Protect your Lenovo Server
Search Results – Bison Knowledgebase

🔍 Results for “SMTP sender masking”

Step-by-step: fix “email sent as another user” using Google Workspace SMTP Relay + PostMaster

A) Google Workspace (Admin Console) — set up SMTP Relay Open: Admin Console → Apps → Google Workspace → Gmail → Routing → SMTP relay service → Add Setting. Description: Pos…

How to Configure Google Workspace SMTP in Postbox: Complete Setup Guide by Bison Infosolutions

? IntroductionEmail remains the backbone of professional communication. Whether you're managing multiple business inboxes or ensuring reliable message delivery, having a secure and…

Google Workspace SMTP Relay (IP-Based) — Architecture, Configuration, EHLO / Envelope-From Errors & Fixes

This Knowledge Base article provides a technical deep dive into Google Workspace Gmail SMTP Relay (IP-based), covering:SMTP Relay architecture and behaviorCorrect configuration for…

How to Share SMTP Email Details Safely for a requirement of App Password for Web Applications or Whitelisting Requirements (Google Workspace Users)

When a travel portal sends booking confirmations, invoices, or alerts, it needs an email system to send those messages automatically. This is done using something called SMTP.If n…

Mailfence Email Setup in Microsoft Outlook & Mozilla Thunderbird – Complete Configuration Guide

This Knowledge Base article provides a detailed, professional, and technically accurate guide to configure Mailfence email accounts in Microsoft Outlook and Mozilla Thunderbird.It …

Zoho Mail Setup in Microsoft Outlook & Mozilla Thunderbird – Complete Configuration Guide

This Knowledge Base article provides a detailed, technical, and practical guide to configure Zoho Mail accounts in Microsoft Outlook and Mozilla Thunderbird.It is intended for IT a…

GMX Email Setup in Microsoft Outlook & Mozilla Thunderbird – Complete Configuration Guide

This Knowledge Base article provides a detailed, technical, and practical guide for configuring GMX (Global Mail eXchange) email accounts in Microsoft Outlook and Mozilla Thunderbi…

AOL Mail Setup in Microsoft Outlook & Mozilla Thunderbird – Complete Configuration Guide

This Knowledge Base article provides a detailed, technical, and practical guide for configuring AOL Mail in Microsoft Outlook and Mozilla Thunderbird.It is intended for IT administ…

Mail.com Email Setup in Microsoft Outlook & Mozilla Thunderbird – Complete Configuration Guide

This Knowledge Base article provides a detailed, technical, and practical guide for configuring Mail.com free email accounts in Microsoft Outlook and Mozilla Thunderbird.It is desi…

Yahoo Free Email (All Domains) Configuration in Outlook & Mozilla Thunderbird – Complete Technical Guide

This Knowledge Base article provides a complete, standardized procedure to configure Yahoo free email accounts—across all supported Yahoo domains—in Microsoft Outlook and Mozilla T…

Gmail Sending Limits in Google Workspace – Technical Limits, Behavior, and Troubleshooting Guide

This Knowledge Base article provides a technical and operational explanation of Gmail sending limits in Google Workspace.It is intended for IT administrators, system engineers, MSP…

iCloud Mail Setup in Microsoft Outlook & Mozilla Thunderbird – Complete Configuration Guide

This Knowledge Base article provides a detailed, technical, and practical guide for configuring iCloud Mail in Microsoft Outlook and Mozilla Thunderbird.It is intended for IT admin…

Hotmail.com & Outlook.com Email Configuration in Outlook and Thunderbird (Free Microsoft Email)

This Knowledge Base article provides a complete, technical, and practical guide to configure free Microsoft email accounts such as hotmail.com and outlook.com in desktop email clie…

Proton Mail Setup in Microsoft Outlook & Mozilla Thunderbird – Complete Technical Configuration Guide

This Knowledge Base article provides a detailed, technical, and practical guide to configure Proton Mail in Microsoft Outlook and Mozilla Thunderbird.Unlike traditional email provi…

Setting Up POP and IMAP for Third-Party Email Applications

Introduction POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) are two standard protocols used for retrieving emails from a server. While both serve the purpos…

Correct Domain Address Formats in Google Workspace Gmail Compliance & Email Restriction Policies

