Multi-layered protection

Antispam, Antivirus and Security

Structured, multi-layered protection and prevention is included, for free, with any Smardove license. Administrators can customize their spam protection using a variety of industry-standard methods including greylisting, SPF, DKIM, RBLs, URIBLs, blacklist/whitelist and more. In addition, Smardove includes powerful antivirus as well as powerful tools to protect against denial of service attacks, instrusion detection, password policy violations, and much more.


Included Antispam

With the antispam tools included with every Smardove license, email administrators can achieve immediate spam prevention simply by managing:

SpamAssassin-based Pattern Matching
rSpamd support
Pre-configured URIBLs and RBLs, by default
The ability to add custom URIBLs and RBLs
Greylisting, DMARC, DKIM and SPF
Integration with third-party products and services

Server Wide or User Managed

System administrators can elect to lock down the server as a whole, and implement their own robust antispam policies, or allow domain administrators to manage antispam options. And if they want, domain administrators can even let their users manage what they want done to low, medium and high probability messages.

Antispam options

Antispam Add-Ons

In addition to the free email antispam options available with Smardove, it's possible to increase antispam protection using third-party products, including:

Message Sniffer - uses collaborative learning technologies to accurately identify spam, viruses and other email borne malware before it hits inboxes.
Add your own - Smardove is flexible enough to allow for additional third-party products, services, or antispam/security appliances.
Spam Filtering

Custom Spam Filtering

Along with configuring the included antispam tools, system administrators can create custom rules for how to handle a message once it's scored as spam. Messages can have their subject lines appended for easy identification by users or automatically filtered so that they never hit a user's inbox.

Consistent Rulesets

For system administrators who manage multiple mail servers, it's possible to configure antispam options on one server, then export those rules and import them into another Smardove server on the network. This allows for a robust, consistent set of antispam options on every mail server.

Antispam settings

Antispam Management

Using Smardove's web interface, system administrators can access all security features using their favorite web browser. In addition, all antispam settings are contained in a single JSON file, so system admins can easily transfer antispam settings so that all Smardove servers are consistently managed and consistently secured.

Self-updating virus protection

Enterprise Level Antivirus

Smardove includes effective and self-updating virus protection measures to ensure you run a secure server via ClamAV, which is included with every Smardove installation. Smardove also employs Windows Defender, for added protection. Administrators can also integrate Smardove with third-party antivirus programs via a command-line execution. This can be an efficient solution for high-volume mail environments by reducing the burden on the mail server itself.

Antivirus Add-Ons

Smardove's API-driven architecture means administrators are free to use any other antivirus protection, either installed on the server, in the cloud or even via command line. Of course, integration isn't the only way to use third-party products. Use of antivirus and/or security appliances, that are installed as part of a company's' infrastructure, are fully supported as well and can be used to find, and eliminate, threats before they even make it to the Smardove server.

Seamlessly integrates

Additional Security

While keeping an email server protected from viruses and other malware is a great start, there's more to having a secure mail server than just antivirus protection. Smardove includes additional security features, including:

Password policy enforcement
Two-Step Authentication (app passwords + authenticator)
Built-in Intrusion Detection System (IDS)
Access restrictions by IP address
Email harvest attack detection
Denial of Service (DoS) attack prevention
Brute force detection
A powerful Event system to create actions based on any of the above, and more