36 votesopen discussion · 4 comments · Feature Suggestions » Plesk (general) · Flag idea as inappropriate… · Admin →
77 votesopen discussion · 22 comments · Feature Suggestions » Usability and UI · Flag idea as inappropriate… · Admin →Bob commented
This would be useful to determining wether an ip address should be removed from the trusted list based on changes in clients and circumstances... It can be tough to remember every IP address in the list without some sort of help...
59 votesBob commented
This can be vital in tracking down the source of not only an offending subscription but possibly a compromised email address or if the source is from a script, listing the file that generated the email in the first place.
It may be sufficient to log the headers rather than the actual email content... Or possibly just a truncated portion of the offending emails content? As long as the source (email address/script) is logged it should be sufficient to help track down security breaches and injected malware code...
960 votesopen discussion · 113 comments · Feature Suggestions » Plesk (general) · Flag idea as inappropriate… · Admin →