ESET MAIL SECURITY - FOR LINUX BSD AND SOLARIS Installationshandbuch

Stöbern Sie online oder laden Sie Installationshandbuch nach Allgemeine Dienstprogramm-Software ESET MAIL SECURITY - FOR LINUX BSD AND SOLARIS herunter. ESET MAIL SECURITY - FOR LINUX BSD AND SOLARIS Installation manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - ESET MAIL SECURITY

ESET MAIL SECURITY Installation Manual and User Guide (intended for product version 4.0 and higher) Linux, BSD and Solaris

Seite 2 - Contents

10@ETCDIR@/licenseThis directory is used to store the product(s) license key(s) you have acquired from your vendor. Note that the ESETS daemon willche

Seite 3 - 1. Introduction

116. Integration with Email Messaging SystemThis chapter describes the integration of ESET Mail Security with a variety of known email messaging syste

Seite 4

126.1 Bi-directional email message scanning in MTABi-directional email message scanning mode allows the user to scan inbound and outbound email mess

Seite 5

13approval. The backup configuration files should be reimplemented after uninstalling. Detailed steps for all possible scenariosare described in appen

Seite 6 - 3. System requirements

14Figure 5-3. Rule Settings.6.5.2 Scanning email messages using AMaViSAMaViS (A Mail Virus Scanner) is a tool that interfaces your MTA with severa

Seite 7 - 4. Installation

156.5.3 Scanning email messages using Novell GroupWiseNovell GroupWise is a messaging and collaborative software platform that also supports email

Seite 8

167. Important ESET Mail Security mechanisms7.1 Handle Object PolicyThe Handle Object Policy (see figure 6-1) mechanism provides filtering for scann

Seite 9 - 5. Architecture Overview

17[smtp]agent_enabled = yeslisten_addr = "localhost"listen_port = 2526server_addr = "localhost"server_port = 2525action_av = "

Seite 10

18directory.Regular updates of the anti-spam database can be administered using tasks in Scheduler. Anti-spam functionality can also beconfigured usin

Seite 11

19ignored_ip_listList of ignored IP addresses. You can specify IPs that should be ignored during Real-time Blackhole List(RBL) checks. You should incl

Seite 12 - @SBINDIR@/esets_setup

ESET MAIL SECURITYCopyright ©2013 by ESET, spol. s r. o.ESET Mail Security was developed by ESET, spol. s r. o.For more information visit www.eset.com

Seite 13

20Value from 0 to 100. Influences overall spam score. Standard value is 100, i.e. in case of a positivecheck the message is assigned the spam score of

Seite 14

21Other settingsenable_spfThis option enables/disables validation by SPF (Sender Policy Framework). This validationmethod checks the public rules of a

Seite 15 - /etc/init.d/grpwise restart

22The following event names can be used in place of the datespec option:start – Daemon startup.startonce – Daemon startup but at most once a day.engin

Seite 16

23Important: Make sure you click the Save changes button after making any changes in the Configuration section of the webinterface to save your new se

Seite 17 - 7.4 Anti-Spam control

24Using the web interface:Figure 6-3. ESETS - Configuration > SMTP Agent.Always remember to save your new configuration by clicking Save changes. T

Seite 18

257.7.3 SchedulerYou can manage the scheduler tasks either via ESET configuration file (see chapter Scheduler) or using the web interface.Figure 6

Seite 19

267.7.4 StatisticsYou can view statistics for all of active ESETS agents here. The Statistics summary refreshes every 10 seconds.Figure 6-6. ESETS

Seite 20

277.8.1 Remote Administration usage exampleBefore commencing any remote administration process, ensure your system fulfills the three following pr

Seite 21 - 7.6 Scheduler

28Figure 6-8. ERA Configuration Editor.The New Task context menu contains On-demand scanning options (enabled/disabled cleaning).You can select the de

Seite 22 - 7.7 Web Interface

297.9 LoggingESETS provides system daemon logging via syslog. Syslog is a standard for logging program messages and can be used to logsystem events

Seite 23 - 7.7.1 License management

31. IntroductionThank you for using ESET Mail Security - the premier security system for Linux, BSD and Solaris. ESET's state-of-the-art scanning

Seite 24 - Using the web interface:

30The following commands are available only for ESET Mail Security.esets_cgpExternal filter plug-in for CommuniGate Pro, which reads e-mail filenames

Seite 25 - 7.7.3 Scheduler

318. ESET Security system update8.1 ESETS update utilityTo maintain the effectiveness of ESET Mail Security, the virus signature database must be ke

Seite 26 - 7.8 Remote Administration

329. Let us knowWe hope this guide has provided you with a thorough understanding of the requirements for ESET Mail Security installation,configuratio

Seite 27 - Figure 6-8. ERA Console

3310. Appendix A. ESETS setup and configuration10.1 Setting ESETS for MTA PostfixInbound email message scanningWarning: This installation is not com

Seite 28

3410.2 Setting ESETS for MTA SendmailInbound email message scanningWarning: This installation is not compatible with SELinux. Either disable SELinux

Seite 29 - 7.10 Command-line scripts

35This will start Qmail using esets_mda for local deliveries. However, the original delivery specification is passed to qmail-localthrough esets_mda.

Seite 30

36or, if you are using FreeBSD, this parameter:mda_path = "/usr/local/sbin/exim"where /usr/sbin/exim (or /usr/local/sbin/exim) is the full p

Seite 31 - 8.1 ESETS update utility

37Note: According to the Handle Object Policy, configuration options in [gwia] section such as ‘action_av’, ‘action_av_infected’,‘action_as’ and their

Seite 32 - 9. Let us know

3810.10 Setting ESETS for scanning of IMAP communicationThe IMAP communication scanning is performed using the esets_imap daemon. In the [imap] sect

Seite 33

3911. Appendix B. PHP LicenseThe PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved.Redistribution and use in sour

Seite 34

4Multiple logging levelsMultiple logging levels can be configured to get information about system activity and infiltrations.Web interfaceConfiguratio

Seite 35

52. Terminology and abbreviationsIn this section, we will review the terms and abbreviations used in this document. Note that boldface font is reserve

Seite 36

63. System requirementsThe following hardware requirements must be met before the installation process in order to run ESET Mail Security properly:250

Seite 37

74. InstallationAfter purchasing ESET Mail Security, you will receive your authorization data (Username, Password and license key). Thesecredentials i

Seite 38

8Enter your Username and Password information into the global section of the ESET configuration file using a text editor:vi @ETCDIR@/esets.cfgEdit the

Seite 39 - 11. Appendix B. PHP License

95. Architecture OverviewOnce ESET Mail Security is successfully installed, you should become familiar with its architecture.Figure 4-1. Structure of

Kommentare zu diesen Handbüchern

Keine Kommentare