Kaspersky Lab kaspersky anti-virus 5.6 for sendmail with milter api Mode D'Emploi
![Kaspersky Lab](https://files.manualsbrain.com/attachments/6297ae902b815dbfefa39dfad6abb3e11a947bcf/common/fit/150/50/1d8636c29cd4d405860e4e56247e7bf0c11699ee24e447aad6093cb86324/brand_logo.png)
Contents
CHAPTER 1. KASPERSKY ANTI-VIRUS
®
FOR SENDMAIL WITH MILTER API....... 6
1.1. What’s new in version 5.6 ..................................................................................... 7
1.2. Hardware and software system requirements ..................................................... 7
1.3. Licensing policies................................................................................................... 9
1.4. Distribution kit ........................................................................................................ 9
1.5. Help desk for registered users ............................................................................ 10
1.6. Adopted conventions........................................................................................... 10
CHAPTER 2. TYPICAL DEPLOYMENT SCENARIOS ............................................... 13
2.1. Installing Kaspersky Anti-Virus on the same server with your mail system ...... 13
2.2. Installing Kaspersky Anti-Virus on a dedicated server....................................... 16
2.3. Installing Kaspersky Anti-Virus as a filter (single or additional).......................... 18
2.4. Installing Kaspersky Anti-Virus as Milter filter for several Sendmail servers..... 18
CHAPTER 3. INSTALLATION AND UNINSTALLATION OF KASPERSKY ANTI-
VIRUS ......................................................................................................................... 21
3.1. Software installation on a server running Linux.................................................. 21
3.2. Software installation on a server running FreeBSD or OpenBSD..................... 22
3.3. Installation process.............................................................................................. 22
3.4. Post-install setup ................................................................................................. 23
3.5. Location of application files and directories ........................................................ 24
3.6. Software uninstall ................................................................................................ 26
3.7. Uninstallation process ......................................................................................... 26
CHAPTER 4. THE PRINCIPLES OF APPLICATION OPERATION........................... 28
4.1. General message processing algorithm............................................................. 28
4.2. Creating groups for message processing........................................................... 29
4.3. Message status ................................................................................................... 31
4.4. Assigning actions for mail messages ................................................................. 31
CHAPTER 5. PRESET PROTECTION PROFILES..................................................... 33
5.1. High overall security profile ................................................................................. 33
5.2. High effective security profile .............................................................................. 34