In Google Workspace (Gmail) Admin settings, address lists are commonly used to control allowlisting, blocklisting, and authentication requirements for inbound and outbound email.A …

Send Anywhere and Similar File-Sharing Apps/Websites: Features, Benefits, Pros & Cons (Knowledge Base)

File sharing tools like Send Anywhere solve a common IT problem: moving files quickly between devices and people—often across different platforms (Windows/macOS/Android/iOS)—withou…

GoDaddy Email POP3 & IMAP Settings for Outlook and Thunderbird – Complete Configuration Guide

This Knowledge Base article provides a comprehensive and technical guide to configure GoDaddy email accounts using POP3 or IMAP protocols in Microsoft Outlook and Mozilla Thunderbi…

Difference Between POP, IMAP, and Other Email Access Methods: Technical Comparison, Use Cases, and Best Practices

Email access methods define how email clients retrieve, synchronize, and store messages from a mail server. The choice of protocol directly affects data availability, security, dev…

How to Send Invoices from Tally Using Gmail – Step-by-Step Setup Guide

Sending invoices directly from Tally using Gmail helps you share bills quickly, professionally, and without any manual attachment work. Once Gmail and Tally are configured properly…

How to Allow Specific Domains and Block All Other Emails in Microsoft 365 Using Mail Flow Rules (Step-by-Step Guide)

his detailed technical guide explains how to allow email communication only with specific domains and block all other domains in Microsoft 365 Business Basic, using Mail Flow (Tran…

Tuta Mail (formerly Tutanota) Setup in Outlook & Mozilla Thunderbird – Technical Explanation and Limitations

This Knowledge Base article explains how (and why) Tuta Mail cannot be set up in Microsoft Outlook or Mozilla Thunderbird using traditional email protocols.It is written for IT adm…

Why Business Emails Go to Spam Even When SPF, DKIM, and DMARC Are Correct

Many organizations assume that once SPF, DKIM, and DMARC are configured correctly, all business emails will reliably reach the inbox. In reality, email authentication is only the f…

How to Set Up MX Records for Google Workspace (2026)

Email delivery for any domain depends on Mail Exchange (MX) records, a critical DNS configuration that tells the global internet where to deliver incoming email. When you deploy Go…

MX Record TTL Mismatch Between Cloudflare and Hostinger: Technical Impact, Behavior, and Resolution

This article explains why Cloudflare DNS does not provide a 14400-second (4-hour) TTL option while Hostinger recommends TTL 14400 for MX records, and whether this mismatch causes e…

How to Configure Yahoo Mail in Microsoft Outlook (Updated Step-by-Step Guide)

Configuring Yahoo Mail in Microsoft Outlook is fully supported, but the process is slightly different because Yahoo requires Enhanced Security Login. This means that Outlook cannot…

Tally Prime Configuration Persistence: Backup and Restore of Application, Company, and User Settings

This Knowledge Base article explains where and how Tally Prime stores configuration data, including bank details, email (SMTP) settings, view/UI preferences, and customizations, an…

Do Paid Domain-Based Email Services Require SPF, DKIM & DMARC? A Technical Knowledge Base Guide for Google Workspace, Microsoft 365, Yahoo Business Mail & Rediffmail Pro

Modern email delivery is governed by strict anti-spam and anti-phishing standards. Merely purchasing a paid, domain-based email service does not guarantee inbox delivery.Whether yo…

How to Set Up Google Workspace Email Using POP and IMAP in Outlook or Thunderbird

Setting up your Google Workspace email in Outlook or Thunderbird using POP or IMAP allows you to manage your emails efficiently across devices. Here's a step-by-step guide to confi…

Justdial: Local Search Platform Overview, Features, Benefits, Pros, and Cons

Justdial is one of India’s most widely used local search and business discovery platforms, designed to connect consumers with nearby businesses and service providers. It enables us…

How to Restrict Email Communication to Approved Domains and Limit Attachment Size in Microsoft 365

Email remains one of the most common channels for data exchange—and also one of the most exploited attack vectors. Organizations handling financial, legal, or confidential informat…

Mozilla Thunderbird Email Client – Complete Technical Knowledge Base Guide

Mozilla Thunderbird is a free, open-source desktop email client designed for managing emails, calendars, contacts, and tasks across multiple accounts. Developed and maintained by t…

