GFI MailSecurity for Exchange/SMTP 8 Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com This manual was produced by GFI Software Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of GFI Software Ltd. GFI MailSecurity was developed by GFI Software Ltd. GFI MailSecurity is copyright of GFI Software Ltd. 1998-2004 GFI Ltd. All rights reserved. GFI MailSecurity is a registered trademark and GFI Software Ltd. and the GFI logo are trademarks of GFI Software Ltd. in the Europe, the United States and other countries. Version 8.10 Last updated: March 15, 2004 Contents Explaining GFI MailSecurity 1 Introduction to GFI MailSecurity .................................................................................... 1 Key features of GFI MailSecurity................................................................................... 1 GFI MailSecurity operating modes ................................................................................ 3 GFI MailSecurity VS API Exchange 2000/2003 mode .................................................. 3 GFI MailSecurity SMTP gateway mode ........................................................................ 4 Differences between SMTP gateway and Exchange VSAPI mode .............................. 5 Which operating mode should I use? ............................................................................ 5 Can I use both operating modes? ................................................................................. 6 GFI MailSecurity components ....................................................................................... 6 GFI MailSecurity from a user's perspective................................................................... 7 Add-ons – DownloadSecurity for ISA server ................................................................. 7 Add-ons – GFI MailEssentials ....................................................................................... 8 Installing GFI MailSecurity in VS API mode 9 Introduction to installing in VS API mode ...................................................................... 9 System requirements of VS API mode.......................................................................... 9 Installing GFI MailSecurity in VS API mode .................................................................. 9 Entering your License key after installation................................................................. 11 Installing GFI MailSecurity in gateway mode 13 Introduction to installing in SMTP gateway mode ....................................................... 13 System requirements of GFI MailSecurity SMTP gateway mode ............................... 14 Installing in SMTP Gateway mode on the Exchange server ....................................... 14 Installing in SMTP gateway mode on a separate machine ......................................... 15 The Exchange 5.5 User synchronization wizard ......................................................... 24 Entering your License key after installation................................................................. 25 Configuring Content & Attachment checking 27 Introduction to content checking.................................................................................. 27 Creating a content checking rule ................................................................................. 27 Creating an attachment checking rule ......................................................................... 32 Quarantining 37 Introduction .................................................................................................................. 37 Quarantine options ...................................................................................................... 37 Approving/rejecting mail via an e-mail client ............................................................... 40 Approving/rejecting mail using the Moderator Client................................................... 41 Using the remote moderator client .............................................................................. 42 Quarantined mail from the user point of view.............................................................. 45 Setting up the web based moderator .......................................................................... 46 Configuring Virus checking 53 Configuring scanning engines ..................................................................................... 53 Deleting/Quarantining infected mails........................................................................... 53 Norman Virus Control configuration ............................................................................ 54 Manual MailSecurity for Exchange/SMTP Contents • i BitDefender configuration ............................................................................................ 56 McAfee configuration................................................................................................... 57 Kaspersky configuration .............................................................................................. 57 The Email Exploit engine 59 Introduction to e-mail exploits...................................................................................... 59 Configuring the email exploit engine ........................................................................... 60 Email exploit update settings....................................................................................... 61 The HTML Threat Engine 63 Introduction to the HTML Threat Engine ..................................................................... 63 Configuring the HTML Threat Engine.......................................................................... 64 The Trojan & Executable Scanner 65 Introduction to the Trojan & executable scanner......................................................... 65 Configuring the Trojan & Executable scanner............................................................. 66 Trojan & Executable scanner update settings............................................................. 67 Decompression engine 69 Introduction to the decompression engine .................................................................. 69 Configuring the decompression engine....................................................................... 69 Remote monitoring & administration 73 Installing the remote monitor/configuration ................................................................. 73 Configuring & monitoring GFI MailSecurity remotely .................................................. 73 Switching to another server to monitor or configure.................................................... 74 General options 75 General options ........................................................................................................... 75 Update options ............................................................................................................ 76 VS API Scanning modes ............................................................................................. 77 Adding additional local domains .................................................................................. 78 Changing the bindings................................................................................................. 79 Checking number of licensed users ............................................................................ 80 Version information...................................................................................................... 81 Advanced topics 83 Determining Outbound/Inbound/Internal mail.............................................................. 83 User synchronization with Exchange 5.5 .................................................................... 83 GFI MailSecurity logging ............................................................................................. 85 Configuring ISA server to allow downloading of updates............................................ 85 Enabling Event Logging for the Virus Scanning API ................................................... 85 Setting Virus Scanning API Performance Monitor Counters....................................... 86 Customizing the notification templates ........................................................................ 87 Troubleshooting 91 Introduction .................................................................................................................. 91 Knowledgebase ........................................................................................................... 91 Request support via e-mail.......................................................................................... 91 Request support via webchat ...................................................................................... 92 Request support via phone.......................................................................................... 