Basic Features of Dr.Web for UNIX Mail Servers |
1. Scanning for malicious programs of any kind (various viruses, including those that infect mail files and boot records, trojans, email worms and so on) and unwanted software (adware, joke programs and dialers). For details on threat types, refer to Appendix A. Types of Computer Threats. Threat detection methods: •a signature analysis—a scan method allowing to detect known threats registered in virus databases; •a heuristic analysis—a set of scan methods allowing to detect threats that are not known yet; •cloud-based threat detection technologies using the Dr.Web Cloud service that collects up-to-date information about recent threats detected by various Dr.Web anti-virus products.
When scanning the file system on the user request, it is possible to perform either a full scan of all the file system objects available to the user, or a custom scan of the specified objects only (individual directories or files that meet the specified criteria). In addition, it is possible to perform an individual check of boot records of volumes and executable files which started the processes that are currently active in the system. In the latter case, when a threat is detected, a malicious executable file is not only neutralized, but all processes started by it are forcibly terminated. On systems that implement a mandatory model of file access with a set of different access levels, the scanning of files that are not available at the current access level can be done in special autonomous copy mode. All objects containing threats detected in the file system are registered in a permanent threat registry, except those threats that were detected in autonomous copy mode. The Dr.Web Ctl command-line tool bundled with Dr.Web for UNIX Mail Servers allows to scan file systems of remote network hosts providing remote terminal access via SSH or Telnet for threats.
2.. Dr.Web for UNIX Mail Servers supports various modes of email message scanning. •The mode of an external filter connected to a mail server (MTA). Dr.Web for UNIX Mail Servers can be integrated with any mail server that supports interfaces for connecting Milter, Spamd and Rspamd external filters. In filter mode, upon an initiative of the MTA, all email messages received by the server are sent to Dr.Web for UNIX Mail Servers via the conjugation interface for scanning. Depending on the capabilities of the interface, Dr.Web for UNIX Mail Servers operating as a filter is able to: ▫Inform the server of email message scanning results. In this case, the mail server must independently process the email message according to received results (reject the delivery, add headers or modify email contents, if the scanning result suggests the presence of threats). ▫Instruct the mail server to receive or reject the message. ▫Modify the email message by adding headers or removing detected malicious or unwanted contents. Removed malicious contents are attached to the email message as a password-protected archive. The recipient of the email message can request the password for unpacking the protected archive from a mail server administrator. If required, though not recommended, the administrator can allow using archives not protected with a password.
•SMTP proxy mode, which scans SMTP traffic to be further transmitted to one or several target MTA/MDA. In fact, this mode is similar to the previous one: Dr.Web for UNIX Mail Servers connects (via Milter, Spamd or Rspamd) to an MTA (for example, Postfix) that is configured to transmit email messages to other MTAs (for example, by routing of messages sent to different domains and so on). •The transparent proxy mode for mail protocols. In this mode, Dr.Web for UNIX Mail Servers (using the SpIDer Gate component) acts as a proxy server embedded in a channel for sharing data between an MTA and/or a MUA transparently for the sharing parties and scanning the transmitted messages upon sending and receiving them. The product can be transparently embedded in the main mail protocols, such as SMTP, POP3 and IMAP. In this mode, and also depending on possibilities of the protocol, Dr.Web for UNIX Mail Servers can transmit the email message to the recipient (unmodified or after adding headers or repacking the message) or block its delivery (among other things, having returned a protocol error message to the sender or the recipient).
Depending on the distribution and settings, Dr.Web for UNIX Mail Servers runs the following checks of email messages: •detection of malicious attachments that contain threats; •search for links to malicious websites or websites covered by unwanted categories; •detection of signs of phishing and spam (using a DKIM technology, an automatically updated spam filtering rule database, and a mechanism of checking the presence of the sender’s address in DNSxL black lists); •compliance with the security criteria established by the administrator of the mail system individually (scanning of a body and headers of messages using regular expressions). To scan links to unwanted websites, which can be present in email messages, an automatically updated database of web resource categories bundled with Dr.Web for UNIX Mail Servers is used. Furthermore, a request is sent to Dr.Web Cloud to check whether other Dr.Web products marked a web resource referred by an email message as malicious.
3. • Write operations of the NSS file storage users are monitored. This feature allows to detect and neutralize malware instantly at an attempt of copying it to the NSS storage, which prevents its further distribution over the network.
5. detected within the server file system in a special storage known as quarantine to prevent any harm to the system. When quarantined, objects are renamed according to special rules and, if necessary, they can be restored to their original location only on user demand. Threats detected by the Dr.Web MailD component in email messages are not quarantined on the server; they are sent to a user-recipient in a modified email message. At that, they are packed in a password-protected archive. The user can access the contents of the archive only by providing the password received from the administrator of Dr.Web for UNIX Mail Servers. 6. of the scanning engine, virus databases, databases of web resource categories and a database of rules for email spam filtering to maintain the high level of protection against malware. 7. on scans and threat events. Logging detected threats. Sending of notifications of detected threats via SNMP to external monitoring systems and a centralized protection server if Dr.Web for UNIX Mail Servers operates in centralized protection mode, as well as to the Dr.Web Cloud service. 8. (when connected to a centralized protection server such as Dr.Web Enterprise Server or as a part of the Dr.Web AV-Desk service) to implement single security policies adopted within some network which comprises this server. It can be a corporate network, a private network (VPN) or a network of a service provider (for example, an internet service provider). |