+49 (0) 7245 919 581
info@eunetic.com
Deutsch
English
Login
Products
SSL Certificates
Domain Validation SSL
Organization Validation SSL
Extended Validation SSL
S/MIME Certificates
Code Signing Certificates
Email Filter
Inbound Filter
Outbound Filter
Archiving Solution
Exchange & Office 365
DNS Filter
How it works
Use Cases
Core Features
Firewall
Functions & Technology
Rates & Prices
Areas of Application
Enterprise Security with Imperva
Other Services
Anycast DNS Hosting
LEI Code Registration Service
Support
Knowledge Base
EuropeanSSL FAQ
EuropeanMX FAQ
EuropeanNS FAQ
EuropeanLEI FAQ
EuropeanSEC FAQ
Miscellaneous
Contact Us
SSL Root Certificates
SSL Forms & Agreements
EuropeanMX IP-Pool
Toolbox
SSL-Tools
SSL Checkup
Certificate Converter
CSR Generator
CSR Decoder
MX-Tools
MX Checkup
SPF Generator
DMARC Generator
DMARC Report Analyzer
Partner Program
Free Trials
EuropeanMX
Try our our email protection filter for 30 days
EuropeanSSL
SSL certificate with 30 days validity
EuropeanNS
Anycast DNS zone with 30 days validity
EuropeanWF
Try our DNS web filter for 30 days
Home
Knowledge Base
Eunetic
Knowledge Base
1. Cybersecurity Basics
Understanding Authentication: Secure Identity Verification
FAQ
Understanding Intrusion Prevention Systems (IPS)
FAQ
Understanding the Term 'Exploit'
FAQ
Understanding VPNs: What is a Virtual Private Network?
FAQ
Understanding Endpoint Security: Essential Guide
FAQ
Understanding Security Protocols
FAQ
Understanding Digital Signatures
FAQ
Understanding Antivirus Software: Protection for Your Digital Devices
FAQ
Understanding Trojans: Definition and Overview
FAQ
Understanding Patch Management: A Comprehensive Guide
FAQ
Understanding Intrusion Detection Systems (IDS)
FAQ
Understanding Worms: Definition and Overview
FAQ
Understanding the Cybersecurity Framework
FAQ
Understanding Data Loss Prevention (DLP) - Essential Guide
FAQ
Understanding Man-in-the-Middle Attacks
FAQ
Understanding DDoS Attacks: An Overview
FAQ
Understanding Firewalls: Your First Line of Cyber Defense
FAQ
Understanding Encryption: Securing Digital Information
FAQ
Understanding Botnets: Definition and Overview
FAQ
Understanding Secure Shell (SSH) - A Comprehensive Guide
FAQ
Understanding Two-Factor Authentication (2FA)
FAQ
Understanding SSL Certificates - Secure Your Online Transactions
FAQ
Understanding Security Audits: Importance and Process
FAQ
Understanding Malware: Definition and Overview
FAQ
Understanding Phishing: What You Need to Know
FAQ
Understanding Spyware: Definition and Overview
FAQ
Understanding Ransomware: Definition and Overview
FAQ
Understanding Adware: What You Need to Know
FAQ
Understanding Social Engineering: Techniques and Prevention
FAQ
Show 26 more topics...
