Contents

 Contents 1. Log in to Plesk Control Panel (Customer Control Panel) ___________________________________ 4 2. If You Forgot Your Password to Control Panel ___________________________________________ 5 3. Plesk Control Panel/ Current System____________________________________________________ 8 4. My Account _________________________________________________________________________ 9 4.1 My Account/ Billing Management/ Subscriptions________________________________________ 10 4.2 My Account/ Account Management/ Account Contacts ___________________________________ 12 4.3 My Account/ Account Management/ Account Settings____________________________________ 12 4.4 My Account/ Account Management/ Notification Settings_________________________________ 12 4.5 My Account/ Personal Settings/ Personal Profile ________________________________________ 12 5. Upgrade Center_____________________________________________________________________ 13 5.1 Change Hosting Plan ______________________________________________________________ 13 5.2 Register New Domain ______________________________________________________________ 14 6. Sign out from the Plesk Control panel __________________________________________________ 15 7. Domain____________________________________________________________________________ 15 7.1 Report___________________________________________________________________________ 16 7.2 Limits ___________________________________________________________________________ 17 7.3 Domain Administrator _____________________________________________________________ 19 7.4 Domain Aliases ___________________________________________________________________ 20 7.5 Custom Buttons ___________________________________________________________________ 21 8. Services ___________________________________________________________________________ 24 8.1 DNS-Settings _____________________________________________________________________ 24 8.2 Databases (LINUX hosting) _________________________________________________________ 24 8.2.1 Add a Database ___________________________________________________________________ 24 8.2.2 Creating an additional Database User Account __________________________________________ 26 8.2.3 Changing Password for a Database User _______________________________________________ 26 8.2.4 Removing a Database User Account ___________________________________________________ 26 8.2.5 Removing a Database_______________________________________________________________ 27 8.3 Databases (Windows hosting)________________________________________________________ 28 8.3.1 Add a Database ___________________________________________________________________ 28 8.3.2 Creating an additional Database User Account __________________________________________ 29 8.3.3 Changing Password for a Database User _______________________________________________ 29 8.3.4 Removing a Database User Account ___________________________________________________ 30 8.3.5 Removing a Database_______________________________________________________________ 30 8.4 Certificates _______________________________________________________________________ 31 8.5 ODBC Data Sources (Note! Only for Windows hosting) __________________________________ 32 8.5.1 Creating New Connections to External Databases (Windows Hosting) ________________________ 32 8.5.2 Physical path _____________________________________________________________________ 34 8.5.3 Changing Settings of an existing ODBC Connections (Windows Hosting)______________________ 34 8.5.4 Removing Connections to external databases (Windows Hosting) ____________________________ 34 9. Hosting Linux ______________________________________________________________________ 34 9.1 Setup____________________________________________________________________________ 34 9.2 Changing FTP Password ___________________________________________________________ 36 1 9.3 Delete ___________________________________________________________________________ 36 9.4 Web users________________________________________________________________________ 39 9.4.1 Changing FTP Password for a Web Page Owner _________________________________________ 40 9.4.2 Allocating More Disk Space to the Web Page Owner ______________________________________ 41 9.4.3 Removing Web Page Owner's Account _________________________________________________ 41 9.5 Sub domains _____________________________________________________________________ 41 9.5.1 Setting up Subdomains ______________________________________________________________ 42 9.5.2 Removing Subdomains ______________________________________________________________ 43 9.6 Protected Directories _______________________________________________________________ 43 9.6.1 Protecting a Resource ______________________________________________________________ 43 9.6.2 To change password for an authorized user of a protected directory: _________________________ 45 9.6.3 To delete a permission to access the protected directory from a user: _________________________ 45 9.7 File Manager _____________________________________________________________________ 46 9.8 Crontab _________________________________________________________________________ 50 9.8.1 Scheduling a Task__________________________________________________________________ 51 9.8.2 Suspending and Resuming Execution of Tasks ___________________________________________ 52 9.8.3 To resume execution of scheduled task:_________________________________________________ 53 9.8.4 Unscheduling a Task _______________________________________________________________ 53 9.9 Site Preview ______________________________________________________________________ 53 9.10 Performance _____________________________________________________________________ 54 10. Hosting Windows _________________________________________________________________ 54 10.1 Setup____________________________________________________________________________ 54 10.2 Changing FTP/Microsoft Front Page Password _________________________________________ 57 10.3 Delete ___________________________________________________________________________ 57 10.4 Web users________________________________________________________________________ 57 10.4.1 Changing FTP Password for a Web Page Owner_______________________________________ 59 10.4.2 Allocating More Disk Space to the Web Page Owner____________________________________ 59 10.4.3 Removing Web Page Owner's Account _______________________________________________ 60 10.5 Sub domains _____________________________________________________________________ 60 10.5.1 Setting up Subdomains____________________________________________________________ 60 10.5.2 Removing Subdomains____________________________________________________________ 63 10.6 Protected URLs ___________________________________________________________________ 64 10.6.1 Protecting an URL _______________________________________________________________ 64 10.6.2 To change password for an authorized user of a protected resource: _______________________ 65 10.6.3 To delete a permission to access the protected resource from a user: _______________________ 65 10.7 Web Directories ___________________________________________________________________ 66 10.7.1 To set access permissions for a virtual directory:_______________________________________ 68 10.7.2 Changing settings for the root directory ______________________________________________ 68 10.7.3 Configuring ASP.NET for Virtual Directories _________________________________________ 71 10.7.4 Restoring Default ASP.NET Configuration____________________________________________ 74 10.7.5 MIME Types____________________________________________________________________ 75 10.7.5.1 To add a new MIME type for a virtual directory on a domain: ____________________________ 75 10.7.5.2 Changing MIME Types ___________________________________________________________ 76 10.7.5.3 Removing MIME Types ___________________________________________________________ 77 10.7.6 Restricting Access to Web Site's Resources with Password Protection ______________________ 77 2 10.8 FTP Accounts ____________________________________________________________________ 80 10.8.1 Adding additional FTP-users ______________________________________________________ 80 10.8.2 Changing password for a FTP user account. __________________________________________ 81 10.8.3 To remove an additional FTP user __________________________________________________ 82 10.9 Log Manager _____________________________________________________________________ 83 10.10 File Manager___________________________________________________________________ 84 10.10.1 Setting and Changing Access Permissions for Groups and Users __________________________ 84 10.10.2 Removing Access Permissions from Groups and Users __________________________________ 85 10.10.3 Setting Up Access Permissions Inheritance for Files and Folders __________________________ 86 10.10.4 Setting, Changing and Removing Special Access Permissions _____________________________ 86 10.10.5 User/Groups____________________________________________________________________ 87 10.10.6 Repairing Access Permissions – Permission check______________________________________ 88 10.11 Scheduled tasks _________________________________________________________________ 88 10.11.1 To schedule a task: ______________________________________________________________ 88 10.11.2 To temporarily suspend execution of a scheduled task: __________________________________ 89 10.11.3 To resume execution of scheduled task: ______________________________________________ 90 10.11.4 To cancel a task: ________________________________________________________________ 90 10.12 Site Preview ____________________________________________________________________ 90 10.13 Front page Management _________________________________________________________ 91 10.13.1 Publishing Sites with Microsoft FrontPage____________________________________________ 91 10.14 Web Applications _______________________________________________________________ 92 10.15 ASP.NET ______________________________________________________________________ 92 10.16 PHP Settings ___________________________________________________________________ 95 10.17 IIS Application Pool _____________________________________________________________ 96 10.18 Performance ___________________________________________________________________ 97 10.19 Hotlink Protection_______________________________________________________________ 98 11. Custom Button/ Remote Mail _______________________________________________________ 99 11.1 Creating a Mailbox ________________________________________________________________ 99 11.1.1 Mail Alias_____________________________________________________________________ 100 11.1.2 To remove an e-mail alias from a mailbox ___________________________________________ 101 11.1.3 Preferences ___________________________________________________________________ 101 11.1.3.1 Changing User Password for e-mail account _________________________________________ 101 11.1.4 Mailbox ______________________________________________________________________ 102 11.1.5 Redirect ______________________________________________________________________ 102 11.1.5.1 Setting up Mail Forwarding to a single e-mail address _________________________________ 102 11.1.6 Mail Group ___________________________________________________________________ 103 11.1.6.1 Setting up Mail Forwarding to multiple e-mail addresses _______________________________ 103 11.1.6.2 To remove mail group ___________________________________________________________ 105 11.1.7 Autoresponders ________________________________________________________________ 105 11.1.8 Filtering incoming e-mails _______________________________________________________ 109 11.1.9 Protecting Mailboxes from Viruses _________________________________________________ 111 11.1.9.1 To switch on anti-virus protection for a mailbox:______________________________________ 111 11.1.9.2 Switching off Anti-virus Protection _________________________________________________ 111 11.1.10 Switching off e-mail service for a domain ____________________________________________ 112 11.1.11 Catch-All function for the e-mail service for a domain__________________________________ 113 3 12. 13. 13.1.1 13.1.2 14. 14.1 14.1.1 14.1.2 15. 16. 17. 18. 18.1 18.2 19. 20. Info____________________________________________________________________________ 113 Standard forwarding (redirect) /Frame Forwarding ___________________________________ 114 Standard forwarding ____________________________________________________________ 115 Frame forwarding ______________________________________________________________ 116 Domain Management_____________________________________________________________ 116 DNS Zone ______________________________________________________________________ 120 To add a DNS record to a zone file _________________________________________________ 122 Disabling a zone _______________________________________________________________ 124 Termination of services ___________________________________________________________ 125 Customizing web server error messages _____________________________________________ 127 Web Mail_______________________________________________________________________ 129 Setting Up Your E-mail Program for Retrieving Mail from Your Mailbox ________________ 130 To set up Microsoft Outlook Express: ________________________________________________ 130 To set up Mozilla Thunderbird: _____________________________________________________ 130 Problem with receiving e-mail messages _____________________________________________ 131 Technical specification, servers_____________________________________________________ 132 1. Log in to Plesk Control Panel (Customer Control Panel)
4 To log in to your Plesk control panel:Open your web browser, and type the URL to the control panel that
has been sent to you.
Plesk login screen will open.
Type the login name and password your provider gave you into the Login and Password boxes,
respectively.
Click Sign in
Enter the Control Panel
2. If You Forgot Your Password to Control Panel
5 To restore your forgotten password:
In your web browser’s address bar, type the URL where your Plesk control panel is located (for example,
https://hosting.strongbox.se/cp)
Press ENTER.
Plesk login screen will open.
Click on the Forgot your password?
Type your e-mail address registered in the system into the E-mail box.
Click Submit.
An e-mail will be sent to you with a URL and an auth code. Click on the link and you will be redirected to
the site Reset Password. Enter your e-mail address, the code and a new password, also confirmed.
6 Enter your new log in information and sign in to the Control Panel
7 3. Plesk Control Panel/ Current System
Under System/Current System/ Select Another System (Subscription) all the subscriptions are listed. If
you have several subscriptions with own webhotels, you just click on the name of the subscription to enter
the very own administration panel for the subscription chosen.
You can also find information about the subscriptions, the name of the hosting plan, the expiration date of
the present period etc. The exp. date does not mean that the service will be deleted; it only tells when the
period is to be renewed with a new period accordingly to the agreement signed.
In the left side pane you can also upgrade your plan and buy new hosting plans.
Click for ex. on subscription 1202 and you will be redirected to the current system of the web account for
the domain strongboxdemotest2.com. You can administrate your services here.
8 The icons shown in the middle section can also be found as links in the left side pane. The Domain
management link can´t on the other hand be found as an icon. You can only find it as a link in the left side
pane.
4. My Account
9 4.1 My Account/ Billing Management/ Subscriptions
Within the Billing Management/ Subscriptions you can either buy new hosting plans clicking on the Buy
another hosting plan button or request a termination for your services/subscriptions. If you choose to buy
more services you will be redirected to the Order Form.
If you choose to terminate services, click on the name of the subscription, for ex. strongboxdemo2.com
Webbhotell
Click on the Request Subscription Termination and fill in a reason and a date. The date shown in the date
field is the date for the next renewal of the subscription. The cancellation of the services depends on what
service agreement customer has with you.
This is the way that you have to handle cancellations from your customers, to add a termination request
and then approve the request.
10 You have to fill something in the termination request field.
The date shown in the field shows the date when the service is to end. If you wish the services to end
sooner, click on the calendar and pick another date. You do still have to approve the date in the Reseller
Control Center.
11 4.2 My Account/ Account Management/ Account Contacts
Within the Account Management/ Account Contacts you can change the administrative contact of your
account by clicking on the edit button.
4.3 My Account/ Account Management/ Account Settings
Within the Account Management/ Account Settings you can update address information etc.
4.4 My Account/ Account Management/ Notification Settings
Within the Account Management/ Notification Settings you can adjust the current settings for notifications
format as well as disable or enable some notifications
4.5 My Account/ Personal Settings/ Personal Profile
Within the Personal Settings/ Personal Profile you can see the currently logged user personal settings.
