Imapi session requirements, Shadow mailbox – Lucent Technologies INTUITY Messaging Solutions Enhanced-List Application 585-310-575 User Manual

Page 18

Advertising
background image

Enhanced-List Application

8

Issue 1 July 1997

cannot be infected with viruses embedded in these software files, client
machines may become infected when a user launches the application
associated with the software file.

!

CAUTION:

ELA does not perform any virus detection. Your company should evaluate
the security risks of file attachments carefully and make provisions for virus
detection software on PCs running Message Manager or an e-mail
application supported by I

NTUITY

AUDIX R4.

At a minimum, you should advise your users that file attachments should be
detached (not launched) and scanned for viruses before use.

IMAPI Session Requirements

An IMAPI session is invoked when an e-mail trusted server, Message Manager,
or the ELA trusted server needs to communicate with the AUDIX server. The
AUDIX server must have a sufficient number of IMAPI sessions administered to
provide adequate access for all IMAPI requests. Additionally, the ELA server
must be registered as an AUDIX trusted server.

Shadow Mailbox

The shadow mailbox is a special mailbox that ELA uses to distribute messages.
The use of a shadow mailbox prevents replies to ELA-delivered messages from
being sent back to the entire Enhanced List. However, you can administer
enhanced lists such that recipients can reply to the person who originally sent
the message. The shadow mailbox must belong to a community that cannot
receive messages.

Advertising