Bob

My feedback

  1. 48 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    open discussion  ·  4 comments  ·  Feature Suggestions » Plesk (general)  ·  Flag idea as inappropriate…  ·  Admin →

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Bob supported this idea  · 
  2. 126 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    open discussion  ·  29 comments  ·  Feature Suggestions » Usability and UI  ·  Flag idea as inappropriate…  ·  Admin →

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Bob commented  · 

    This would be useful to determining wether an ip address should be removed from the trusted list based on changes in clients and circumstances... It can be tough to remember every IP address in the list without some sort of help...

    Bob supported this idea  · 
  3. 77 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    open discussion  ·  10 comments  ·  Feature Suggestions » Mail  ·  Flag idea as inappropriate…  ·  Admin →

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Bob commented  · 

    This can be vital in tracking down the source of not only an offending subscription but possibly a compromised email address or if the source is from a script, listing the file that generated the email in the first place.

    It may be sufficient to log the headers rather than the actual email content... Or possibly just a truncated portion of the offending emails content? As long as the source (email address/script) is logged it should be sufficient to help track down security breaches and injected malware code...

    Bob supported this idea  · 
  4. 1,529 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    239 comments  ·  Feature Suggestions » Plesk (general)  ·  Flag idea as inappropriate…  ·  Admin →

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We hear you and see a clear demand for this feature.

    I want to say that implementing these features requires a lot of investment, and in 2021 Plesk team keeps focusing on the delivery of other improvements (sad, but true).

    We will back to the re-evaluation of these features at the beginning of the next year.

    Please continue to share your use cases and requirements, and it would really helpful if you point to existing solutions that we can review and check before implementation.

    Your feedback is important to us. Thank you, everyone.

    AA

    Bob supported this idea  · 

Feedback and Knowledge Base