Control e-mail access

You should control who accesses your server through e-mail to protect your data from malicious attacks.

Related concepts
Independent disk pools
Determine problems with e-mail
Related tasks
Restrict relays
Restrict connections
Related information
AS/400 Internet Security: Protecting Your AS/400 from HARM on the Internet