By clicking the Edit button you can update the login information, both the username which always is an email address and the password. Don’t forget to save when making changes. After the changes is updated
you have to log in to the control panel using the new login information.
12 5. Upgrade Center
A customer can upgrade his plan, buy more resources to the plan or register New Domain through the
Upgrade Center
5.1 Change Hosting Plan
If customer wants to change his/hers hosting plan they can do this by clicking on the ”Change hosting
plan” button and choose to downgrade/upgrade their subscription.
A list of products will appear and the product marked with bold letters is the subscription that customer
has today within your company.
If customer choose to change to some of the other subscriptions he just marks the plan that he
wish to change to and clicks next.
The system presents the new price with corrections.
Click the “Place order” button and the plan has been updated.
13 An order confirmation is shown on the screen
Click My Account tab and subscriptions and you can see that the subscription has been changed.
5.2 Register New Domain
14 If you click “Register New Domain” you will be redirected to the Order Form from where you
can choose to register a new domain.
6. Sign out from the Plesk Control panel
To sign out from the control panel, just click Sign Out
7. Domain
15 7.1 Report
Click the Report button and you will find statistics. Most common is the Web Stats icon. This shows
statistics over unique visitors daily, weekly, monthly and from what countries, and what pages of the site
they have been visiting.
To view the statistics for web pages transferred from your site over hypertext transfer
protocol (HTTP), click Web Stats.
To view statistics for files transferred over file transfer protocol (FTP), click FTP Statistics.
To view the bandwidth usage by months, click the Bandwidth Usage icon.
Note: You can also view the Web statistics for a site by visiting the following URL:
https://your-domain.com/plesk-stat. When prompted for username and password, specify the
Credentials for your FTP account.
You may also get details for your webhosting within the system within the control panel, under the
Summary report heading. Common operations on these reports are:
To get more details, select the Full Report option from the Report drop-down menu.
To adjust the amount of information presented in a report, click the Customize icon, and
then modify an existing report template (to do this, click a report template name) or create a
new report template (to do this, click the Add New Layout icon). Next, specify how
much information you want in each section of the report: select None if you do not want any
information, select Summary if you want a concise overview, or select Full if you need a
detailed report. Select the Use as default report check box and click OK. To delete a custom
report layout, select the checkbox corresponding to the report layout name and click
Remove Selected.
To print the report, click the Print icon. A report will open in a separate browser window.
16 Select the File > Print option from the browser's menu to print the report.
To send the report by e-mail, type the recipient's e-mail address into the input box located to
the right of the Report group and click the Send by E-mail icon. If you are the recipient,
then you do not need to specify an e-mail address: the system assumes by default that you
are the report recipient and specifies your e-mail address registered with your control panel
account.
To have the reports automatically generated and delivered by e-mail on a daily, weekly, or
monthly basis, click the Report Delivery icon and follow the instructions supplied in
the "Automating report generation and delivery by e-mail" section.
Note! This report is not a report that shows customers web site visitors. This is just a summary report over
the services within the web hotel account.
7.2 Limits
17 Click the limits button
the product is configured.
and the limits for the resources will be shown. The limits depends on how
18 7.3 Domain Administrator
you can modify the view of the middle section of
Within the Domain Administrator
the control panel. There are several interface skins from which you can choose. The colors of the panel
will change, so will also the icons. Click on the Domain asministrator´s interface skin and choose which
skin you prefer.
Click OK to save the settings
The login information is for the domain administrator. He can access Plesk directly on the server.
URL: https://webserverIP:8443
Login
Password
There is no reason to access the panel this way since all your customers will use the link that you will send
them by an automatically generated e-mail as soon as they have registered themselves as customer
19 7.4 Domain Aliases
Setting Up Additional Domain Names for a Site (Domain Aliases)
If you have registered with a domain name registrar several domain names that you would like
to point to the same web site that you host on this server, you should set up domain aliases.
Setting Up a Domain Alias
Click the Domain Aliases icon
.
Click the Add Domain Alias icon.
Type the desired domain alias name, for ex. intranet.stronboxtest.com
20 Select the Mail check box, if you want e-mail directed at the e-mail addresses under the domain alias to be
redirected to the e-mail addresses under your original domain name.
Example: You have an e-mail address [email protected]. You have set up an alias for
your domain name, for example, strongboxdemotest.se. If you want to receive mail to your mailbox
[email protected] when it is sent to [email protected], select the Mail check box.
Select the Web check box. Otherwise, the web server will not serve the web content to users coming to
your site by typing the domain alias in their browsers. The same site will be shown whether your visitors
use strongboxdemotest.com com or strongboxdemotest.se
Click OK.
Note!
When you set up a domain alias, resource records in its DNS zone are copied from the original
domain name. This means that if your original domain points to an external mail server, your
domain alias will point to that mail server too. However, to accept mail for the domain alias, the
external mail server should be configured accordingly. Whenever you change MX records in the domain's
DNS zone, be sure to introduce the respective changes in the DNS zone of the domain alias.
7.5 Custom Buttons
You can add own buttons in the control panel. In the domain group, click the Custom buttons
icon
Click Add New Custom Button.
21 Specify properties of the button:
Type the text that will show on your button in the Button label field.
Choose the location for your button. To place it in the right frame of your Home page,
select the Client home page value from the Location drop-down box. To place it on each
domain's administration screen (Home > domain name), select the Domain Administration
page value. To place it in the left frame (navigation pane) of your control panel, select
the Navigation pane value.
Specify the priority of the button. Plesk will arrange your custom buttons on the control
panel in accordance with the priority you define: the lower the number – the higher is
22 priority. Buttons are placed in the left-to-right order.
To use an image for a button background, type the path to its location or click Browse to
browse for the desired file. It is recommended that you use a 16x16 pixels GIF or JPEG
image for a button to be placed in the navigation pane, and 32x32 pixels GIF or JPEG
image for buttons placed in the main frame.
Type the hyperlink of your choice to be attached to the button into the URL box.
Using the checkboxes, specify whether to include the information, such as domain
name, FTP login, FTP password and other data to be transferred within the URL. These
data can be used for processing by external web applications.
In the Context help tip contents input field, type in the help tip that will be displayed
when you hover the mouse pointer over the button.
Select the Open URL in the Control Panel checkbox if you wish the destination URL to be
opened in the control panel's right frame, otherwise leave this check box unchecked to
open the URL in a separate browser window.
If you wish to make this button visible to the mailbox users with access to control panel,
select the Visible to all sub-logins checkbox.
Click OK to complete creation.
23 8. Services
8.1 DNS-Settings
is nothing that you have to administrate.
DNS-Settings
8.2 Databases (LINUX hosting)
8.2.1
Add a Database
Click the Databases icon
in the Tools group.
Click the Add New Database icon.
Type the name you choose for your database in the Database name field.
MySQL is the type of Database that is supported in the web package. You will see the IP number of the
database shown in the Database Server field.
24 Click OK
To set up database administrator’s credentials, click Add New Database User.
Type a Database User Name and a Password in the New Password and Confirm Password fields
Click OK.
You can now administrate your Database through phpMyAdmin:
Click the DB WebAdmin icon in the Tools group. An interface to phpMyAdmin database management
tool will open in a separate browser window. You can also surf to the IP-adress of the server and log in to
the phpMyAdmin-tool.
25 8.2.2
Creating an additional Database User Account
If you collaborate with other people on managing a web site and wish to give them access to the database,
you should create separate user accounts for them.
To create an additional database user account follow the same steps as in the figures above.
8.2.3
Changing Password for a Database User
To change password for a database user:
Click on a database name.
A list of database users will open.
Click on the database user’s name.
Type a new password and click OK.
8.2.4
Removing a Database User Account
26 To remove a database user account:
Click on a database name. A list of database users will open.
Select a check box corresponding to the user account that you wish to remove.
Click Remove Selected.
Next, confirm removing and click OK.
8.2.5
Removing a Database
To remove a database with its contents:
Select a check box corresponding to the database that you wish to remove. (If the required check box appears
grayed out, this means that this database is used by a site application and you can remove it only by uninstalling the
respective application.)
Click Remove Selected.
Confirm removal and click OK.
27 8.3 Databases (Windows hosting)
8.3.1
Add a Database
Click the Databases icon
in the Tools group.
Click the Add New Database icon.
Type the name you choose for your database in the Database name field.
You will see the IP number of the database shown in the Database Server field.
Click OK
To set up database administrator’s credentials, click Add New Database User.
28 Type a Database User Name and a Password in the New Password and Confirm Password fields
Click OK.
You can now administrate your Database through Microsofts EnterPrise Manager:
8.3.2
Creating an additional Database User Account
If you collaborate with other people on managing a web site and wish to give them access to the database,
you should create separate user accounts for them.
To create an additional database user account follow the same steps as in the figures above.
8.3.3
Changing Password for a Database User
To change password for a database user:
Click on a database name.
29 A list of database users will open.
Click on the database user’s name.
Type a new password and click OK.
8.3.4
Removing a Database User Account
To remove a database user account:
Click on a database name. A list of database users will open.
Select a check box corresponding to the user account that you wish to remove.
Click Remove Selected.
Next, confirm removing and click OK.
8.3.5
Removing a Database
To remove a database with its contents:
Select a check box corresponding to the database that you wish to remove. (If the required check box appears
grayed out, this means that this database is used by a site application and you can remove it only by uninstalling the
respective application.)
30 Click Remove Selected.
Confirm removal and click OK.
8.4 Certificates
SSL
are not supported
31 8.5 ODBC Data Sources (Note! Only for Windows hosting)
If you want your users to access the data from an external database management system, you should use
Open Database Connectivity (ODBC) drivers. For example, you can install a Microsoft Access ODBC
driver, creating a connection to external Microsoft Access database, and let Web applications use this
database for storing their data.
8.5.1
Creating New Connections to External Databases (Windows Hosting)
To let web applications of your clients use external databases for storing the data, you need to create
connections to these external databases by installing appropriate ODBC drivers.
To install a new ODBC driver, creating a connection to an external database:
Click on the ODBC Data Sources
icon in the Services tools group.
Click Add New ODBC DSN.
32 Specify the ODBC connection name and description in the corresponding fields.
Select the required driver in the Driver field.
Click OK.
Choose the appropriate options on the driver configuration screen.
Typically, you should specify the path to the database, user credentials and other connection options,
depending on the selected driver.
Click Test to check whether the connection will function properly with provided settings. Click Finish to
complete the creation.
33 8.5.2
Physical path
The physical path for Windows hosting is: C:\Inetpub\vhosts\yourdomain.com\httpdocs\
8.5.3
Changing Settings of an existing ODBC Connections (Windows Hosting)
Click the required connection name in the list.
Change the settings as needed.
Click Test to check whether the connection will function properly with new settings.
Click Finish to save changes.
8.5.4
Removing Connections to external databases (Windows Hosting)
To remove a redundant ODBC connection:
Select a check box corresponding to the connection you want to remove.
Click Remove, confirm the removal and click OK.
9. Hosting Linux
Hosting
9.1 Setup
To review or select the hosting features available for your account
Click the Setup icon in the tools group
34 View or change your hosting options:
IP Address. Your domain is hosted on a shared server and the IP address is thus shared.
Certificate. Shows the SSL certificate used by your site.
SSL support. Secure Sockets Layer encryption is generally used for protecting transfer of sensitive data
during online transactions on e-commerce Web sites that run on dedicated IP addresses. SSL certificates
that participate in the encryption process are usually applied to a single domain name on a single IP
address, therefore, each site that needs SSL protection must be hosted on a dedicated IP address. An
exception to this is subdomains, which you can protect with a wildcard certificate. Installing an SSL
certificate on a Web server that hosts several web sites with different domain names on a single IP address
(shared or name-based hosting) is technically possible, however, it is not recommended: the encryption
will be provided, but users will get warning messages on attempt to connect to the secure site. To allow
SSL encryption for Web sites, select the SSL support check box.
Use a single directory for housing SSL and non-SSL content. By default, when users publish their sites
through their FTP accounts, they need to upload the web content that should be accessible via secure
connections to the httpsdocs directory, and the content that should be accessible via plain HTTP, to the
35 httpdocs directory. For the convenience of publishing all content through a single location – httpdocs
directory, select the Use a single directory for housing SSL and non-SSL content check box.
FTP login and FTP password. Specify the user name and password that will be used for publishing the
site to the server through FTP. Retype the password into the Confirm Password box.
Hard disk quota. Specify the amount of disk space in megabytes allocated to the web space for this site.
This is the so-called hard quota that will not allow writing more files to the web space when the limit is
reached. At attempt to write files, users will get the "Out of disk space" error. Hard quotas should be
enabled in the server's operating system, so if you see the "Hard disk quota is not supported" notice to the
right of the Hard disk quota field, but would like to use the hard quotas, contact your provider or the
server administrator and ask to enable the hard quotas.
