Securing your Installation
Previous  Top  Next

Depending on the type of organization you have, you may wish to secure your installation. You can use the NT Security Model to secure your installation and keep anyone from maliciously changing the configuration, or for the truly paranoid even keep one user from reading another's spam.

Spam Sleuth Enterprise uses three root directories. This is done so that you can secure them at different levels. Please see the documentation for your operating system for information on setting security on folders.

Setting the security to tighter levels of security of the folders is optional, and is not required for Spam Sleuth to function. If you find that Spam Sleuth is not functioning correctly, you may have set the permissions incorrectly. Setting the permissions back to Full Control for Everyone should resume operation.

\SERVER - This directory is only needed by SYSTEM, and anyone who is allowed to configure the server. The SpamSleuthServer.EXE runs as SYSTEM by default, but you can change that if you wish. See your operating system documentation for information on changing the Account under which a service runs.  

\CLIENT - This directory is used by every user that is allowed to view their spam and configure their preferences. It can be read-only for each user, or group.  
 
\SPAM - The root of this directory contains the MASTER configuration files. The MASTER configuration files must be read-only for all users and read/write for all Spam Sleuth Master users.  
 
\SPAM\<e-mail> - There is a folder for every account. Its name corresponds to the account's e-mail address. Inside the root of this folder are the configuration files for each user. Each user/account must have read/write rights for their own folder.  
 
\SPAM\<e-mail>\SPAM - Each user has a spam folder under their e-mail address folder. This is the temporary holding area for their spam. The server is responsible for removing the files at the configured time, so no maintenance of these folders is required. Each user must have read/write access to their spam folder.