92 Web Forum .................................................................................................................. 92 Build notifications......................................................................................................... 92 ii • Contents Manual MailSecurity for Exchange/SMTP Index Manual MailSecurity for Exchange/SMTP 93 Contents • iii Explaining GFI MailSecurity Introduction to GFI MailSecurity The need to monitor email messages for dangerous, offensive or confidential content has never been more evident. The most deadly viruses, able to cripple your email system and corporate network in minutes, are being distributed worldwide via email in a matter of hours (for example, the Nimda virus). Anti-virus vendors cannot update their signatures in time. Worse still, email is also used to install backdoors (Trojans) and other harmful programs to help potential intruders break into your network. Your only defense is to install a comprehensive email content checking and anti-virus solution to safeguard your mail server & network. GFI MailSecurity acts as an Email Firewall and protects you from headline-hitting viruses such as Love Letter, as well as email attacks targeted at your organization. GFI MailSecurity for Exchange/SMTP is the market leading email content security software. GFI MailSecurity can be installed in 2 modes: the Exchange 2000 VS API mode or the SMTP gateway mode. The Exchange 2000 VS API version integrates seamlessly with Exchange Server 2000 and scans the Exchange 2000 information stores. The SMTP gateway version should be deployed at the perimeter of the network as a mail relay server. GFI MailSecurity is totally transparent to your users - no additional user training or administration is needed. Key features of GFI MailSecurity Email Content checking/filtering GFI MailSecurity's key feature is the ability to content check all in- and outbound mail. It can quarantine all mail with dangerous attachments, such as *.exe, *.vbs and other files. Such attachments are more likely to carry a virus, worm or email attack. Because email viruses can spread so quickly and cause immense damage, it is best to quarantine such emails before they are distributed to the email users. When an email is quarantined, it can by reviewed by the administrator who can then reject or approve the message. In addition to scanning for harmful attachments, GFI MailSecurity can check for script code in the message body itself, as well as scanning for offensive content (for which a company could be sued) and information leaks (distribution of confidential information by users). Manual MailSecurity for Exchange/SMTP Explaining GFI MailSecurity • 1 Furthermore, you might choose to quarantine mails carrying *.mp3 or *.mpg files, as these hog bandwidth and can needlessly burden a mail server's disk space. The attachment checking module has effectively saved thousands of companies from the Love Letter virus. Email exploit detection engine GFI's leading research on email exploits has contributed to the creation of GFI MailSecurity's email exploit detection engine. This industry-first detects emails that contain known email exploits - think of it as "email intrusion detection". It therefore safeguards you from any current or future email viruses and attacks that use known exploits. GFI MailSecurity is the ONLY email security product to protect against email exploits. For more information on exploits, visit http://www.gfi.com/emailsecuritytest/ Automatic removal of HTML scripts The advent of HTML mail has made it possible for hackers/virus writers to trigger commands by embedding them in HTML mail. GFI MailSecurity detects & disables these commands and sends the 'cleaned' HTML mail to the recipient. GFI MailSecurity is the only product to protect you from potentially malicious HTML e-mail, allowing you to be secure from not only HTML viruses, but also from attacks directed at your network via HTML e-mail. Automatic quarantining of Microsoft Word documents with word macros GFI MailSecurity protects you from present and future Word & Excel macro viruses, by automatically quarantining documents with macros. This means you can safely allow Word docs and excel spreadsheets to be sent via e-mail, since if they are potentially malicious, you can rest assured that GFI MailSecurity will quarantine them. (or delete if you prefer) Virus checking using multiple virus engines GFI MailSecurity scans email for viruses using multiple virus engines. Scanning email at the gateway and at mail server level prevents viruses from entering and/or spreading within your network. Furthermore, you can avoid the embarrassment of sending infected emails to customers, as GFI MailSecurity also checks outgoing mail for viruses. GFI MailSecurity includes the industrial strength Norman anti-virus & Bitdefender virus engines that has received various awards. Optionally you can choose to add the McAfee virus engine. Multiple virus engines gives you a higher level of security, since virus engines complement each other and lower the average virus response time. Trojan Executable scanner GFI MailSecurity is able to analyze incoming executables and rate the risk-level of an executable. This way, potentially dangerous, unknown Trojans can be detected before they enter your network. 2 • Explaining GFI MailSecurity Manual MailSecurity for Exchange/SMTP GFI MailSecurity operating modes GFI MailSecurity can be operated in 2 modes: 1. Exchange 2000/2003 VS API mode 2. SMTP gateway mode Depending on your network set-up, and your objectives in deploying GFI MailSecurity, either mode can be applicable. In some cases you might consider deploying GFI MailSecurity in both modes. GFI MailSecurity VS API Exchange 2000/2003 mode If you have Microsoft Exchange 2000 or 2003, GFI MailSecurity can integrate with Exchange Server via the Microsoft Virus Scanning API (VS API). What is and why use VS API (Virus Scanning API)? Exchange 2000 & 2003 provides a new virus scan API that is implemented at very low-level in the Exchange store. This allows a virus scanning application to run with high performance and guarantees that the message will be scanned before any client can access a message or attachment. This low-level access facilitates the elimination of viruses such as the Melissa virus. In addition, VS API reduces scalability issues that can arise when a particular server has a large number of users/mailboxes. VS-API's real-time scan allows messages and attachments to be scanned once before delivery, rather than multiple times determined by the number of mailboxes the message is delivered to. This single-instance scanning also helps prevent messages from being rescanned when a message is copied. GFI MailSecurity VS API has the following features: • Native MIME/MAPI content scanning • Proactive scanning • Priority-based queuing • Multithreaded queue processing • Per-Messaging Database configuration options • Enhanced background scanning • Event logging • Virus scanning API-specific Performance Monitor counters Why choose a product based on the VSAPI? Microsoft strongly encourages the development and adoption of Exchange VS API-based anti-virus solutions • VS API is secure and preserves the integrity of the Information Store and its databases • The Microsoft Exchange product group is committed to providing enhancements to this API, bug fixes, documentation, and technical assistance to ISVs using VS API (as appropriate) Manual MailSecurity for Exchange/SMTP Explaining GFI MailSecurity • 3 • Antivirus solutions using Extensible Storage Engine API or any other undocumented API may corrupt the Information Store and its databases • The Microsoft Exchange product group does not provide any code updates, documentation, or technical assistance to address issues related to the use of a non-VS API-based solution • For Exchange customers using a non-VS API-based solution, Microsoft Product Support Services may ask the customer to uninstall/disable the anti-virus solution to help identify issues, this may delay in final resolution • VS API enhances the current core feature set by providing abilities to optimize and configure the scanning process at multiple levels, as well as providing Exchange administrators with built-in functionality to monitor the performance of the new API For more information about VS API You can find more information about VS API on this link: http://support.microsoft.com/default.aspx?scid=kb;EN-US;q285667 Limitations of using the VS API Exchange 2000/2003 mode Although VS API is a recommended way to do content checking and virus scanning on Exchange 2000, there are a number of limitations which you need to be aware of as a system administrator: 1. The Virus API only scans information stores. That means that if you have installed GFI MailSecurity for Exchange 2000 on for example a front-end server, no mail will be scanned, because mail is not being stored on the front-end server. In this case, you need to use GFI MailSecurity in SMTP gateway mode. 2. You need to be more careful with applying attachment rules. Some MAPI applications running on Exchange might be using vbs or exe files. You need to ensure that if this is the case, you don’t apply rules to quarantine exe or vbs files to mailboxes used by those applications. 