Getting Started

1.To start using the installed Dr.Web for UNIX Mail Servers, you need to activate it by obtaining and installing a key file.

2.Further scanning of the operability of Dr.Web for UNIX Mail Servers is recommended.

3.Integrate Dr.Web for UNIX Mail Servers with the mail server you use by connecting it as an external filter operating via the Milter, Spamd or Rspamd extensions or in SMTP integration mode. You can also integrate Dr.Web for UNIX Mail Servers with Dr.Web vxCube to scan email attachments.

4.If you want to use Dr.Web for UNIX Mail Servers in the SMTP proxy mode, at first, install and configure a mail server (if it is not installed) that performs transit MTA functions.

5.For the GNU/Linux based systems, you can configure the proxy mode that is transparent for your mail server and/or MUA. In this mode, you do not need to perform the actual integration of Dr.Web for UNIX Mail Servers with the mail server. Transparent integration with the protocols SMTP, POP3, IMAP is supported.

6.Check what components are running and enable additional components, which are disabled by default, if you need them for the protection of your server (for example, the Dr.Web ClamD or Dr.Web SNMPD component, depending on the distribution).

You may also need to perform other actions apart from enabling the additional components, for example, you may need to adjust their default configuration.

To view the list of installed and running components and their settings, use one of the following:

The command-line-based management tool—Dr.Web Ctl. Use the drweb-ctl appinfo, drweb-ctl cfshow and drweb-ctl cfset commands).

The management web interface of Dr.Web for UNIX Mail Servers (by default, you can access it via a web browser at https://127.0.0.1:4443/).

Dr.Web for UNIX Mail Servers executes only the following actions with email messages:

Email message check for the compliance with the criteria established by the administrator and scanning for signs of spam (also via check of the sender’s domain in DNSxL black lists when such configuration is present),

Search for links to malicious websites or websites from the unwanted categories,

Detection of malicious attachments.

If the protocol that was used to receive an email message for scanning and the party that sent the email message (MTA/MDA or MUA) support modification of transferred for scanning email messages, then, besides standard actions “Pass” and “Reject”, Dr.Web for UNIX Mail Servers can repack email messages on the basis of one of predetermined repack templates (during repacking, all threats are moved to a protected archive attached to an email, and a notification on threats and/or unwanted contents is added to the email body). Besides, basic functionality that adds and modifies email headers is supported.

All other actions (for example, sending of notifications to an administrator, complete removal or renaming of attached files), if they are required, should be implemented via a protected mail server (MTA/MDA). They should be implemented via a protected mail server by connecting, if required, a set of specific filter plug-ins from third-party developers which are designed for the corresponding processing.

 

Function of scanning of email messages for the signs of spam could be unavailable depending on the Dr.Web for UNIX Mail Servers distribution.