2. Cyber threats and attack vectors
Understanding Viruses: Definition and Overview
FAQ
Understanding Cryptojacking - What You Need to Know
FAQ
What is SHA-1? - Secure Hash Algorithm 1 Explained
FAQ
Understanding ECDSA: Elliptic Curve Digital Signature Algorithm
FAQ
Understanding RSA 2048+ Encryption
FAQ
Understanding Ransomware: Definition and Overview
FAQ
Understanding Drive-by Downloads: Risks and Prevention
FAQ
Understanding Side Channel Attacks: Security Threats Explained
FAQ
Understanding SQL Injection: Risks and Prevention
FAQ
Understanding Logic Bombs in Cybersecurity
FAQ
Understanding Rogue Software: Definition and Risks
FAQ
Understanding Hardware Security Modules (HSM)
FAQ
Understanding Cross-Site Scripting (XSS)
FAQ
Exploring Automatic Certificate Management Environment (ACME)
FAQ
Understanding Clickjacking: Definition and Prevention
FAQ
Understanding Credential Stuffing: A Security Threat Explained
FAQ
Understanding MD5 Hash: A Comprehensive Guide
FAQ
Understanding Zero-Day Exploit: Definition and Impact
FAQ
Understanding the Concept of a Backdoor in Technology and Security
FAQ
Understanding Eavesdropping Attacks: Definition and Overview
FAQ
Understanding IETF RFC 8555 (2018): The ACME Protocol
FAQ
Understanding Malware: Types, Risks, and Protection
FAQ
Understanding Cross-Site Request Forgery (CSRF)
FAQ
Understanding Privilege Escalation in Cybersecurity
FAQ
Understanding Session Hijacking: Risks and Prevention
FAQ
Understanding Brute Force Attacks: Definition and Overview
FAQ
Understanding Phishing: Protect Yourself Online
FAQ
Understanding Directory Traversal: Risks and Prevention
FAQ
Understanding OCSP/CRL: Digital Certificate Validation
FAQ
Understanding TLS (Transport Layer Security)
FAQ
Understanding Spear Phishing: Definition and Overview
FAQ
Understanding Certificate Authorities (CAs)
FAQ
Multi-Domain (SAN) Certificates Explained
FAQ
Understanding Buffer Overflow: Definition and Impact
FAQ
Understanding Rootkits: Definition and Overview
FAQ
Understanding Spoofing: Definition and Overview
FAQ
Understanding Certificate Lifecycle Management (CLM)
FAQ
Understanding CLM-Tools: An Overview
FAQ
What is a Keylogger? - A Comprehensive Guide
FAQ
Understanding Whaling: Definition and Overview
FAQ
Show 37 more topics...
3. Protection measures and security tools
Introduction to Public Key Infrastructure (PKI)
FAQ
Understanding Identity and Access Management (IAM)
FAQ
Understanding Multi-Factor Authentication (MFA)
FAQ
Understanding Sandboxing: A Comprehensive Guide
FAQ
Understanding Threat Intelligence Platforms
FAQ
Understanding SHA256: A Comprehensive Guide
FAQ
Understanding Tokenization: A Comprehensive Guide
FAQ
Understanding Backup Solutions: Essential Guide
FAQ
Understanding Disaster Recovery Planning
FAQ
Understanding Unified Threat Management (UTM)
FAQ
Understanding Web Application Firewalls (WAF)
FAQ
Understanding Secure Coding Practices
FAQ
Zero Trust Architecture Explained
FAQ
Understanding Antivirus Software: Protection for Your Devices
FAQ
Understanding Honeypots in Cybersecurity
FAQ
Understanding Email Security Gateways
FAQ
Understanding Security Awareness Training
FAQ
Understanding Deep Packet Inspection (DPI)
FAQ
Behavioral Analytics - Unveiling User Interaction Insights
FAQ
Understanding Network Access Control (NAC)
FAQ
Understanding Cloud Access Security Broker (CASB)
FAQ
Understanding Secure Web Gateway - Essential Guide
FAQ
Understanding Secure Configuration Management
FAQ
Understanding Threat Hunting in Cybersecurity
FAQ
Understanding Mobile Device Management (MDM)
FAQ
Understanding Patch Management Software
FAQ
Understanding Advanced Threat Protection (ATP)
FAQ
Understanding Security Information and Event Management (SIEM)
FAQ
Understanding Phishing Simulation Tools
FAQ
Understanding Encryption Software: Securing Digital Data
FAQ
Understanding Firewalls: Your First Line of Cyber Defense
FAQ
Understanding Next Generation Firewalls (NGFW)
FAQ
Show 29 more topics...