Shell access to server with FTP user's credentials. This allows you to upload securely web content to
the server through a Secure Socket Shell connection, however, allowing shell access also poses a potential
threat to the server security, so we recommend thatyou do not allow shell access. Leave the Forbidden
option selected.
Support for programming and scripting languages supported by your hosting environment. Specify
which of the following programming and scripting languages should be interpreted, executed or otherwise
processed by the web server: Active Server Pages (ASP), Server Side Includes (SSI), PHP hypertext
preprocessor (PHP), Common Gateway Interface (CGI), Perl, Python, and ColdFusion.
Web statistics. To allow you to view the information on the number of people visited your site and the
pages of the site they viewed, select the Web statistics and accessible via password protected directory
/plesk-stat/ check boxes. You can also choose which type of statistics program you want to use. You can
choose between Awstats and Webalizer. Awstats is set as default, but you can just click on the arrow and
choose the other one. If you want to protect the URL for your statistics, just check the box and the URL
will be protected with the FTP-credentials. You will then be able to access Web statistics at the
URL:https://your-domain.com/plesk-stat/ using your FTP account login and password. (Read more about
statistics under section Domains/Report)
Custom error documents. When visitors coming to your site request pages that the web server cannot
find, the web server generates and displays a standard HTML page with an error message. If you wish to
create your own error pages and use them on your web server, select the Custom error documents check
box.
Click OK to save settings.
9.2 Changing FTP Password
To change FTP password for a Web site owner:
Click the Setup icon
in the Hosting group.
Specify new password and confirm it.
Click OK.
9.3 Delete
36 Note!
If you click the delete button,
All the files will also be deleted.
you will delete the web hosting for your domain.
You can of course create a new physical hosting for your domain and configure the setup for the hosting
yourself.
Click the Setup
icon in the hosting tools group
Choose physical hosting and click ok.
Configure the hosting
37 38 9.4 Web users
You can host on your Web server personal Web pages for individuals who do not need their own domain
names. This service is popular with educational institutions that host noncommercial personal pages of
their students and staff.
These pages usually have web addresses like http://your-domain.com/~username, however, you
can set up personal web pages with alternative web addresses like http://username@yourdomain.
com, if you like.
To accommodate a personal web page on your server, allocate a separate web space and set up a FTP
account for publishing:
Click the Web Users icon in the tools group.
Click Preferences.
If you wish to allow execution of scripts embedded in personal web pages, select the Allow the web users
scripting check box.
Click OK to save setting
The settings you have defined are common for all personal web pages you might host on your web server.
Therefore, you will not need to perform steps 3 and 4 next time you set up a web space for a personal web
page.
39 Click Add New Web User.
Specify a web user name and password that will be used for accessing the web space through FTP and
publishing the web page. (You can use only lowercase alphanumeric, hyphen and underscore symbols in user
name. The user name should begin with an alphabet character. It cannot contain white spaces. The password cannot
contain quotation marks, white space, user's login name, and should be between 5 and 14 characters in length.)
If you wish to limit the amount of disk space that can be occupied by the Web page content, type the
desired value in megabytes into the Hard disk quota box. When the specified limit is exceeded, the Web
page owner will not be able to add files to his or her web space.
Click OK to save settings.
Now you can tell your user the FTP account credentials, so that he or she can publish their web page.
9.4.1
Changing FTP Password for a Web Page Owner
Click the user name you want to update.
40 Type the new password into the New password and Confirm password boxes.
Click OK.
9.4.2
Allocating More Disk Space to the Web Page Owner
Click the user name you want to update
Type the amount of disk space in megabytes into the Hard disk quota box.
Click OK.
9.4.3
Removing Web Page Owner's Account
To remove a web page owner’s account together with his or her web page
Select a check box to the right of the user name you wish to remove and click Remove Selected.
Confirm removal and click OK.
9.5 Sub domains
Organizing your site structure with Subdomains
Subdomains are additional domain names that enable you to:
Organize logically the structure of your site,
Host additional Web sites or parts of your main Web site on the same server without the need to pay for
registration of additional domain names.
An example of using subdomains:
You have a Web site “strongboxdemo2.com” dedicated to promoting your site. For publishing user’s
guides, tutorials and list of frequently asked questions, you can organize the subdomain 'userdocs' so that
your users will be able to access online user documentation directly by visiting the domain name 'intranet.
strongboxdemo2.com.
41 9.5.1
Setting up Subdomains
Click the Subdomains icon in the tools group.
Click the Add New Subdomain icon.
42 Type the subdomain name as desired.
This can be, for example, a topic of your site, organization department, or any other combination of
letters, numbers and hyphens (up to 63 characters in length). The subdomain name must begin with an
alphabet character. Subdomain names are case insensitive.
If this subdomain will hold a part of your own Web site that you manage on your own, leave the Use the
FTP user account of the parent domain option selected. If this subdomain will hold a separate web site
that will belong to or will be managed by another person, select the Create a separate user account for
this subdomain option, and specify the login name and password that will be used for accessing the web
space through FTP and publishing web site content.
Specify the programming languages in which your web site is developed. Otherwise, your web site may
not function properly. For example, if your web site is written mainly in ASP and uses some applications
written in PHP, select the ASP support and PHP support check boxes.
If you wish to limit the amount of disk space that can be occupied by web content under this subdomain,
type the desired value in megabytes into the Hard disk quota box. When the specified limit is exceeded,
you will not be able to add files to the web space, and editing existing files may corrupt them.
Click OK.
Note!
You do also have to add a record for the sub domain in zone for the primary domain. It may take up to 24
hours for the information on new subdomain to spread in the Domain Name System and become available
to the Internet users. This is done through Domain Management / Domains.
9.5.2
Removing Subdomains
To remove a subdomain with its web content:
in the tools group.
Click the Subdomains icon
Select a check box corresponding to the subdomain name that you wish to
remove, and click Remove Selected.
Confirm removal and click OK.
The subdomain configuration and its web content will be removed from the web server
9.6 Protected Directories
If you have directories in your site that only authorized users should see, restrict access to these directories
with password protection.
9.6.1
Protecting a Resource
43 To password protect a directory in your site and to specify authorized users:
Click the Protected Directories icon in the tools group.
Click Add New Directory.
Specify the path to the directory that you wish to password protect in the Directory Name field. This can
be any directory existing in your site, for example: /intranet.
If the directory that you would like to protect has not yet been created, specify the path and the directory
name – Plesk will create it for you.
Specify in what location (also called document root) your password protected directory resides or will
reside.
For ex.: To protect the httpdocs/intranet directory, type '/intranet' in the Directory name box and select
the Non-SSL check box.
To protect your CGI scripts stored in the cgi-bin directory, leave the '/' value in the Directory name box
and select the cgi-bin check box. Make sure there are no white spaces after the slash symbol; otherwise, a
protected directory will be created with the name consisting of white spaces.
In the Header Text box, type a resource description or a welcoming message that your users will see
when they visit your protected area.
Click OK.
The directory you specified will be protected.
To add authorized users, click Add New User.
44 Specify the login name and password that will be used for accessing the protected area. (The password
should be from 5 to 14 symbols in length)
Click OK.
To add more authorized users for this protected resource, repeat the steps above.
9.6.2
To change password for an authorized user of a protected directory:
Click the Protected Directories
icon in the hosting group.
Click on the name of the directory you want to update.
A list of authorized users will open.
Click on the user’s name.
Specify the new password and re-type it for confirmation.
Click OK.
9.6.3
To delete a permission to access the protected directory from a user:
45 icon in the hosting group.
Click the Protected Directories
Click on the name of the directory you need.
A list of authorized users will open.
Select a check box corresponding to the user’s name.
Click Remove Selected.
Confirm the operation and click OK.
9.7 File Manager
Uploading files through Plesk file manager
Click the File Manager icon
in the tools group.
46 Create and upload files and directories.
Place the files and directories that should be accessible via HTTP protocol to the httpdocs directory.
Place your CGI scripts into the cgi-bin directory.
To create a new directory within your current location, click the Add New Directory
button.
To upload or create new files in the required directory, click Add New File
icon
47 If you are to upload an already existing file located locally on your hard disk, specify the path to its
location in the Path to file box (or use the Bläddra button to locate the file), and click OK.
If you want to creae a file, specify the file name in the File creation section, select the Use html template
check box, if you want file manager to insert some basic html tags to the new file, and click OK.
A page will open allowing you to enter the content or html-formatted source of a new file.
Click OK to save the file.
When you upload web content through File Manager or FTP, your control panel automatically sets the
appropriate access permissions for files and directories. The permissions are represented as three sets of
symbols, for example, 'rwx rwx r--'. The first set tells what the owner of the file or directory can do with
it; the second tells what the user group, the file or directory belongs to, can do with the file or directory;
the third set indicates what other users (the rest of the world, i.e. Internet users visiting a site) can do with
the file or directory. R means the permission to read the file or directory, W means the permission to write
to the file or directory and X means the permission to execute the file or look inside the directory.
To modify permissions for a file or directory, in the Permissions column, click the respective hyperlink
representing the set of permissions.
48 Modify the permissions as desired and click OK.
You can rename, preview, show coding of the file, edit the file in an editor by clicking the icons
To copy or move a file or directory to another location, select the required file or directory using the
appropriate check box, and click Copy/Move
icon.
49 Specify the destination for the file or directory to be copied or renamed to, then click Copy to copy, or
Move to move it.
To update the file or directory creation date, click the Touch
updated with the current local time.
icon. The time stamp will be
To remove a file or directory, select the corresponding check box, and click Remove Selected
icon.
Confirm removal and click OK.
9.8 Crontab
50 9.8.1
Scheduling a Task
If you need to run scripts on your site at specific time, use the task scheduler facility on the server to make
the system automatically run the scripts for you.
To schedule a task:
Click the Crontab icon
in the tools group.
Click the name of the System User
Click Schedule a Task For …
51 Specify when to run your command.
Minute - enter the value from 0 to 59
Hour - enter the value from 0 to 23
Day of the Month - enter the value from 1 to 31
Month - enter the value from 1 to 12, or select the month from a drop-down box
Day of the Week - enter the value from 0 to 6 (0 for Sunday), or select the day of the week from a dropdown box
-You can schedule the time using the UNIX crontab entry format. In this format, you can enter several
values separated by commas. Two numbers separated by a hyphen mean an inclusive range. For example,
to run a task on the 4th, 5th, 6th, and 20th of a month, type 4-6,20.
-Insert an asterisk to specify all values allowed for this field. For ex. to run a task daily, type * in the Day
of the Month text box. To schedule the task to run every Nth period, enter the combination */N, where N
is the legal value for this field (minute, hour, day, month). For example, */15 in the Minute field
schedules the task to start every 15 minutes.
You can type the contracted names of months and days of the week, which are the first three letters: Aug,
Jul, Mon, Sat, etc. However, the contracted names cannot be separated with commas or used together with
numbers.
Specify which command to run. Type it into the Command input box.
Click OK.
9.8.2
Suspending and Resuming Execution of Tasks
To temporarily suspend execution of scheduled task:
Click the Crontab
icon in the Hosting group.
Choose a task that you wish to suspend and click on the command name.
Click the Disable icon.
52 9.8.3
To resume execution of scheduled task:
Click the Crontab
icon in the Hosting group.
Choose a task whose execution you wish to resume and click on the command name.
Click the Enable icon.
9.8.4
Unscheduling a Task
Click the Crontab
icon in the Hosting group.
Select a check box to the right of the task that you wish to unschedule.
Click Remove Selected.
Confirm removal and click OK.
9.9 Site Preview
Previewing a Site
Once you published a site on the server, you may want to make sure that it functions properly in the actual
hosting environment. You can preview the site through your favorite web browser, even if the information
on the domain name has not yet propagated in the Domain Name System. Note that Macromedia Flash
and CGI scripts will not work during preview.
To preview a site:
Click the Site Preview icon in the tools group
If your customers use some CMS system to publish their site, for ex. Joomla or Umbraco, the site preview
don´t work properly since they referrer to the domain name.
53 9.10
Performance
To seed the bandwidth and connection limits, click the Performance icon in the tools group.
10. Hosting Windows
10.1
Setup
To review or select the hosting features available for your account
Click the Setup icon in the tools group
View or change your hosting options:
54 IP Address. Your domain is hosted on a shared server and the IP address is thus shared.
Certificate. Shows the SSL certificate used by the server where your site is situated.
SSL support. Secure Sockets Layer encryption is generally used for protecting transfer of sensitive data
during online transactions on e-commerce Web sites that run on dedicated IP addresses. SSL is not
supported for shared customers.
FTP/Microsoft FrontPage Login and FTP/Microsoft FrontPage password. Specify the user name and
password that will be used for publishing the site to the server through FTP or Microsoft FrontPage.
Retype the password into the Confirm Password box.
Hard disk quota. Specify the amount of disk space in megabytes allocated to the web space for this site.
This is the so-called hard quota that will not allow writing more files to the web space when the limit is
reached. At attempt to write files, users will get the "Out of disk space" error. Hard quotas should be
enabled in the server's operating system, so if you see the "Hard disk quota is not supported" notice to the
55 right of the Hard disk quota field, but would like to use the hard quotas, contact your provider or the
server administrator and ask to enable the hard quotas.
