Benno MailArchiv available in the Univention App Center

Benno MailArchiv is a software for the automated and revision-safe archiving of emails.

Benno MailArchiv offers an integrated full text search that allows the search for any email based on content information (sender, receiver, text) but also on text content from attachments. At the moment, more than 1,200 attachment formats, incl. PDF, office formats, etc. are supported. ZIP files will be unpacked and also fully indexed file-by-file.

Dovecot is the default IMAP/POP3 mail server in UCS

Univention integrated Dovecot as new default IMAP/POP3 mail server in UCS. This article gives a first overview about this integration.

Why Dovecot as default IMAP/POP3 server in UCS?
Dovecot IMAP Server LogoDovecot has a focus on security, stability and performance, while complying with established standards. Similarly to Postfix Dovecot starts a couple of separate processes for different tasks. The processes can be run with different owner and group permissions to limit the impact of a security incident.

Dovecot supports several backend storage formats: mbox, Maildir and dbox. In each case it uses indices to increase access performance. Their self healing and self optimizing features reduce tedious administrative intervention and simplify backups.

Bundestag Hack: Possible Backgrounds and Defense Methods

Bundestag Hack

Here at Univention, we are of course also concerned by the attack on the German parliament’s IT infrastructure, better known as the “Bundestag hack”. To recap: It appears that there were some bogus e-mails there including links to malware. A number of the Windows PCs in the Bundestag’s “Parlakom” network were or may still be infected with the malware, which is alleged to have searched for and copied certain confidential Word documents. According to a report in the Tagesspiegel (German) newspaper, this allowed the hackers to gain “administration rights for the infrastructure”. The attack was conducted as an “advanced persistent threat” or “APT attack” for short: in other words, a complex, multi-phase attack on the German parliament’s “Parlakom” IT network.

How IT systems can be taken over

There are a whole host of “classic” approaches for taking over IT systems, such as the exploitation of security vulnerabilities in the software, the interception or guessing of passwords (brute force attacks) and the cracking of password hashes. These methods are well known and it is comparatively simple to reduce the risk of such attacks’ being successful. The requisite measures are: regular, comprehensive and rapid installation of updates, encryption of sensitive data and network communication using state-of-the-art encryption standards, the use of sufficiently long passwords, logging of failed login attempts and blocking of user accounts with too many failed attempts, the use of salted password hashes (the salt converts two identical passwords into different hashes), iteration of the hash functions (rounds) and changing passwords regularly.

Working On The Go – How You Stay Productive and in Control

working-on-the-goAs manager of Univention North America, I often find myself working on the go. While free WiFi and mobile Internet are slowly bridging the gap between the office, airport lounges and hotels, connections are often slow and congested whenever many people are congregating.

While many office documents can still be worked on when on the go, synchronization with the office and collaboration with coworkers are still difficult, especially, if you have to consider questions like data and transmission security, including secure access to the company network, travel across time zones or, oh horror, the date line and slow connections.

Of course, travel needs are not the only reason, why you would want to look at these applications, for synchronization and collaboration can also greatly benefit teams that work at multiple locations or colleagues frequently working from home. In the end, nothing is worse than finding out that an employee has uploaded much of the companies confidential knowledge base to a cloud service, because tablets, smart phones or collaborations are words that the IT office can’t be bothered with.

Free UCS Core Edition rapidly boosts popularity of Univention Corporate Server

Bremen, 1st July 2015 – Univention ( is amazed by the positive feedback that it has received on the free Core Edition of Univention Corporate Server (UCS), which has now been available for two months. The popularity of this Open Source server solution optimised for the operation and management of IT infrastructures and server applications as well as identity management in companies is growing at lightning speed. The integrated App Center with a constantly increasing number of enterprise applications has also contributed substantially to this success.

Identity Management – What you Need to Know

Identity management (IdM) in essence refers to the management or administration of individual identities within a system, such as a company or network.

Within the corporate world, ID management refers more specifically to providing IT managers with a centralised administrative system (Identity Management System – IdMS) where company users and permission restrictions to applications such as ERP, CRM, e-mail client etc etc can be grouped together and managed collectively. The principle objective behind IdM is to improve security and protection for sensitive company data and systems, whilst simultaneously improving productivity as well as reducing costs, downtime and repetitive time consuming tasks. [1]

Example Set Up

What makes Identity Management Systems such as Univention Corporate Server (UCS) so useful is that they can be integrated into a whole host of systems including for example corporate phone systems like pascom’s mobydick VoIP Communications Solution as illustrated by the following video.

Should QNAP servers be expanded with UCS and Zarafa or is it technical overload?

QNAP LogoIt’s not just in our working lives that digitalisation is constantly gaining ground; the number of digital devices we use at home is also increasing on a daily basis. A family of four or a shared flat can easily boast a formidable number of different devices and applications. It gets even more interesting when friends come to visit and want to play a movie on your television or use your printer. And it gets downright complicated if all these digital devices have to interact with each other too! In such cases, the requirements are often hardly any different from those of a small company, and the need for more comprehensive functions soon arises.

Many people already have a small home server at home, even if they don’t realise it. Boxes like QNAP, Synology and the like are often used for central file storage and as media servers, and these little boxes can really do much more than you’d think. So why not tap the existing potential?

Page 20 of 32« First...10...1819202122...30...Last »