Re: Filtering the webmail / attack scans:
All of that extra "scanning" noise for stuff like PHP, wordpress crap, .env files, etc... Those are broad-range "scanning" attacks seeing what you're running. Those have been hitting servers long before the SM vulnerabilities -- that's literally script kiddies scanning servers looking for common apps or vulnerabilities. That same scanning hits our public web servers on a level that rivals the AI bots in scraping... Our WAF logs hits to certain files in those scans they try to hit and then our IDS dq's the IPs for minimum 90 days... Running a third party WAF at the proxy server level in either IIS or Apache would be the best way to protect against most of that garbage.
Re: Smartermail "backports" / older versions:
There won't be backports of fixes because of the rolling release schedule, and the legacy versions are essentially useless because they're vulnerable -- just to answer two notes.
MailEnable survivor / convert --