Manage of access to server over Remote Desktop. This allows a site owner to upload securely Web
content to the server through a Secure Socket Shell or Remote Desktop connection, however, allowing
access to the server also poses a potential threat to the server security, so we recommend that you set this
option to Forbidden. Not supported.
Sitebuilder. This allows a site owner to create and manage his or her Web site using the Sitebuilder
service installed on the server. Not supported
Microsoft FrontPage support. Microsoft FrontPage is a popular Web site authoring tool. To enable users
to publish and modify their sites through Microsoft FrontPage, select the options Microsoft FrontPage
support, Microsoft FrontPage over SSL support, and Remote FrontPage authoring allowed.
Services, or support for programming and scripting languages widely used in development of dynamic
Web sites and server-side Web applications. Specify which of the following programming and scripting
languages should be interpreted, executed or otherwise processed by the web server: Active Server Pages
(ASP), Server Side Includes (SSI), PHP hypertext preprocessor (PHP), Common Gateway Interface
(CGI), Fast Common Gateway Interface (FastCGI), Perl, Python, ColdFusion, and Miva scripting
languages. By default, PHP is configured to operate in safe mode with functional restrictions.
Web statistics. To allow Web site owner to view the information on the number of people visited his or
her site and the pages of the site they viewed, select the statistics program you need from the Web
statistics menu, and select the accessible via password protected directory /plesk-stat/webstat check box.
This will install the statistics program of your choice, which will generate reports and place them into the
password protected directory. The domain/web site owner will then be able to access Web statistics at the
URL: https://your-domain.com/plesk-stat/webstat using his or her FTP account login and password.
Note: When you switch from one statistics program to another, all reports created by the previously used
statistics program are deleted and new reports are created in accordance with the information read from
log files kept on the server.
Custom error documents. When visitors coming to your site request pages that the Web server cannot
find, the Web server generates and displays a standard HTML page with an error message. If you wish to
create your own error pages and use them on your Web server or allow your customers to do that, select
the Custom error documents check box.
Additional write/modify permissions. This option is required if Web applications under a domain will be
using a file-based database (like Jet) located in the root of httpdocs folder. Please note that selecting this
option might seriously compromise the Web site security.
Use dedicated IIS application pool. This option enables the use of dedicated IIS application pool for
Web applications on a domain. Using dedicated IIS application pool dramatically improves the stability of
domain Web applications due to worker process isolation mode. This mode gives each Web site hosted on
the server the possibility to allocate a separate process pool for execution of its Web applications. This
way, malfunction in one application will not cause stopping of all the others. This is especially useful
when you are using shared hosting package.
Click OK. (Now the server is ready to accommodate the new web site, and the site owner can publish the site to the
server.)
56 10.2
Changing FTP/Microsoft Front Page Password
To change FTP password for a Web site owner:
Click the Setup
icon in the Hosting group.
Specify new password and confirm it.
Click OK.
10.3
Delete
Note!
If you click the delete button,
you will delete the web hosting for your domain.
All the files will also be deleted.
You can easily create a new physical hosting, by clicking the create button and choose physical hosting,
but the old files will be gone.
10.4
Web users
You can host on your Web server personal Web pages for individuals who do not need their own domain
names. This service is popular with educational institutions that host noncommercial personal pages of
their students and staff.
These pages usually have web addresses like http://your-domain.com/~username, however, you
can set up personal web pages with alternative web addresses like http://username@yourdomain.
com, if you like.
To accommodate a personal web page on your server, allocate a separate web space and set up a FTP
account for publishing:
Click the Web Users icon in the tools group.
Click Add New Web User
57 Click Preferences.
If you wish to allow execution of scripts embedded in personal web pages, select the Allow the web users
scripting check box.
Click OK.
The settings you have defined at the steps 3 and 4 are common for all personal web pages you might host
on your web server. Therefore, you will not need to perform steps 3 and 4 next time you set up a web
space for a personal web page.
Click Add New Web User.
Specify a user name and password that will be used for accessing the web space through FTP and
publishing the web page. (You can use only lowercase alphanumeric, hyphen and underscore symbols in user
name. The user name should begin with an alphabet character. It cannot contain white spaces. The
password cannot contain quotation marks, white space, user's login name, and should be between 5 and 14 characters
in length.)
58 If you wish to limit the amount of disk space that can be occupied by the Web page content, type the
desired value in megabytes into the Hard disk quota box. When the specified limit is exceeded, the Web
page owner will not be able to add files to his or her web space. Also enable ASP and ASP.NET support if
you wish the user to be able to run ASP-scripts.
Click OK.
Now you can tell your user the FTP account credentials, so that he or she can publish their web page.
10.4.1 Changing FTP Password for a Web Page Owner
Click the user name you want to update
Type the new password into the New password and Confirm password boxes.
Click OK.
10.4.2 Allocating More Disk Space to the Web Page Owner
Click the user name you want to update
Type the amount of disk space in megabytes into the Hard disk quota box.
Click OK.
59 10.4.3 Removing Web Page Owner's Account
To remove a web page owner’s account together with his or her web page
Select a check box to the right of the user name you wish to remove and click Remove Selected.
Confirm removal and click OK.
10.5
Sub domains
Organizing your site structure with Subdomains
Subdomains are additional domain names that enable you to:
Organize logically the structure of your site,
Host additional Web sites or parts of your main Web site on the same server without the need to pay for
registration of additional domain names.
An example of using subdomains:
You have a Web site “strongbox-demo.com” dedicated to promoting your site. For publishing user’s
guides, tutorials and list of frequently asked questions, you can organize the subdomain 'userdocs' so that
your users will be able to access online user documentation directly by visiting the domain name
'intranet.strongbox-demo.com'.
10.5.1 Setting up Subdomains
Click the Subdomains icon in the tools group.
Click the Add New Subdomain icon.
Select the required Hosting type and click OK:
Select Physical hosting to create a virtual host for the domain.
60 Select Subdomain on subfolder to create a virtual subdomain. Subdomain on subfolder will use physical
structure of the domain. The creation of a separate FTP user account will be not possible: the FTP user
account of the domain will be used.
Type the subdomain name as desired.
This can be, for example, a topic of your site, organization department, or any other combination of
letters, numbers and hyphens (up to 63 characters in length). The subdomain name must begin with an
alphabet character. Subdomain names are case insensitive.
61 If this subdomain will hold a part of your own Web site that you manage on your own, leave the Use the
FTP user account of the parent domain option selected. If this subdomain will hold a separate web site
that will belong to or will be managed by another person, select the Create a separate user account for
this subdomain option, and specify the login name and password that will be used for accessing the web
space through FTP and publishing web site content.
If you are creating subdomain on subfolder, specify the physical location for the subdomain files in the
Site home directory field:
Clear the Create physical directory for subdomain check box and specify the existing directory to the right
of httpdocs field. You can click to browse for the required directory, select it and click OK.
Leave the Create physical directory for subdomain check box selected to create a corresponding physical
directory with the same name as the subdomain.
If you are creating subdomain with physical hosting, specify the FTP user account for it:
If this subdomain will hold a part of your own Web site that you manage on your own, leave the Use the
FTP user account of the main domain option selected.
If this subdomain will hold a separate web site that will belong to or will be managed by another person,
select the Create a separate user account for this subdomain option, and specify the login name and
password that will be used for accessing the web space through FTP and publishing web site content.
Specify the hard disc quota in the appropriate field in megabytes or leave the Unlimited check box
selected. When the specified limit is exceeded, you will not be able to add files to the web space, and
editing existing files may corrupt them.
62 If you wish to limit the amount of disk space that can be occupied by web content under this subdomain,
type the desired value in megabytes into the Hard disk quota box.
When the specified limit is exceeded, you will not be able to add files to the web space, and editing
existing files may corrupt them.
All publishing parameters will be set in the paths predefined: for subdomain with Physical hosting /subdomains/SUBDOMAINNAME/httpdocs/sitebuilder; for subdomain with Subdomain on subfolder /httpdocs/SUBDOMAINNAME/.
If you want to enable Microsoft FrontPage support, select the appropriate check box. Enable or disable
Remote Microsoft FrontPage authoring by selecting the appropriate option.
Specify the programming languages support in the Services group by selecting the required languages.
Use select all or clear all to select or clear all of the languages available.
If the ASP.NET support is disabled on the domain for which you are creating subdomain, it is also
unavailable on Subdomain on subfolder. In case the ASP.NET support is enabled on the domain, the
ASP.NET is available for subdomain created on a subfolder. If you choose to enable ASP.NET 2.0 the
support for ASP.NET 3.5 frameworks will also be supported.
Note: If subdomain administrator changes the FTP credentials, web statistics access credentials do not
change. The original login and password specified upon the subdomain creation should always be used for
accessing password-protected Web statistics directory.
Select the Additional write/modify permissions option if this subdomain's Web applications will use a filebased database (like Jet) located in the root of httpdocs or httpsdocs folders. Please note that selecting this
option might seriously compromise the web site security.
To complete the setup, click OK.
Note!
You do also have to add a record for the sub domain in zone for the primary domain. It may take up to 24
hours for the information on new subdomain to spread in the Domain Name System and become available
to the Internet users. This is done through Domain Management / Domains. If the domain is situated on
external DNS servers, the record has to be added there.
10.5.2 Removing Subdomains
To remove a subdomain with its web content:
Click the Subdomains icon
in the tools group.
Select a check box corresponding to the subdomain name that you wish to
63 remove, and click Remove Selected.
Confirm removal and click OK.
The subdomain configuration and its web content will be removed from the web server
10.6
Protected URLs
If you have directories or files in your site that only authorized users should see, restrict access to these
directories with password protection.
10.6.1 Protecting an URL
To password protect an URL-address for your site specify authorized users:
Click the Protected URLs icon in the tools group.
Click Add New Protection.
Specify the path to the directory that you wish to password protect in the URL name field. This can be any
directory or file existing in your site, for example: /intranet.
Click the Add New User icon to add a user for the protected URL. With the given credentials the user can
access the site
64 Click OK.
To add more authorized users for this protected resource, repeat the steps.
10.6.2 To change password for an authorized user of a protected resource:
Click the Protected URL icon in the Hosting group.
Click on the name of the protection you need.
A list of authorized users will open.
Click on the user’s name.
Specify the new password and re-type it for confirmation.
Click OK.
10.6.3 To delete a permission to access the protected resource from a user:
Click the Protected URL icon in the Hosting group.
Click on the name of the directory you need.
A list of authorized users will open.
Select a check box corresponding to the user’s name.
Click Remove Selected.
Confirm the operation and click OK.
65 10.7
Web Directories
Within the Web Directories you can change settings for your web hosting. You can create a virtual
directory in Parallels Plesk Panel as a link to an existing physical directory that is present on the server's
hard disk. Virtual directories can have a number of specific settings like custom ASP.NET configuration,
access permissions, URL password protection, and so on. Since any virtual directory can have its own
settings, including customized ASP.NET configuration, virtual directories are very useful in setting up
your web applications, especially those written in ASP.NET. For example, if you have three web
applications that use ASP.NET version 1.1, and you need to install one web application that uses
ASP.NET version 2.0, you can create a virtual directory for the ASP.NET 2.0 application, configure
ASP.NET settings for this directory, enabling version 2.0 only for this directory, and successfully install
the required application.
Virtual directories can also be used as aliases. For example, you have a web application installed on your
domain 'example.com' in the physical folder '/my_data/web_apps/forum'. To access this web application,
users need to type 'example.com/my_data/web_apps/forum', which is hard to remember and too long to
type. You can create virtual directory 'forum' in the root of your virtual host, and link this virtual directory
to '/my_data/web_apps/forum', so users who want to access the web application have to type
'example.com/forum' , which is much shorter and easier to remember.
in the Hosting group.
Click Web Directories
You are in your Web site root now.
Navigate to the directory in which you want to create a new virtual directory. The directories are listed as
in the picture above
66 Click Add New Virtual Directory.
Note! To create a physical directory instead of virtual directory, click Create Directory, specify the name
of the directory and click OK.
Specify the required parameters:
Name - specify the virtual directory name.
Path - specify the virtual directory path:
Select the Create physical directory with the same name as virtual directory check box to automatically
create a physical directory with the same name as the virtual directory you are creating.
Clear the Create physical directory with the same name as virtual directory check box and specify the path
in the field to select the physical directory that already exists.
Script source access - select this check box to allow users to access source code if either Read or Write
permissions are set. Source code includes scripts in ASP applications.
Read permission - select this check box to allow users to read files or directories and their associated
properties.
Write permission - select this check box to allow users to upload files and their associated properties to
the virtual directory or to change content in a write-enabled file. Write access is allowed only if browser
supports the PUT feature of the HTTP 1.1 protocol.
Directory browsing - select this check box to allow users to see a hypertext listing of the files and
subdirectories in the virtual directory.
Log visits - select this check box if you want to store the information about visits of the virtual directory.
