{"id":28665,"date":"2023-06-13T12:31:24","date_gmt":"2023-06-13T10:31:24","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/"},"modified":"2025-02-28T15:10:36","modified_gmt":"2025-02-28T14:10:36","slug":"faqs-ikarus-mail-security","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/","title":{"rendered":"FAQs IKARUS mail.security"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-d36d9c8385e72339198b26c9386642ac entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-dcbab7c4a63d51201b18857d09d92f97\">\n.flex_cell.av-junyesco-dcbab7c4a63d51201b18857d09d92f97{\nvertical-align:middle;\nheight:200px;\nmin-height:200px;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-dcbab7c4a63d51201b18857d09d92f97{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-dcbab7c4a63d51201b18857d09d92f97 av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:200px;\nmin-height:200px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1txevv-b3afbc7475719148e3960f96100624da\">\n#top .av-special-heading.av-1txevv-b3afbc7475719148e3960f96100624da{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-1txevv-b3afbc7475719148e3960f96100624da .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-1txevv-b3afbc7475719148e3960f96100624da .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-1txevv-b3afbc7475719148e3960f96100624da .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-1txevv-b3afbc7475719148e3960f96100624da .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-1txevv-b3afbc7475719148e3960f96100624da .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-1txevv-b3afbc7475719148e3960f96100624da .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-1txevv-b3afbc7475719148e3960f96100624da av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >FAQs IKARUS mail.security<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-4  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-5  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-c560f286cad9655cf79b9c2f33f5d5f2\">\n.flex_cell.av-junywu9f-c560f286cad9655cf79b9c2f33f5d5f2{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-c560f286cad9655cf79b9c2f33f5d5f2{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-c560f286cad9655cf79b9c2f33f5d5f2 av-gridrow-cell av_one_half no_margin  avia-builder-el-6  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div>\n<div id='av-layout-grid-3'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-7  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n<div class='flex_cell av-q2i8yj-d8b0319cfaae95b9c865418c60435802 av-gridrow-cell av_one_full no_margin  avia-builder-el-8  avia-builder-el-no-sibling '  ><div class='flex_cell_inner'><div  class='avia-icon-list-container av-jzwfmaj4-c874b2f57a5322837469736efe573e2e  avia-builder-el-9  avia-builder-el-no-sibling '><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-big av-jzwfmaj4-c874b2f57a5322837469736efe573e2e avia-iconlist-animate'>\n<li><div class='iconlist_icon av-fk2x57-10e86461a3283eaa7eac85b5cb8556c7 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: I DO NOT RECEIVE EXPECTED EMAILS\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >I DO NOT RECEIVE EXPECTED EMAILS<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>The status of the received emails can be checked in the log files.<\/p>\n<p>Using the log file access interface, you can search for any email accepted by the IKARUS mail.security system. If an email has been received, you can find the status of the email. The following status values are available:<\/p>\n<ul>\n<li><strong>Delivered:<\/strong> Email was sent to the next server.<\/li>\n<li><strong>Delivery error:<\/strong> delivery to the destination server failed.<\/li>\n<li><strong>Queued<\/strong>: the transmission to the next server is still pending.<\/li>\n<li><strong>Rejected:<\/strong> the email was rejected due to spam \/ virus \/ attachment.<\/li>\n<\/ul>\n<p>Emails can be resent directly from the log file.<\/p>\n<p>In addition, there are emails that are rejected by the system. This happens when the sender&#8217;s domain is not authorised by SPF (sender policy framework).<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-d9994129d68feb9b74a2fa15d9c38090 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT IS APT OR ATP?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT IS APT OR ATP?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>The abbreviations stand for Advanced Persistent Threat (APT) and Advanced Threat Protection (ATP) respectively. This is a sandbox environment that is used for additional tests of the files that are not detected as a virus by IKARUS. The file is executed, and the behaviour is analysed by the ATP, depending on this behaviour it is detected as a virus. This provides additional protection against new, unknown viruses or malware.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-8-f2d9e6286f4c6cc55047c30e6e06058b avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT DO I HAVE TO CHANGE IN MY ENVIRONMENT IF I WANT TO USE IKARUS MAIL.SECURITY?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT DO I HAVE TO CHANGE IN MY ENVIRONMENT IF I WANT TO USE IKARUS MAIL.SECURITY?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>To use IKARUS mail.security, you need to change the MX record of your email domain to mx.mymailwall.com and submit the server IP (or DNS name) of your email domain to IKARUS to complete the forwarding.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-7-3ae0060f1e5c8c3029451b3be17c6ac0 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT DO THE SPAM FILTERS CONTROL?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT DO THE SPAM FILTERS CONTROL?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>The spam filters determine the parameters within which an email is recognised as possible spam or spam.<br \/>\nThe default settings are those we recommend. First test them and only change them when you are sure about the required settings.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-6-7f939ec45bdff3f77cf73cbe31fb702c avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHY WILL I RECEIVE E-MAILS WITH THE SUBJECT ******SPAM*****?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHY WILL I RECEIVE E-MAILS WITH THE SUBJECT ******SPAM*****?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Our default setting flags emails as spam and\/or possible spam. This ensures that new customers can check their settings and adjust them if necessary without worrying about missing an email.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-5-d3980ba61c17625177db09d54e4c4458 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: A VIRUS WAS FOUND IN ONE OF MY EMAILS. WHY DID I RECEIVE THE E-MAIL ANYWAY?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >A VIRUS WAS FOUND IN ONE OF MY EMAILS. WHY DID I RECEIVE THE E-MAIL ANYWAY?