4. Regulatory and Compliance
Understanding the Sarbanes-Oxley Act (SOX)
FAQ
Understanding the California Consumer Privacy Act (CCPA)
FAQ
Understanding GDPR-K: Korea's Personal Information Protection Act
FAQ
Understanding ISO 27001: Information Security Management
FAQ
Understanding FISMA: The Federal Information Security Management Act
FAQ
What is HIPAA? - Health Insurance Portability and Accountability Act Explained
FAQ
Understanding the EU Cybersecurity Act
FAQ
Understanding the ePrivacy Directive
FAQ
Understanding CIS Controls: Essential Cybersecurity Practices
FAQ
Understanding Cybersecurity Maturity Model Certification (CMMC)
FAQ
Understanding Brazil's LGPD - General Data Protection Law
FAQ
Understanding the Gramm-Leach-Bliley Act (GLBA)
FAQ
Understanding PCI DSS: Ensuring Payment Card Security
FAQ
Understanding the NIST Framework
FAQ
Understanding FERPA: Family Educational Rights and Privacy Act
FAQ
Understanding ITIL: Information Technology Infrastructure Library
FAQ
Understanding the Australian Privacy Principles
FAQ
Understanding the CA/Browser Forum
FAQ
Understanding COBIT: A Guide to IT Governance Framework
FAQ
Understanding the UK Data Protection Act 2018
FAQ
Understanding the New York SHIELD Act
FAQ
Show 18 more topics...
5. Industry-specific security
Understanding NERC CIP: Safeguarding North America's Energy Supply
FAQ
Understanding SWIFT Security Standards in Banking
FAQ
Understanding MARS-E: Standards for Healthcare Exchanges
FAQ
Understanding Basel III - Banking Regulation
FAQ
Understanding ISO/IEC 27017: Cloud Service Security Standards
FAQ
Understanding eIDAS: Digital Transactions in the EU
FAQ
Understanding SEC Cybersecurity Guidelines for Securities Trading
FAQ
Understanding TISAX in the Automotive Industry
FAQ
Maritime Cybersecurity Standards in Maritime Shipping - An Overview
FAQ
Understanding GDPR: Data Protection Across All EU Industries
FAQ
Understanding ISO 22301: Business Continuity Management
FAQ
Understanding HITRUST CSF in Healthcare
FAQ
Understanding FAA Cybersecurity Requirements in Aviation
FAQ
Understanding FDA Cybersecurity Guidelines for Medical Devices
FAQ
Understanding CJIS Security Policy for Law Enforcement
FAQ
Automotive Cybersecurity Standards Explained
FAQ
Understanding the Energy Sector Cybersecurity Framework
FAQ
Understanding FINRA Cybersecurity Practices in Financial Services
FAQ
Show 15 more topics...
6. Advanced topics
Understanding Blockchain Security - Essentials and Practices
FAQ
Understanding Machine Learning in Cybersecurity
FAQ
Understanding Behavioral Biometrics: A Comprehensive Guide
FAQ
Understanding Embedded Systems Security
FAQ
Understanding Advanced Persistent Threats (APT)
FAQ
Understanding Quantum Cryptography
FAQ
Understanding Cybersecurity Mesh
FAQ
Understanding Cyber Deception: Strategies and Techniques
FAQ
Extended Detection and Response (XDR) Explained
FAQ
Understanding Cryptography Standards: AES, RSA, ECC
FAQ
Understanding 5G Security: Essentials and Implications
FAQ
The Role of Federated Learning in Enhancing Cybersecurity
FAQ
Understanding Supply Chain Security
FAQ
Understanding Cryptographic Algorithms
FAQ
Understanding Industrial Control Systems Security
FAQ
Understanding Network Traffic Analysis
FAQ
Understanding Micro-segmentation in Network Security
FAQ
Understanding Post Quantum Cryptography
FAQ
Understanding Artificial Intelligence in Cybersecurity
FAQ
Understanding SOAR: Security Orchestration, Automation, and Response
FAQ
Understanding Secure Access Service Edge (SASE)
FAQ
Understanding Cyber Physical Systems Security
FAQ
Understanding Mobile Security: Protecting Your Devices
FAQ
Understanding Anomaly Detection Systems
FAQ
Understanding IoT Security: Protecting Connected Devices
FAQ
Understanding Software Defined Perimeter (SDP)
FAQ
Understanding Homomorphic Encryption
FAQ
Understanding Cloud Security Posture Management (CSPM)
FAQ
Understanding Privacy-Enhancing Technologies (PETs)
FAQ
Show 26 more topics...
