Dr.Web Web Management Interface
In this section:
•Restoring Passwords of Mail Archives.
The web interface of Dr.Web for UNIX Mail Servers allows you to:
1.View the current state of the Dr.Web for UNIX Mail Servers components, start or stop some of the components.
2.View the status of updates and start an updating process manually, if required.
3.View the status of the product license and load a license key, if required.
4.View the list of detected threats and manage quarantined objects (threats detected in local file system via the Dr.Web File Checker component are displayed only).
5.Edit the settings of the components included in Dr.Web for UNIX Mail Servers.
6.Connect Dr.Web for UNIX Mail Servers to the centralized protection server or switch to the standalone mode.
7.Start an on-demand scanning of local files (including a capability to do it by dragging and dropping files onto the page opened in your browser).
System Requirements of the Web Interface
Correct operation of the web interface is guaranteed for the following web browsers:
•Microsoft Internet Explorer—version 11 and later.
•Mozilla Firefox—version 25 and later.
•Google Chrome—version 30 and later.
Accessing the Web Interface
To access the web interface, type in the address bar of your browser the following address:
where <host_with_drweb> is the IP address or the name of the host where Dr.Web for UNIX Mail Servers operates with the Dr.Web HTTPD web interface server, and <port> is the port (on this host) which Dr.Web HTTPD is listening on. To access Dr.Web for UNIX Mail Servers component which operates on the local host, use IP address 127.0.0.1 or the name localhost. By default, the <port> is 4443.
Thus, to access the web interface on the local host by default, enter the following URL in the browser address bar:
After the connection to the managing server is established, the startup page opens and displays the authentication form. To access management functions, fill in the authentication form by specifying the login and password of a user who has administrative privileges on the host where Dr.Web for UNIX Mail Servers operates.
If you need, you can provide the authorization on the web interface using a personal user certificate. To do so:
1.Create a personal certificate signed by a certificate authority certificate.
2.Import the signed certificate as a user authorization certificate in the browser that is used to connect to the web interface for management.
3.In the Dr.Web HTTPD settings (parameter AdminSslCA), specify a path to the certificate authority certificate that signs your personal certificate.
If you use a personal user certificate for the authorization on the web interface, the authorization form does not appear, the user is authorized as root.
If necessary, refer to the Appendix E. Generating SSL certificates section.
In the left pane of the web interface, which appears once you have successfully passed authentication, there is a main menu, the items in which allow you to do the following:
• opens the main page which displays the full list of installed components of Dr.Web for UNIX Mail Servers and their status.
• opens a page which displays all the threats detected on the server. In this section, you can manage these detected threats (for example, move infected objects to quarantine, rescan, cure or delete detected malicious objects).
• opens a page with the component settings of Dr.Web for UNIX Mail Servers installed on the server.
• opens a page that shows brief information about the version of this web interface and about the state of virus databases.
• opens a new browser tab with help information on the Dr.Web for UNIX products.
•Password for attached archive with threats displays a panel for password restoration of archives containing unwanted email message attachments with signs of spam, attached infected files and parts of the email message with unwanted URL.
• displays a panel for quick file scanning, which will stay available on top of any opened page of the web interface until you close this panel.
• ends the current web interface session (not available for authentication with user's personal certificate).