Product » A free email server for Windows and Linux » Knowledge Base
Document ID: | 5142 |
---|---|
Subject: | Extended configuration through server.properties file |
Creation date: | 8/5/17 1:50 AM |
Last modified on: | 8/10/18 12:26 PM |
server.properties
, which is stored in $INSTALL_DIR\config folder.
server.properties
and not service.properties
or server.properties.txt
# Lines starting with a # sign are ignored and can be used for user comments # Parameter name appears on the LHS of equal sign, whereas the value appears on the RHS. # For example: parameter.one=50 parameter.two=Another Value
Parameter Name | Default Value | Description |
---|---|---|
allow.users.to.restore.emails |
true | Must be true or false. If false, users will not be able to restore emails from their quarantine reports |
allow.users.to.restore.password |
true | Must be true or false. If false, the Forgot password link disappears from the login page. |
auto.purge.user.repositories.once.a.week |
false | Must be true or false. If set to true, Xeams will auto-purge user repositories so they take less room on disk. Actual purging happens on a Sunday around midnight. |
default.subject.for.off |
Auto: Out of office notification | Subject for the email generated as a result of Out of office notification |
dictionary.attack.alerter.enabled |
true | Dictionary attack prevention is disabled if this is set to false. |
dictionary.attack.alerter.blockedMinutes |
10 | Number of minutes an IP is blocked if a dictionary attack is detected. |
ignore.local.invalid.associations |
true | Must be true or false. If true, Xeams will ignore email addresses ending with .local when pulling them from AD. |
invalid.pwd.blocked.time |
10 | Number of minutes an IP address is blocked if too many incorrect password attempts are detected. |
msg.per.page.cv |
50 | Number of emails to display per page when viewing messages in Compact View |
msg.per.page.dv |
20 | Number of emails to display per page when viewing messages in Detail View |
restrict.admin.to.lan |
false | If true, the admin account will be restricted to LAN IP addresses. This is now obsolete. A better way to restrict admin access is through Access Control under Server Configuration |
sender.4.ndr.message |
BLANK | Email address used as a sender for NDRs. |
skip.spf.check.for.ip.allowed.to.relay |
true | Must be true or false. If true, SPF check is skipped for IP addresses allowed to relay |
use.cache.for.drv |
true | Must be true or false. If set to false, Xeams will not cache addresses verified by the DRV mechanism. |
Do you have a helpful tip related to this document that you'd like to share with other users?