Plesk Email Security

Version
1.5.21
Entwickelt von
128 Bewertungen

E-Mail-Sicherheit leicht gemacht Cyber-Bedrohungen?

Cyber threats? Spam? Darüber müssen Sie sich beim E-Mail-Hosting keine Sorgen mehr machen. Managing spam and viruses is one of the most used features when hosting email. Mit Plesk Email Security können Sie Ihr Unternehmen vor immer häufiger auftretenden Cyber-Bedrohungen schützen und entstandene Schäden beheben. Dank der neuen Plesk Erweiterung "Plesk Email Security" haben Spam und Viren keine Chance.

Funktionen der kostenlosen Version:

  • Konfigurierbare Spamfilter (eingehend/ausgehend)
  • Serverweite und individuelle Einstellungen zum Schutz vor Spam (Sperr- und Zulassungsliste, Spam markieren und Erkennungsstufen)
  • Überprüfung der E-Mail-Konfiguration (DNS/RDNS-Einträge, MX-Einstellungen, Ports)
  • Migration von Einstellungen von integriertem Spamfilter

Mit Plesk Email Security Pro erhalten Sie zusätzliche, erweiterte Funktionen für die professionelle Verarbeitung von E-Mails auf Ihrem Plesk Server.

Funktionen der kostenpflichtigen Version:

  • Überprüfung von E-Mails auf Viren
  • Verwaltung der Quarantäne zum Schutz vor Viren
  • Tägliche Aktualisierungen der Antivirendatenbank
  • Automatisches Erkennen von Spam- und Ham-Nachrichten direkt im E-Mail-Client (als Spam bzw. nicht als Spam markieren)
  • Tägliche Aktualisierungen der Antispam-Datenbank
  • Detaillierte Statistik zum E-Mail-Verkehr (Ham, Spam, Viren)
  • Verwaltung der DNS-Sperrliste

Unterstützte Betriebssysteme:

  • CentOS 7 und 8
  • Ubuntu 18.04, 20.04 und 22.04
  • CloudLinux 7
  • Red Hat Enterprise Linux 8
  • AlmaLinux 8 und 9
  • RockyLinux 8
  • Debian 10, 11 und 12

Hinweis: Plesk Email Security benötigt auf Linux-Servern Dovecot und Postfix, die mit Plesk als Komponenten mitgeliefert werden. Die Erweiterung funktioniert unabhängig von der in Plesk integrierten SpamAssassin-Komponente. Diese Erweiterung deaktiviert die Benutzeroberfläche und die Spamregeln, die durch die Komponente festgelegt werden. Sie müssen die SpamAssassin-Komponente weder installieren noch deinstallieren, um Plesk Email Security korrekt nutzen zu können. Greylisting funktioniert nicht in Email Security und ist bei der Installation deaktiviert. Der manuelle Lernprozess findet nicht statt, wenn der Modus "SELinux Enforcing" aktiviert ist.

Changelog

1.5.21 (30 September 2025)

  • [-] Fixed Postfix configuration when the inet_protocols parameter was defined twice. (EXTPLESK-9219)
  • [*] Added support for dovecot 2.4.

1.5.20 (7 July 2025)

  • [*] Improved the setup CLI command by adding validation to check if the specified mail server is supported.

1.5.19 (19 June 2025)

  • [+] Added support for AlmaLinux 10.

1.5.18 (5 June 2025)

  • [*] Security improvements for ClamAV installation on Ubuntu and Debian.

1.5.17 (16 May 2025)

  • [-] Fixed backup of the extension on Plesk versions below 18.0.69.

1.5.16 (9 May 2025)

  • [*] Added compatibility with MariaDB 11.4.

1.5.15 (7 April 2025)

  • [-] Fixed Clamav antivirus installation on AlmaLinux 9. (EXTPLESK-3847)

1.5.14 (20 March 2025)

  • [*] Internal improvements.

1.5.13 (19 March 2025)

  • [*] Internal improvements.