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>The virus filter can be set to determine what should happen to an email that contains a virus.<br \/>\nWith the default setting, the virus is removed from the email, while other attachments and the email itself continue to be delivered.<br \/>\nIt should be noted that in this case the email is no longer checked for spam, as an email with a virus is always classified as spam.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-4-a124d789d04003fb78e355b886d418a3 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT DOES &quot;AN EXECUTABLE FILE IS A VIRUS&quot; MEAN?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT DOES \"AN EXECUTABLE FILE IS A VIRUS\" MEAN?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>This identifies all executable files in email attachments as viruses.<br \/>\nIf they are directly attached, not only is the file extension checked, but the file is analysed so that renamed files are also detected.<br \/>\nIf files are contained in a password-protected archive, they are only detected by their file extension.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-3-44c0658c116e25ddc6cdce122e4dc64a avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHICH FILES ARE RECOGNISED AS EXECUTABLE?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHICH FILES ARE RECOGNISED AS EXECUTABLE?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>This includes all PE files, e.g. .acm, .ax, .cpl, .dll, .drv, .efi, .exe, .mui, .ocx, .scr, .sys, .tsp<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-2-d157e127e86a0ec45fdacc3ad3a05c0d avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT DOES &quot;AN ENCRYPTED ARCHIVE IS A VIRUS&quot; MEAN?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT DOES \"AN ENCRYPTED ARCHIVE IS A VIRUS\" MEAN?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>This includes all types of encrypted archives.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-64836f0475ee7247c599c4b7f0bf27d9 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT IS A QUARANTINE MAILBOX?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT IS A QUARANTINE MAILBOX?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Any virus detected by IKARUS mail.security is sent to this mailbox if the programme is configured accordingly.<br \/>\nThe virus file is sent to a password-protected archive, with the password specified in the email. The virus file is also modified so that it cannot be executed unintentionally.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-7-fb893b2139e35d60951cc04324dfd02a avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT DOES &quot;CHECK SPF ENTRY&quot; MEAN?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT DOES \"CHECK SPF ENTRY\" MEAN?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Domains sending via IKARUS mail.security are checked to see if they have an SPF entry and if so, whether it contains: mymailwall.com.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-6-cc7516214d0ac5b7e0f8920ee9fba395 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT DOES A SPF ENTRY PROVIDE?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT DOES A SPF ENTRY PROVIDE?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>An SPF record specifies which servers are allowed to send using the domain names. This prevents abuse of the domain by not accepting emails from senders not in the DNS record.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-5-530e48d1b042f6c1535af0dd3d1a9e52 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: AN E-MAIL WAS REJECTED BECAUSE OF SPF?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >AN E-MAIL WAS REJECTED BECAUSE OF SPF?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>If an email is rejected due to SPF, it is initially not accepted.<br \/>\nIn this case, an SPF whitelist entry must be made for the domain. Afterwards, the email must be resent by the sender.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-4-a692061bc0b72b1e1e0d26e5ae3d6e04 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: HOW LONG DOES IT TAKE FOR THE CHANGES TO TAKE EFFECT?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >HOW LONG DOES IT TAKE FOR THE CHANGES TO TAKE EFFECT?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Changes usually take effect within five minutes.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-3-b77068fc426e78f3cfc68d975ba09231 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: HOW CAN I DEFINE MY OWN SPAM RULES?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >HOW CAN I DEFINE MY OWN SPAM RULES?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Rules can be defined to categorise emails. This action is usually of interest if the sender is on several blacklists and the user wants to continue receiving these emails until the clean-up is complete.<\/p>\n<p><strong>Email section:<\/strong> This defines what the filter will focus on.<\/p>\n<p><strong>Sender:<\/strong> This is the sender of the envelope or the actual sender of the email, which is not necessarily the same as the sender identified in the email program.<\/p>\n<p><strong>Recipient:<\/strong> To whom the email is sent. A single address can be selected to be excluded from the spam filter.<\/p>\n<p><strong>Subject:<\/strong> A specific section of text can be specified here to be part of the subject<\/p>\n<p><strong>Text:<\/strong> A specific text sequence can be specified here, which can be found in the body of the e-mail.<\/p>\n<p><strong>Content:<\/strong> Specifies the string used to perform a search for sender, recipient, subject or text. It should be noted that the search is only performed for the character string, without considering what comes before or after it. For example, if the text &#8220;count&#8221; is searched for, the word &#8220;accounting&#8221; is included.<\/p>\n<p><strong>Type:<\/strong> This determines what happens to an email when it is selected by the filter.<\/p>\n<p>Possible selections are normal, possible or spam.<\/p>\n<p><strong>Counter:<\/strong> Counts how often the rule has been applied since it was implemented. This can be reset for all rules with the &#8220;Reset all counters&#8221; function.<\/p>\n<p><strong>Action:<\/strong> Rules can be deleted, processed, and moved up or down. It should be noted that the rules are processed from top to bottom, using the first applicable rule. This means that the order of the rules is relevant.<\/p>\n<p><strong>Filter for attachments:<\/strong> Settings relating to email attachments can be made via the attachment filter. Attachments with certain names, file extensions or file types can be blocked with this filter.<\/p>\n<p>&#8220;*&#8221; can be used as a wildcard.<\/p>\n<p>Please note that the MS Office\/Word\/etc. file extensions only apply to Office 2007.