As requested by many partners we have added support for adding images in email signatures in Modern UI. To be able to use this feature you have to update to the latest patch version of Zimbra (10.0.6). Adding a Signature is done via the Gear menu -> Settings -> Signatures
Tag Archives | Partners
Print preview an attachment in Zimbra Desktop
This Zimlet adds a link to print preview an attachment without having to download and save the attachment, reducing number of user interactions. This Zimlet was made for users of Zimbra Desktop that need to print many PDF attachments during their daily workflow. Out-of-the box on Zimbra Desktop this requires one to store the PDF […]
Zimbra with on JumpCloud cloud based Single Sign-On
In this article you will learn how to set-up Zimbra on JumpCloud. The technology used in this article is SAML, an open standard for Single Sign-On. When using SAML an Identity Provider (IdP) will take care of user authentication after which users can use their applications without having to log-on to each of them separately. […]
How to deploy Zimbra Desktop via automation?
After downloading Zimbra Desktop there are two ways to install it. For end-users it is a matter of double clicking it and going through the set-up wizard. For administrators looking to deploy Zimbra Desktop in a corporate environment there is a silent installation switch. By using the switch you can script the installation of Zimbra […]
How to stay informed about Zimbra security announcements?
Zimbra can be updated using apt update or yum update, and it is highly recommended to install Zimbra updates (patches) as they are released, especially in case of patches that include security fixes. Here are a few ways to stay informed on Zimbra Security updates: Subscribe to these RSS feeds: https://wiki.zimbra.com/security-advisory-feed.php (no details, can be […]
Zimbra not affected by NGINX CVE-2023-44487
Recently a number of partners have asked if Zimbra is affected by NGINX CVE-2023-44487. When we take a look at the NGINX blog post on CVE-2023-44487 it mentions the following: …it is essential that the following updates are made to NGINX configuration files, minimizing the server’s attack surface: keepalive_requests should be kept at the default […]