Benutzerhandbuch (AVGREN25-49)Inhaltsverzeichnis1 Introduction91.1 Introduction to GFI MailSecurity91.2 Using this manual91.2.1 Manual structure91.2.2 Terms and conventions used in this manual102 About GFI MailSecurity112.1 GFI MailSecurity components11GFI MailSecurity scan engine11GFI MailSecurity web interface11GFI MailSecurity Switchboard112.2 How GFI MailSecurity works112.2.1 Incoming email112.2.2 Outgoing email122.2.3 Other features132.3 Licensing133 Monitoring the GFI MailSecurity status153.1 Introduction153.2 Status and statistical information16Services17Quarantine Statistics17Email Statistics183.3 Email processing logs19Filtering the email processing logs203.4 Virus scanning engine updates214 General settings234.1 Introduction234.2 Configuring the administrator’s email address234.3 Configuring proxy server settings for automatic updates244.4 Adding Local Domains254.5 SMTP server bindings264.6 Managing local users274.6.1 GFI MailSecurity installed in Active Directory mode27GFI MailSecurity installed on the Microsoft Exchange machine274.6.2 GFI MailSecurity installed in SMTP mode27To add a new local user:28To remove a local user:285 Configuring Virus Scanning Engines295.1 Introduction295.2 AVG configuration30AVG web site315.2.1 AVG LinkScanner315.3 Kaspersky configuration33Kaspersky web site345.4 BitDefender configuration35BitDefender website365.5 McAfee configuration37McAfee website385.6 Norman configuration39Norman website405.7 Virus scanner actions415.8 Virus scanner updates43Downloading anti-virus updates manually445.9 Setting the Virus Scanning Engines scan sequence445.10 Configuring Virus Scanning optimizations455.11 Configuring Information Store Scanning455.11.1 Information Store Scanning455.11.2 VSAPI settings466 Configuring other mail filters496.1 Content Filtering496.1.1 Introduction496.1.2 Creating a Content Filtering rule50Step 1: Configuring basic rule settings50Step 2: Configuring terms to block51Step 3: Configuring the actions to take on detected emails53Step 4: Specifying the users to apply this rule to546.1.3 Enabling/disabling rules566.1.4 Removing content filtering rules566.1.5 Modifying an existing rule576.1.6 Changing rule priority576.2 Attachment Filtering576.2.1 Introduction576.2.2 Creating an Attachment Filtering rule596.2.3 Enabling/disabling rules636.2.4 Removing attachment rules646.2.5 Modifying an existing rule646.2.6 Changing the rule priority656.3 Decompression engine656.3.1 Introduction656.3.2 Configuring the decompression engine filters66Check password protected archives66Check corrupted archives67Check for recursive archives68Check size of uncompressed files in archives69Check for amount of files in archives70Scan within archives (attachment checking)726.3.3 Enable/disable decompression filters736.4 The Trojan & Executable Scanner736.4.1 Introduction73What is a Trojan horse?73How does the Trojan & Executable Scanner work?736.4.2 Configuring the Trojan & Executable Scanner746.5 The Email Exploit Engine776.5.1 Introduction77What is an exploit?77What is an e-mail exploit?77Difference between Anti-Virus software & Email Exploit Detection software776.5.2 Configuring the Email Exploit Engine776.5.3 Enabling/Disabling email exploits816.6 The HTML Sanitizer826.6.1 Introduction82Why remove HTML scripts?836.6.2 Configuring the HTML Sanitizer836.6.3 HTML Sanitizer Whitelist83Adding an HTML Sanitizer Whitelist entry84Deleting an HTML Sanitizer Whitelist entry847 Quarantine857.1 Introduction857.2 The Quarantine Store857.2.1 Searching for quarantined emails85Content search86Search by date877.2.2 Search Folders87Creating a new Search Folder87Modifying a Search Folder90Deleting Search Folders917.2.3 Approving quarantined emails91Sanitize and Approve927.2.4 Permanently deleting quarantined emails92Delete and Notify937.2.5 Rescanning quarantined emails937.2.6 Viewing the full security threat report of an email947.2.7 Downloading quarantined email957.3 Quarantine Action Forms957.3.1 Enabling Quarantine Action Forms957.3.2 Reviewing quarantined emails967.3.3 Logging quarantine actions987.4 Quarantine RSS feeds987.4.1 Enabling Quarantine RSS Feeds997.4.2 Subscribing to Quarantine RSS feeds100Subscribing to all enabled Quarantine RSS feeds100Subscribing to a search folder Quarantine RSS feed1017.4.3 Securing access to the GFI MailSecurity Quarantine RSS feeds1017.5 Directory Harvesting1027.5.1 Configuring Directory Harvesting1028 Reporting1058.1 Introduction1058.2 Enabling reporting1058.3 Configuring the database105Configuring a Microsoft Access database backend1068.3.1 Configuring a Microsoft SQL Server database backend1069 Miscellaneous1099.1 Patch Checking1099.2 Version Information1109.3 Tracing1109.4 Failed emails1119.4.1 Reprocessing legitimate emails that fail112GFI MailSecurity installed on Microsoft Exchange Server 2007/2010112GFI MailSecurity installed on Microsoft Exchange Server 2003112GFI MailSecurity installed on Gateway server1129.4.2 Failed emails notifications1129.5 Notification templates113Notifications113Templates1149.5.1 Customizing notification templates114Variables used in XSL-based notification templates1149.6 Monitoring Virus Scanning API1159.6.1 Performance counter in Windows 2003 Server1159.6.2 Performance counter in Windows 2008 Server1169.6.3 Performance monitor counters11810 Troubleshooting12110.1 Introduction12110.2 Knowledge Base12110.3 Web Forum12110.4 Common issues12110.5 Request technical support12210.6 Build notifications12211 Glossary123Größe: 1,77 MBSeiten: 126Language: EnglishHandbuch öffnen