Thank you both for your replies and comments.
Greenman, that's as I thought, but it's only by following up possible vulnerabilities that I educate myself. I'm not seriously worried at this stage, but if I can make things more secure, why not do so?
Sellerie, it had occurred to me that an application to do what fail2ban does would be useful, but I wasn't aware of it. Find the right search string for something you don't know the name of is always hard, but starting from fail2ban I've found several similar for Windows, and will test them. I'm sorry, but I don't follow what you mean by direct access. Regarding a VPN, are you suggesting I host a VPN on the server so that IMAP clients must log in to the VPN?
<p>Thank you both for your replies and comments.
</p><p>Greenman, that's as I thought, but it's only by following up possible vulnerabilities that I educate myself. I'm not seriously worried at this stage, but if I can make things more secure, why not do so?</p><p>Sellerie, it had occurred to me that an application to do what fail2ban does would be useful, but I wasn't aware of it. Find the right search string for something you don't know the name of is always hard, but starting from fail2ban I've found several similar for Windows, and will test them. I'm sorry, but I don't follow what you mean by direct access. Regarding a VPN, are you suggesting I host a VPN on the server so that IMAP clients must log in to the VPN?
</p>