3. Outgoing mails that have been approved need to be resent by the user. For example, if an executable is quarantined and approved, the user will get a message saying that he has 24 hours to send that executable. The reason for this is because the recipient of the message is not always known with 100% certainty in VS API mode. GFI MailSecurity SMTP gateway mode If you do not need to scan internal mail or do not have Microsoft Exchange 2000/2003, you must install GFI MailSecurity in SMTP gateway mode. You can install GFI MailSecurity in SMTP Gateway mode on a separate machine on the perimeter of your network (acting as a mail relay) or on the Exchange server 2000/2003 machine it self. The SMTP gateway mode allows you to set-up more powerful content security rules. If you do not need to scan internal mail we recommend the SMTP gateway mode. 4 • Explaining GFI MailSecurity Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity on a separate machine If you decide to install GFI MailSecurity on a separate machine then you must install GFI MailSecurity in SMTP gateway mode. In this type of installation GFI MailSecurity checks all inbound and outbound mail before it reaches your mail server. In order to do this, it must be the first to receive all mails destined for your mail server and it must the last 'stop’ for outbound mail, i.e. mails destined for the Internet. In this set-up GFI MailSecurity acts as a gateway for all email. This set-up is also known as 'Smart host' or 'Mail relay' server. GFI MailSecurity working as a mail gateway/relay Differences between SMTP gateway and Exchange VSAPI mode The main differences between the SMTP gateway mode and the Exchange VS API version of GFI MailSecurity are as follows: • SMTP Gateway version only scans inbound and outbound mail, not internal mail • SMTP Gateway version has more information about the e-mail, and can therefore quarantine outbound mail without the need for a ticketing system • SMTP Gateway version has more information about the e-mail and can therefore determine better if it’s an inbound or an outbound mail. • SMTP Gateway version has a more advanced quarantining system. It is possible to hold the entire email until a part is approved or rejected – that way a recipient only receives the mail if it is approved. He will receive the mail in its entirety. • Exchange VS API version can only be used on Exchange 2000/2003 • Exchange VS API version can scan internal mail also, and can therefore prevent internal virus outbreaks. Which operating mode should I use? In general we recommend using the gateway version to block viruses at the gateway and implement advanced content security rules, and to use the VS API version mainly to block internal virus outbreaks. • If you don’t have Exchange 2000/2003, you must use the SMTP gateway version. • If you have Exchange 2000/2003, you can choose. If you have a large network or many users on Exchange, its better to install GFI MailSecurity in gateway mode at the perimeter of your network and use the VS API mode only to block internal virus outbreaks. If Manual MailSecurity for Exchange/SMTP Explaining GFI MailSecurity • 5 you have a small number of users, you can just install the VS API version. • If you want to block entire mails, rather then message parts, you need to use the SMTP gateway version. • SMTP gateway mode is the correct mode if you run Exchange 5.5, Lotus Notes or another SMTP/POP3 server! Can I use both operating modes? It is possible to deploy both versions at the same time (as long as they are installed on separate machines). The main advantage of this is that you can have stricter rules on inbound and outbound mail, and less strict rules on internal mail. Also, you can avoid mail reaching your Exchange server in the first place, and use the Exchange VS API version to control virus outbreaks through internal mail. GFI MailSecurity components GFI MailSecurity consists of the following parts: GFI MailSecurity scan engine The GFI MailSecurity scan engine analyses the content of all in- and outbound mail and internal mail (if using in Exchange 2000/2003 VS API mode). If a mail is quarantined, the scan engine will notify the appropriate supervisor/administrator and ask for approval of the message. GFI MailSecurity configuration The GFI MailSecurity configuration The configuration program allows you to set up and configure GFI MailSecurity. All configuration can be done from the MMC console. 6 • Explaining GFI MailSecurity Manual MailSecurity for Exchange/SMTP GFI MailSecurity Moderator client The moderator client – gateway version GFI MailSecurity allows you to approve or reject messages that are quarantined in 2 ways – either using the moderator client or via HTML mail in your inbox. If you have to approve/reject large amounts of mail, you can use the moderator client. GFI MailSecurity from a user's perspective GFI MailSecurity is totally transparent to the user. That means that the user will not notice that GFI MailSecurity is active, until the user sends or receives a mail which has triggered a rule in GFI MailSecurity, for example because it included a forbidden attachment or a virus. In the case of a suspicious attachment, GFI MailSecurity will quarantine the mail attachment for review by the administrator. Optionally, the recipient will receive a message saying that a mail is waiting for administrator review. Once the administrator approves the email, the mail will be sent to the recipient. Add-ons – DownloadSecurity for ISA server A companion product to GFI MailSecurity is DownloadSecurity. DownloadSecurity content filters & virus checks user's file downloads. It uses the same scan engine as GFI MailSecurity. DownloadSecurity installs on top of Microsoft ISA server (and therefore requires Microsoft ISA server) and will intercept all files downloads from users on your network. In this manner, you can safely allow users to download files from the Internet. If you use Microsoft Small Business Server, you are probably running both Microsoft ISA server and Microsoft Exchange Server on a single machine. GFI MailSecurity & GFI DownloadSecurity can be installed on that same machine, and together provide http, ftp and SMTP content security. For more information, please see the GFI website. DownloadSecurity is available at a bundle price if purchased in combination with GFI MailSecurity. Manual MailSecurity for Exchange/SMTP Explaining GFI MailSecurity • 7 Add-ons – GFI MailEssentials A companion product to GFI MailSecurity is GFI MailEssentials. MailEssentials adds a number of corporate email features to Exchange Server, notably: • Anti Spam • Disclaimers • Centralized archiving of inbound and outbound mail • POP3 down loader • Server based auto replies For more information, please see the GFI website. MailEssentials is available at a bundle price if purchased in combination with GFI MailSecurity. 8 • Explaining GFI MailSecurity Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in VS API mode Introduction to installing in VS API mode This chapter explains the procedure how to install and configure GFI MailSecurity in Exchange 2000/2003 VS API mode. In this mode, GFI MailSecurity uses the low level Microsoft Virus scanning API, ensuring that the scanning process will be done in a high performance and reliable manner. For more information about GFI MailSecurity operating modes and VS API, please see the previous chapter. VS API mode requires Exchange 2000 (SP1) or Exchange 2003! System requirements of VS API mode To install GFI MailSecurity you need: • Windows 2000 Server or Advanced Server with Service Pack 1 or higher installed OR Windows 2003 Server or Advanced Server. • Microsoft Exchange server 2000 with Service Pack 1 or higher installed or Microsoft Exchange server 2003. • If using Small Business Server, ensure you have installed Service Pack 2 for Exchange Server. • IMPORTANT: Disable Anti Virus software from scanning the GFI MailSecurity directories! AV products are known to both interfere with normal operation as well as slow down any software which requires file access. In fact Microsoft does not recommend running file based anti virus software on the Exchange Server. For more information: http://kbase.gfi.com/showarticle.asp?id=KBID001559 • Make sure that backup software is not backing up any of the GFI MailSecurity directories at any point. Installing GFI MailSecurity in VS API mode Before you install GFI MailSecurity, please make sure you are logged on as an Administrator. Step 1: Run GFI MailSecurity set-up by double-clicking the file MailSecurity.exe on the Exchange Server machine. GFI MailSecurity will also prompt you to check for a later GFI MailSecurity version. We recommend you do this and always use the latest version. Step 2: Confirm the License agreement. Step 3: Enter your Name, company, and License key. If you are evaluating the product, leave the default ‘Evaluation’. Click Next. Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in VS API mode • 9 Step 4: Set-up will now ask you if you wish to install in SMTP Gateway mode or in VS API mode. Choose VS API mode. Step 5: Set-up will now ask you to specify the administrator email address. Enter the e-mail address of the Administrator. Specifying the administrator email address Step 6: Set-up will now ask you where you want GFI MailSecurity to be installed. GFI MailSecurity will need approximately 30 MB of free hard disk space. In addition to this, you must reserve approximately 200 MB for temporary files. Step 7: Set-up will confirm installation in VS API mode and will now copy all program files to the selected destination, and finish the installation by creating a GFI MailSecurity program group. Click Finish to finish setup. The GFI MailSecurity services & the GFI MailSecurity VS API engine will now be started. Step 8: You can check if GFI MailSecurity is running using the GFI MailSecurity monitor. Note that it can take up to a minute before GFI MailSecurity will load, because VS API has to load GFI MailSecurity first. The GFI MailSecurity remote monitor To monitor GFI MailSecurity: Click Start > Programs > GFI MailSecurity and select GFI MailSecurity monitor. 10 • Installing GFI MailSecurity in VS API mode Manual MailSecurity for Exchange/SMTP Note that the monitor refers to items, not mails. An item is a message part, such as a mail body or an attachment. Therefore a mail can contain multiple items. For example a mail with 2 attachments consists of 3 parts/items: 1 body and 2 attachments. Entering your License key after installation If you have purchased GFI MailSecurity, you can enter your License key in the General > Licensing node. If you are evaluating GFI MailSecurity with an evaluation key, the product will time out after 60 days. If you then decide to purchase GFI MailSecurity, you can just enter the License key here without having to re-install. Entering the License key should not be confused with the process of registering your company details on our website. This is important; since it allows us to give you support and notify you of important product news. Register on: http://www.gfi.com/pages/regfrm.htm In VS API mode, you must license GFI MailSecurity based on the number of mailboxes that you have on Exchange Server. Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in VS API mode • 11 Installing GFI MailSecurity in gateway mode Introduction to installing in SMTP gateway mode This chapter explains the procedure how to install and configure GFI MailSecurity in SMTP gateway mode. There are 2 ways to install GFI MailSecurity in SMTP gateway mode: 1. On the Exchange Server 2000/2003 machine. 2. On a separate machine at the perimeter of your network. If you are installing on the Exchange Server 2000/2003 machine, setup is very straight forward. Simply choose gateway mode rather then VS API mode. If installing on a separate server, you must configure that machine to act as a gateway for all mail first. This set-up is also known as 'Smart host' or 'Mail relay' server. Once configured, you can install GFI MailSecurity on that machine. In SMTP gateway mode, GFI MailSecurity checks inbound and outbound mail before it reaches your mail server. For more information about GFI MailSecurity operating modes and the SMTP gateway mode, please see the chapter ‘Explaining GFI MailSecurity’. SMTP gateway mode is the correct mode if you run Exchange 5.5, Lotus Notes or another SMTP/POP3 server! If you are running a Windows NT network: The machine running GFI MailSecurity can be totally separate from your Windows NT network – GFI MailSecurity does not require Active Directory! Installing GFI MailSecurity in front of your firewall A good way to deploy GFI MailSecurity is to install it on a separate machine in front of your firewall or on your firewall (if running a Windows 2000/2003 firewall such as Microsoft ISA Server). This allows you to keep your corporate mail server behind the firewall. GFI MailSecurity will act as a smart host/mail relay server in the perimeter network (also known as DMZ - demilitarized zone). Additional advantages are: • You can perform maintenance on your Mail server machine, whilst still receiving email from the Internet. • You use less resources on your Mail server machine • The GFI MailSecurity machine can have a lower spec then the Mail server machine and process mail faster. Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in gateway mode • 13 • Additional fault tolerance – if anything happens with your Mail server you still receive mail, which is queued on the GFI MailSecurity machine. Note: This separate machine does not need to be dedicated to GFI MailSecurity, it can be running other applications, for example a firewall. System requirements of GFI MailSecurity SMTP gateway mode • Windows 2000 - Pro, Server or Advanced Server OR Windows 2003 – Pro, Server or Advanced Server OR Windows XP (Note that if you use Windows 2000 Pro or XP, you will only be able to accept up to 10 inbound SMTP connections simultaneously, so its better to use Windows server versions) • Microsoft Exchange server 2003, 2000, 4, 5 or 5.5, Lotus Notes 4.5 and up, or an SMTP/POP3 mail server. • IMPORTANT: Disable Anti Virus software from scanning the GFI MailSecurity & IIS directories! AV products are known to both interfere with normal operation as well as slow down any software which requires file access. For more information: http://kbase.gfi.com/showarticle.asp?id=KBID001559 • Make sure that backup software is not backing up any of the GFI MailSecurity directories at any point. Installing in SMTP Gateway mode on the Exchange server Before you install GFI MailSecurity, please make sure you are logged on as an Administrator. Step 1: Run GFI MailSecurity set-up by double-clicking the file MailSecurity.exe on the Exchange Server machine. GFI MailSecurity will also prompt you to check for a later GFI MailSecurity version. We recommend you do this and always use the latest version. Step 2: Confirm the License agreement. Step 3: Enter your Name, company, and License key. If you are evaluating the product, leave the default ‘Evaluation’. Click Next. Step 4: Set-up will now ask you if you wish to install in SMTP Gateway mode or in VS API mode. Choose SMTP Gateway mode. Step 5: Set-up will now ask you to specify the administrator email address. Enter the e-mail address of the Administrator. 14 • Installing GFI MailSecurity in gateway mode Manual MailSecurity for Exchange/SMTP Specifying the administrator email address Step 6: Set-up will now ask you where you want GFI MailSecurity to be installed. GFI MailSecurity will need approximately 30 MB of free hard disk space. In addition to this, you must reserve approximately 200 MB for temporary files. Step 7: Set-up will now copy all program files to the selected destination, and finish the installation by creating a GFI MailSecurity program group. Click Finish to finish setup. The GFI MailSecurity services will now be started. Step 8: You can check if GFI MailSecurity is running using the GFI MailSecurity monitor. The GFI MailSecurity remote monitor To monitor GFI MailSecurity: Click Start > Programs > GFI MailSecurity and select GFI MailSecurity monitor. Note that the monitor refers to items, not mails. An item is a message part, such as a mail body or an attachment. Therefore a mail can contain multiple items. For example a mail with 2 attachments consists of 3 parts/items: 1 body and 2 attachments. Installing in SMTP gateway mode on a separate machine In order for GFI MailSecurity to be installed on a separate machine, the IIS SMTP service must be installed and running on that machine Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in gateway mode • 15 and configured as an SMTP relay to your mail server. This means that the MX record of your domain must be pointing to the machine on which you will install GFI MailSecurity. This chapter describes how you can install the mail relay. For more information about this: http://support.microsoft.com/support/kb/articles/Q293/8/00.ASP Installing & configuring the IIS SMTP service GFI MailSecurity uses the Windows 2000/2003 IIS SMTP service as its SMTP server. Because GFI MailSecurity works with this SMTP service, you need to configure this service as a mail relay server first. About the Windows 2000/2003 IIS SMTP service The SMTP service is part of IIS, which is part of Windows 2000/2003. It is used as the message transfer agent of Microsoft Exchange Server, and has been designed to handle large amounts of mail traffic. The Windows 2000/2003 IIS SMTP service is included in every Windows 2000/2003 distribution, including Windows 2000 professional and XP. To install & configure the IIS SMTP service as a mail relay server: Step 1: Verify the Installation of the SMTP Service In Control Panel, open Add/Remove Programs, click Add/Remove Windows Components. Click the Internet Information Services (IIS) component, click Details, and then verify that the SMTP Service check box is selected. If it is not selected, click to select it, click OK, and then follow the installation directions that are displayed. Specify mail relay server name and assign IP Step 2: Specify mail relay server name and assign an IP 1. Click Start, point to Programs, click Administrative Tools, and then click Internet Services Manager. 