EuropeanMX E-Mail Archive
How can I make the settings for archiving and what options are available?
Guide
Are you able to migrate existing archives?
FAQ
How can I search for archived messages?
Guide
How can I calculate the approximate size of the required archive storage? Do you compress archived messages?
FAQ
How can I exclude certain mailboxes from archiving?
Guide
How can I activate journaling in Exchange (2010 - 2019) and Microsoft365?
Guide
How can I set up the archive function for my domain?
Guide
How can I view archived messages, download them or have them resent to me?
Guide
Is it possible to use our admin account to globally access the mail archives for the individual e-mail addresses, or is it necessary to set up a separate account for each e-mail address?
FAQ
Where and how is the archive stored?
FAQ
How can I save storage space? Can I allow messages to expire?
Guide
How can I activate journaling in Postfix (Linux)?
Article
How can I activate journaling in Exim (Linux)?
Guide
Show 10 more topics...
EuropeanMX General
Is a sender completely blocked after sending me a single spam message?
FAQ
What access does EuropeanMX have to the email data?
FAQ
Which providers are not supported?
FAQ
What are the SMTP responses and what do they mean?
FAQ
Is IPv6 supported?
FAQ
How can I read the header of a message?
Guide
Do you scan the messages for viruses?
FAQ
Are your servers located in Germany?
FAQ
What is spam and who sends it?
FAQ
Do your servers support an encrypted connection (TLS)?
FAQ
How do I log in to my Eunetic account and manage it?
Guide
Can custom keywords be placed on a blocklist so that messages containing such a word are blocked?
Guide
In which country are my e-mails stored?
FAQ
My mail server is on a blacklist. Can you help me?
FAQ
Does the admin have full access to the email or is the view in the web console restricted to the header?
FAQ
Show 12 more topics...
EuropeanMX Inbound Filter
How can I report spam that has not been filtered and reached my mailbox as spam?
Guide
What happens if the target server is not reachable?
FAQ
What is a Recipient Callout?
FAQ
How do I have to configure my mail client (Outlook, Thunderbird, etc.) to access the quarantine via IMAP?
Guide
What is HAM? How can I report HAM messages?
Guide
Is it possible to have my e-mails processed exclusively via servers within Europe?
FAQ
What are MX records and which ones should be used for incoming filtering?
Guide
Is LDAP synchronization supported? How can we set this up?
Guide
Does every user need access to his SPAM account or is it only available for the administrator?
FAQ
What settings can I make with regard to my mailboxes?
FAQ
What is the maximum size of an e-mail message?
FAQ
(How) Can I change actions for specific message types?
Guide
What does quarantine mean and how can I access it?
Guide
How long are messages stored in quarantine?
FAQ
What does greylisting mean and how is it handled at EuropeanMX?
FAQ
What is a bounce message? How can I prevent these messages?
Guide
How can I reject messages with certain characters in the recipient address?
Guide
(How) Can I use domain aliasing?
Guide
Which methods are used for filtering?
FAQ
Can I disable the quarantine?
FAQ
Which settings for incoming filtering can I make for my domain?
FAQ
Is there a list of all IP addresses that connect to our mail server for delivery?
FAQ
Can I block dangerous/unwanted file extensions?
Guide
What does score and threshold mean? How are they calculated?
FAQ
What can I do if I still receive spam even though I have a spam filter?
FAQ
Show 22 more topics...
EuropeanMX Installation
[EuropeanMX Quickstart Installation Guide]
Guide
How do I set up PostFix to accept incoming messages only from the EuropeanMX servers?
Guide
How do I set up Cisco ASA based devices to accept incoming messages only from the EuropeanMX servers?
