PowerProtect Data Manager 19.17 for Cyber Recovery User Guide

Configure mail settings

After you have configured an email server in the Cyber Recovery UI, enable mail server support to route and deliver Cyber Recovery email notifications to Cyber Recovery users, and set restricted domains for email addresses for users and the reporting feature.

Prerequisites

You are logged in as the security officer.

About this task

The email service supports Transport Layer Security (TLS) 1.2 or TLS 1.3. If TLS is disabled, all email communication is sent in clear text. We recommend that you enable TLS, which also requires that you to use a mail server certificate, to prevent vulnerabilities. For more information, see Mail server certificates.

Steps

  1. From the masthead navigation, click Icon with an image of a gear. to access the System Settings list.
  2. Click Support > Mail Settings.
  3. Under Activate Mail Support, swipe right on the slider to enable sending email notifications.
    If this option is disabled, you cannot modify the mail server configuration.
    NOTE:When you update to Cyber Recovery version 19.16 and later, the procedure checks if you are using an external mail service or Postfix. If neither is used, then the email option is disabled by default.
    The pane opens to display more options to activate mail support.
  4. Under Mail Server Settings, swipe right on the slider to enable TLS, if necessary.
    NOTE:When you install the Cyber Recovery software, TLS is enabled by default.

    If you enable TLS for a relay server from the Cyber Recovery environment, only the inbound communication to the relay server is encrypted. To configure end-to-end encryption, ensure that you enable TLS for outbound connections from the relay server. For information about how to view message headers to verify TLS encryption, see Verifying TLS encryption..

  5. Perform the tasks for each field that are described in the following table:
    Table 1. Mail server settings fieldsThis table lists the mail server settings fields that you can modify.
    Field Description
    Mail/Relay Server (required) Specify the hostname or IP address of the Cyber Recovery email server or the Postfix server.
    NOTE:If you are using Postfix configured on the Cyber Recovery host, use the Cyber Recovery hostname or IP address as the relay server.
    Port (required) Specify a port number. The default port number is 25.
    Certificate (required if TLS is enabled) Do one of the following:
    • If the mail server certificate is in place, click View Certificate to see general and detailed certificate information. From the Details tab, you can see the certificate hierarchy and view the certificate field details of all the certificates in the chain. From the Certificate Fields section under the Details tab, click the radio button next to a field to see the field value for the specified field.
    • If the mail server certificate is not in place, click Verify and then:
      1. Click the Accept check box at the bottom left.
      2. Click Done.
      3. Click Save.
    • To renew a mail certificate that is about to expire, click Change. Then, click Verify and:
      1. Click the Accept check box at the bottom left.
      2. Click Done.
      3. Click Save.
    Sender's Email Address (required) Specify the email address that delivers Cyber Recovery alert messages. The default value is noreply@cyberrecovery.
    NOTE:The delivered email displays the first part of the email address. For example, if the sender's email address is CyberRecovery@acme.com, the email message shows that it is from CyberRecovery.
    Username Optionally, specify the username for the email server that is configured to work with the Cyber Recovery software.
    Password Optionally, specify the password for the email server that is configured to work with the Cyber Recovery software.
  6. Optionally, under Domain Restrictions, set restricted domains for user email and for the report feature:
    1. Swipe right on the slider to enable domain restrictions.
    2. In the Allowed Domains field, enter the allowed domains.
      You cannot add a duplicate domain name.
    3. To delete a domain, click the X next to the domain name.
    4. Click Save.
    If domain restrictions are enabled, an error message is displayed if you enter an email address that is not allowed to add a user or for an analysis report. When a report schedule runs, a critical alert indicates that the report schedule includes email addresses with restricted domains.
  7. Click Save.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\