16 • Installing GFI MailSecurity in gateway mode Manual MailSecurity for Exchange/SMTP 2. Expand the tree under the server name, and then expand the Default SMTP Virtual Server. Right click and select 'Properties'. Assign an IP to it. Step 3: Configure the SMTP Service to relay mail to your mail server In this step, you configure the SMTP service to relay inbound messages to your mail server. Note: During installation, GFI MailSecurity will perform this step for you automatically. GFI MailSecurity will ask for your local domain name, and create it as a remote domain. You will see the domain listed in the right pane. However, if you do this step manually, you can confirm that your relay server is working properly before running the GFI MailSecurity installation. Creating a local domain in IIS to route mail 1. Click Start, point to Programs, click Administrative Tools, and then click Internet Services Manager. 2. Expand the tree under the server name, and then expand the Default SMTP Virtual Server. By default, you should have a Local (Default) domain with the fully qualified domain name of the server. 3. Configure the domain for inbound: a) Right-click the Domains icon, click New, and then click Domain. b) Click Remote, click Next, and then type the domain name in the Name box. Click Finish. Configure the domain IMPORTANT NOTE ABOUT LOCAL DOMAINS Note: Upon installation, MailSecurity will import local domains from the IIS SMTP service. If you want additional local domains, you have to Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in gateway mode • 17 add these local domains in the MailSecurity configuration. For more information see ‘Adding additional local domains’ in the Advanced Topics chapter. If you add additional local domains in IIS SMTP service, they will not be automatically recognized until you enter them in the MailSecurity configuration. This allows you to setup remote smart hosts for particular domains that are not local. Configure the domain to relay mail to your mail server: 1. In the properties for the domain that you just created, click to select the Allow the Incoming Mail to be Relayed to this Domain check box. 2. If this is being set up for an internal domain, you should specify the server that receives email for the domain name by the IP address in the Route domain dialog box. 3. Click the forward all email to smart host option, and then type the IP address of the server that is responsible for email for that domain in square brackets. For example: [123.123.123.123] Note: Typing the IP address of the server in square brackets is necessary so that the server recognizes this is an IP address and not a host name. 4. Click OK. Relay options Step 4: Secure your mail relay server. In this step you will specify your mail server name, and any other mail servers that will send mail via this mail relay server. Effectively you will limit the servers that can send mail through this server: 1. Open the properties of the Default SMTP Virtual Server. 2. On the Access tab, click Relay. 18 • Installing GFI MailSecurity in gateway mode Manual MailSecurity for Exchange/SMTP 3. Click Only the list below, click Add, and then add the IP of your mail server that will be forwarding the mail to this server. You can specify a single computer, group of computers or a domain: a) Single computer: Specify one particular host that you want to relay off of this server. If you click the DNS Lookup button, you can lookup an IP address of a specific host. b) Group of computers: Specify a base IP address for the computers that you want to relay. c) Domain: Select all of the computers in a domain by domain name that will openly relay. This option adds processing overhead, and might reduce the SMTP service performance because it includes reverse DNS lookups on all IP addresses that try to relay to verify their domain name. Step 5: Configure your mail server to relay mail via the mail relay server After you have configured the IIS SMTP service to send and receive mail, you must configure your mail server to relay all mail to the mail relay server. To do this; If you have Microsoft Exchange Server 4/5/5.5: 1. Start up Microsoft Exchange Administrator. 2. Go to the Internet Mail Service and double-click on it to configure its properties. The Microsoft Internet mail connector 3. Go to the Connections tab. 4. Message Delivery section, select 'Forward all messages to host'. Enter the computer name or IP of the machine running GFI MailSecurity. 5. Click OK and restart Exchange server. This can be done from the services applet. Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in gateway mode • 19 If you have Microsoft Exchange Server 2000/2003: You will need to set-up an SMTP connector that forwards all mail to GFI MailSecurity: 1. Start up Exchange System Manager 2. Right-click on the Connectors Node->New->SMTP Connector and create a new SMTP connector. You will be prompted for a name. 3. Now select the option "Forward all mail through this connector to the following smart host", and type in the IP of the GFI MailSecurity server (the mail relay server) enclosed within square brackets [ ] (e.g.: [100.130.130.10]. Click OK to ADD. 4. Select the SMTP Server that the SMTP Connector will be working on. Go to the Address Space tab, and click Add. Select SMTP and click OK. 5. Click OK to exit. All mails will now be forwarded to the GFI MailSecurity machine. If you have Lotus Notes: 1. Double click on the Address Book button in Lotus Notes 2. Click on Server item to open it’s sub-items 3. Click on Domains 4. Click on Add Domains 5. In the Basics section, select Foreign SMTP Domain from the Domain Type field. 6. In the Messages Addressed to section type '*' in the Internet Domain field. 7. In the Should be routed to section enter the IP number of the Mail Essentials machine in the Internet Host field 8. Save the settings and restart the Lotus Notes server If you have an SMTP/POP3 mail server: 1. Start-up the configuration program of your mail server. 2. Search for the option to relay all outbound mail via another mail server. This option will be called something like 'Forward all messages to host’. Enter the computer name or IP of the machine running GFI MailSecurity. 3. If necessary, click OK and restart your mail server. Step 6: Point the MX record of your domain to the mail relay server. Since the new mail relay server must receive all inbound mail first, you must update the MX record of your domain to point to the IP of the new mail relay server. Otherwise mail will continue to go to your mail server and by-pass GFI MailSecurity. If you run your own DNS server you need update this in your DNS server. If your ISP manages it for you, you need to ask your ISP to update the MX record for you. After you have done this, check if the MX record is correct using the following procedure. 20 • Installing GFI MailSecurity in gateway mode Manual MailSecurity for Exchange/SMTP Checking if the MX record for your domain is set correctly 1. Open command prompt. Type nslookup 2. Now type 'set type=mx' 3. Enter your mail domain. 4. The MX record should return a single IP. This IP must be the IP of the machine on which GFI MailSecurity is installed! Checking the MX record of your domain Step 7: Test your new mail relay server! Before you proceed to install GFI MailSecurity, verify that your new mail relay server is working correctly. 1. Test IIS 5 SMTP inbound connection of your mail relay server by sending a mail from an external account to an internal user (you can use hotmail, if you don’t have an external account available). Verify that the mail client received the email. 