New Outbound Email Configuration Required

Written By Marissa Fegan (Super Administrator)

Updated at August 13th, 2021

Most of our customers configure their internal sources of email—often internal mail servers and automated systems, print servers, web servers, etc.—to route outbound mail through VIPRE's mail relay servers. This approach has benefits due to the additional filtering and processing of outbound email. We are often the first to notice when individual customer user accounts may have been compromised and used to send spam.

A wide variety of systems are configured to send email through VIPRE, and it is a significant goal of ours to be as compatible as possible with as many such systems as possible. That said, we also strive to keep our systems secure, extending to customer systems that connect to our systems. One important security measure that we have long recommended, but are now planning to require, is that all outbound email communications take place over a secure encrypted channel.

Some of our customers have not yet enabled encryption for all of their outbound emails destined for VIPRE mail relays. If you are reading this note, you are likely on that list and should take action to review your outbound email system configuration to ensure that encrypted SMTP is enabled in all cases. Thankfully, re-configuring your outbound email servers to use secure TLS connections should not be difficult. You should be able to find security options for your outbound connection (often called a "Smart Host" or "outbound mail gateway") in your normal admin configuration area, or find instructions via a quick Google search. 

Here are some examples:

To avoid any service disruptions and to provide better security for your email, we recommend that you re-configure your email server before we start to enforce this requirement. If you need any assistance, please contact your qualified partner or our Support team by visiting VIPRE.com; select your region at the top, and then choose Support or Help from the top menu.