1.5.12 (13 March 2025)

  • [-] Fixed the path to a UNIX socket for database connections. (EXTPLESK-8784)

1.5.11 (12 March 2025)

  • [*] Internal and security improvements.
  • [-] The extension now uses a UNIX socket for database connections, and using the skip-name-resolve option no longer causes the connection to break. (EXTPLESK-6308)

1.5.10 (28 January 2025)

  • [*] Internal improvements.
  • [-] Removed the decommissioned SORBS service from the extension. (EXTPLESK-6340)
  • [-] Amavis is once again installed correctly on Debian 11. (EXTPLESK-3895, EXTPLESK-3397)

1.5.9 (22 July 2024)

  • [-] Additional administrators can now configure domain settings in Restricted Mode. (EXTPLESK-5683)

1.5.8 (27 June 2024)

  • [-] Restoring the extension settings from backup no longer fails with the "Failed to restore the extension email-security: ERROR 1045 (28000): Access denied for user 'admin'@'localhost'" error. (EXTPLESK-5637)
  • [*] Security improvements.

1.5.7 (26 June 2024)

  • [*] Internal improvements.

1.5.6 (21 June 2024)

  • [*] Additional users who have insufficient permissions for creating and managing websites will now see a detailed error message instead of "Access denied".

1.5.5 (17 June 2024)

  • [*] Security improvements.

1.5.4 (10 May 2024)

  • [+] Added support for Ubuntu 24

1.5.3 (8 April 2024)

  • [-] Amavis is once again installed correctly together with other components in Plesk on Ubuntu. (EXTPLESK-5392)

1.5.2 (3 April 2024)

  • [-] Resetting the server-wide spam policy no longer fails with the "Access denied" error in case of some database inconsistency. (EXTPLESK-5387)

1.5.1 (2 April 2024)

  • [*] Updated translations of all supported languages.

1.5.0 (24 November 2023)

  • [+] Added support for RockyLinux 8 and Debian 12.

1.4.0 (10 November 2023)

  • [+] Added support for AlmaLinux 9.

1.3.9 (13 October 2023)

  • [-] Resetting the server-wide spam policy no longer fails with the "The domain is invalid" error. (EXTPLESK-4276)

1.3.8 (24 August 2023)

  • [*] Internal improvements.

1.3.7 (19 April 2023)

  • [*] Fixed broken links to KB articles in Plesk and its documentation.

1.3.6 (09 February 2023)

  • [*] Internal improvements.

1.3.5 (27 January 2023)

  • [*] Internal improvements.

1.3.4 (28 October 2022)

  • [*] Internal improvements.

1.3.3 (13 May 2022)

  • [-] Amavis can be installed on RHEL 8. (EXTPLESK-3420)

1.3.2 (11 March 2022)

  • [*] Optimised update statistics script to reduce CPU load significantly. (EXTCERT-3760)

1.3.1 (03 March 2022)

  • [-] Fixed location detection of the spam folder in the auto-cleanup process. (EXTCERT-3727)

1.3.0 (11 January 2022)

  • [+] Added auto-cleanup for spam mails. You may set the retention period in days in the global settings. (EXTCERT-3652)
  • [*] Various internal improvements.

1.2.1 (06 October 2021)

  • [+] Added support for CloudLinux OS.
  • [*] Updated virus signatures for better virus detection on supported distributions. If you are already using the antivirus integration, then the update process can take several minutes. Please be patient and do not interrupt the update process!

1.2.0 (13 September 2021)

  • [+] Added support for AlmaLinux OS.
  • [-] Fixed mailbox location detection for the move action. (EXTCERT-3467)

1.1.12 (06 April 2021)

  • [*] Renamed the terms blacklist and whitelist to blocklist and allowlist.
  • [*] Added the hostname value in the error message if an invalid hostname is detected.
  • [*] Improved the description hint for allowlist/blocklist. (EXTCERT-3349)
  • [*] Improved the custom SpamAssassin configuration to make sure that the auto-whitelist plugin is loaded. (EXTCERT-3364)

1.1.11 (27 January 2021)

  • [+] A new option to alter the amount of concurrent Amavis processes was added in the server settings. If the number is too low, then not all emails can be processed directly on a busy server. If the number is too large, then a high load may occur on the MySQL database. Please adjust according to the server activity, available resources and MySql configuration. The default value is 10. Note: A change restarts Amavis and Postfix. (EXTCERT-3304)
  • [*] The daily Bayes train cron job was extended with a forced expiry check call (--force-expire option) to force database sync and an expiry run. (EXTCERT-3293)
  • [*] A check for Sieve rules containing the keyword "X-Spam-Flag" was added to avoid conflicts with the rule necessary for the extension. (EXTCERT-3294)

