Search Our Database

How to create email accounts in DirectAdmin (enhanced skin)

Introduction This article is designed for system administrators and users managing email services through the DirectAdmin control panel. It provides step-by-step guidance on creating email accounts, addressing common challenges related to account setup and security. Users should refer to this information whenever they need to establish new email accounts for their domains, applicable in both

How to create a subdomain in DirectAdmin (Enhanced Skin)

Introduction This guide is intended for users who wish to create a new subdomain using DirectAdmin. Whether you’re a beginner or an experienced website administrator, this step-by-step guide will help you easily add a subdomain to your existing domain. The article covers the process of creating a subdomain, when and where this information is applicable,

How to configure windows built-in client for L2TP/IPSEC VPN

Introduction Configuring a VPN connection on Windows using the built-in client is a reliable method for establishing a secure connection to a private network over the internet. One of the most common VPN protocols is L2TP (Layer 2 Tunneling Protocol) combined with IPsec for encryption. This setup ensures secure communication by encrypting the data transmitted

How to create FTP account on DirectAdmin (Enhanced skin)

Introduction This guide walks you through the steps to create an FTP account in DirectAdmin. It’s designed for website administrators or users who need to set up FTP access for file transfer. This article covers the process of creating an FTP account from logging into DirectAdmin to setting up your new FTP account with the

How to check overview of domain in SmarterMail using Domain Reports

Introduction This guide explains how to check the overview of domain in SmarterMail. If you suspect unauthorized access or abnormal activity in your email account, this guide will help you identify and review suspicious behaviors such as unusual login activity, high volumes of outgoing emails, or compromised account credentials. These steps should be followed if