Mail Server Configuration
Follow the simple, step-by-step instructions to configure your corporate email server to work with StayPrivate. The whole setup process should take little more that 5 minutes and will not disrupt your current email service in any way.
Follow the simple, step-by-step instructions to configure your corporate email server to work with StayPrivate. The whole setup process should take around 5 to 10 minutes and will not disrupt your current email service in any way.
Show instructions for:
1. Update DNS Records
The first step is to update your DNS records to allow StayPrivate to forward emails on behalf of your company. It is very important to do this before configuring your server below, otherwise some emails may not be delivered.
Firstly, log into your DNS administration console and find the current SPF record - this is a TXT record and normally starts with 'v=spf1'. Add the text: include:spmail.com before the trailing '~all'.
OR, if you do not have an SPF record, add a new TXT record with the following content: v=spf1 a mx include:spmail.com ~all
Secondly, add support for DKIM by adding a CNAME record for stayprivate._domainkey with the value stayprivate._domainkey.spmail.com.
2. Google Mail Server Access
You require administrator access to your Google mail server in order to configure it to work with StayPrivate:
If you do not have administrator access to your email server, please send the following link to your IT administrator and ask them to complete the setup:
3. Configure Host
First add StayPrivate as a host:
4. Outbound Email
The next step is to add a rule so that the email server can identify which emails to send via the StayPrivate host.
5. Inbound Email
The next step is to configure your email server to accept and relay emails sent by StayPrivate:
6. Secure Replies
To ensure that direct replies from secure corporate domains are included in StayPrivate, incoming secure replies are identified and blind copied to server@stayprivatemail.com. This is achieved by adding a further compliance rule:
That is it! StayPrivate will start working immediately.
7. Deleting StayPrivate from Your Mail Server
If you do wish to delete StayPrivate, return to the 'Settings for Gmail' page, scroll down to near the bottom and click on 'Compliance'. Then scroll down to 'Content compliance' and delete the rules 'Identify messages to send via StayPrivate' and 'Send secure replies to StayPrivate'.
Again, in the 'Settings for Gmail' page, scroll down to the bottom and click on 'Routing'. Scroll down to 'SMTP relay service' and delete the service 'Receive from StayPrivate'.
Finally, near the top of the 'Settings for Gmail' page, click on 'Hosts' and delete 'StayPrivate'.
1. Google Mail Server Access
You require administrator access to your Google mail server in order to configure it to work with StayPrivate:
If you do not have administrator access to your email server, please send the following link to your IT administrator and ask them to complete the setup:
2. Configure Host
First add StayPrivate as a host:
3. Outbound Email
The next step is to add a rule so that the email server can identify which emails to send via the StayPrivate host.
4. Inbound Email
The next step is to configure your email server to accept and relay emails sent by StayPrivate:
5. Secure Replies
To ensure that direct replies from secure corporate domains are included in StayPrivate, incoming secure replies are identified and blind copied to server@stayprivatemail.com. This is achieved by adding a further compliance rule:
That is it! StayPrivate will start working immediately.
6. Update DNS Records
Out of the box, StayPrivate will deliver your emails from StayPrivate mail (spmail.com) addresses. We recommend that you update your DNS records to allow StayPrivate to address emails as sent direct from your users' existing email accounts.
As soon as both your SPF and DKIM records are updated to allow StayPrivate to send on your behalf, StayPrivate will automatically start sending emails direct from your users' email addresses.Firstly, log into your DNS administration console and find the current SPF record - this is a TXT record and normally starts with 'v=spf1'. Add the text: include:spmail.com before the trailing '~all'.
OR, if you do not have an SPF record, add a new TXT record with the following content: v=spf1 a mx include:spmail.com ~all
Secondly, add support for DKIM by adding a CNAME record for stayprivate._domainkey with the value stayprivate._domainkey.spmail.com.
7. Deleting StayPrivate from Your Mail Server
If you do wish to delete StayPrivate, return to the 'Settings for Gmail' page, scroll down to near the bottom and click on 'Compliance'. Then scroll down to 'Content compliance' and delete the rules 'Identify messages to send via StayPrivate' and 'Send secure replies to StayPrivate'.
Again, in the 'Settings for Gmail' page, scroll down to the bottom and click on 'Routing'. Scroll down to 'SMTP relay service' and delete the service 'Receive from StayPrivate'.
Finally, near the top of the 'Settings for Gmail' page, click on 'Hosts' and delete 'StayPrivate'.
Follow the simple, step-by-step instructions to configure your corporate email server to work with StayPrivate. The whole setup process should take around 5 to 10 minutes and will not disrupt your current email service in any way.
Show instructions for:
1. Update DNS Records
The first step is to update your DNS records to allow StayPrivate to forward emails on behalf of your company. It is very important to do this before configuring your server below, otherwise some emails may not be delivered.
Firstly, log into your DNS administration console and find the current SPF record - this is a TXT record and normally starts with 'v=spf1'. Add the text: include:spmail.com before the trailing '~all'.
OR, if you do not have an SPF record, add a new TXT record with the following content: v=spf1 a mx include:spmail.com ~all
Secondly, add support for DKIM by adding a CNAME record for stayprivate._domainkey with the value stayprivate._domainkey.spmail.com.