Guide
How do I set up the incoming filter of EuropeanMX for my domain?
Guide
How do I set up Qmail to send messages via the outgoing filter?
Guide
How do I set up the outbound filter of EuropeanMX for my domain?
Guide
How do I set up SmarterMail Configuration (Windows 2012) to accept incoming messages only from EuropeanMX servers?
Guide
How do I set up the inbound filter of EuropeanMX for Exchange Online (Microsoft 365)?
Guide
How do I set up Exchange (2003 - 2016) or Office365 to allow verification of the recipient address for incoming messages?
Guide
How do I set up Exchange (2003 - 2019) to accept incoming messages only from the EuropeanMX servers?
Guide
How do I set up Exim(DirectAdmin) to accept incoming messages only from the EuropeanMX servers?
Guide
How do I create a domain in EuropeanMX?
Guide
How can I apply your MX servers to my DNS settings?
Guide
How do I set up Exim (DirectAdmin) to send messages through the outbound filter?
Guide
How do I set up PostFix to send messages via the outgoing filter?
Guide
How do I set up Exchange Online (Microsoft 365) to send messages via the outgoing filter?
Guide
How do I set up IceWarp to send messages via the outgoing filter?
Guide
How do I set up Qmail to accept incoming messages only from the EuropeanMX servers?
Guide
How can I set that only messages from the EuropeanMX cloud are accepted?
Guide
How do I set up cPanel/WHM to send messages via the outgoing filter?
Guide
How do I set up MailEnable to send messages via the outgoing filter?
Guide
How do I set up Exchange (2000 - 2019) to send messages through the outbound filter?
Guide
How do I set up Cisco IOS based routers to accept incoming messages only from the EuropeanMX servers?
Guide
How do I set up cPanel/WHM to accept incoming messages only from the EuropeanMX servers?
Guide
How do I set up Sendmail to send messages through the outbound filter?
Guide
Is there anything I need to consider when configuring the incoming filter in cPanel?
Guide
How do I set up Kerio to send messages through the outgoing filter?
Guide
How do I configure Google Workspace to use EuropeanMX for my domain?
Guide
Show 25 more topics...
EuropeanMX Order & Contract
What does the Fair-Use Traffic Agreement mean? Is a dynamic monthly billing based on traffic usage also possible?
FAQ
What liability is assumed in the event of data loss?
FAQ
Which payment options does Eunetic offer?
FAQ
How are subdomains and aliases handled?
FAQ
Are the domain and its settings automatically transferred from the trial package to a paid package?
FAQ
How can I test or set up the service free of charge?
Guide
Which contract terms and periods of cancellation must be observed?
FAQ
Show 4 more topics...
EuropeanMX Outbound Filter
Is it possible to send e-mails over several different IP addresses?
FAQ
How can I activate outgoing user authentication if multiple domains send from the same IP?
Guide
What is an ARF report? How can I set it up? Why do I receive such messages?
FAQ
What is DKIM and why should I use it? How does the setup work?
Guide
What is DMARC and what is this record used for?
Guide
Do you send MS-Exchange 2016 absence notes to the recipient?
FAQ
What is an SPF record and how should it be structured?
Guide
How do I set up an outgoing user?
Guide
Is it possible to lock users automatically?
FAQ
I send messages for several domains via one IP address. Is this possible with EuropeanMX?
Guide
How can I use the identification method 'Message header'?
Guide
How can I force the usage of the smart host?
Guide
What is the hostname or IP address of the smart host that I have to enter on my Exchange server?
FAQ
Should an outgoing spam mail be detected by the filter, is there a return value / error code for the e-mail delivery? If yes, how is the SMTP error code?
FAQ
Show 11 more topics...
EuropeanMX Reporting
Can I use Catch-All in combination with EuropeanMX on my server?
FAQ
How can I create Email Scout reports and have them sent to me?
Guide
How can I be informed about blocked incoming messages?
Guide
How can I view or edit automatic or individual Email Scout reports?
Guide
Is there an API for SPAM notification?
FAQ
Are there statistics about the blocked/delivered messages of my domain?