Create application - select this check box to make the Web directory an IIS Application. The directory
becomes logically independent from the rest of the Web site.
Execute permissions - select the appropriate program execution level allowed for the virtual directory.
None - allow access only to static files such as HTML or image files.
Scripts only - allow running scripts only, not executables.
Scripts and Executables - remove all restrictions so that all file types can be executed.
ASP Settings - set specific settings for ASP-based web applications.
67 If you are using ASP-based applications that cannot operate correctly under data transfer restrictions
currently set by IIS, clear the Defined by parent directory check box corresponding to the field you want
to change and type in the required number.
If you want to enable debugging of ASP applications on the server side, clear the corresponding Defined
by parent directory check box and select the Enable ASP server-side script debugging check box.
If you want to enable debugging of ASP applications on the client side, clear the corresponding Defined
by parent directory check box and select the Enable ASP client-side script debugging check box.
Note that if you are trying to change ASP Settings for the root Web directory, the default check box
names will be Defined by IIS instead of Defined by parent directory.
Click OK to complete the creation.
10.7.1 To set access permissions for a virtual directory:
Click the icon corresponding to the directory you wish to open, and set the access permissions for this
directory and all its files.
Refer to the Setting File and Folder Access Permissions (File Manager, on page…) section for more
information on setting access permissions.
10.7.2 Changing settings for the root directory
You can change several options also for the root directoy clicking the Web directory button in the hosting
group and then click
.
Within the Preferences you can change virtual directory setting, application settings, which order index
documents will be picked by the web server, directory security that means that you can allow or disallow
the ordinary Internet visitors to access your web site and make changes for the asp settings.
68 Script source access - select this check box to allow users to access source code if either Read or Write
permissions are set. Source code includes scripts in ASP applications.
Read permission - select this check box to allow users to read files or directories and their associated
properties.
69 Write permission - select this check box to allow users to upload files and their associated properties to
the virtual directory or to change content in a write-enabled file. Write access is allowed only if browser
supports the PUT feature of the HTTP 1.1 protocol.
Directory browsing - select this check box to allow users to see a hypertext listing of the files and
subdirectories in the virtual directory.
Log visits - select this check box if you want to store the information about visits of the virtual directory.
Create application - select this check box to make the web directory an IIS Application. The directory
becomes logically independent from the rest of the web-site.
Execute permissions - select the appropriate program execution level allowed for the virtual directory.
None - allow access only to static files such as HTML or image files.
Scripts only - allow running scripts only, not executables.
Scripts and Executables - remove all restrictions so that all file types can be executed.
Allow to use parent paths - select this check box to allow using double period (../) in the pathname when
referring to a folder above the current web directory. This makes users able to move up the folder tree
without knowing the folder name or the whereabouts in the hierarchy. If the option is selected, parent path
directories should not have the Execute permission check box selected in their preferences, so that
applications do not have the ability of unauthorized running of programs in the parent paths.
Allow application execution in MTA (multi-threaded apartment) mode - select this check box to allow
the application execution in multi-threaded apartment (MTA) mode. Otherwise the application will run in
a single-threaded apartment (STA) mode. Using STA, each application pool is executed in a dedicated
process. With MTA, several concurrent application pools are executed in one thread which can increase
performance in some cases.
Use default documents - select this check box to allow the use of default documents for the current web
directory. The default document is sent when users access the directory on the Web without a specific file
name (for example, using 'http://www.strongbox.se as opposed to 'http://www.strongbox.se/index.html').
If this check box is cleared and the Directory browsing check box is selected, the Web server returns a
folder listing. If this check box is cleared and the Directory browsing check box is cleared as well, the
Web server returns an "Access Forbidden" error message.
Default documents search order - specifies the order in which IIS searches for the default document,
sending user the first available file it finds. If no match is found, IIS behaves as in the cases when the
default content page is disabled.
Allow anonymous access - select this check box if you want to make the directory public so that web
users could access it without authentication.
Require SSL – SSL is not supported
ASP Settings - set specific settings for ASP-based web applications.
If you are using ASP-based applications that cannot operate correctly under data transfer restrictions
currently set by IIS, clear the Defined by parent directory check box corresponding to the field you want
to change and type in the required number.
If you want to enable debugging of ASP applications on the server side, clear the corresponding Defined
by parent directory check box and select the Enable ASP server-side script debugging check box.
If you want to enable debugging of ASP applications on the client side, clear the corresponding Defined
by parent directory check box and select the Enable ASP client-side script debugging check box.
Note that if you are trying to change ASP Settings for the root web directory, the default check box names
will be Defined by IIS.instead of Defined by parent directory.
Click OK to save changes.
70 10.7.3 Configuring ASP.NET for Virtual Directories
To improve the performance of ASP.NET-based web applications, Parallels Plesk Panel allows using
individual settings of .NET framework per virtual directory.
To configure ASP.NET for a virtual directory:
Click Web Directories
.
Browse to the required directory and enter it.
Click ASP.NET Settings icon
.
Set up the strings that determine database connection data for ASP.NET applications which use databases.
This option is available only for ASP.NET 2.0.x.
When you open the ASP.NET configuration page for the first time, sample connection parameters with
common constructions are displayed. You can then delete them and specify your own strings.
71 To add a string, enter the required data into the Name and Connection Parameters input fields and
click
next to them.
To remove a string, click
next to it.
Set up custom error messages that will be returned by ASP.NET applications in the Custom Error Settings
field:
To set the custom error messages mode, select an appropriate option from the Custom error mode menu:
On - custom error messages are enabled.
Off - custom error messages are disabled and detailed errors are to be shown.
RemoteOnly - custom error messages are displayed only to remote clients, and ASP.NET errors are
shown to the local host.
72 To add a new custom error message (which will be applied unless the Off mode was selected), enter the
values in the Status Code and Redirect URL fields, and click
.
Status Code defines the HTTP status code resulting in redirection to the error page.
Redirect URL defines the web address of the error page presenting information about the error to the
client.
Due to possible conflicts, you cannot add a new custom error message with an error code that already
exists, but you can redefine the URL for the existing code.
To remove a custom error message from the list, click
next to it.
Configure compilation settings in the Compilation and Debugging field:
To determine the programming language to be used as default in dynamic compilation files, choose an
entry from Page default language list.
To enable compiling retail binaries, leave the Switch on debugging checkbox empty.
To enable compiling debug binaries, select the Switch on debugging checkbox. In this case, the source
code fragments containing error will be shown in a diagnostic page message.
Note! When running applications in debug mode, a memory and/or performance overhead occurs. It is
recommended to use debugging when testing an application and to disable it before deploying the
application into production scenario.
Configure encoding settings for ASP.NET applications in the Globalization Settings section:
To set an adopted encoding of all incoming requests, enter an encoding value into the Request encoding
field (default is utf-8).
To set an adopted encoding of all responses, enter an encoding value into the Response encoding field
(default is utf-8).
To set an encoding which must be used by default for parsing of .aspx, .asmx, and .asax files, enter an
encoding value into the File encoding field (default is Windows-1252).
To set a culture which must be used by default for processing incoming web requests, select an
appropriate item from the Culture list.
To set a culture which must be used by default when processing searches for a locale-dependent resource,
select an appropriate item from the UI Culture list.
Set a code access security trust level for ASP.NET applications in the Code Access Security field.
CAS trust level is a security zone to which applications execution is assigned, defining what server
resources the applications will have access to.
73 Important! When an assembly is assigned a trust level that is too low, it does not function correctly. For
more information on the permissions levels see http://msdn.microsoft.com/library/enus/dnnetsec/html/THCMCh09.asp?frame=true#c09618429_010.
Enable the usage of the auxiliary scripts in the Script Library Settings field. Specifying the script library
settings is necessary if the validation web controls are used on your web site. This option is available only
for ASP.NET 1.1.x.
If you need to use auxiliary scripts (specifically, scripts implementing objects for validating input data),
provide the settings for .NET framework script library. To do so, enter the path beginning with the domain
root directory preceded by the forward slash into the Path to Microsoft script library field, or click the
folder icon next to the Path to Microsoft script library field and browse for the required location.
To initiate the auto-installation of files containing the scripts to the specified location, select the Install
checkbox. If the files already exist there, they will be rewritten.
Set client session parameters in the Session Settings field:
To set up the default authentication mode for applications, select an appropriate item from the
Authentication mode list. Windows authentication mode should be selected if any form of IIS
authentication is used.
64 Hosting Web Sites
To set up time that a session can idle before it is abandoned, enter appropriate number minutes into the
Session timeout field.
Click OK to apply all changes.
Note! Parallels Plesk Panel supports separate configurations for different versions of the .NET framework
(1.1.x and 2.0.x).
10.7.4 Restoring Default ASP.NET Configuration
To restore the default ASP.NET configuration:
.
Click Set to Default icon
configuration for Web Directory.
which you can find when you have entered the ASP.NET
Confirm the restoring and click OK.
74 10.7.5 MIME Types
Multipurpose Internet Mail Exchange (MIME) types instruct a Web browser or mail application how to
handle files received from a server. For example, when a Web browser requests an item on a server, it also
requests the MIME type of the object. Some MIME types, like graphics, can be displayed inside the
browser. Others, such as word processing documents, require an external helper application to be
displayed. When a web server delivers a Web page to a client Web browser, it also sends the MIME type
of the data it is sending. If there is an attached or embedded file in a specific format, IIS also tells the
client application the MIME type of the embedded or attached file. The client application then knows how
to process or display the data being received from IIS. IIS can only operate files of registered MIME
types. These types could be defined both on the global IIS level and on the domain or virtual directory
level. Globally defined MIME types are inherited by all the domains and virtual directories while ones
defined on the domain or virtual directory level are used only for the area where they are defined.
Otherwise, if the web server receives request for a file with unregistered MIME type, it returns the 404.3
(Not Found) error.
Adding MIME Types
10.7.5.1
To add a new MIME type for a virtual directory on a
domain:
Click Web Directories
in the hosting group.
Navigate to the required directory or virtual directory and enter it.
Select the MIME Types tab.
Click Add MIME Type.
75 Type the filename extension in the Extension field. Filename extension should begin with a dot (.), or a
wildcard (*) to serve all files regardless of filename extension.
Specify the file content type in the Content field.
You can either select the appropriate value from the list or define a new content type. To do this, select
Custom... and enter the content type in the input box provided.
Click OK to finish the creation.
10.7.5.2
Changing MIME Types
Select the MIME Types tab.
Select the required MIME type in the list.
Type the filename extension in the Extension field. Filename extension should begin with a dot (.), or a
wildcard (*) to serve all files regardless of filename extension.
Specify the file content type in the Content field.
You can either select the appropriate value from the list or define a new content type. To do this, select
Custom... and enter the content type in the input box provided.
Click OK to save changes.
76 10.7.5.3
Removing MIME Types
To remove a MIME type for a virtual directory on a domain:
Select the MIME Types tab.
Select the check box corresponding to the MIME type you wish to remove.
Click Remove.
Confirm removal and click OK.
10.7.6 Restricting Access to Web Site's Resources with Password Protection
Select the Protection Tab
If you want to protect your site from all users in the Internet, you can protect the site with password
protection and only give specific users access to your site.
77 Click Add New User
icon to att a new user.
Enter a Login name for the user and a password
Click OK to save the settings
The site is now protected, and only this created user can access it by entering the login information in the
login field that appears when visiting the site on Internet.
To remove protection
78 Check the checkbox and click Remove selected
Confirm removal and click OK and the protection is removed
You can also protect directories and virtual directories by choosing the directory you want to protect and
choose the protection tab and follow the same steps as above.
79 10.8
FTP Accounts
10.8.1 Adding additional FTP-users
Click the FTP Accounts icon
in the hosting group.
Click Add New FTP Account
80 Enter a FTP account name
Choose which directory the user has access to
Enter a password and confirm it.
If you want to limit the hard disk quota for this user, enter a value
If you want to give this user access to read and write to the folder, enter permissions for him
Click OK to save the settings
10.8.2 Changing password for a FTP user account.
Click the FTP Accounts icon
in the hosting group.
Click on the name for the specific user and change the settings.
81 Click OK to save the settings
10.8.3 To remove an additional FTP user
82 Check the box in front of the user and select Remove Selected. Confirm removal and the user will be
removed
Note! Anonymous FTP is not supported
10.9
Log Manager
All log files per day are saved and statistics is generated from these files. Click on the Log Manager icon
to enter the log files
.
You can choose to remove files by checking the box and click remove or copy files to an external location
by clicking the
icon.
83 Note! The statistics is generated from these log files so if you choose to delete a file, no statistics will be
found for the deleted file.
10.10 File Manager
10.10.1
Click File Manager
Click the
Setting and Changing Access Permissions for Groups and Users
in the Hosting group.
icon corresponding to the required file or folder.
To change or remove permissions from a group or user, click the required name in the Group or user
names list.
84 To set permissions for a group or user, which is not in the Group or user names list, select the required
user/group name from the drop-down box located above the list and click
the list. Select it.