Enforcing Email-Client-Only Access in Google Workspace Using App Passwords (No User Passwords)

Some organizations want to strictly prevent users from accessing Google Workspace accounts via browsers (Gmail web, Google login, Drive, etc.) and force email usage only through de…

Fix: Outlook Keeps Asking for Gmail Password (Google Workspace App Password Solution)

If your Outlook keeps asking for your Gmail or Google Workspace password, even after enabling POP and creating an App Password, you’re not alone. Thousands of professionals face th…

Safelisting Business Emails Using Contacts, VCF Files, and QR Codes

Even trusted business emails can land in spam due to automated filtering. One of the most reliable ways to ensure inbox delivery is safelisting the sender by adding them to the rec…

Microsoft Outlook Features and Shortcut Commands for Everyday Productivity

Microsoft Outlook is a core productivity application used daily for email communication, calendar management, contacts, and task tracking. When used beyond basic email reading—by l…

Blockchain Technology: A Practical Technical Guide for IT and Enterprise Use

Blockchain technology is a distributed ledger system designed to record transactions in a secure, transparent, and tamper-resistant manner. Originally introduced as the foundation …

How to Move Microsoft Outlook OST Data File to Another Drive (IMAP / SMTP)

When the C: drive becomes full, Microsoft Outlook may stop receiving or syncing emails. This is a common issue for users configured with IMAP/SMTP email accounts, where Outlook sto…

How to Create a Google Workspace App Password for Outlook or Third-Party Email Clients

When you use Google Workspace (formerly G Suite) with email software like Outlook, Postbox, Thunderbird, or any other third-party mail client, you might encounter sign-in errors du…

How to Set Up Hostinger Email in Outlook for Windows (Hostinger Webmail)

Setting up your Hostinger email on Outlook for Windows ensures seamless and secure access to your messages across all devices. This guide walks you through both the automatic and m…

How to Set Up Google Workspace Email in Outlook and Enable Two-Factor Authentication (2FA)

Introduction Google Workspace (formerly G Suite) offers robust email services that can be seamlessly integrated with Microsoft Outlook. This guide provides step-by-step instruction…

Website Downloaders (Offline Website Makers): Complete Technical Guide

Website downloaders, also known as offline website makers, are tools that copy web content (HTML, CSS, JavaScript, images, media, and sometimes server-rendered pages) from a live w…

Adobe Photoshop: History, Technology, Licensing, and Modern Alternatives

Adobe Photoshop is the world’s most widely used raster-based professional image editing software, serving industries such as graphic design, photography, publishing, advertising, e…

Sulekha.com: Service Discovery Platform Overview, Usage, Benefits, Pros, and Cons

Sulekha.com is a prominent service discovery and lead-generation platform in India, primarily focused on connecting consumers with local service providers and professionals. Unlike…

AI Tools in 2026: Types, Benefits, Top Tools by Segment, Key Players, and How to Spot Fraud

AI tools are now a broad market of products that use machine learning (ML) and large language models (LLMs) to generate content, automate workflows, analyze data, and assist decisi…

5 Apps to Use VPN on Your Mobile Phone (2026) – A Technical & Security Guide

Virtual Private Networks (VPNs) are a critical security tool for mobile users, especially when accessing the internet over public Wi-Fi or mobile data networks. In 2026, VPN usage …

DMARC, DKIM, and SPF for Email Authentication

Introduction Email authentication is critical for protecting against spam, phishing, and other malicious activities. DMARC (Domain-based Message Authentication, Reporting, and Conf…

Google Workspace vs Microsoft 365 vs Rediffmail Pro – Detailed Technical Comparison for Business Email & Productivity

Selecting the right business email and productivity platform is a strategic IT decision that affects communication reliability, data security, user productivity, and long-term scal…

How to Block Google Workspace Browser Access and Allow Email Access Only via Microsoft Outlook

Organizations using Google Workspace Business Starter often want to restrict browser-based access to Gmail, Drive, Calendar, and other Workspace web applications, while allowing us…

Quick Heal Total Security Slowing Outlook Send/Receive Performance

If you're experiencing delays while sending or receiving emails in Microsoft Outlook, Quick Heal Total Security’s built-in Email Protection and Real-Time Scanning features might be…