1.1.10 (24 November 2020)

  • [*] Limited socket bind to the loopback interface (local IPv4 address). (EXTCERT-3226)

1.1.9 (09 November 2020)

  • [*] Completely revised the statistics functionality to speed up the calculation to avoid timeouts or blank pages. (EXTCERT-3157)
  • [-] Reverted the hostname in the Amavis configuration file to localhost and enabled httpd_can_network_connect_db policy for SELinux. If you still encounter database connection issues, then disable the Enforcing mode in SELinux. (EXTCERT-3178)
  • [-] Fixed saving process of custom settings if the email address contains the & (ampersand) character. (EXTCERT-3177)

1.1.8 (02 November 2020)

  • [*] Improved an error message for the config checker. (EXTCERT-3138)
  • [*] Handle score entries in exponential notation properly. (EXTCERT-3147)
  • [*] Force spam score 0 for deprecated DNS_FROM_AHBL_RHSBL check to avoid false-positive spam detection. (EXTCERT-3168)
  • [-] Fixed a database connection issue with SELinux in enforcing mode. (EXTCERT-3139)
  • [-] Fixed the symbolic link creation in the SpamAssassin installation process. (EXTCERT-3157)

1.1.7 (05 October 2020)

  • [*] Fixed and improved the statistics calculation. (EXTCERT-3099)
  • [*] Optimised the update task for the statistics calculation to avoid database timeout locks on servers with high mail traffic. (EXTCERT-3065)
  • [-] Resolved conflicts of user-specific spam rules with webmail filters. (EXTCERT-3095)
  • [-] The custom folder list is now loaded correctly for email addresses with capital letters. (EXTCERT-3128)
  • [-] Removed a PHP notice from the config checker. (EXTCERT-3122)

1.1.6 (17 September 2020)

  • [+] Added the "Install" button to the Amavis service infobox. Users can now trigger the installation manually from the interface.
  • [*] The new Amavis package is installed automatically on CentOS servers in an update from version 1.1.5.
  • [*] Improved how custom email folders are loaded for the user-specific selection list. (EXTCERT-3092)
  • [*] Improved ClamAV installation handling required for Ubuntu 20.04.

1.1.5 (4 September 2020)

  • [-] Fixed Amavis installation issues on newer CentOS systems (EXTCERT-3078)

1.1.4 (18 August 2020)

  • [-] The component configuration is not performed in update processes if the installation has not been completed yet by the user. (EXTCERT-3048)

1.1.3 (13 August 2020)

  • [-] Changed the ordering of the ClamAV removal call in the installation process. (EXTCERT-3031)
  • [-] Fixed a wrong spam action behaviour in a particular constellation - global action set to move, user-specific action set to mark. (EXTCERT-3044)

1.1.2 (06 August 2020)

  • [+] New option: Postfix Strict Rules - With this option strict rules can be set optionally to improve the security of the mail server
  • [-] Postfix strict rules are not applied automatically and are removed in the update process

1.1.1 (04 August 2020)

  • [*] Strengthened Postfix security configuration - helo, sender and recipient restrictions (EXTCERT-3012)
  • [*] Reduced SMTP timeout to the default value of 300 seconds (smtpd_timeout parameter)
  • [*] Configuration process is triggered on each update process
  • [*] Allowed IPv6 in Postfix again - Statistics accept version 6 of the Internet Protocol
  • [-] Fixed menu entry for email accounts only on Ubuntu 18.x (EXTCERT-3021)

1.1.0 (16 July 2020)

  • [+] Added CentOS 8 support (EXTCERT-2887)
  • [+] Added Statistics tab with detailed statistics about all email accounts (Pro)
  • [+] Added CLI commands to automate the complete global management via the command-line. Use "plesk ext email-security --help" in your terminal to get all commands and examples
  • [+] Email protection can be disabled entirely for specific email accounts
  • [+] Custom spam settings accessible for email accounts with access to the Plesk UI
  • [+] Reconfigure of used components in update processes (EXTCERT-2931)
  • [+] Plesk Email Security database is backed-up in the server backup processes
  • [+] Added tutorial for local DNS caching with Plesk's DNS BIND server
  • [*] Improved spam learning and filter training by global spam knowledge sharing with daily updates of fresh samples
  • [*] Improved Bayes filter handling and configuration significantly
  • [*] Opened the Dashboard tab with service statuses and aggregated statistics in the free version
  • [*] Changed default spam score to the high threshold (score 5)
  • [*] Errors of services are logged (panel.log), and a user-friendly message is displayed in the UI
  • [*] Numerous code and UI optimisations
  • [-] Fixed memory overuse for statistics collection (EXTCERT-2980)
  • [-] Added pre-installation check for a valid hostname (EXTCERT-2981)