2. Test IIS 5 SMTP outbound connection of your mail relay server by sending a mail to an external account from a mail client. Verify that the external user received the email. Note: Instead of using an email client, you can use Telnet and manually send an email. This will give you more troubleshooting information. Here is the link to the Microsoft KB article how to do it: http://support.microsoft.com/support/kb/articles/Q153/1/19.asp Step 8: Running GFI MailSecurity set-up Step 1: Run GFI MailSecurity set-up by double-clicking the file MailSecurity.exe on the SMTP relay machine. GFI MailSecurity will also prompt you to check for a later GFI MailSecurity version. We recommend you do this and always use the latest version. Step 2: Confirm the License agreement. Step 3: Enter your Name, company, and License key. If you are evaluating the product, leave the default ‘Evaluation’. Click Next. Step 4: Set-up will now ask you to specify the administrator email address. Enter the e-mail address of the Administrator. Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in gateway mode • 21 Specifying the administrator email address Step 5: Set-up will now ask you where you want GFI MailSecurity to be installed. GFI MailSecurity will need approximately 30 MB of free hard disk space. In addition to this, you must reserve approximately 200 MB for temporary files. Step 6: Set-up will now ask you to specify your mail server IP & port and your local domain. The local domain is the last part of your internal e-mail address, for example gfi.com. You can use the Test IP function to test whether the IP and port you specified are correct Is Active Directory installed? Step 7a: This step only occurs if Active Directory is installed! If Active Directory is installed, set-up will ask you whether this server has access to all Network users in Active Directory. This step is relevant if you are installing GFI MailSecurity on a machine in the DMZ that is not part of the main domain, and therefore will not have all users listed in Active Directory. In this case you can select that GFI MailSecurity will not use Active Directory to retrieve users. Users will 22 • Installing GFI MailSecurity in gateway mode Manual MailSecurity for Exchange/SMTP be based on SMTP e-mail addresses and not on Active Directory users. Users will be automatically added to a database as e-mail flows through the GFI MailSecurity scan engine. (Each internal email address is automatically added to the database) Step 7b: This step only occurs if Active Directory is NOT installed! GFI MailSecurity will ask you what type of internal mail server you are running. What mail server you are running In this dialog you have 3 options: 1. Microsoft Exchange Server 5.5. In this case, GFI MailSecurity will synchronize its users with the Exchange Server 5.5 user database. If you select this option, after installation the GFI MailSecurity User synchronization wizard will start and retrieve users from your Exchange 5.5 server. Note: Install Microsoft Exchange administrator on the machine running GFI MailSecurity! 2. SMTP/POP3 server or Lotus Notes. In this case, GFI MailSecurity will automatically add users to a database as e-mail flows through the GFI MailSecurity scan engine. (Each internal email address is automatically added to the database) 3. Microsoft Exchange Server 2000/2003. This option is identical to the SMTP/POP3 server or Lotus Notes option. If GFI MailSecurity is running on the DMZ, and does not have access to all network users in Active Directory, GFI MailSecurity will automatically add users to a database as e-mail flows through the GFI MailSecurity scan engine. (Each internal email address is automatically added to the database) Note: If GFI MailSecurity is running on the DMZ, and does not have access to Exchange 5.5, you can also select this option. The set-up program will now copy all program files to the selected destination, and finish the installation by creating a GFI MailSecurity program group. Click Finish to finish setup. The GFI MailSecurity services will now be started. Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in gateway mode • 23 Step 8: You can check if GFI MailSecurity is running using the GFI MailSecurity monitor. The GFI MailSecurity remote monitor To monitor GFI MailSecurity: Click Start > Programs > GFI MailSecurity admin tools and select GFI MailSecurity monitor. The Exchange 5.5 User synchronization wizard Note: In order for the synchronization wizard to run, install the Microsoft Exchange administrator on the machine running GFI MailSecurity! The User synchronization wizard is only applicable to Microsoft Exchange server 5.5 users. This wizard will automatically start after you have installed GFI MailSecurity AND selected that you are running Microsoft Exchange Server 5.5. This wizard will connect to Exchange server and synchronize users via DAPI, so as to allow you to configure rules on a per user basis. Requirements to run the User Synchronization Wizard 1. The Exchange 5.5 administrator must be installed on the GFI MailSecurity machine. GFI MailSecurity requires certain DAPI DLL's installed by the Exchange 5.5 administrator, in order to successfully perform the synchronization process. 2. An account with administrative rights within the Exchange directory. You can either specify a separate account, or use your own admin account. If you use a separate account, you can use this procedure to grant an account admin rights in the Exchange 5.5 directory: • From the Exchange Administrator, open the Properties for the Site against which synchronization should be performed. • In the permissions tab grant the Account used for synchronization the 'Admin' role. • Repeat the same procedure for the 'Configuration' container within the Site. • In case you want to synchronize multiple exchange sites you will need to repeat the whole procedure for each of the sites. Running the User synchronization Wizard Step 1: When the Wizard is started you are presented with the initial welcome screen. Click Next to Continue. 24 • Installing GFI MailSecurity in gateway mode Manual MailSecurity for Exchange/SMTP Step 2: The User sync wizard will ask you for: • The Exchange Server 5.5 machine name. • A username (use domain notation, i.e. domain\username) and password which it should use to connect to the Exchange 5.5 server. Note: that if you use an administrative account on which you change the password regularly, you will have to change the password for the synchronization service also. Step 3: Confirm the entries you specified by clicking on ‘Confirm settings’ and click Next. The wizard will now retrieve a list of sites from which you can retrieve users. Select the sites from which you wish to retrieve users and click Next. Step 4: User synchronization will now take place. GFI MailSecurity will install a new service, called the MailSecurity synchronisation service and will re-start a number of services. Click Next to finish. The GFI MailSecurity database will be populated with all users from the Exchange 5.5 directory. Entering your License key after installation If you have purchased GFI MailSecurity, you can enter your License key in the General > Licensing node. If you are evaluating GFI MailSecurity with an evaluation key, the product will time out after 60 days. If you then decide to purchase GFI MailSecurity, you can just enter the License key here without having to re-install. Entering the License key should not be confused with the process of registering your company details on our website. This is important; since it allows us to give you support and notify you of important product news. Register on: http://www.gfi.com/pages/regfrm.htm In Gateway mode, you must license GFI MailSecurity based on the number of users in Active Directory that have an e-mail address configured. Manual MailSecurity for Exchange/SMTP Installing GFI MailSecurity in gateway mode • 25 Configuring Content & Attachment checking Introduction to content checking This chapter explains how to set up content & attachment checking in GFI MailSecurity. The content checking feature allows you to setup a policy regarding what types of email you will allow on your mail server. To set up such a policy, GFI MailSecurity uses the concept of 'Rules'. A rule is a condition that you set, for example, blocking all executable attachments. Other examples of rules are: • blocking all mails which contain certain words • blocking all mails with attachments that can contain programs or scripts. (*.vbs) (Love Letter!) • blocking certain users sending attachments all together. Types of Content checking rules There are two types of content checking rules: Content checking rule - this rule allows you to search a mail message and its attachments for certain words. This allows you to block mails and attachments with certain content. For example, you can block attachments with specific words. Attachment checking rule – An attachment checking rule allows you to block attachments of a certain type. Both rules can be applied to all users or a specified list of users. Creating a content checking rule To create a content checking rule: 1. Highlight the content checking node in the GFI MailSecurity configuration. Right click and select New> Content checking rule. 2. A new rule will be created in the right pane. Highlight this rule and double-click it. A tabbed dialog will appear. Manual MailSecurity for Exchange/SMTP Configuring Content & Attachment checking • 27 Checking the body & subject A content checking rule (VSAPI mode) 3. In the general tab, you can specify whether you wish to apply this rule to apply to inbound mail, internal mail, outbound mail or all. You can also block PGP encrypted messages. 