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-2-0fc8be9aba02a2db51a2a03654b0d10f avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: WHAT IS GREYLISTING?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >WHAT IS GREYLISTING?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>When IKARUS mail.security greylists a message, it responds to the sending mail server with a temporary rejection message that causes the sender to try again.<br \/>\nIf another attempt is made to send an email with the same combination of data, this email will be accepted. Whether and when another attempt is made depends solely on the sender.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-1-c74093cf1b6e18f0d5b582ca3627ab25 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: CAN I SPECIFY A BACKUP SERVER?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >CAN I SPECIFY A BACKUP SERVER?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Yes, you can specify a second destination server to be used as a backup.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-1-e79eb1eebe5caa748c3bf808e824bcb2 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: How long does it take for newly added domains to be usable in IKARUS mail.security?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >How long does it take for newly added domains to be usable in IKARUS mail.security?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>In most cases, a new DNS record becomes effective within 30 minutes. However, this can be influenced by various factors. Once the record is active and the corresponding routes are configured, protection is fully established.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-1-6edef1966922788381a05f17773ac4a6 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: What happens if a domain is created but no incoming or outgoing routes are defined?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >What happens if a domain is created but no incoming or outgoing routes are defined?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Emails are routed through IKARUS mail.security and subjected to security checks such as malware, spam, and phishing scans only after routes are created. To activate protection, create new incoming or outgoing routes for the desired domain, or add the domain to existing routes.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bamaj-1-1-ad9ea45a42b8a66f78e8825e898a29b5 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: When deleting a domain, an error message appears?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >When deleting a domain, an error message appears?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Before deleting a domain, it must be removed from all existing routes. Otherwise, an error message will be displayed during the deletion process.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div><div id='av-layout-grid-4'  class='av-layout-grid-container av-3uw0y3-8a6fbbc83af3de59d9476fc65d542127 entry-content-wrapper main_color av-flex-cells  avia-builder-el-10  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n<div class='flex_cell av-28g47f-fdf21df6a448102433a3d72aa95bda50 av-gridrow-cell av_one_full no_margin  avia-builder-el-11  avia-builder-el-no-sibling '  ><div class='flex_cell_inner'><div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-12  avia-builder-el-no-sibling  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44708 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' data-rel='slide-1' class='slide-image' title='Cyber Threats in Europe'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025--260x185.png\" class=\"wp-image-44704 avia-img-lazy-loading-not-44704 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"ENISA Threat Landscape Report 2025\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cyber Threats in Europe\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' title='Cyber Threats in Europe'>Cyber Threats in Europe<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-10T10:49:24+01:00\" >10. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025-.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>424<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-06-13T12:31:24+02:00\" >2026-03-10 10:49:24<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-10 11:06:01<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cyber Threats in Europe<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44622 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' data-rel='slide-1' class='slide-image' title='New Company Name and New Office Address as of March 1, 2026'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"84\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-260x84.png\" class=\"wp-image-44613 avia-img-lazy-loading-not-44613 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS Security\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New Company Name and New Office Address as of March 1, 2026\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' title='New Company Name and New Office Address as of March 1, 2026'>New Company Name and New Office Address as of March 1, 2026<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-02T10:06:20+01:00\" >2. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>84<\/span>\n\t\t\t\t\t\t<span itemprop='width'>350<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-06-13T12:31:24+02:00\" >2026-03-02 10:06:20<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-02 10:06:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New Company Name and New Office Address as of March 1, 2026<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44362 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' data-rel='slide-1' class='slide-image' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-260x185.png\" class=\"wp-image-44368 avia-img-lazy-loading-not-44368 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"BSI-Certification\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: BSI-certified EDR agent for HarfangLab Guard feat. IKARUS\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-02-02T16:12:31+01:00\" >2. February 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>753<\/span>\n\t\t\t\t\t\t<span itemprop='width'>752<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-06-13T12:31:24+02:00\" >2026-02-02 16:12:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-02-02 16:18:51<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44284 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' data-rel='slide-1' class='slide-image' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg\" class=\"wp-image-35536 avia-img-lazy-loading-not-35536 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"HarfangLab Guard\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-300x214.