ESET MAIL SECURITY - FOR LINUX BSD AND SOLARIS Installation Manual

Browse online or download Installation Manual for General utility software ESET MAIL SECURITY - FOR LINUX BSD AND SOLARIS. ESET MAIL SECURITY - FOR LINUX BSD AND SOLARIS Installation manual User Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - ESET MAIL SECURITY

ESET MAIL SECURITY Installation Manual and User Guide (intended for product version 4.0 and higher) Linux, BSD and Solaris

Page 2 - Contents

10@ETCDIR@/licenseThis directory is used to store the product(s) license key(s) you have acquired from your vendor. Note that the ESETS daemon willche

Page 3 - 1. Introduction

116. Integration with Email Messaging SystemThis chapter describes the integration of ESET Mail Security with a variety of known email messaging syste

Page 4

126.1 Bi-directional email message scanning in MTABi-directional email message scanning mode allows the user to scan inbound and outbound email mess

Page 5

13approval. The backup configuration files should be reimplemented after uninstalling. Detailed steps for all possible scenariosare described in appen

Page 6 - 3. System requirements

14Figure 5-3. Rule Settings.6.5.2 Scanning email messages using AMaViSAMaViS (A Mail Virus Scanner) is a tool that interfaces your MTA with severa

Page 7 - 4. Installation

156.5.3 Scanning email messages using Novell GroupWiseNovell GroupWise is a messaging and collaborative software platform that also supports email

Page 8

167. Important ESET Mail Security mechanisms7.1 Handle Object PolicyThe Handle Object Policy (see figure 6-1) mechanism provides filtering for scann

Page 9 - 5. Architecture Overview

17[smtp]agent_enabled = yeslisten_addr = "localhost"listen_port = 2526server_addr = "localhost"server_port = 2525action_av = "

Page 10

18directory.Regular updates of the anti-spam database can be administered using tasks in Scheduler. Anti-spam functionality can also beconfigured usin

Page 11

19ignored_ip_listList of ignored IP addresses. You can specify IPs that should be ignored during Real-time Blackhole List(RBL) checks. You should incl

Page 12 - @SBINDIR@/esets_setup

ESET MAIL SECURITYCopyright ©2013 by ESET, spol. s r. o.ESET Mail Security was developed by ESET, spol. s r. o.For more information visit www.eset.com

Page 13

20Value from 0 to 100. Influences overall spam score. Standard value is 100, i.e. in case of a positivecheck the message is assigned the spam score of

Page 14

21Other settingsenable_spfThis option enables/disables validation by SPF (Sender Policy Framework). This validationmethod checks the public rules of a

Page 15 - /etc/init.d/grpwise restart

22The following event names can be used in place of the datespec option:start – Daemon startup.startonce – Daemon startup but at most once a day.engin

Page 16

23Important: Make sure you click the Save changes button after making any changes in the Configuration section of the webinterface to save your new se

Page 17 - 7.4 Anti-Spam control

24Using the web interface:Figure 6-3. ESETS - Configuration > SMTP Agent.Always remember to save your new configuration by clicking Save changes. T

Page 18

257.7.3 SchedulerYou can manage the scheduler tasks either via ESET configuration file (see chapter Scheduler) or using the web interface.Figure 6

Page 19

267.7.4 StatisticsYou can view statistics for all of active ESETS agents here. The Statistics summary refreshes every 10 seconds.Figure 6-6. ESETS

Page 20

277.8.1 Remote Administration usage exampleBefore commencing any remote administration process, ensure your system fulfills the three following pr

Page 21 - 7.6 Scheduler

28Figure 6-8. ERA Configuration Editor.The New Task context menu contains On-demand scanning options (enabled/disabled cleaning).You can select the de

Page 22 - 7.7 Web Interface

297.9 LoggingESETS provides system daemon logging via syslog. Syslog is a standard for logging program messages and can be used to logsystem events

Page 23 - 7.7.1 License management

31. IntroductionThank you for using ESET Mail Security - the premier security system for Linux, BSD and Solaris. ESET's state-of-the-art scanning

Page 24 - Using the web interface:

30The following commands are available only for ESET Mail Security.esets_cgpExternal filter plug-in for CommuniGate Pro, which reads e-mail filenames

Page 25 - 7.7.3 Scheduler

318. ESET Security system update8.1 ESETS update utilityTo maintain the effectiveness of ESET Mail Security, the virus signature database must be ke

Page 26 - 7.8 Remote Administration

329. Let us knowWe hope this guide has provided you with a thorough understanding of the requirements for ESET Mail Security installation,configuratio

Page 27 - Figure 6-8. ERA Console

3310. Appendix A. ESETS setup and configuration10.1 Setting ESETS for MTA PostfixInbound email message scanningWarning: This installation is not com

Page 28

3410.2 Setting ESETS for MTA SendmailInbound email message scanningWarning: This installation is not compatible with SELinux. Either disable SELinux

Page 29 - 7.10 Command-line scripts

35This will start Qmail using esets_mda for local deliveries. However, the original delivery specification is passed to qmail-localthrough esets_mda.

Page 30

36or, if you are using FreeBSD, this parameter:mda_path = "/usr/local/sbin/exim"where /usr/sbin/exim (or /usr/local/sbin/exim) is the full p

Page 31 - 8.1 ESETS update utility

37Note: According to the Handle Object Policy, configuration options in [gwia] section such as ‘action_av’, ‘action_av_infected’,‘action_as’ and their

Page 32 - 9. Let us know

3810.10 Setting ESETS for scanning of IMAP communicationThe IMAP communication scanning is performed using the esets_imap daemon. In the [imap] sect

Page 33

3911. Appendix B. PHP LicenseThe PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved.Redistribution and use in sour

Page 34

4Multiple logging levelsMultiple logging levels can be configured to get information about system activity and infiltrations.Web interfaceConfiguratio

Page 35

52. Terminology and abbreviationsIn this section, we will review the terms and abbreviations used in this document. Note that boldface font is reserve

Page 36

63. System requirementsThe following hardware requirements must be met before the installation process in order to run ESET Mail Security properly:250

Page 37

74. InstallationAfter purchasing ESET Mail Security, you will receive your authorization data (Username, Password and license key). Thesecredentials i

Page 38

8Enter your Username and Password information into the global section of the ESET configuration file using a text editor:vi @ETCDIR@/esets.cfgEdit the

Page 39 - 11. Appendix B. PHP License

95. Architecture OverviewOnce ESET Mail Security is successfully installed, you should become familiar with its architecture.Figure 4-1. Structure of

Comments to this Manuals

No comments