User System Operation Guide
This guide is designed to give FaithMail users insight into proper use of the system.
Most of the difficult technology issues such as system stability, performance, backups, anti-virus, encryption, and operational security have already been handled by our support team.
So for the most part, all you have to do is simply enjoy using the system. There is really only one thing you are responsible for and it is critical.
PROTECTING YOUR PASSWORD!
Here is what you need to know in order to do a good job at that:
- Choose a complex password that is easy to remember. It should be more than 8 characters long, contain numbers, lowercase letters, uppercase letters, and special characters. This protects you from the most common attack hackers use, a dictionary attack, simply put they use a computer program to try to log into your account using every word in the dictionary. This is how most accounts are compromised, weak passwords.
- Never give anyone your password especially if they ask for it. No one from Asclepius Rod Support will ever ask you for your password or any other personal information. If someone does they are pretending to work for us and are trying to trick you. Do not give your password to anyone no matter what they say.
- Do not use your FaithMail password on other sites. Many sites have terrible security and your password may be easily stolen. Your email account is the key to all your other accounts use a separate password for it and only it.
- Write down your password on a sheet of paper and archive it where you keep your critical records, such as your birth certificate. That way you cannot forget it. Never save it on a computer.
- Set at a minimum 2 password recovery codes by creating and answering 2 security questions. Click on "Settings" in the green banner on top of FaithMail, login, then click on "Password". Enter your information there so you can never get locked out of your account if you lose the password you promised to write down. Be sure to choose 2 very good question/answer pairs, something no one could guess or dictionary attack. For example, a bad question/answer would be Question: What is the name of your dog? Answer: Spot. This is terrible for two reasons, other people know the name of your dog and "spot" is in the dictionary. This would be like opening the front door to hackers. YOU CANNOT RECOVER YOUR LOST PASSWORD WITHOUT A MINIMUM OF 2 QUESTION/ANSWER PAIRS, 1 IS NOT ENOUGH, SO CREATE 2 BEFORE IT IS TOO LATE!
- If you have a work email address that you trust set your "Recovery Email" on the same "Settings", "Password" page. The primary way back into a locked out account is to click on the forgot password links on the "View email" or "Settings" pages. If you lock yourself out of your account and do not have two Recovery Questions/Answers and/or a Recovery Email the last resort is to contact support and let us know that you are locked out and that you would like us to call the phone number on file for your account to verfiy your identity and wish to reset your password, if we can reach you via this number and only this number we will reset your password. If you cannot remember your password and did not write it down and did not setup any of the recovery questions and/or recovery email and do not have a valid phone number on file your account and all its data are most likely lost. Remember, Asclepius Rod Support's policy is to never be a victim of social engineering, we will only reset your password if we can confirm your identity beyond any doubt. In all other cases we will not let you back in; you will have to create a new account. After one year your old username will become available again.
- Refuse to log into FaithMail from any untrustworthy computer. If the computer has a virus or keyboard logger installed they can see and save your password without your knowledge.
- Install anti-virus software on your primary computer. There are many free anti-virus programs out there. McAfee LiveSafe is the best, but Avast is free and works almost as well.
- Do not fall for phishing sites. Phishing sites are web sites that hackers create that look exactly like the real website. They send you a fake email claiming to be technical support and give you a link in that email that tells you to click on it to do something. When you click on it you appear to be at FaithMail, but you are not. If you enter your password into this fake site the hackers have just stolen your password. Do not fall for it. Always use your browser's favorites short-cut to go to FaithMail or type "https://www.faithmail.org/" into the address bar of your browser, these two ways are the safest.
- Change your password at least once a year.
That is it. Remember, you have only one responsibility, we handle the rest, protect your password.
While this site works with most browsers, it works best with the latest version of Firefox. If you are having trouble with a feature not working as expected first try Firefox. See our Not Working Help page for more details.
Accounts that have not been accessed in over a year are subject to deletion.
Your Email Address
Any email sent to the domains "@faithmail.org" or "@faithmail.net" matching a vaild FaithMail.org account will be delivered. So if you have a FaithMail account and your username is for example "support", if someone emails "firstname.lastname@example.org" or "email@example.com" you will receive the message in your "firstname.lastname@example.org" inbox. While you can give family and friends any of these addresses to send you mail we recommend only providing the "@faithmail.org" address as this is FaithMail's official domain.