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg 400w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Austrian Universities Move Toward European Endpoint Security with Data Sovereignty\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T11:45:07+01:00\" >27. January 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>285<\/span>\n\t\t\t\t\t\t<span itemprop='width'>400<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-06-13T12:31:24+02:00\" >2026-01-27 11:45:07<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-01-27 11:47:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44159 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' data-rel='slide-1' class='slide-image' title='Attack Surface Management (ASM)'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-260x185.jpg\" class=\"wp-image-44156 avia-img-lazy-loading-not-44156 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Attack Surface Management (ASM)\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-600x430.jpg 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Attack Surface Management (ASM)\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' title='Attack Surface Management (ASM)'>Attack Surface Management (ASM)<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-09T11:49:31+01:00\" >9. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>467<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-06-13T12:31:24+02:00\" >2025-12-09 11:49:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-09 11:49:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Attack Surface Management (ASM)<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44134 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' data-rel='slide-1' class='slide-image' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-260x185.jpg\" class=\"wp-image-44018 avia-img-lazy-loading-not-44018 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS CEO Joe Pichlmayr and Gr\u00e9goire Germain\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-03T11:57:52+01:00\" >3. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1281<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1920<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-06-13T12:31:24+02:00\" >2025-12-03 11:57:52<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-03 11:57:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43945 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' data-rel='slide-1' class='slide-image' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png\" class=\"wp-image-43850 avia-img-lazy-loading-not-43850 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"NOZOMI EMEA MSSP Award 2025\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png 595w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-24T12:36:31+01:00\" >24. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>420<\/span>\n\t\t\t\t\t\t<span itemprop='width'>595<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-06-13T12:31:24+02:00\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43752 slide-entry-overview slide-loop-8 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' data-rel='slide-1' class='slide-image' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general-260x185.jpg\" class=\"wp-image-43747 avia-img-lazy-loading-not-43747 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"ASCON: Neuer NIST-Standard f\u00fcr leichtgewichtige IoT-Kryptografie\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ASCON: New NIST Standard for Lightweight IoT Cryptography\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-07T11:46:41+01:00\" >7. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>260<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-06-13T12:31:24+02:00\" >2025-11-07 11:46:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-07 11:46:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-9' aria-describedby='av-svg-desc-9' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-9'>Previous<\/title>\n<desc id='av-svg-desc-9'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-10' aria-describedby='av-svg-desc-10' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-10'>Next<\/title>\n<desc id='av-svg-desc-10'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4441,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-28665","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FAQs IKARUS mail.security - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FAQs IKARUS mail.security - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-28T14:10:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mail-security\\\/faqs-ikarus-mail-security\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mail-security\\\/faqs-ikarus-mail-security\\\/\",\"name\":\"FAQs IKARUS mail.security - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"datePublished\":\"2023-06-13T10:31:24+00:00\",\"dateModified\":\"2025-02-28T14:10:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mail-security\\\/faqs-ikarus-mail-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mail-security\\\/faqs-ikarus-mail-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mail-security\\\/faqs-ikarus-mail-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Solutions\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IKARUS mail.security\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mail-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"FAQs IKARUS mail.security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FAQs IKARUS mail.security - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/","og_locale":"en_US","og_type":"article","og_title":"FAQs IKARUS mail.security - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2025-02-28T14:10:36+00:00","twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/","url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/","name":"FAQs IKARUS mail.security - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"datePublished":"2023-06-13T10:31:24+00:00","dateModified":"2025-02-28T14:10:36+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/faqs-ikarus-mail-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT Security Solutions","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/"},{"@type":"ListItem","position":3,"name":"IKARUS mail.security","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/"},{"@type":"ListItem","position":4,"name":"FAQs IKARUS mail.security"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/28665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=28665"}],"version-history":[{"count":10,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/28665\/revisions"}],"predecessor-version":[{"id":39951,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/28665\/revisions\/39951"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4441"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=28665"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=28665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}