Skip to main content

zimbra change domain ham spam galsync and virus accounts

Do the domain that was created by default is not the domain that you intended.  Or when you setup zimbra you were not paying attention and server name got added in front of the domain ie instead of just

Now you need to setup the ham, spam, galsync, and virus-quarantine accounts to your new domain.

Lets start with ham and spam.

From zimbra webadmin find the spam and ham accounts under manage and then search individually for ham and spam.  They will have random characters after the name.  We will need the full name of both accounts.  Right click to edit the account and under account name change the domain to your newly created domain and save.  Do this for both accounts.  Also get the names of both accounts.  You can copy and paste them to use in the following command line.

As zimbra user on the mail server run these commands.
You can also check the current spam accounts with

zmprov gcf zimbraSpamIsSpamAccount

zmprov gcf zimbraSpamIsNotSpamAccount

Change the spam and ham accounts
zmprov mcf zimbraSpamIsSpamAccount
zmprov mcf zimbraSpamIsNotSpamAccount
zmcontrol restart

Change the virus-quarantine account

From the manage users in zimbra web admin edit the virus-quarantine account and change the domain to the newdomain

Now we need to link the global config attribute zimbraAmavisQuarantineAccount to the newly created account.

zmprov mcf zimbraAmavisQuarantineAccount

flush the cache
zmprov fc config
zmprov gcf zimbraAmavisQuarantineAccount

check the av_notify_user and av_notify_domain
zmlocalconfig av_notify_user
zmlocalconfig av_notify_domain

If you need to change either of the settings
zmlocalconfig -e
zmlocalconfig -e

Galsync account needs to be recreated and a new sync forced.
From zimbra webadmin get the galsync account name.  You can just use your own random string if you dont want to lookup the account and use the same one.

zmgsautil deleteAccount -a

command to create the new account
zmgsautil createAccount -a -n InternalGAL --domain -s MAILBOX.SERVER.NAME -t zimbra -f _InternalGAL

Command to force sync the gal account
zmgsautil forceSync -a -n InternalGAL

Sam Saqr


Popular posts from this blog

EXTERNAL domain warning for zimbra

With the phishing attempts that consonantly target users your company can get exposed to a possible infiltration because a user thought a representative of the company sent them an email asking to change the password or to cleanup a full inbox, etc. In the email they will have a link and a login page that is used to collect the users login name and password. Many companies are starting to implement some kind of indication to the user that the email originated outside the company. Some will add a tag to the subject like [EXTERNAL] if the mail system has capabilities for using transport rules, spamassasin header, postfix header_checks. Other phishing attempts would use CEO names in the name field with a different return email address. The way users fall for this is they do not look at the originating email address. It also does not help that most mail clients will only show display name when provided instead of the email. Currently zimbra does not have a way to creat

Best Free Antivirus for Home use

Best Free Antivirus Are you looking for a good anti-virus that is free.  My current recommendation is Free Sophos Home. Sophos Home the free version comes with Real Time Antivirus, Parental Website Filtering, Web protection, Remote management, and support for 10 PC's and Macs from one free account. I have used the Sophos Endpoint paid version for several years at my work and has been a great product. Web Protection and Parental Website Filtering are useful from keeping all computers from known infected websites.  Sophos makes this easy by having categories.  You want to block all know malware/spyware infected websites.

Remove EXTERNAL from subject on exim for email leaving your domain

In an earlier post I mentioned how to tag/add EXTERNAL to the subject header on exim.  I made the changes on our Sophos UTM which may require re-applying the configuration files after Sophos UTM update. I ended up adding and elif block to act on outgoing emails in the exim.system_filter file this is the block I added.  Change your domain as appropriate and add additional lines if you need to. elif  $header_from: contains ">"  and $header_to: does not contain ">"  and $header_subject: contains "[EXTERNAL]" then  headers add "Old-Subject: $h_subject:"  headers remove "Subject"  headers add "Subject: ${sg{$h_old-subject:}{[[]EXTERNAL[]]}{}}"  headers remove "Old-Subject" endif This is the full exim.system_filter file To have the $h_from or $header_from act on the domain part and not the display name part if someone was trying to spoof the from name I added the > at the