1.To start using the installed distribution of Dr.Web for UNIX Mail Servers, you need to activate it by obtaining and installing a key file.
2.After that, we recommend that you test the operation of Dr.Web for UNIX Mail Servers.
3.Integrate Dr.Web for UNIX Mail Servers with your mail server by connecting it as an external filter operating via a Milter, Spamd, or Rspamd extension or in SMTP integration mode. You can also integrate Dr.Web for UNIX Mail Servers with Dr.Web vxCube to scan email attachments.
4.If you want to use Dr.Web for UNIX Mail Servers in SMTP proxy mode, at first, install and configure a mail server (if it is not installed) functioning as a transit MTA.
5.For the GNU/Linux based systems, you can configure the proxy mode that is transparent for your mail server and/or MUA. In this mode, you do not need to directly integrate Dr.Web for UNIX Mail Servers with the mail server. Transparent integration with SMTP, POP3, IMAP is supported.
6.Check what components are running and enable additional components, which are disabled by default, if you need them for the protection of your server (for example, Dr.Web ClamD or Dr.Web SNMPD).
|
You may also need to perform other actions apart from enabling the additional components, for example, you may need to adjust their default configuration.
|
To view the list of installed and running components and their settings, use one of the following:
•the Dr.Web Ctl command-line management tool (use the drweb-ctl appinfo, drweb-ctl cfshow and drweb-ctl cfset commands);
•the management web interface of Dr.Web for UNIX Mail Servers (you can access it via a web browser at https://127.0.0.1:4443 by default).
|
Dr.Web for UNIX Mail Servers performs only the following actions on email messages:
•checking email messages for compliance with the criteria established by the administrator and scanning for signs of spam (also by checking the presence of the sender’s domain in DNSxL black lists if enabled);
•searching for links to malicious websites or websites from unwanted categories;
•detecting malicious attachments.
If the protocol that was used to receive an email message for scanning and the party that sent the email message (MTA/MDA or MUA) support modification of messages sent for scanning, then, besides standard actions “Pass” and “Reject”, Dr.Web for UNIX Mail Servers can repack email messages on the basis of one of predetermined repack templates (during repacking, all threats are moved to a protected archive attached to the email message, and a notification of threats and/or unwanted contents is added to the email body). Furthermore, basic functionality that adds and modifies email headers is supported.
All other actions (for example, sending notifications to an administrator, irreversibly deleting or renaming attached files), if they are necessary, should be implemented by means of the protected mail server (MTA/MDA). If necessary, a set of custom third-party filter plug-ins, which are designed for such processing, can be connected to the server.
The function of scanning of email messages for the signs of spam can be unavailable depending on the distribution of Dr.Web for UNIX Mail Servers.
|
|