FAQ
Show 3 more topics...
EuropeanMX Web Interface
Can access to the Spampanel be secured with a 2-factor authentication?
FAQ
What do the classifications of messages in the web interface mean?
FAQ
How is the admin panel structured? What are the most important menu items?
FAQ
How to get an overview of the blocked messages?
Guide
Is it possible to determine the traffic consumption per e-mail address?
FAQ
How can I log into the Admin-Panel (web interface of the filter)?
Guide
Is it possible to control traffic usage in the web interface?
FAQ
Are several administrative users on the same domain possible?
FAQ
Are there any examples of how the rules for the block and allow list can be designed?
FAQ
Is there a log?
FAQ
Is there a user administration?
FAQ
Which browsers are supported by EuropeanMX?
FAQ
Show 9 more topics...
EuropeanNS General
What are the advantages of using DNS zone templates?
Article
What is Anycast DNS hosting and how does it differ from traditional DNS hosting?
Article
How can I test EuropeanNS?
Article
How does the EuropeanNS pricing structure scale with my needs?
FAQ
How does DNSSEC improve the security of my DNS infrastructure?
Article
How does Anycast DNS affect the global accessibility and latency of my website?
Article
Show 3 more topics...
EuropeanNS Installation
How can I perform an update for multiple DNS zones at the same time?
Guide
How can I configure EuropeanNS for my domain?
Guide
What is a DNS zone and which DNS types exist?
FAQ
How can I create a DNS template and how can I use it?
Guide
Can I use EuropeanNS as a master or slave name server?
Guide
How can I switch to EuropeanNS if I am already using another DNS provider?
Article
Is there an API that I can use to manage the DNS zones?
FAQ
Show 4 more topics...
EuropeanNS Troubleshooting
Why is my traffic going through a different node?
FAQ
Which information do I need to provide so that a particular behavior can be investigated?
FAQ
I have problems with DNS resolution of my domains. How can I fix the problem?
Guide
How can I restore a DNS zone?
Article
Show 1 more topics...
EuropeanSSL CSR Generator
How do I create a CSR on my own Linux server?
Guide
How do I generate a Certificate Signing Request (CSR) under OpenSSL?
Guide
What's a key pair?
FAQ
What is a Certificate Signing Request (CSR)?
FAQ
What are the advantages and disadvantages of key encryption (cipher)?
FAQ
What does key algorithm mean in relation to the generation of a CSR?
FAQ
What does the hash algorithm (digest) mean for CSR generation?
FAQ
Show 4 more topics...
EuropeanSSL General
Can I test your SSL certificates before buying?
FAQ
Can I protect various sub-domains with a single certificate?
FAQ
Why do EuropeanSSL certificates cost significantly less than other Certification Authorities?
FAQ
Where can I get the free web seal?
FAQ
What is Secure Sockets Layer (SSL)?
FAQ
Which browsers and devices support EuropeanSSL certificates?
FAQ
Can I change the IP address of my domain if I have an ssl certificate on that domain?
FAQ
Heartbleed Bug - How to make your SSL encrypted site secure again.
FAQ
Do I need an SSL certificate for my website?
FAQ
What is encryption?
FAQ
Do I need my own IP address?
Article
What is a certification authority (CA)?
FAQ
Show 9 more topics...
EuropeanSSL Install
How do I copy an SSL certificate from one Windows server to another Windows server?
Guide
How do I install an SSL certificate on a Synology NAS?
Article
How can I install root and intermediate certificates under Microsoft IIS 5.x/6.x?
Guide
How do I install my SSL certificate on IIS7 (Windows Server 2008)?
Guide
How do I install my SSL certificate on IIS5 and 6?
Guide
How can I check if my SSL certificate is installed correctly?
FAQ
Do I need to install all the certificates that I received?
FAQ
How do I install my SSL certificate on the Apache web server?
Guide
How do I install my SSL certificate on Exim 4.x?
Guide
Why did I receive a zip file with several files from you by e-mail?
FAQ
How can I create a PFX file?
Article
Show 8 more topics...