4. Now you can enter the conditions & keywords you wish to content check emails for. Select either 'Add Condition' to enter a condition that uses operands, or select 'Add Keyword' to enter a single keyword or a phrase. Adding a condition Adding conditions Conditions are combinations of keywords using the operands IF, AND, AND NOT, OR or OR NOT. Using conditions, you can specify combinations of words that must appear in the e-mail. For example a condition "If Word1 AND Word2" will check for Word1 and Word2. Both words would have to be present in the mail to activate the rule. To add a condition, select 'Add Condition' 28 • Configuring Content & Attachment checking Manual MailSecurity for Exchange/SMTP Adding a keyword or phrase Adding keywords If you only wish to check for single words or phrases, you do not need to create a condition. In this case you can just add a keyword. Select 'Add Keyword' to do this. If you enter multiple words, then GFI MailSecurity will search for that phrase. For example if you enter Basketball sports, then GFI MailSecurity will check for the phrase 'Basketball sports'. Only this phrase would activate the rule, not only the word basketball OR sports. 5. By default, only the message body of the mail will be checked. You can have GFI MailSecurity open an attachment and check for keywords in the attachment itself. To do this, click on 'Attachment checking options'. Enable 'Check these attachments', and specify the extensions of the attachments you wish to content check using the Add & remove buttons. Note: This option will cost processing time, since it is time intensive to search for words through attachments. Its best to only do this for doc, txt and rtf attachments and to quarantine other attachments. 6. After you have specified keywords and combinations to check for, you can select a number of options: Match whole words only: Enabling this option allows you to ensure that GFI MailSecurity will only block mails where the word you specify is a whole word. For example, if you specify the word sport, an email with the word sport will be blocked, but not an email with the word Allsports. Block PGP encrypted mails: This option will block/quarantine messages that are encrypted using PGP. This will allow you to intercept messages trying to bypass the GFI MailSecurity content checking engine. Import/Export: You can import keywords & conditions using the Import/Export function. To do this, create a text file and include each condition or keyword on a separate line. Phrases should be enclosed in “”. Condition operators should be written in capitals. Tip: Export a sample file to see the exact format. 7. You can now proceed onto the next tab and specify words that you wish to check for in the subject of the message. Manual MailSecurity for Exchange/SMTP Configuring Content & Attachment checking • 29 Content checking rule – subject tab Specifying the actions to be taken 8. After you have specified what the content rule should check for, you can now specify what should be done if GFI MailSecurity finds a mail with those words in the body. Content checking rule – actions tab – gateway version You can choose from the following options: Block mail & perform action: Enabling this will block the mail and allow you to either quarantine, delete or move the mail. 30 • Configuring Content & Attachment checking Manual MailSecurity for Exchange/SMTP Quarantine e-mail: This will quarantine the mail or message part for review by an administrator. For more information on quarantining, see the chapter on Quarantining. Delete e-mail: (Gateway version only) entire e-mail. This option will delete the Delete body/attachment: This option will delete the ‘offending’ mail message part (i.e. body or attachment) Move mail to folder: This option will move the mail part to a folder. Notification The following notification options are available Notify user via mail: This option allows you to notify the user via email that the message was blocked. Notify manager via mail: This option allows you to notify the users manager via e-mail that the mail was blocked. The manager of a user is specified in Active Directory. If no manager is specified the default manager is notified. The default manager can be configured from the quarantine options node. Log occurrence of rule to this file: Optionally you can log the fact that a rule was ‘activated’ to a log file of your choice. Note: You can also choose not to block the mail, but simply to notify the user or to log the occurrence of it. Applying the rule to users 9. After you have configured what to check for and what to do, you can specify for which users GFI MailSecurity will apply this rule. By default, GFI MailSecurity will apply the rule to all emails. However, you can choose to apply the rule to only a few users. This can be done from the users tab. The Content checking rule ‘Users’ tab Manual MailSecurity for Exchange/SMTP Configuring Content & Attachment checking • 31 To add users, select add. GFI MailSecurity will automatically list all the users listed in Active Directory. If you do not have Active Directory, all known/imported SMTP addresses will be listed. You can then select to which users to apply the rule. Alternatively you can select the users to which the rule should not apply! You can also apply the rule to one or more mail enabled public folders. When you are ready specifying to which users the rule will apply, click OK to save the rule. Renaming the rule After you have created and saved the rule, you can rename it. To do this, simply right click on the rule and select ‘rename’. Creating an attachment checking rule An attachment checking rule allows you to block attachments of a certain type. The attachment checking rule differs from the content checking rule in that it only checks for a type of attachment. The content checking rule checks attachments also, but only for words contained in them. If running in Exchange VSAPI mode: Be careful when applying attachment rules! Some MAPI applications running on Exchange might be using vbs or exe files. You need to ensure that if this is the case, you don’t apply rules to quarantine exe or vbs files to mailboxes used by those applications. To create an attachment checking rule: 1. Highlight the Attachment checking node in the GFI MailSecurity configuration. Right click and select New> Attachment checking rule. 2. A new rule will be created in the right pane. Double-click on this rule. A tabbed dialog will appear. The attachment checking rule 32 • Configuring Content & Attachment checking Manual MailSecurity for Exchange/SMTP 3. Specify whether to apply this rule to inbound mails, internal mails, outbound mails or all. To understand how GFI MailSecurity determines whether a mail is inbound, internal or outbound, see the chapter 'Advanced Use'. Checking attachments 4. Specify which attachments to block. You can specify a list of attachments types or names to block, or you can specify a list of attachments which are allowed through, such as doc or txt. Adding a file type or file name to block To add a file to block, click on the ‘Add’ button. You can use asterisk (*) wildcards to specify file names that have certain strings in the name. For example specifying *orders*.mdb blocks files which contain the string 'orders' in the file name. *.jpg will block all jpg files. You can also block attachments based on size. To do this simply select ‘Block files greater than’ and enter attachment size. The attachment checking rule ‘Actions’ tab. Manual MailSecurity for Exchange/SMTP Configuring Content & Attachment checking • 33 Specifying actions to be taken 5. After you have specified what the attachment rule should check for, you can now specify what should be done if GFI MailSecurity finds that type of attachment. You can choose from the following options: Block attachment & perform action: Enabling this will block the attachment and allow you to either quarantine, delete or move the attachment. Quarantine attachment: This will quarantine the attachment for review by an administrator. For more information on quarantining, see the chapter on Quarantining. Delete attachment: This option will delete the attachment Delete e-mail: (Gateway version only) entire e-mail. This option will delete the Move attachment to folder: This option will move the attachment to a folder. Notification The following notification options are available Notify user via mail: This option allows you to notify the user via email that the attachment was blocked. Notify manager via mail: This