Thank you for choosing Plexicomm Internet Solutions. To protect your computer and home network from viruses and unwanted intrusion it’s important to keep your computer applications and virus software up-to-date. Please, take a few minutes to read and follow the guidelines below to see if they apply to your home or business computers. This will ensure a reasonable level of security while browsing the web and using E-Mail.

Basic Setup

While you can directly connect your computer to the Internet connection, we strongly recommend installing a router as the first device on your home network. A router will provide a good first layer of protection between your devices and the other users on the Internet.

When setting up or adding your own computers, routers, wireless routers or other devices, set the IP (Internet Protocol) address option to automatically obtain DHCP. If you need assistance in doing this, please contact Technical Support at 866-759-4678.

If you’re having difficulty connecting after changing settings, RESTART your computer and/or other devices. It is best to shutdown your computers using the ‘Shutdown’ command. Other network devices typically have no on/off switch and you can simply unplug the device from the power source. For more specific instructions, refer to the computer or device users’ manuals or contact Plexicomm Technical Support.

Install Virus Protection

We recommend that all customers install a virus protection package on their computers. You can find many options for virus protection commercial or for free online. Customers have reported good luck with AVG: Anti-Virus Free Editions or Avast: Free AntiVirus.

Make sure to keep your virus software up-to-date. Viruses can infect your computer through bad links on the web or through E-Mail attachments. It is a common practice for hackers to infect one person’s computer and then automatically send E-Mails with a copy of the virus to everyone in their address list, often without their knowledge.

As a guideline, whenever an E-Mail message is received that contains an attachment or vague message with a link to another site, ask yourself, "does this seem like a message I would receive from this person?". Exercise caution, and whenever possible, check with that person to see if they actually sent you the message. If you do decide to open an attachment and are presented with an option to "enable macros" chances are very good that enabling them will cause a virus infection. In most cases you should close the document immediately.

Avoid browsing any suspicious sites or clicking on any messages that pop up unless you are sure the source is trusted. If you are unsure about how to deal with a situation it's best to just close your web browser until it can be determined if the source is legitimate.

Install Antispyware/Antimalware Software

Spyware and Malware programs are only slightly less destructive than normal computer viruses. In many cases spyware and malware programs are used to trick you into downloading additional malicious programs and viruses. The less malicious programs still can consume system resources and display unwanted pop-up ads while you browse the internet.

We recommend either Spybot 2 from or Windows Defender from Microsoft for protection against spyware and malware. Windows Defender is integrated into Windows 10, and by default should already be active.

Firewall Settings and Operating System Updates

Finally, you will want to enable your systems software Firewall and turn on Automatic Updates for your Operating System. Creating a firewall is critical to the health of your PC and your home network. A firewall helps defend your computer against intruders who try to access your computer over the internet. It is also very important to keep your computer up-to-date with the latest patches from Microsoft, Apple or for a Linux distribution. These patches are free and keep your computer updated to protect it from hackers and viruses that can infect your machine using older software vulnerabilities.

You should refer to the software or hardware manufacturer’s website for more detailed information.

For example, Microsoft users can go to to learn more about Safety and Security for Microsoft Windows Products.

E-Mail Setup and WebMail

E-Mail is most commonly accessed in 2 ways.

Option 1. Open your favorite internet bowser (Chrome, Edge, Mozilla, Safari, etc) and log into any existing mail service such as Yahoo Mail or Google's GMail. This option requires only a username and password. No additional configuration is needed.

You may also use the IceWarp WebClient, which Plexicomm makes available to it's customers. Just click the web mail link below and the IceWarp client will automatically display the login page.

Plexicomm's IceWarp Web Client:
Review the IceWarp documentation: IceWarp User Guide

Plexicomm Webmail Logon

Option 2. Use the E-Mail client application on your computer or device (Android, iPhone, iPad, etc.). Your E-Mall application may be able to determine some or all of these settings automatically. If you're not using Plexicomm for your E-Mail, contact your E-Mail provider for their specific settings.

The following table contains the information needed to connect your computer, tablet or phone to the Plexicomm E-Mail system. The fields requested might vary slightly depending on the E-Mail application being used. Note that there are always individual settings for receiving (incoming) and sending (outgoing) mail.

Setting Value
E-Mail Address Your E-Mail address.

Description What you'd like to call your account.

Example: My Bingo Mail
Username/Password The full E-Mail address and password used to access your account.

Example User:
Incoming Server Plexicomm supports both IMAP and POP3 for receiving E-Mail. IMAP is recommended, especially if you will be accessing your mail from more than one device.

Server Name (both IMAP and POP3):

Security (both IMAP and POP3):
SSL/TLS (recommended) or NONE

Authentication (both IMAP and POP3):

IMAP=143, POP3=110
Outgoing Server Typically, this is the SMTP server.

Server Name:

SSL/TLS (recommended) or NONE

Port (based on Security choice):
SSL/TLS=465, NONE=587

Server requires secure connection (SSL):

Server requires authentication (or sign-in):

Authentication type:

Same password to send and receive: