Hello!
You would be better off by restricting users ability to initiate SMTP and POP3/IMAP protocols outside the company internal network. Leave the ports associated with email traffic open in firewall towards internet for your corporate mail server only.
Note that it still leaves open the possibility to create in Pmail another identity (of a coworker for example) and send emails via coproprate mail server by pretending to be somebody else. So You should also look how to close down this possibility in your corporate smtp server as well.
<p>Hello!
</p><p>You would be better off by restricting users ability to initiate SMTP and POP3/IMAP protocols outside the company internal network. Leave the ports associated with email traffic open in firewall towards internet for your corporate mail server only. </p><p>Note that it still leaves open the possibility to create in Pmail another identity (of a coworker for example) and send emails via coproprate mail server by pretending to be somebody else. So You should also look how to close down this possibility in your corporate smtp server as well.&nbsp;
</p><p>&nbsp;</p>