EuropeanSSL Order transaction
Can I order a SSL certificate for an IDN domain (domain with Umlaut) as well?
FAQ
I only want a trial certificate, why does this type also have to be validated?
FAQ
How does the validation of an EV certificate at EuropeanSSL work (extended validation)?
Guide
How does the validation of a Premium certificate at EuropeanSSL work (organization validation)?
Guide
How can I renew my existing certificate?
Guide
How does the validation of a starter certificate at EuropeanSSL work (domain validation)?
Guide
What is a CAA entry and how does it work?
FAQ
How does the validation of a code signing certificate work?
Article
Show 5 more topics...
EuropeanSSL S/MIME-Certificates
How can I implement my e-mail certificate (S/MIME) in Outlook 2003 and sign/encrypt my e-mails?
Guide
How can I implement my email certificate (S/MIME) in Mac OS X Mail / Apple Mail and sign/encrypt my email?
Guide
How can I implement my e-mail certificate (S/MIME) in Mozilla Thunderbird and sign/encrypt my e-mails?
Guide
How can I implement my e-mail certificate (S/MIME) in Outlook 2016 and sign/encrypt my e-mails?
Guide
How can I implement my e-mail certificate (S/MIME) in Outlook 2010/2013 and sign/encrypt my e-mails?
Guide
How can I implement my e-mail certificate (S/MIME) in iOS and sign/encrypt my e-mails?
Guide
How can I order an S/MIME certificate for multiple e-mail addresses?
Guide
What is the difference between Strict and Multipurpose?
FAQ
Show 5 more topics...
EuropeanSSL Troubleshooting
The CSR cannot be decoded or is invalid
FAQ
I have a new server or have switched to a different provider, how do I transfer the SSL certificate?
FAQ
The certificate is not recognized by my mobile device.
FAQ
My software indicates that an intermediate certificate has expired since 30.05.2020. How can I solve this?
FAQ
Fixing the SHA2 error on Windows Server 2003 and XP
FAQ
Why do I get the message 'PRE-SIGN FAILED!!!'?
FAQ
I get the error message 'Unsupported Keysize'. What do I have to do?
FAQ
I get the error message 'cert/key mismatch'. What does this mean?
FAQ
Why do I not get a green address bar in Chrome and Firefox despite having an EV certificate?
FAQ
How do I obtain a certificate with CRL extension?
Article
Show 7 more topics...
General
How does a firewall protect my website?
Article
Which scans can EuropeanSEC perform?
FAQ
How can I access EuropeanSEC?
Guide
Installation
How can I set up and activate EuropeanSEC for my website?
Guide
Which IP addresses do I need to allow in my firewall to avoid a blockade from EuropeanSEC?
FAQ
How can I set up my own certificate in EuropeanSEC?
Guide
LEI General
What are level 1 or level 2 data?
Article
I have an LEI number but the bank says it is invalid or inactive.
FAQ
Is a GbR subject to LEI?
FAQ
What is the importance of an LEI number in the financial sector?
Article
What is an LEI?
FAQ
What do we have to do if the company data in the official registration has changed?
FAQ
Who is not eligible to apply for an LEI number?
FAQ
How long is an LEI valid?
FAQ
Verification documents
Article
How can I find out if an LEI number has expired or is inactive?
FAQ
Who can apply for an LEI?
Article
Who is required to use an LEI?
FAQ
How can I search by LEI number or company?
FAQ
What is the Policy Conformity Flag?
Article
Show 11 more topics...
LEI ordering, renewal and transfer
How much does an LEI number cost?
FAQ
How can I register an LEI?
Guide
How long does LEI application take?
FAQ
How can I transfer my LEI number?
Guide
How can I reactivate my expired LEI number?
Guide
Where can I apply for an LEI number?
FAQ
What happens if an LEI code is not renewed?
FAQ
How can I renew my LEI number?
Guide
3 reasons why you should never let your LEI expire.
Article
Show 6 more topics...
Troubleshooting
What do the error messages of the firewall or the CDN mean?
FAQ