: the user/group appears in
To allow or deny permissions to a selected group/user, select the Allow or Deny check boxes
corresponding to permissions listed under Permissions for [user/group name].
Note! If check boxes in Allow and/or Deny columns are shaded, it means that the corresponding
permissions are inherited from a parent folder.
To deny the permission, which are inherited from a parent object as allowed, select the required check
boxes under Deny. This will override inherited permissions for this file/folder.
To allow the permission, which are inherited from a parent object as denied, clear the Allow inheritable
permissions from the parent to propagate to this object and all child objects. Include these with entries
explicitly defined here check box: this removes the inherited permissions. Then select the required check
boxes under Allow and Deny.
Click OK.
10.10.2
Removing Access Permissions from Groups and Users
To remove access permissions from a group or user:
Click File Manager
Click the
in the hosting group.
icon corresponding to the required file or folder.
Select the required name in the Group or user names list and click next to it.
Note!: The icons appear unavailable for entries with permissions inherited from a parent object.
85 Select the required entry.
Clear the Allow inheritable permissions from the parent to propagate to this object and all child objects.
Include these with entries explicitly defined here check box.
Select the entry again and click .
Click OK.
10.10.3
Click File Manager
Click the
Setting Up Access Permissions Inheritance for Files and Folders
in the hosting group.
icon corresponding to the required file or folder.
To make the file/folder inherit permissions from a parent folder (if it does not), select the Allow
inheritable permissions from the parent to propagate to this object and all child objects. Include these with
entries explicitly defined here check box.
To make the files and folders, which are contained in this folder, inherit the folder permissions defined
here, select the Replace permission entries on all child objects with entries shown here that apply to child
objects check box.
Click OK.
10.10.4
Setting, Changing and Removing Special Access Permissions
You can also set, change and remove special permissions including advanced management of folder
permissions inheritance. In Advanced permissions management mode, several permission entries can be
associated with a single group or user, each containing different set of permissions. Also, the list of
permissions in Advanced mode is more detailed and gives more opportunities for fine-tuning file/folder
permissions. It contains permissions that cannot be seen in Microsoft Windows interface, but present
combinations of native Microsoft Windows permissions. They are Read Control, Write Control, and
Execute Control.
To set, change or remove file/folder special permissions:
Click File Manager
in the hosting group.
86 Click the
icon corresponding to the required file or folder.
Click Advanced.
To create a permission entry for a group or user, select the required name from the Group or user names
list and click
.
To set or change file/folder permissions for a group or user, select the required name from the Group or
user names list, select the required Allow and Deny check boxes corresponding to permissions listed
under Permissions for [group/user name].
10.10.5
User/Groups
The user and groups that you might have to change permissions for is:
Plesk IIS User (IUSR) – this is the anonymous Internet user
Plesk WP User (IWAM) – if you run ASP.NET, this is the user that runs the scripts on the server.
Plesk WP User (IWPD) – If you choose to run the ASP and ASP.NET applications in an own application
pool, this is the user that runs the scripts.
To remove a permission entry for a group or user, select the required name from the Group or user names
list and click
.
To make child objects of a folder inherit its permissions defined under Permissions for [group/user name],
select the Replace permission entries on all child objects with entries shown here that apply to child
objects check box, and select check boxes in the Apply to list which correspond to objects you want to
inherit the permissions.
Click OK.
87 10.10.6
Repairing Access Permissions – Permission check
If some scripts on your sites stop working without any changes have been done at customers, this might be
due to the incorrectly defined or corrupted file and folder access permissions. It is advised to run check
and repair process to restore proper access permissions, thereby restoring scripts functioning.
To check and repair access permissions for a domain or a group of domains, restoring scripts functioning
you need to contact Strongbox.
10.11 Scheduled tasks
You schedule tasks on a per-domain basis.
10.11.1
To schedule a task:
Click Scheduled Tasks
in the Hosting group.
In Scheduler notification, specify whether the scheduler should notify you when it runs this task. The
following options are available:
Do not send - do not notify you.
Send to the default e-mail - send the notification to your default e-mail address.
Send to the e-mail I specify - send the notification to the e-mail specified in the corresponding field.
After selecting this option, you need to input the required e-mail in the field on the right.
Click SET to save scheduler notifications settings.
Then, click Add New Task.
88 Leave the Switched on check box selected if you want your scheduled task to be active immediately after
the creation.
Type a name for your task in the Description field.
Specify which command to run. Type it into the Path to executable file input box. If you need to run the
command with certain options, type them in the Arguments field.
For example, if you want to run the statistics calculation task to count disc space and see more detailed
information for the example.com and example.net domains, you need to specify the following path in the
Path to executable file input box:
C:\Program Files\Parallels\Plesk\admin\bin\statistics.exe and the following options in the Arguments
field: --disk-usage --process-domains=example.com, example.net –verbose
If you want to run your own php script using the task scheduler, you need to specify the following path in
the Path to executable file input box:
C:\Program Files (x86)\Parallels\Plesk\Additional\PleskPHP5\php.exe and specify the script location in
the Arguments field: C:\Inetpub\vhosts\doman.se\httpdocs\myscript.php
Select the appropriate priority in the Task priority field. Task priority can be set to Low, Normal or High.
Specify when to run your command by selecting the appropriate check boxes in the Hours, Days of
Month, Months or Days of Week fields.
Click OK to schedule the task or click Run Now to schedule the task and immediately run it.
10.11.2
To temporarily suspend execution of a scheduled task:
89 Choose a task that you wish to suspend and click on the command name.
Clear the Switched on check box.
10.11.3
To resume execution of scheduled task:
Choose a task whose execution you wish to resume and click on the command name.
Select the Switched on check box.
10.11.4
To cancel a task:
Select a check box to the left of the task that you want to cancel.
Click Remove.
Confirm removal and click OK.
10.12 Site Preview
Previewing a Site
Once you published a site on the server, you may want to make sure that it functions properly in the actual
hosting environment. You can preview the site through your favorite web browser, even if the information
on the domain name has not yet propagated in the Domain Name System. Note that Macromedia Flash
and CGI scripts will not work during preview.
To preview a site:
Click the Site Preview icon in the tools group
If your customers use some CMS system to publish their site, for ex. Dot Net Nuke, the site preview don´t
work properly since the CMS system referrers to the domain name.
90 10.13 Front page Management
To add additional Front page accounts click the
icon in the hosting group.
Click Add New FrontPage Account and add account information.
Click OK to save setting.
The new user can now access the web server through FrontPage and edit the site.
10.13.1
Publishing Sites with Microsoft FrontPage
91 Microsoft FrontPage deals with two kinds of Web sites: disk-based and server-based. In short, a diskbased site is a FrontPage Web site you create on your local hard disk and then later publish to a Web
server. A server-based site is one you create and work with directly on a Web server, without the extra
step of publishing. This section provides you with instructions on publishing only disk-based web sites.
You can publish disk-based web sites either through FTP or HTTP. If your server is running FrontPage
Server Extensions, you would publish your site to an HTTP location. For example: http://yourdomain.com/MyWebSite. If your server supports FTP, you would publish to an FTP location. For
example: ftp://ftp.your-domain.com/myFolder. After publishing, you can manage your site through
FrontPage Server Extensions.
To access FrontPage Server Extensions management interface:
Log in to customer control panel
Click Front Page management in the hosting group
Click the
icon
Type your FrontPage administrator‘s login name and password, and click OK.
You can publish your site directly through your locally installed FrontPage software.
10.14 Web Applications
- are not supported
10.15 ASP.NET
Configuring ASP.NET for Domains
Most ASP.NET configuration settings that commonly need to be customized in order for ASP.NET
applications to function in a desirable way can be edited through Parallels Plesk Panel.
Changing .NET Framework Version for Domains
Since Parallels Plesk Panel supports both 1.1.x and 2.0.x versions of the .NET framework, it is possible to
choose the version used by your domains on a per-domain basis.
92 To change the version of .NET framework used by a domain:
Click Setup icon and select the .NET framework version in the Microsoft ASP.NET support drop-down
menu and save by clicking OK
To configure ASP.NET for a domain:
Click ASP.NET Settings icon
in the Hosting group.
Set up the strings that determine database connection data for ASP.NET applications which use databases.
This option is available only for ASP.NET 2.0.x.
When you open the ASP.NET configuration page for the first time, sample connection parameters with
common constructions are displayed. You can then delete them and specify your own strings.
To add a string, enter the required data into the Name and Connection Parameters input fields and click
next to them.
93 To remove a string, click
next to it.
Set up custom error messages that will be returned by ASP.NET applications in the Custom Error Settings
field:
To set the custom error messages mode, select an appropriate option from the Custom error mode menu:
On - custom error messages are enabled.
Off - custom error messages are disabled and detailed errors are to be shown.
RemoteOnly - custom error messages are displayed only to remote clients, and ASP.NET errors are shown
to the local host.
To add a new custom error message (which will be applied unless the Off mode was selected), enter the
values in the Status Code and Redirect URL fields, and click the
Status Code defines the HTTP status code resulting in redirection to the error page.
Redirect URL defines the web address of the error page presenting information about the error to the
client. Due to possible conflicts, you cannot add a new custom error message with an error code that
already exists, but you can redefine the URL for the existing code.
To remove a custom error message from the list, click
next to it.
Configure compilation settings in the Compilation and Debugging field:
To determine the programming language to be used as default in dynamic compilation files, choose an
entry from Page default language list.
To enable compiling retail binaries, leave the Switch on debugging checkbox empty.
To enable compiling debug binaries, select the Switch on debugging checkbox. In this case, the source
code fragments containing error will be shown in a diagnostic page message.
Note! When running applications in debug mode, a memory and/or performance overhead occurs. It is
recommended to use debugging when testing an application and to disable it before deploying the
application into production scenario.
Configure encoding settings for ASP.NET applications in the Globalization Settings section:
To set an adopted encoding of all incoming requests, enter an encoding value into the Request encoding
field (default is utf-8).
To set an adopted encoding of all responses, enter an encoding value into the Response encoding field
(default is utf-8).
To set an encoding which must be used by default for parsing of .aspx, .asmx, and .asax files, enter an
encoding value into the File encoding field (default is Windows-1252).
94 To set a culture which must be used by default for processing incoming web requests, select an
appropriate item from the Culture list.
To set a culture which must be used by default when processing searches for a locale-dependent resource,
select an appropriate item from the UI Culture list.
Set a code access security trust level for ASP.NET applications in the Code Access Security field.
CAS trust level is a security zone to which applications execution is assigned, defining what server
resources the applications will have access to.
Important. When an assembly is assigned a trust level that is too low, it does not function correctly. For
more information on the permissions levels see http://msdn.microsoft.com/library/enus/dnnetsec/html/THCMCh09.asp?frame=true#c09618429_010.
Enable the usage of the auxiliary scripts in the Script Library Settings field. Specifying the script library
settings is necessary if the validation web controls are used on your web site. This option is available only
for ASP.NET 1.1.x.
If you need to use auxiliary scripts (specifically, scripts implementing objects for validating input data),
provide the settings for .NET framework script library. To do so, enter the path beginning with the domain
root directory preceded by the forward slash into the Path to Microsoft script library field, or click the
folder icon next to the Path to Microsoft script library field and browse for the required location.
To initiate the auto-installation of files containing the scripts to the specified location, select the Install
check box. If the files already exist there, they will be rewritten.
Set client session parameters in the Session Settings field:
To set up the default authentication mode for applications, select an appropriate item from the
Authentication mode list. Windows authentication mode should be selected if any form of IIS
authentication is used.
Hosting Web Sites 61
To set up time that a session can idle before it is abandoned, enter appropriate number minutes into the
Session timeout field.
Click OK to apply all changes.
Note! Parallels Plesk Panel supports separate configurations for different versions of the .NET framework
(1.1.x and 2.0.x).
10.16 PHP Settings
To set PHP version for a domain:
95 The Windows server is configurated to support PHP scripting. You can choose between two versions
4.4.7 and 5.2.6.
Click the
icon and choose which version you want the server to support.
Click OK to save your settings
10.17 IIS Application Pool
You can choose to run your applications in an own application pool
Setting Up IIS Application Pool
To enable IIS application pool for a domain:
Click IIS Application Pool icon
in the hosting tool group
Click Switch On.
96 To limit the amount of CPU resources that this domain's application pool can use, select the Switch on
CPU monitoring check box and provide a number (in percents) in the Maximum CPU use (%) field.
Click OK.
When the pool is enabled and running you can recycle the pool and stop the pool. Recycling the pool
means that all the applications running will be stopped and restarted.
Disabling IIS Application Pool:
To disable IIS application pool for a domain:
Click IIS Application Pool icon
in the hosting tool group
Click Switch off.
Click OK.
10.18 Performance
To avoid excessive usage of bandwidth, which can lead to resources overage, you can set various
performance limitations for a domain. To seed the bandwidth and connection limits, click the Performance
icon
in the tools group.
97 Maximum bandwidth usage. To limit the maximum speed (measured in kilobytes per second) that a
domain can share between all its connections, type in a number in kilobytes.
