Jump to: navigation, search

Applications Features

System Performance Features

Management Features

Management Features

Connect Xf

Feature Breakdown List

3.14

3.16

3.18

3.20

3.22

3.24

3.26

3.28

Admin Panel Browser Based Interface

Easy and intuitive cross browser interface integrated with Baya to manage users and groups in a domain.

Check Mark.png
Check Mark.png
Provisioning

Provision users/groups in bulk, sort user lists, search through user and group list, export user list

Check Mark.png
Check Mark.png
Group Membership Management

Update key user properties and group membership using a simple an intuitive interface.

Check Mark.png
Check Mark.png
Password policies & Expiry

Like complexity, minimum length, age, history and account lockout.

Check Mark.png
Account Lockout

When enabled for the domain, users accounts can be automatically locked out when the number of unique invalid login attempts exceeds the given threshold in the specified interval

Check Mark.png
Command Line Interface Server Management

Manage services, mail queues, scheduled jobs, backups etc.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Domain and User management

Provision entities (users, groups, Class of Service, Domains), modify entity properties, bulk provision and bulk modify entities, etc

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Role based access

Access to command line interfaces/ programs is controlled by roles.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Application Manager Browser based interface for advanced operations on entities
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Class of Service (COS)

Templates to easily manage properties of a set of users. The users belonging to a COS, inherit the properties of the COS template.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Role based access

Granular property level control offers extreme flexibility in managing the system.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Multiple perspectives or views

Use the Entity view to see all the properties of a single entity. Use the Application view which gives a spreadsheet like interface to see related properties for multiple users

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Automation Welcome Mail

System will automatically send a welcome mail to every new user created on your domain. The welcome mail will instruct the new users on how to use the web client Baya for the collaboration applications, update their profiles and other settings. The welcome mail will also guide the end user to the help wizard where the user can find information on configuring her mobile and desktop clients for application access.

Check Mark.png
clean unused mailstores of deleted users

To help us support you better and faster, the server now also includes some features which automatically clean unused mailstores of deleted users.

Check Mark.png

Security Features

Connect Xf

Feature Breakdown List

3.14

3.16

3.18

3.20

3.22

3.24

3.26

3.28

Security Overview Hardened operating system layer with built in firewall
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Hardened services and components
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Authorization controls
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Authentication controls
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Secure/Encrypted channels for communication by default
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
With Connect Xf 3.22, the services (WRSS, STUN/TURN, Nginx) can now be configured on 80 and 443
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Attachment Vault Attachments sent or received by users (selected or all the users) are uploaded to a central FTP server automatically
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Authentication, Access Control and Authorization SSO Integration
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Account Expiry
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
OTP
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Account Lockout
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Password History and Complexity
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Password policies

Like complexity, minimum length, age, history and account lockout.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Access control

To restrict users from using the services from un-trusted networks.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Authorization control

To control the availability of applications to different users.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Mail Policies Restrict mail flow based on parameters

Such as sender, recipient, mail size, subject, contents, and attachments.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Control mail flow

To/from users, and to distribution lists.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Easy intuitive way to define the policies

For each entity: Allow universe and deny few (exceptions) or deny universe and allow few (exceptions).

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Perimeter Control Spoof check

Prevents threats from users masquerading as others

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Anti Virus

Scan each mail incoming and outgoing and quarantine affected mail

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Anti Spam

Advanced engines like grey list, RBL, network test and content scanning using spam assassin to detect and filter out spam

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Threat mitigation

Authenticated relay, IP and email id rate control, DDOS attack alerts, and more.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Channel Encryption TLS encryption to secure communication

Between Client-Server and Server-to-Server (disable wire sniffing)

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Secure channels for POP, IMAP, SMTP, HTTP etc.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Archival Types - Compliance and Personal
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Automatically Forward to compliance and personal archives.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Access compliance archive only via a GUI.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Storage of compliance archive

Mail in tamper proof compressed and encrypted format.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Use personal archive to forward copies of mail to alternate email ids on same or different domains.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Role based Administration Authenticated and role based access to the Application Manager.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Define roles specifying the allowed entities and allowed operations.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Audit trail for all operations done using the Application manager.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Predefined roles available upon installation
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Mail Sanitization: Using HTML mail sanitization, cross scripting attacks are prevented by removing code in email which redirects users to rogue sites. You can also now disable mail forwarding to external domains
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Anti Virus Support Built-in Anti-virus controls ensure that all SMTP traffic flowing through the servers is checked for virus.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Infected mails are quarantined on the server.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Virus signatures are automatically updated.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
For any domain, all the quarantined mail can be viewed by the administrator of the domain
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Anti Spam Support Connect Xf Email Server incorporates reputation and content based technologies to control spam on incoming channels, giving more than 99% spam detection accuracy.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Reputation based technologies used are Greylist, RBL, reverse PTR checks, return MX checks, Blacklists & Whitelists, etc
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
The content based technologies are implemented using Spam Assassin, which scans the contents of the mail for objectionable words, etc and filters the mail to a spam folder.
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
The spam management features based on the spam reports help users manage their blacklists, white list and also minimize the problems related to false positives (mail wrongly marked as spam)
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png

Storage Features

Connect Xf

Feature Breakdown List

3.14

3.16

3.18

3.20

3.22

3.24

3.26

3.28

Quota Activity Trace and Logging

The server maintains a trace of all the transactions and configurations.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Allocated Size Quota allows the administrators to control the amount of mailbox space used on the server by individual users or a group of users
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Quota alerts

Administrators can specify multiple thresholds, when users get email alerts if their mailbox usage crosses the threshold.

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Quota overflow policy

If a user’s mailbox usage crosses the allocated quota, the administrator can configure the system to disallow the user from Sending mail (Block Sending) or reject mail being delivered to the user’s mail box (Block receiving)

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Time based Quota:

The administrators can configure the system to automatically delete mail of select users based on retention period (E.g. For a specified user, retain mail only for the last 3 months)

Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Single Instance Storage for Attachments (SISA) Define user level policies to automatically strip attachments from mail and send links instead, thus saving bandwidth and storage
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png

Reports Features

Connect Xf

Feature Breakdown List

3.14

3.16

3.18

3.20

3.22

3.24

3.26

3.28

Activity Reports Active Users
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Inactive Users
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Activity Statistics
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Access Protocol Statistics
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
User Login History
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Mail Traffic Reports Top senders and recipients
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Top senders or recipients by number of mail, size of mail or number of recipients
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
User’s mail flow report
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Server Statistics Reports Backup Status
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
LDAP Replication Status
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Server Load Average
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
CPU utilization
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Memory Utilization
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Disk Utilization
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png
Check Mark.png


1. Log on to Baya using valid credentials.

2. Click the Baya logo placed in the upper-right corner of the Email application.

Application displays the version of Webclient Baya you are using.

Baya 326 Logo.png