2. Microsoft Mail Server Access
You require administrator access to your Microsoft 365 account or mail server in order to configure it to work with StayPrivate:
If you do not have administrator access to your email server, please send the following link to your IT administrator and ask them to complete the setup:
We recommend that you use the latest version of the Microsoft Exchange Admin Center. If you are using the 'Classic' Exchange Admin Center you can still follow the instructions below, but please be aware that there are one or two slight differences in wording and layout.
Instead of using the Admin Center, you can configure the email server directly using Exchange Online PowerShell. Click here to display the PowerShell instructions.
3. Outbound Email
Add a secure connector to enable emails to be forwarded to the StayPrivate relay server:
4. Inbound Email
Next add a secure connector to allow StayPrivate to send secure emails back to your corporate email server for delivering to the recipient.
5. Create Rules
The next step is to add a rule so that the mail server can identify which emails to send to StayPrivate:
Next add a rule to ensure that secure emails are not incorrectly identified as spam:
6. Secure Replies
To ensure that direct replies from secure corporate domains are included in StayPrivate channels, incoming secure replies are identified and blind copied to server@stayprivatemail.com. Firstly, set up a new contact:
Now add a rule to ensure that secure emails are copied to server@stayprivatemail.com:
7. Enable Rules
The next step is to enable the rules:
That is it! StayPrivate will start working right away.
8. Deleting StayPrivate from Your Mail Server
If you wish to delete StayPrivate from your mail server, all you need to do is to navigate to the 'Exchange Admin Center' then under the 'Mail flow' section on the left, select 'Rules'. Select the circle next to the rule called 'Identify messages to send via StayPrivate' and then click on the 'Delete' button above.
This is enough to stop StayPrivate working. But it is recommended to also delete the other StayPrivate rules 'StayPrivate Allow' and 'Send secure replies to StayPrivate'. You will find these in the same place.Finally, select 'Connectors' under 'Mail flow' and delete the connectors 'Send to StayPrivate' and 'Receive from StayPrivate'.
Alternatively, you can log into Exchange Online Powershell and remove the rules and connectors using the commands below:
Remove-TransportRule "Identify messages to send via StayPrivate"
Remove-TransportRule "Send secure replies to StayPrivate"
Remove-TransportRule "StayPrivate Allow"
Remove-OutboundConnector "Send to StayPrivate"
Remove-InboundConnector "Receive from StayPrivate"
1. Microsoft Mail Server Access
You require administrator access to your Microsoft 365 account or mail server in order to configure it to work with StayPrivate:
If you do not have administrator access to your email server, please send the following link to your IT administrator and ask them to complete the setup:
We recommend that you use the latest version of the Microsoft Exchange Admin Center. If you are using the 'Classic' Exchange Admin Center you can still follow the instructions below, but please be aware that there are one or two slight differences in wording and layout.
Instead of using the Admin Center, you can configure the email server directly using Exchange Online PowerShell. Click here to display the PowerShell instructions.
2. Outbound Email
The first step is to add a secure connector to the StayPrivate relay server:
3. Inbound Email
Next add a secure connector to allow StayPrivate to send secure emails back to your corporate email server for delivering to the recipient.
4. Create Rules
The next step is to add a rule so that the mail server can identify which emails to send to StayPrivate:
Next add a rule to ensure that secure emails are not incorrectly identified as spam:
5. Secure Replies
To ensure that direct replies from secure corporate domains are included in StayPrivate channels, incoming secure replies are identified and blind copied to server@stayprivatemail.com. Firstly, set up a new contact:
Now add a rule to ensure that secure emails are copied to server@stayprivatemail.com:
6. Enable Rules
The next step is to enable the rules:
That is it! StayPrivate will start working right away.
7. Update DNS Records
Out of the box, StayPrivate will deliver your emails from StayPrivate mail (spmail.com) addresses. We recommend that you update your DNS records to allow StayPrivate to address emails as sent direct from your users' existing email accounts.
As soon as both your SPF and DKIM records are updated to allow StayPrivate to send on your behalf, StayPrivate will automatically start sending emails direct from your users' email addresses.Firstly, log into your DNS administration console and find the current SPF record - this is a TXT record and normally starts with 'v=spf1'. Add the text: include:spmail.com before the trailing '~all'.
OR, if you do not have an SPF record, add a new TXT record with the following content: v=spf1 a mx include:spmail.com ~all
Secondly, add support for DKIM by adding a CNAME record for stayprivate._domainkey with the value stayprivate._domainkey.spmail.com.
8. Deleting StayPrivate from Your Mail Server
If you wish to delete StayPrivate from your mail server, all you need to do is to navigate to the 'Exchange Admin Center' then under the 'Mail flow' section on the left, select 'Rules'. Select the circle next to the rule called 'Identify messages to send via StayPrivate' and then click on the 'Delete' button above.