Connections limiting. To limit the maximum number of simultaneous connections to a domain, type in a
number.
10.19 Hotlink Protection
Protecting Sites from Bandwidth Stealing
Hotlinking (also called file leeching, remote linking, direct linking, bandiwidth stealing or bandwidth
banditism) is a term used for describing a situation when a Web page of one domain owner is directly
linking to images (or other multimedia files) on the Web pages of another domain owner, usually using an
<IMG> tag. If your domains are hotlinked, you may face the problem of excessive bandwidth usage.
To protect a domain from hotlinking:
Click the Hotlink Protection icon
in the hosting tools group
Click Switch On to enable the protection from hotlinking.
Specify the extensions of files you wish to be protected from hotlinking (for example, jpg, bmp, and so
on) in the Protected files extensions field. When listing several file extensions, separate them with spaces.
Click OK.
98 11. Custom Button/ Remote Mail
11.1
Creating a Mailbox
To create a mailbox:
Click the Remot Mail icon
Select Add New Mail Account
Type a user name before @ in the Mail Account field
Type a password for a user to read his (or her) mail. You can also enter mail quota to the box just created
if you wish.
99 To add a mailbox, click OK
The mailbox is now created
You can choose to configure the account with several options.
11.1.1 Mail Alias
100 icon in the tools group.
Click Add New Mail Alias
Type a desired name and click OK.
The messages addressed to your additional e-mail address (e-mail alias) will get to your mailbox.
11.1.2 To remove an e-mail alias from a mailbox
Select the check box corresponding to the alias that you wish to remove, and click Remove Selected.
11.1.3 Preferences
11.1.3.1
Click the Preferences icon
Changing User Password for e-mail account
in the tools group
101 Write the new password in the New password field
Rewrite the password in the Confirm password field and click OK.
The password is now changed for the e-mail account
11.1.4 Mailbox
Switching off the Mailbox Service when you have decided to turn your account into a
mail forwarder
If you are going to use your existing e-mail account as a mail forwarder you are recommended to switch
off the mailbox service: a mailbox keeps all incoming messages and messages are not removed
automatically after being forwarded. Therefore, if you choose to have "mailbox + mail forwarder"
configuration on your account, be sure to clean up the mailbox from time to time.
To switch off the mailbox service for your account discarding all messages in your mailbox:
Click the Mailbox icon
in the Tools group.
Deselect the Mailbox check box.
Click OK.
11.1.5 Redirect
11.1.5.1
Setting up Mail Forwarding to a single e-mail address
Click the Redirect
icon in the tools group
Select the Redirect check box.
102 Type the destination e-mail address to which you would like to forward email and click OK.
For the account that you have added the redirect;
Clear the Mailbox, Control panel access and Enable spam filtering check boxes.
Click OK.
If you want to remove the redirect, just click Switch Off or reselect the checkboxes in front of the e-mail
accounts and click remove
11.1.6 Mail Group
11.1.6.1
Click Mail Group
Setting up Mail Forwarding to multiple e-mail addresses
icon in the tools group
Click Add New Member.
103 You should add at least one e-mail address before enabling mail forwarding to several e-mail addresses.
Enter the desired external e-mail address into the E-mail input box and/or select one or more of the local
mail accounts listed on the screen.
Click OK.
Click Switch on.
104 All the e-mails sent to [email protected] will now also be forwarded the addresses that you
choose to add and pick from the list.
Clear the Mailbox, Control panel access and Enable spam filtering check boxes for the
[email protected] account and Click OK.
11.1.6.2
To remove mail group
Click the mail forwarder's e-mail address.
Click Mail Group.
Click Disable.
11.1.7 Autoresponders
If you are going on vacation and will not be able to check your mail for a while, you may want
to leave a vacation notice that will be automatically sent to your correspondents once they send
e-mail to your address. This is done with automatic reply facility, also referred to as
autoresponder. Aside from vacation notices, organizations can use automatic replies to notify
customers that their orders or technical support requests were received and will soon be
processed. Automatic replies can include pre-written messages in plain text or HTML format,
and they can contain attached files as well.
Click the Autoresponders
Click Add New Autoresponder
icon in the Tools group when entering an e-mail account.
105 Configure your autoresponder
106 Type a name for this automatic reply into the Autoresponder name box. For ex. Vacation notice.
107 If you want your incoming mail to be forwarded to another e-mail address while you are away, specify an
e-mail address in the Upon automatic response, forward the original message to the specified e-mail
box.
If you want this automatic reply to be sent in reply to any incoming e-mail message, in the Conditions
group, leave the always respond option selected. If you wish to automatically reply only to e-mail
messages that contain specific words in the message text or subject line, select the appropriate option, and
type the word combination in the input box.
By default, the subject line of incoming e-mail will be inserted into the automated reply. To use a custom
subject, type it into the Reply subject input box.
As your correspondents may not figure out that the message they received from you was an automatic
response, they may want to respond to your auto-reply. So, you should specify your e-mail address as the
Return address, otherwise, their messages will be directed at the autoresponder’s address.
Specify the automatic reply message format (plain text or HTML) and character encoding (UTF-8 is
recommended). If you use HTML tags in your auto-reply message, you should select the HTML option.
Type your message in the Reply with text field.
To limit the number of automated responses per day to the same e-mail address, enter the desired number
in the respective input box under Limits. The default setting is to respond no more than ten times in one
day to the same e-mail address.
To reduce mail server load, you may want to limit the number of unique addresses that the autoresponder
will remember. To do this, enter the desired number into the Store up to box.
Click OK
Click the Switch on icon in the Tools group
108 11.1.8 Filtering incoming e-mails
If you choose to filter the incoming e-mail messages you can activate the Spam Filtering within every
account and configure them with separate spam filtering score values.
SpamAssassin performs a number of different tests on contents and subject line of each message. As a
result, each message scores a number of points. The higher the number, the more likely a message is
spam. For example, a message containing the text string ―BUY VIAGRA AT LOW PRICE!!! in Subject
line and message body scores 8.3 points. By default, the filter sensitivity is set so that all messages that
score 7 or more points are classified as spam.
When your users receive lots of spam messages with the current setting, to make filter more sensitive, try
setting a lesser value in the The score that a message must receive to qualify as spam box; for example, 6.
Note! To protect your mailbox from undesirable correspondence, do not publish your e-mail address on
Internet forums and switch on the server-side spam filter provided by the SpamAssassin software. When
you need to publish your e-mail address, create a disposable e-mail address - e-mail alias - for your
primary e-mail address, and publish it instead. All messages sent to the e-mail alias will come into your
mailbox. Once you start getting spam, remove that alias and create another one. If you have a mailbox at
another domain or mail server, you may want to set up a disposable e-mail forwarder.
To add the filtering service to your account click Spam Filter
account you want to update.
icon in the tools group under the
109 Configure the following settings:
Enable SpamAssassin spam filtering by clicking the enable
icon.
The score that a message must receive to qualify as spam. This setting adjusts spam filter sensitivity.
SpamAssassin performs a number of different tests on contents and subject line of each message. As a
result, each message scores a number of points. The higher the number, the more likely a message is
spam. For example, a message containing the text string ―BUY VIAGRA AT LOW PRICE!!!‖ in
Subject line and message body scores 8.3 points. By default, the filter sensitivity is set so that all messages
that score 7 or more points are classified as spam.
If you receive lots of spam messages with the current setting, to make filter more sensitive, try setting a
lesser value in the The score that a message must receive to qualify as spam box; for example, 6.
If you are missing your e-mails because your spam filter thinks they are junk, try reducing filter sensitivity
by setting a higher value in the The score that a message must receive to qualify as spam box.
What to do with spam mail. If you are sure that your spam filter is accurate, you may want to set the filter
to automatically delete all incoming messages recognized as spam. To do this, select the Delete option.
If you wish to filter mail with the software on your local computer, select the Mark as spam and store in
mailbox option, and then specify how spam filter should mark the messages recognized as spam.
To include a desired combination of symbols or words to the message subject, type it into the Add the
following text to the beginning of subject of each message recognized as spam box. If you do not want the
spam filter to modify message subject, leave this with the default messsage. If you want to include into the
subject line the number of points that messages score, type _SCORE_ in this box.
Spam detection alert text. If you want spam filter to include a text into e-mail messages marked as spam,
type the text into this box.
Trusted languages and locales. E-mail messages written in the specified languages and with the defined
character sets will pass the spam filter and will not be marked as spam.
Click OK to save the settings.
If you do not want to receive e-mail from specific domains or individual senders, click the Black List tab,
and then add the respective entries to the spam filter‘s black list:
To add entries to the black list, click Add Addresses. If you have a list of entries stored in a file, click
Browse to specify it, and then click OK. Otherwise, select the From List option, and type the e-mail
addresses into the E-mail addresses box. Place each address in one row, or separate addresses with a
coma, a colon, or a white space. You can use an asterisk (*) as a substitute for a number of letters, and
question mark (?) as a substitute for a single letter. For example: [email protected],
[email protected], *@spammers.net. Specifying *@spammers.net will block the entire mail domain
spammers.net.
To save the entries you added, click OK, then confirm adding, and click OK again.
To remove entries from the black list, under the Black List tab, select the entries and click Remove.
Confirm removal and click OK.
If you want to be sure that you will not miss e-mail from specific senders, click the White List tab, and
then add e-mail addresses or entire domains to the spam filter‘s white list:
110 To add entries to the white list, click Add Addresses. If you have a list of entries stored in a file, click
Browse to specify it, and then click OK. Otherwise, select the From List option, and type the e-mail
addresses into the E-mail addresses box. Place each address in one row, or separate addresses with a
coma, a colon, or a white space. You can use an asterisk (*) as a substitute for a number of letters, and
question mark (?) as a substitute for a single letter. For example: [email protected],
[email protected], *@mycompany.com. Specifying *@mycompany.com will add to the white list
all e-mail addresses that are under the mycompany.com mail domain.
To save the entries you added, click OK, then confirm adding, and click OK again.
To remove entries from the white list, under the White List tab, select the entries and click Remove.
Confirm removal and click OK.
Once finished with setting up the spam filter, click OK.
11.1.9 Protecting Mailboxes from Viruses
To defend your system from viruses, do not open suspicious e-mail attachments, enable
anti-virus protection on the server side, and be sure to have a firewall and anti-virus
software installed on your personal computer. Keep your operating system up-to-date
and timely install security hot fixes and patches.
To scan your e-mails from viruses you can choose to switching on the Anti Virus protection.
11.1.9.1
Click the Antivirus
To switch on anti-virus protection for a mailbox:
icon within the toolbox of the account that you want to protect.
Choose the desired mail scanning mode. You can switch on scanning for incoming mail, outgoing mail, or
both.
Click OK.
11.1.9.2
Switching off Anti-virus Protection
To switch off anti-virus protection for a mailbox:
Click the Antivirus
icon within the toolbox of the account that you want to delete protection
from.
Select the Do not scan for viruses option and click OK.
111 11.1.10
Switching off e-mail service for a domain
You can also choose to switch off the e-mail service for the domain.
If you for ex. only want to use the web service within this system and the e-mail service at another ISP,
then you shall let the e-mail service be switched off. Otherwise there will be problems if somebody else
using the same system tries to send e-mails to you. Since the e-mail service is activated, due not used, the
e-mail server tries to deliver the e-mails to the service for the domain in the own system and tries not to
send the e-mails outside the system.
To Switch Off the e-mail service, just click the Switch Off
icon.
112 11.1.11
Catch-All function for the e-mail service for a domain
If you only want to use a catch-all function for the e-mail service you can redirect all incoming e-mail for
the domain to another address by clicking on the Preferences
icon in the tools group.
You can choose to forward the e-mails or reject them.
If you choose not to use any e-mail service for a domain, you can just choose to let the messages bounce
with a message that you can fill in the field.
12. Info
113 You will find info about the resources allocated to your services in the Control Panel and how
much of the resources are used.
13. Standard forwarding (redirect) /Frame Forwarding
If you have a web hotel account and only want to use the e-mail services within the provider and want to
redirect or frameforward your site to another URL, you can choose to delete the physical hosting and add
a redirect or a frameforward within the control panel
icon in the hosting tools group. You will be asked if
To delete the physical hosting click the Delete
you are sure you want to remove the physical configuration for the domain. To delete you have to click
OK
114 The physical hosting is deleted and no configuration can be made
By clicking the Setup icon you can choose either to create a new physical hosting to the domain or add a
redirect or frameforward
13.1.1 Standard forwarding
Is what we call redirects
115 13.1.2 Frame forwarding
You need to add the Destination URL in the field, and the domain will be redirected or frame forwarded to
the address given.
14. Domain Management
For each new domain name, your control panel automatically creates DNS zone in accordance with the
configuration preset defined by your provider. The domain names should work fine with the automatic
configuration, however if you need to perform custom modifications in the domain name zone, you can do
that through your Control Panel/Domain management (in the left side pane)
Click All My Domains
The domains hosted in the name servers will be found here.
