To deploy StealthMail on your Azure cloud you will need to go through the wizard and fill out requested fields.

Initial

Fill out Application (Client) ID, Tenant (Directory) ID and Application Secret. These values you got and saved after registering the StealthMail application in Azure Active Directory.

Next Company email domain - it is a main company domain that you set after domain validation on StealthMail website.

StealthMail authorization code - is code you have got on the last step of deployment guide on StealthMail website.

Step-1

Subscription - If you have several active subscriptions pick the one within which you to deploy StealthMail.

Resource group - click Create new - to create new resource group especially for StealthMail, it is important.

Location - pick the region that is closer to your actual location, this will ensure the best possible connection speeds.

Step-2

Virtual Machines

Deployment Type - Pick Distributed option to get better performance. It will use 3 VM for StealthMail deployment.

StealthMail Virtual Machines - Pick the size of the cloud VM, for about 50 users B2s would be enough, for more user pick more powerful machines.

Step-3

Admin username and Admin password - Specify StealthMail Virtual Machines administrator name and password. These credentials will be used to log in to virtual machines and manage them if required.

Secure Gateway to StealthMail VMs - If enabled allows you to configure a secure VPN to StealthMail infrastructure.

Read more about VPN gateway and its configuration here https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpngateways

Step-4

Database Configuration

Database admin username and Password - Credentials to access StealthMail database

Step-5

Management tool

StealthMail Management Tool is an application developed for Security officers and company administers. It allows managing StealthMail users e.g. change passwords, set limits on devices and get information about them.

Set credentials for your company’s security officer and administrator for StealthMail Management tool.

Step-6

That’s it. You may proceed to StealthMail deployment and Click OK.

If client applications have issues with connection to the StealthMail service after the deployment please refer to this troubleshooting page.

Step-7
Info

Мы используем файлы cookie, чтобы улучшить Ваше взаимодействие с сайтом.