ESET MAIL SECURITY Installation Manual and User Guide (intended for product version 4.0 and higher) Linux, BSD and Solaris
10@ETCDIR@/licenseThis directory is used to store the product(s) license key(s) you have acquired from your vendor. Note that the ESETS daemon willche
116. Integration with Email Messaging SystemThis chapter describes the integration of ESET Mail Security with a variety of known email messaging syste
126.1 Bi-directional email message scanning in MTABi-directional email message scanning mode allows the user to scan inbound and outbound email mess
13approval. The backup configuration files should be reimplemented after uninstalling. Detailed steps for all possible scenariosare described in appen
14Figure 5-3. Rule Settings.6.5.2 Scanning email messages using AMaViSAMaViS (A Mail Virus Scanner) is a tool that interfaces your MTA with severa
156.5.3 Scanning email messages using Novell GroupWiseNovell GroupWise is a messaging and collaborative software platform that also supports email
167. Important ESET Mail Security mechanisms7.1 Handle Object PolicyThe Handle Object Policy (see figure 6-1) mechanism provides filtering for scann
17[smtp]agent_enabled = yeslisten_addr = "localhost"listen_port = 2526server_addr = "localhost"server_port = 2525action_av = "
18directory.Regular updates of the anti-spam database can be administered using tasks in Scheduler. Anti-spam functionality can also beconfigured usin
19ignored_ip_listList of ignored IP addresses. You can specify IPs that should be ignored during Real-time Blackhole List(RBL) checks. You should incl
ESET MAIL SECURITYCopyright ©2013 by ESET, spol. s r. o.ESET Mail Security was developed by ESET, spol. s r. o.For more information visit www.eset.com
20Value from 0 to 100. Influences overall spam score. Standard value is 100, i.e. in case of a positivecheck the message is assigned the spam score of
21Other settingsenable_spfThis option enables/disables validation by SPF (Sender Policy Framework). This validationmethod checks the public rules of a
22The following event names can be used in place of the datespec option:start – Daemon startup.startonce – Daemon startup but at most once a day.engin
23Important: Make sure you click the Save changes button after making any changes in the Configuration section of the webinterface to save your new se
24Using the web interface:Figure 6-3. ESETS - Configuration > SMTP Agent.Always remember to save your new configuration by clicking Save changes. T
257.7.3 SchedulerYou can manage the scheduler tasks either via ESET configuration file (see chapter Scheduler) or using the web interface.Figure 6
267.7.4 StatisticsYou can view statistics for all of active ESETS agents here. The Statistics summary refreshes every 10 seconds.Figure 6-6. ESETS
277.8.1 Remote Administration usage exampleBefore commencing any remote administration process, ensure your system fulfills the three following pr
28Figure 6-8. ERA Configuration Editor.The New Task context menu contains On-demand scanning options (enabled/disabled cleaning).You can select the de
297.9 LoggingESETS provides system daemon logging via syslog. Syslog is a standard for logging program messages and can be used to logsystem events
31. IntroductionThank you for using ESET Mail Security - the premier security system for Linux, BSD and Solaris. ESET's state-of-the-art scanning
30The following commands are available only for ESET Mail Security.esets_cgpExternal filter plug-in for CommuniGate Pro, which reads e-mail filenames
318. ESET Security system update8.1 ESETS update utilityTo maintain the effectiveness of ESET Mail Security, the virus signature database must be ke
329. Let us knowWe hope this guide has provided you with a thorough understanding of the requirements for ESET Mail Security installation,configuratio
3310. Appendix A. ESETS setup and configuration10.1 Setting ESETS for MTA PostfixInbound email message scanningWarning: This installation is not com
3410.2 Setting ESETS for MTA SendmailInbound email message scanningWarning: This installation is not compatible with SELinux. Either disable SELinux
35This will start Qmail using esets_mda for local deliveries. However, the original delivery specification is passed to qmail-localthrough esets_mda.
36or, if you are using FreeBSD, this parameter:mda_path = "/usr/local/sbin/exim"where /usr/sbin/exim (or /usr/local/sbin/exim) is the full p
37Note: According to the Handle Object Policy, configuration options in [gwia] section such as ‘action_av’, ‘action_av_infected’,‘action_as’ and their
3810.10 Setting ESETS for scanning of IMAP communicationThe IMAP communication scanning is performed using the esets_imap daemon. In the [imap] sect
3911. Appendix B. PHP LicenseThe PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved.Redistribution and use in sour
4Multiple logging levelsMultiple logging levels can be configured to get information about system activity and infiltrations.Web interfaceConfiguratio
52. Terminology and abbreviationsIn this section, we will review the terms and abbreviations used in this document. Note that boldface font is reserve
63. System requirementsThe following hardware requirements must be met before the installation process in order to run ESET Mail Security properly:250
74. InstallationAfter purchasing ESET Mail Security, you will receive your authorization data (Username, Password and license key). Thesecredentials i
8Enter your Username and Password information into the global section of the ESET configuration file using a text editor:vi @ETCDIR@/esets.cfgEdit the
95. Architecture OverviewOnce ESET Mail Security is successfully installed, you should become familiar with its architecture.Figure 4-1. Structure of
Comments to this Manuals