If you wish to edit the zone of one of the domains, click the domain name.
116 Within the General Information tab you will find some Domain properties:
Domain – the domain name
Account – the Account which the domain is connected to in the system
Action – DNS hosting
Status – tells if the domain is registered within the system.
Dns hosting – shows that the domains has a zone and which name servers this zone is situated on.
Used by subscription – shows witch subscription the domain is connected to.
If you click the Add Domain
button, you can choose to register new domains, not yet
registered, choose to transfer an existing domain or choose only to set up a zone in the name servers for an
additional domain.
117 If the domain has its own web package, it shall naturally be connected to its own subscription, but if you
have several domains, only in dns hosting, you can choose to connect these domains to subscriptions
within the system and all the records in the dns zone will be the same as for the primary domain.
If you click on one of the domains, ex. Strongbox.bronsonid.com, you can choose to delete the zone for
the domain.
The deletion only means that the zone within the name servers will be deleted.
118 If you click the Delete button, you will delete the domain from the name servers.
If you click the Edit button, you can edit the Domain properties. What you can do is to deselect the
DNS hosting check box. If you choose to deselect it, this means that the zone for the domain will be
deleted. As you can see there are two different subscriptions in this particular Control Panel and you can
choose to change the subscription attached to the domain.
If you want to edit the records in the name server zone for the domain, click the DNS Zone tab.
119 14.1
DNS Zone
DNS Records (A, CNAME, MX, NS, SRV, TXT)
The most common types of DNS records are:
•
SOA record. Defined by provider and read-only. The SOA (start of authority) record is the most
crucial record in a DNS entry. It conveys more information than all the other records combined. This
record is called the start of authority because it denotes the DNS entry as the official source of information
for its domain.
•
Address records (A) that map the name of a machine to its numeric IP address. In clearer terms,
this record states the hostname and IP address of a certain machine. To "resolve" a hostname means to
find its matching IP address.
•
CNAME records allow a machine to be known by more than one hostname. There must always
be an A record for the machine before aliases can be added. The host name of a machine that is stated in
120 an A record is called the canonical, or official name of the machine. Other records should point to the
canonical name
•
MX (Mail eXchanger) resource record identifies the mail server that is responsible for handling
e-mails for a given domain name. When more than one MX record is entered for any single domain name
that is using more than one mail server, the MX record can be prioritized with a preference number that
indicates the order in which the mail servers should be used. This enables the use of primary and backup
mail servers, which makes mail delivery more reliable. Please, keep in mind the following rules about MX
records:
MX record must point to hosts defined by A records, not CNAMEs.
MX record cannot point to IP addresses.
If you create a single MX record, the priority doesn't matter. If you create multiple MX records, your mail server
must have the lowest preference.
•
Name Server records (NS) state the authoritative name servers for the given domain. There must
be at least two NS records in every DNS zone.
•
SRV-records are used to specify the location of a service. They are recently were used in
connection with different directory servers such as LDAP (Lightweight Directory Access Protocol). In
addition, SRV records can be used for advanced load balancing and to specify specific ports for services for example that a web-server is running on port 8080 instead of the usual port 80 (theoretical example this is not yet supported by any major browsers). The "service location" is specified through a target,
priority, weight, and port:
Target is the domain name of the server (referencing an A-record).
Priority is a preference number used when more servers are providing the same service (lower numbers are tried
first).
Weight is used for advanced load balancing.
Port is the TCP/UDP port number on the server that provides this service.
•
TXT records - strictly informational, not functional. Used to provide up to 255 characters of free
form text (quoted string). Provides the ability to associate some text with a host or other name.
The form for resource records input is organized as follows:
1
Enter a record subject into the Name field.
2
Enter a record time-to live in seconds into the TTL field.
3
Select a record type from the Type drop-down menu.
4
Enter priority (for MX or SRV record only) into the Priority field.
121 5
Enter the rest of a record in one string, in the same way as a record is entered in zone file into the Value
field.
14.1.1 To add a DNS record to a zone file
Select the DNS Zone tab. The list of DNS records appears.
Click the New Record
icon.
Fill the form that appears:
A You can type the sub-domain name into the Name field. Since the form we are talking about is designed
for adding different types of records, we can say that the Name field should contain the subject of the
query, e.g., the address you want to use as your Internet e-mail address (for MX record), or the alias name
(for CNAME record), etc. However, to avoid any mistakes, please remember that:
- If you leave the Name field empty, the record will affect just the original domain name, not a sub-domain. In this
case, after you save the record you will see the @ symbol in the record name column.
122 - If you type the @ symbol into the Name field, this will mean the same as described above.
- If you type the sub-domain with the trailing dot into the Name field (e.g., subdomain.domain.com.) the record will
affect the sub-domain named subdomain.domain.com.
- If you type the sub-domain without the trailing dot into the Name field, (e.g., subdomain.my), the domain name
indicated in this record (i.e., the contents of the Host field for example, domain.com) will be automatically appended
to the record name and, as a result the record will affect the sub-domain named subdomain.my.domain.com.
B Into the TTL field you can type in seconds how long other name servers should cache, or save, this
record (TTL is short for time-to-live). For example, the 86400 value corresponds to one day.
Note: The minimal default TTL for all the resource records containing in the zone file is indicated in the SOA record.
And this default TTL can be re-defined for every record containing in the zone file. Thus, if you leave the TTL field
empty, then the default minimal TTL will be applied to this record.
C Select the type of the resource record (A, CNAME, MX, or NS) from the Type drop-down menu.
D The Priority field is needed to add MX and SRV records, namely, to specify a mail server priority.
Thus, this field becomes active only in case you have selected the MX record type from the Type dropdown menu. Mailers attempt to deliver to the mail exchanger with the lowest preference value (highest
priority). This seems a little counterintuitive at first - the most preferred mail exchanger has the lowest
preference value. But since the preference value is an unsigned quantity, this lets you specify a "best" mail
exchanger at preference value 0. Generally, the mailer priority is the digit within the range from 0 to
65535. If delivery to the most preferred mail exchanger(s) fails, mailers should attempt delivery to less
preferred mail exchangers (those with higher preference values), in order of increasing preference value.
That is, mailers should try more preferred mail exchangers before they try less preferred mail exchangers.
More than one mail exchanger may share the same preference value, too. This gives the mailer its choice
of which to send to first. The mailer should try all the mail exchangers at a given preference value before
proceeding to the next higher value, though.
E In the Value field you should indicate the answer to the query. Records are always read from left to
right, with the subject to be queried about on the left and the answer to the query on the right. For
example, for MX record you should indicate the mail server name, for CNAME record - the canonical
name of the machine indicated before in the relevant A record, etc.
F You can add a free-form comment into the Comment field.
Click the Save button.
123 14.1.2 Disabling a zone
button serves for removing a zone from your vendor name servers. A
The Disable zone
disabled zone stays in vendor database and can be Enabled, i.e., restored on your vendor name servers at
any moment. Important: If a zone is kept on a remote name server that does not belong to your vendor
DNS, this zone MUST be disabled.
When you choose to disable a zone the Disable Zone button changes name to Activate Zone.
You can easily activate it again by clicking the Activate Zone button.
124 15. Termination of services
Requesting Subscription Termination
All terminations have to be done by a signed form, otherwise the cancellation will not be handled.
Within the Control Panel you can choose to send us an termination request, but when the request has been
sent, you will also receive an e-mail with further information about the cancellation.
Since all cancellations has to be done by signed forms, the request by the control panel is just a request
and the request will be handled as soon as the billing department receives the signed form from you.
You can choose which subscription you want to send a termination request for by clicking on the
subscription.
125 Click Request Subscription Termination
Fill the form and click Save
An e-mail will be sent to you.
126 16. Customizing web server error messages
When visitors coming to your site request pages that the web server cannot find, the web server generates
and displays a standard HTML page with an error message. The standard error messages may inform of
problems, but they do not usually say how to resolve them or how to get the lost visitor on his way, and
they also look dull.
You may want to create your own error pages and use them on your web server. With Plesk you can
customize the following error messages:
400 Bad File Request. Usually means the syntax used in the URL is incorrect (e.g., uppercase letter
should be lowercase letter; wrong punctuation marks).
401 Unauthorized. Server is looking for some encryption key from the client and is not getting it. Also,
wrong password may have been entered.
403 Forbidden/Access denied. Similar to 401; a special permission is needed to access the site – a
password and/or username if it is a registration issue.
404 Not Found. Server cannot find the requested file. File has either been moved or deleted, or the
wrong URL or document name was entered. This is the most common error.
500 Internal Server Error. Could not retrieve the HTML document because of server configuration
problems.
To configure the Web server to show your custom error pages:
Switch on support for custom error documents through Plesk.
Click Setup in the hosting tools group
127 Select the Custom Error Documents check box.
Click OK.
Click File Manager
Click the error_docs directory
Edit or replace the respective files.
Be sure to preserve the correct file names:
400 Bad File Request - bad_request.html
401 Unauthorized - unauthorized.html
403 Forbidden/Access denied - forbidden.html
404 Not Found - not_found.html
500 Internal Server Error - internal_server_error.html
128 Wait for a few hours till your web server is restarted.
After that, the web server will start using your error documents.
17. Web Mail
Accessing your mail from a web browser
You can read your mail and compose new messages even if you are far from your home or office
computer.
Open a web browser, and type the URL you have received from your serviceprovider.
Press ENTER.
A login screen will open.
Type the user name and password that you specified during creation of your mailbox in the Control Panel
Remote Mail-administration
Click Log in.
129 18. Setting Up Your E-mail Program for Retrieving Mail from Your Mailbox
18.1
To set up Microsoft Outlook Express:
Open Microsoft Outlook Express.
Go to Tools > Accounts / Verktyg>Konton
Click the Mail/Epost tab to open a list of your mail accounts.
Click the Add/Lägg till > button and select the Mail/E-post … item.
Enter your name as you want it to appear in any messages you send, and click Next >.
Type your e-mail address that you created through Plesk (for example [email protected]),
and click Next >.
Select the protocol of your incoming mail server.
Plesk supports both POP3 and IMAP protocols, we recommend that you select IMAP because this leaves
your e-mail on the mail server so that it can later be accessedfrom other locations and by other methods,
for example, browser based Webmail.
If you choose to use the IMAP protocol, the client program will collect all your e-mails locally to your
computer.
Specify the mail domain name as the incoming and outgoing mail server (for ex:
mail.strongboxdemo2.com), and click Next >.
Type your e-mail address in the Account name box (for ex. [email protected]). The
account name is always the e-mail address.
Type your password. This should be the password that you specified during creation of the mailbox
through the Plesk Control Panel in the e-mail administration.
Leave the Remember password box checked, if you do not wish to be prompted to enter password each
time your e-mail program connects to the mail server to check for new mail, and click Next >.
To complete setting up your e-mail program, click Finish.
Since many of the companies who offer Internet access are blocking port 25, which is the port for
outgoing e-mail, you might have to change the outgoing port to 587. This is done in the
Advanced/Avancerat> tab. You do also have to verify the address using the smtp-server by using the
same credentials as for incoming e-mail. Within the Servers/Servrar> tab you will find a checkbox
named “the smtp-server requires authentification/smtp-servern kräver autentisering”, select the box.
18.2
To set up Mozilla Thunderbird:
Open Mozilla Thunderbird.
Go to Tools > Account Settings…
Click Add Account. The Account Wizard will open.
Leave the Email account option selected, and click Next >.
Enter your name as you want it to appear in any messages you send.
Type your e-mail address that you created through Plesk.
For ex. [email protected]
Click Next >.
Select the protocol of your incoming mail server.
Although Plesk supports both POP3 and IMAP protocols, we recommend that you select
IMAP because this leaves your e-mail on the mail server so that it can later be accessed from other
locations and by other methods, for example, browser based Webmail.
130 Specify the mail domain name as the incoming and outgoing mail server (for ex:
mail.strongboxdemo2.com)
Click Next >.
In the Incoming User Name box, specify your full e-mail address (for ex,
[email protected]), and click Next >.
Enter the name by which you would like to refer to this account (for ex, Work Account) and click Next >.
Verify that the information you entered is correct, and click Finish.
Click OK to close the Account Settings wizard.
19. Problem with receiving e-mail messages
If you can’t connect to the e-mail server using an e-mail client, check what error message you receive. In
many cases you can solve the problem yourself. If you are using Microsoft Outlook and for some reason
can´t connect to the server you will receive an error message like 0x800ccc…
Go to www.microsoft.com and make a search on the error message and you will find an error solving
article.
Also log in to the webmail. If you have received an e-mail which is shown in the inbox of your webmail,
there is nothing wrong with the e-mail server.
If you receive an error message that says that there is something wrong with your username or password,
please enter them again in your e-mail client and try to connect again.
Sometimes it doesn´t help to make any changes and the problem persists, then it is often better to delete
the e-mail account and create it again in the client.
If you can´t solve the problem yourself, call your service provider and they will help you out.
131 20. Technical specification, servers
132