings

IKARUS web.security – IP – Routes

This is also where new IP routes can be applied for IKARUS and existing routes can be changed.

IKARUS web.security - IP – Routes

IKARUS web.security – IP – Routes

IKARUS web.security – Settings

Several routes are combined to form a “set”. This is where you can describe the sets.

IKARUS web.security - Settings

IKARUS web.security – Settings

IKARUS web.security – Virus Filter

This is where you can decide what is to happen when a virus is found and how password-protected archives should be dealt with. You can also assign rules for a white list.

.

IKARUS web.security - Virus Filter

IKARUS web.security – Virus Filter

IKARUS web.security – Filetype Filter

This is where you can define what should happen to certain file types.

IKARUS web.security - Filetype Filter

IKARUS web.security – Filetype Filter

IKARUS web.security – Category Filter

This is where you have the option to block categories that are already predefined (according to international guidelines).

IKARUS web.security - Category Filter

IKARUS web.security – Category Filter

IKARUS web.security – Category White List

This is where you can allow selected categories (“white list”).

IKARUS web.security - Category White List

IKARUS web.security – Category White List

IKARUS web.security – URL-Filter

This is where you can allow or forbid certain URLs.

IKARUS web.security - URL-Filter

IKARUS web.security – URL Filter

IKARUS web.security – Authentication – Routes

This is where you can assign a username and password for the dial-in to the proxy service. The setting options correspond to those of the “IP Routes” as described above.

IKARUS web.security - Authentication – Routes

IKARUS web.security – Authentication – Routes

IKARUS wifi.security

This is where you can manage the Wi-Fi routes. All other setting options are identical to those of IKARUS web.security as described above.

IKARUS wifi.security

IKARUS wifi.security

We are looking forward to hearing from you!

IKARUS Security Software GmbH
Blechturmgasse 11
1050 Vienna

Phone: +43 (0) 1 58995-0
Fax: +43 (0) 1 58995-100
Sales Hotline: +43 (0) 1 58995-500

SUPPORT HOTLINE

Support hotline:
+43 (0) 1 58995-400
support@ikarus.at

Support hours:
Mon – Thu: 8am – 5pm
Fri: 8am – 3pm

Remote maintenance software:
TeamViewer Download
AnyDesk Download