This is enough to stop StayPrivate working. But it is recommended to also delete the other StayPrivate rules 'StayPrivate Allow' and 'Send secure replies to StayPrivate'. You will find these in the same place.Finally, select 'Connectors' under 'Mail flow' and delete the connectors 'Send to StayPrivate' and 'Receive from StayPrivate'.
Alternatively, you can log into Exchange Online Powershell and remove the rules and connectors using the commands below:
Remove-TransportRule "Identify messages to send via StayPrivate"
Remove-TransportRule "Send secure replies to StayPrivate"
Remove-TransportRule "StayPrivate Allow"
Remove-OutboundConnector "Send to StayPrivate"
Remove-InboundConnector "Receive from StayPrivate"
Follow the simple, step-by-step instructions to configure your corporate email server to work with StayPrivate. The whole setup process should only take a few minutes and will not disrupt your current email service in any way.
Show instructions for:
1. Update DNS Records
The first step is to update your DNS records to allow StayPrivate to forward emails on behalf of your company. It is very important to do this before configuring your server below, otherwise some emails may not be delivered.
As soon as both your SPF and DKIM records are updated to allow StayPrivate to send on your behalf, StayPrivate will automatically start sending emails direct from your users' email addresses.
Firstly, log into your DNS administration console and find the current SPF record - this is a TXT record and normally starts with 'v=spf1'. Add the text: include:spmail.com before the trailing '~all'.
OR, if you do not have an SPF record, add a new TXT record with the following content: v=spf1 a mx include:spmail.com ~all
Secondly, add support for DKIM by adding a CNAME record for stayprivate._domainkey with the value stayprivate._domainkey.spmail.com.
2. Mail Server Access
You require administrator access to your mail server in order to configure it to work with StayPrivate.
If you do not have administrator access to your mail server, please send the following link to your IT administrator and ask them to complete the setup:
3. Outbound Email
To connect with StayPrivate, outgoing secure emails need to be identified and relayed to https://sendsecure.stayprivate.com. For most email servers this means adding https://sendsecure.stayprivate.com as a host or default connector.
4. Inbound Email
StayPrivate sends secure emails back to the corporate email server for delivering onto the recipient. The corporate email server therefore needs to be configured to accept and relay secure emails sent by StayPrivate. You can identify secure emails in either of two ways:
For alternative setup options, log into the admin dashboard at https://admin.stayprivate.com.
5. Secure Replies
To ensure that secure replies from secure corporate domains are included in StayPrivate, incoming secure replies should be identified and blind copied to server@stayprivatemail.com. For most email servers this is achieved by adding a compliance rule to add the above address to the 'bcc' field if an incoming email contains the text #stayprivate-secure-reply.
1. Mail Server Access
You require administrator access to your mail server in order to configure it to work with StayPrivate.
If you do not have administrator access to your mail server, please send the following link to your IT administrator and ask them to complete the setup:
2. Outbound Email
To connect with StayPrivate, outgoing secure emails need to be identified and relayed to https://sendsecure.stayprivate.com. For most email servers this means:
If you are not able add the external recipient condition, you can simply route all emails through StayPrivate. StayPrivate will automatically ignore internal emails.
3. Inbound Email
StayPrivate sends secure emails back to the corporate email server for delivering onto the recipient. The corporate email server therefore needs to be configured to accept and relay secure emails sent by StayPrivate. You can identify secure emails in either of two ways:
For alternative setup options, log into the admin dashboard at https://admin.stayprivate.com.
4. Secure Replies
To ensure that secure replies from secure corporate domains are included in StayPrivate, incoming secure replies should be identified and blind copied to server@stayprivatemail.com. For most email servers this is achieved by adding a compliance rule to add the above address to the 'bcc' field if an incoming email contains the text #stayprivate-secure-reply.
5. Update DNS Records
Out of the box, StayPrivate will deliver your emails from StayPrivate mail (spmail.com) addresses. We recommend that you update your DNS records to allow StayPrivate to address emails as sent direct from your users' existing email accounts.
As soon as both your SPF and DKIM records are updated to allow StayPrivate to send on your behalf, StayPrivate will automatically start sending emails direct from your users' email addresses.Firstly, log into your DNS administration console and find the current SPF record - this is a TXT record and normally starts with 'v=spf1'. Add the text: include:spmail.com before the trailing '~all'.
OR, if you do not have an SPF record, add a new TXT record with the following content: v=spf1 a mx include:spmail.com ~all
Secondly, add support for DKIM by adding a CNAME record for stayprivate._domainkey with the value stayprivate._domainkey.spmail.com.
StayPrivate is designed so that it can work with any Secure Email Gateway or Email Data Loss Prevention tool. It is also possible to create more advanced logic using native email server logic. For more information, see below.
Secure Email Gateway Integration
To ensure that StayPrivate works with an email gateway:
For further assistance, please contact us at support@stayprivate.com.
Email DLP Integration
You can use a DLP tool to decide which emails to send via StayPrivate:
For further assistance, please contact us at support@stayprivate.com.
Advanced Rules
StayPrivate can also be configured to automatically encrypt based on email content and/or recipient identity. For more information contact us at support@stayprivate.com. You can also use the native email server logic to create more complicated sending rules:
For further assistance, please contact us at support@stayprivate.com.