Hermes SEG keeps a log and a copy of each email message it sends and receives for archiving purposes. The number of log entries and actual messages the system keeps depends on the amount of storage space available on the system. The system automatically starts purging the oldest email logs and email messages once the internal storage reaches 95% capacity.
You can easily see the data/time of the oldest message that the system has retained by looking on the upper right-hand corner of the page in the Earliest Message Date/Time field (Figure 1).
For a low to medium traffic system, an email archive of up to 5 years is possible assuming that no Email Archive job has been setup in order to free up space. If an email Archive job has been setup, the email archive can become virtually unlimited since the email messages will be stored off the local storage.
In this page you will be able to perform the following functions:
For security reasons, the following keywords are not allowed in any search field:
By default the Message History & Archive page displays 25 messages at a time. You can select to display 50, 75 or 100 messages at a time.
You can sort by the following types of messages:
If you sort by any type of message, in other words if the message type selection drop-down is set to anything but the ALL entry, message searches will be performed for the message type selected. For example, if you have sorted by the message type Spam (Quarantined) and you perform a search by date range, the results are only going to show entries matching the date range AND the message type Spam (Quarantined). If you wish to perform a search for all messages, ensure you have sorted by ALL message types.
Clicking on the Clear & Sort button, will clear any previous searches.
You can search email messages by Date/Time Range, the From field, the Return-Path field, the To field, the Subject field and you can also search in the body or a header of a message.
Searching by DATE/TIME
Searching by DATE/TIME allows you to search for messages that were received/sent between the dates and times you specify.
Searching by FROM, RETURN-PATH, TO, SUBJECT
Searching by FROM, RETURN-PATH, TO or SUBJECT allows you to search for messages that match the search criteria you specify in the From field, Return-Path field, the To field or the Subject field of a mesage.
Searching by BODY/HEADERS
Searching by the BODY/HEADERS allows you to search for messages that match the search criteria you specify in the body or the headers of messages. The search Criteria can be any keyword or phrase.
Search results for BODY/HEADERS searches are limited to a maximum of 500 entries.
While a BODY/HEADERS search is in progress, no other BODY/HEADER searches can be performed, however, other types of search by Date/Time Range, From, To and Subject field can still be performed.
Please note that BODY/HEADERS searches are limited to messages stored locally on the appliance. Any messages that have been archived outside the appliance will not be searched.
Releasing messages will instruct the sytem to deliver the messages selected to the intended Internal Recipient mailbox. This action can be performed for any type of message regardless if the message was inititally quarantined. This is useful for releasing lost email back to users or releasing quarantined messages that were never delivered to the user's mailbox.
The system can ONLY release messages stored in local storage. Messages that have been archived to external storage via an Archive Job cannot be released. They can only be viewed and/or downloaded.
When you click on Release Msg button the system will NOT display a loading message like normal (Figure 15) and the system may appear unresponsive. However, please be patient while your system processes the request before trying a different request. Some requests involving lots of messages may take a while to process.
Block/Allow rules should NOT be used as a method of spam control. Spam should be handled by training the Bayes Filter instead. Legitimate mass marketing email campaigns should be handled by unsubscribing from those campaigns.
When you click on Block Sender or the Allow Sender buttons the system will NOT display a loading message like normal (Figure 17) and the system may appear unresponsive. However, please be patient while your system processes the request before trying a different request. Some requests involving lots of messages may take a while to process.
Note, that most marketing/spam email campaigns will auto generate the From email address each time they send out emails. An auto generated email address will look similar to the example below:
In this example, each time an email goes out from this email campaign, the string before the @ (d-3-2492042-40004013-2-1-us2-c2bf84fa) will always be different while the domain string after the @ (aflac-onlineservices.com) will remain the same. Therefore, creating a block/allow rule using the From email address is pointless since the Block/Allow rule you previously created will not fire next time an email from this marketing campaign gets received since the string before the @ will be different. In these cases, it's recommended to navigate to Content Checks --> Sender Check Bypass and follow the instructions under the Add Domain Sender Check Bypass to Internal Recipient section in order to create a rule by using the domain string after the @ (aflac-onlineservices.com).
The Bayes Database needs to be intitially trained with at least 200 spam messages and 200 non-spam messages in order to start being effective. The more you train the Bayes Database the more accurate it becomes, however anything over 5000 messages does not seem to improve accuracy.
You should NEVER use legitimate mass marketing emails to train the Bayes Database as Spam. Inversely, you should NEVER use spam emails to train the Bayes Database as non-spam. These actions will corrupt the Bayes Database and lead to the system misidentifying spam and non-spam emails. Additionally, you should avoid training the Bayes Database with forwarded spam emails.
When you click on the Train as Spam or the Train as NOT Spam buttons the system will NOT not display a loading message like normal (Figure 19) and the system may appear unresponsive. However, please be patient while your system processes the request before trying a different request. Some requests involving lots of messages may take a while to process.
Train as Spam
Train as NOT Spam
When viewing a message, the system automatically disables links and any external content automatically.
Command Buttons - This section contains the following 6 buttons:
Download Message - Clicking on the Download Message link will allow you to download the message in .eml format which can be opened by an email client such as Outlook (Figure 24).
Use extreme care when downloading messages and/or opening attachments within messages since they may contain malware.
Message Details - This section shows the following headers of the message:
Message Body - This section shows the content inside the body of a message. The body section has two modes to display the body of a message:
If the message body is blank, the message may not contain HTML elements, in that case try clicking on the Show Msg Body as Text selection.
Message Headers - This section shows the message headers which can contain a lot of useful information such as spam score, the antispam filter tests that it scored, the sending email server IP address etc. (Figure 28).
We collect no information about you, other than information automatically collected and stored (see below), when you visit our web site unless you choose to provide that information to us.
When you browse through any web site, certain personal information about you can be collected. We automatically collect and temporarily store the following information about your visit:
We use this information for statistical purposes and to help us make our site more useful to visitors. Unless it is specifically stated otherwise, no additional information will be collected about you.
You do not have to give us personal information to visit our web sites.
If you choose to provide us with additional information about yourself through an e-mail message, form, survey, etc., we will only maintain the information as long as needed to respond to your question or to fulfill the stated purpose of the communication.
The term "Deeztek, LLC" or "us" or "we" refers to the owner of the website. The term "you" refers to the user or viewer of our website.
The content of the pages of this website is for your general information and use only. It is subject to change without notice.
Neither we nor any third parties provide any warranty or guarantee as to the accuracy, timeliness, performance, completeness or suitability of the information and materials found or offered on this website for any particular purpose. You acknowledge that such information and materials may contain inaccuracies or errors and we expressly exclude liability for any such inaccuracies or errors to the fullest extent permitted by law.
Your use of any information or materials on this website is entirely at your own risk, for which we shall not be liable. It shall be your own responsibility to ensure that any products, services or information available through this website meet your specific requirements.
This website contains material which is owned by or licensed to us. This material includes, but is not limited to, the design, layout, look, appearance and graphics. Reproduction is prohibited other than in accordance with the copyright notice, which forms part of these terms and conditions.
All trademarks reproduced in this website, which are not the property of, or licensed to the operator, are acknowledged on the website.
Unauthorised use of this website may give rise to a claim for damages and/or be a criminal offence.
From time to time, this website may also include links to other websites. These links are provided for your convenience to provide further information. They do not signify that we endorse the website(s). We have no responsibility for the content of the linked website(s).
Your use of this website and any dispute arising out of such use of the website is subject to the laws of the state of Delaware and the country of the United States of America.