You may send and receive email attachments up to 50MB in size to and from FaithMail, however, many other email service providers do not support sending or receiving large files; if the destination email service does not support the file size you are sending delivery will fail. You are not allowed to attach certain file types because of security concerns. One work-a-round may be to compress the file first using a format such as zip.
Systems are checked every 30 seconds for availability; if a system is unexpectedly offline a support engineer is automatically notified so he or she can addresses the issue. We check all emails entering the system for viruses and we are constantly backing-up the system so that you never lose data. We run hourly, daily, and monthly backups. These backups are transparent to the user for the most part. However, you will notice slower system performance while they are running.
BACKUP SCHEDULE AND PERFORMANCE IMPACT:
All systems remain fully operational during all backups.
All system times are in UTC military.
- Hourly database and mailbox backups start on the tenth minute of every 3rd hour and run for a about an hour. IMPACT: 40% system performance decrease during the remainder of the time.
- Daily database backups start on the 1st minute of the 3rd hour and run for about 10 minutes. IMPACT: some system features completely offline.
- Weekly incremental system images start on the first minute of 4th hour every Sunday and run for about 40 minutes. IMPACT: 25% system performance decrease.
- Monthly full filesystem backups start on the 30th minute of the 5th hour on the 1st day of each month and run for about 12 hours. IMPACT: 40% system performance decrease.
- Yearly monthly archiving on January 1st of each year.
- All systems are rebooted once a month right after the monthly full filesystem backups complete in order to apply the operating system's latest security
updates. Each node of the system takes about 5 minutes to reboot and come online. If there is a problem caused by the update the system is either fixed or rolled back within 30 minutes.
- At 03:30 everyday all services are offline for approximately 3 minutes while security logs rotate and services restart.
- All services are restarted every day at the 9 hour on the 30 minute; services will be offline for approximately 1 minute.
- At all other times the system should be online and performing at 100%.
Our backup policy allows for a 3 hour recovery point objective and an 1 hour recovery time objective. Also, monthly backups are archived off-site, even off country. What this means is that if a server crashes less than 3 hour's worth of data could be lost and it will take an engineer about 1 hour to spin up a new server and restore the backups. If the unthinkable happens and the entire datacenter is lost due to a biblical disaster, less than 1 month's worth of data could be lost and it will take an engineer about 1 hour to spin up a new server and restore from backups in a new datacenter.
Do not be worried none of this is likely to happen. We use the most advanced cloud based systems that have durability levels in excess of 99.999999999% and availablity levels in excess of 99.99%. However, if the 0.0000000001% or 0.01% happen we are prepared.
HIGH VOLUME EMAIL SENDING:
FaithMail allows high volume email sending and receiving at our higher service levels. However, all emails sent must comply with our use policy. Which to summarize is you may send any email and any number of emails as long as your service level allows it and out-going emails do not contain scams, do not attempt to defraud recipients or ask others to defraud others, do not threaten or assault recipients or ask others to threaten or assault others, do not send out anti-religious propaganda, and do not contain hate messages, and do not involve any criminal activity or planning such an activity.
With respect to out-going messages that are unsolicited by the recipient or sent using mass mailing lists all such emails by law are required to contain unsubscribe links in the header or footer of the message, allowing the recipient to opt-out of receiving future emails. Emails in violation of this are considered spam which are a violation of our use policy.
Sending messages which violate any of these policies or any of the policies or the legal contract expressed by our Terms of Service will cause the offending email account to be subject to a 6 month probation period during which if additional violations are cited will result in your networks being banned from all Asclepius Rod resources and account closure and deletion of all data. Violators upon written request to email@example.com may be allowed temporary access to enable them to download all of their existing data before final termination. Such a request must be received within 1 week of account closure. Banned networks will be granted access again after 1 year from the date of the final policy violation after which the original account maybe recreated if it is not already taken.
WHAT DOES ALL THIS MEAN
Protect your password and enjoy using the system, we will handle the rest.
May you walk with God always,
Asclepius Rod Support