1.0.5 (08 May 2020)

  • [*] Amavis - smtp.helo sends proper hostname instead of localhost (EXTCERT-2875)
  • [*] Temporarily removed the support for CentOS 8 due to several unresolved issues (EXTCERT-2886)

1.0.4 (06 April 2020)

  • [*] Revised rDNS check (EXTCERT-2841)
  • [*] Allow a spam score of 0 (EXTCERT-2844)
  • [*] Added inet_acl option to Amavis configuration file (EXTCERT-2813)
  • [*] Stop/start ClamAV service if anti-virus is disabled/enabled in UI (EXTCERT-2836)
  • [*] Import user preferences from Plesk SpamAssassin component only if enabled in settings (EXTCERT-2806)
  • [*] Postfix configuration - Added smtp_tls_security_level = none for internal communication (EXTCERT-2837)
  • [*] Increase amount of concurrent processes to process more emails concurrently - 5 processes (EXTCERT-2838)
  • [-] Fixed TypeError: Cannot read property 'remove' of null (EXTCERT-2819)
  • [-] Fixed error in Quarantine if quarantined emails are malformed (EXTCERT-2843)
  • [-] Bayes Filter - Downloads signatures dump to proper path and enables Bayes in local.conf (EXTCERT-2818)

1.0.3 (06 March 2020)

  • [*] Reset installation state if an exception is thrown during installation - enables installation button to restart the process via UI (EXTCERT-2793)
  • [*] Hotfix for clamsmtp package. ClamAV cannot be installed on CentOS due to a wrong dependency requirement for the package clamsmtp (it requests clamav-server instead of clamd) (EXTCERT-2800)
  • [-] Modify ClamAV configuration file on CentOS to enable LocalSocket option properly (EXTCERT-2801)
  • [-] Epel repository is enabled directly in the installation call (EXTCERT-2792)

1.0.2 (21 February 2020)

  • [*] Improved white/blacklist handling for wildcard imports (EXTCERT-2769)
  • [*] Improved handling of the local DNS check (EXTCERT-2768)
  • [*] Added cleanup cronjob for existing white/blacklist entries
  • [*] Improved description for white/blacklists
  • [*] Disabled Greylisting functionality to avoid delays in outgoing emails
  • [-] Fixed path of Sieve rules (EXTCERT-2770)
  • [-] Unable to install Plesk Email security and process services on CentOS 6 (EXTCERT-2767 & EXTCERT-2729)
  • [-] Installation fails when importing Plesk SpamAssassin configuration under certain circumstances (EXTCERT-2756)
  • [-] Config Check - Error message is displayed if the request cannot be executed (EXTCERT-2729)

1.0.1 (31 January 2020)

  • [+] Added a button in the global settings to reset all user policies and only apply the global policy
  • [+] Anti-virus installation link in the dashboard opens the proper slide directly
  • [*] Added Bypass Header rules to disable bad header blocks
  • [-] Fixed installation process of anti-virus with installed Imunify repository on CentOS (EXTCERT-2724)
  • [-] Fixed rare error when the identical email address is both in the blacklist and the whitelist (EXTCERT-2715)
  • [-] Removed the buy link from the description, the link is set in the Extension Catalog as an action button
  • [-] Newly created email accounts respect the current global server policy, not hardcoded values

1.0.0 (21 January 2020)

  • [+] First release of the Plesk Email Security extension.
Melden Sie sich mit Ihrem creoline Konto an, um die Kompatibilität dieser Erweiterung mit Ihrer Plesk-Installation zu prüfen.

Varianten

Plesk Email Security Pro
9,00 €
/ Monat
Monatliches Abonnement · Alle Preise zzgl. USt.

Technische Details

Version
1.5.21
Build
30.09.2025
Plattform
Unix
Unterstützte Plesk-Versionen
18.0.50 - Aktuellste Version
Im Marktplatz seit
16.11.2025

Hersteller

Kategorien