In Zimbra it is easy to switch between the legacy Classic UI and the Modern UI via menu options. However in case of upgrades to Zimbra 10 in some cases your Class Of Service will not be updated to include new Zimlets. As a result the Zimlet that adds the menu option to switch to […]
Archive | Product News
How to deploy Zimbra Desktop via automation?
After downloading Zimbra Desktop there are two ways to install it. For end-users it is a matter of double clicking it and going through the set-up wizard. For administrators looking to deploy Zimbra Desktop in a corporate environment there is a silent installation switch. By using the switch you can script the installation of Zimbra […]
How to stay informed about Zimbra security announcements?
Zimbra can be updated using apt update or yum update, and it is highly recommended to install Zimbra updates (patches) as they are released, especially in case of patches that include security fixes. Here are a few ways to stay informed on Zimbra Security updates: Subscribe to these RSS feeds: https://wiki.zimbra.com/security-advisory-feed.php (no details, can be […]
Patch for Zimbra Daffodil 10.0.5, 9.0.0 Patch-37 & 8.8.15 Patch-44
Daffodil Migration Patch: Assist Users in Moving to Daffodil This patch has newly added functions that will aid in the upgrade/migration process to Daffodil. To safeguard your system, we recommend you always upgrade to the latest patch and regularly refer to our blog and the Zimbra Security Center for steps to ensure your system is safe. Patch Release […]
Re-introducing RSS feeds in Zimbra
For a long time it has been possible to subscribe to RSS/ATOM feeds from the Zimbra Classic UI. This new Zimlet can be used to subscribe to RSS/ATOM feeds from within Zimbra Modern UI. This way you can stay up-to-date on your favorite Youtube channel, the Zimbra blog or more importantly Zimbra Security updates. Screenshots […]
Zimbra not affected by NGINX CVE-2023-44487
Recently a number of partners have asked if Zimbra is affected by NGINX CVE-2023-44487. When we take a look at the NGINX blog post on CVE-2023-44487 it mentions the following: …it is essential that the following updates are made to NGINX configuration files, minimizing the server’s attack surface: keepalive_requests should be kept at the default […]