option allows you to notify the users manager via e-mail that the attachment was blocked. The manager of a user is specified in Active Directory. If no manager is specified the default manager is notified. The default manager can be configured from the quarantine options node. Note: This option is only available if you have Active Directory. If you don’t have Active Directory, the option is called “Notify Administrator via e-mail”. The administrator email address can be configured in the quarantine options dialog. Log occurrence of rule to this file: Optionally you can log the fact that a rule was ‘activated’ to a log file of your choice. Note: You can also choose not to block the attachment, but simply to notify the user or to log the occurrence of it. Applying the rule to users 6. After you have configured what to check for and what to do, you can specify for which users GFI MailSecurity will apply this rule. By default, GFI MailSecurity will apply the rule to all email. However, you can choose to apply the rule to only a few users. This can be done from the users tab. 34 • Configuring Content & Attachment checking Manual MailSecurity for Exchange/SMTP The Content checking rule ‘Users’ tab To add users, select add. GFI MailSecurity will automatically list all the users listed in Active Directory. If you do not have Active Directory, all known/imported SMTP addresses will be listed. You can then select to which users to apply the rule. Alternatively you can select the users to which the rule should not apply. You can also apply the rule to one or more mail enabled public folders. When you are ready specifying to which users the rule will apply, click OK to save the rule. Renaming the rule After you have created and saved the rule, you can rename it. To do this, simply highlight the rule, right click and select ‘rename’. Manual MailSecurity for Exchange/SMTP Configuring Content & Attachment checking • 35 Quarantining Introduction When an email does not pass the ‘content check’ and is quarantined by GFI MailSecurity, the email has to be reviewed by an authorized person (from now on called the administrator) and then approved or rejected. In GFI MailSecurity this review process can be done in the following ways: 1. Via an HTML email to the administrator 2. Via an HTML email sent to a public folder. 3. Via an HTML email to the users manager/supervisor 4. Using the moderator client 5. Using the web based moderator The advantage of using HTML email, is that the process is proactive, i.e. the moderator does not need to remember to check the moderator client. In addition, e-mails can be approved/rejected directly from an e-mail client, anywhere on the network. Furthermore, it allows the burden of moderating emails to be distributed either amongst the managers of the users, or to a public folder. By giving access to more then one person to the public folder, the moderating burden can be divided. The advantage of using either the moderator client or the web based moderator is that the interface is optimized for faster/batch approving/rejecting of mails. Quarantine options You can set-up how mail should be quarantined from the Quarantine options node in the GFI MailSecurity configuration. To do this, right click on the Quarantine options node and bring up the Quarantine options properties. Manual MailSecurity for Exchange/SMTP Quarantining • 37 Quarantine mode Now configure who should moderate the e-mail: 1. Send quarantined mail to the user's manager: This option will send the mail to the manager of the user as configured in Active Directory. (See below how to do this) 2. Send all quarantined mail to the following e-mail address: This option will send all quarantined mails to a single user, usually the network administrator. 3. Send all quarantined mail to a mail enabled public folder: This option allows you to specify a public folder. By giving multiple users access to this folder, you can divide the moderating burden. Note: This option only appears if you are using the VS API mode. Its possible to use a public folder in Gateway mode too, however in that case you will need to specify the email address of the public folder in option 2. 38 • Quarantining Manual MailSecurity for Exchange/SMTP Quarantine options Quarantine options In the Quarantine options tab you can specify how you want approved quarantined items to be delivered to recipients: Always send file as attachment: This option always attaches the quarantined item in e-mail. If using GFI DownloadSecurity, this option is not recommended, because mail could slow down if the user downloads a very large file. Send link instead of attachment if file exceeds a number of bytes: This option sends a link if the file is large. Always send link instead of attachment: This option always send a link. Configure a manager in Active Directory This option is only available if you have Active Directory To configure a manager of a user in Active Directory: 1. Start Active Directory Users & Computers and go to the users node, 2. Now select the user for whom you want to configure the manager. Double-click to bring up the user's properties. 3. Go to the Organization tab. Now click on the manager button to specify the user's manager Manual MailSecurity for Exchange/SMTP Quarantining • 39 Configuring a manager in Active Directory Approving/rejecting mail via an e-mail client When email is quarantined, the administrator is notified by receiving the actual mail that is quarantined. The subject of the mail will show which mail user triggered the quarantine and what the reason of the quarantine was. A quarantined email in a public folder The quarantined e-mail notification will contain the reason for quarantining, the quarantined item as attachment, and the following three options: 40 • Quarantining Manual MailSecurity for Exchange/SMTP Approve Message: This will approve the message and it will automatically be sent to the recipient. Delete Message: This will delete the message. Delete and Notify: This action will delete the message, and notify the sender that the message was not sent out. You can select your preferred action. Note that you can also forward the mail directly to the recipient, or to another user using the forward function of your e-mail client. You can notify the user automatically about the outcome of the quarantine Approving/rejecting mail using the Moderator Client When email is quarantined, it is also listed in the moderator client. The moderator client lists all the emails that have been quarantined. This utility allows you to approve or reject messages in a more ‘high volume’ fashion, since you can approve/reject multiple messages in one go. The moderator client is slightly different depending on whether you have installed GFI MailSecurity in VS API or in Gateway mode. If installed in Gateway mode, GFI MailSecurity will allow you to delete an entire mail, not only a message part. In addition if a mail has multiple ‘offending’ parts, then they will be grouped. The moderator client – gateway version Manual MailSecurity for Exchange/SMTP Quarantining • 41 To use the moderator client: 1. Start up the moderator client from the MailSecurity program group. The client consists of a 2 pane interface, which allows you to quickly view all quarantined messages. In addition, you can view: Critical Failures: Lists all processing errors Notifications: Lists all messages that GFI MailSecurity has generated regarding events that happened, such as updating the virus definition files. 2. To approve or reject a mail, simply click on the ‘Quarantined mails’ node. This will show you a list of quarantined mails. You can now approve or reject a mail by right clicking on a mail and selecting the appropriate action. Approving mail using the moderator client Using the remote moderator client The third method to approve or reject mail is to use the web based remote moderator client. The web based remote moderator lists all the emails that have been quarantined. This utility allows you to approve or reject messages in a more ‘high volume’ fashion, since you can approve/reject multiple messages in one go. The moderator client is slightly different depending on whether you have installed GFI MailSecurity in VS API or in SMTP Gateway mode. If installed in Gateway mode, GFI MailSecurity will allow you to delete an entire mail, not only a message part. In addition if a mail has multiple ‘offending’ parts, then they will be grouped. 42 • Quarantining Manual MailSecurity for Exchange/SMTP The web based remote moderator To use the remote moderator: 1. Ensure that you have installed the web based moderator according to instructions in the paragraph setting up the web based moderator (further on in this chapter) 2. Go to the following URL and enter authentication http://<mailsecurityserver_name>/remotemoderator (this depends on how you have configured it) 3. After authentication, the remote moderator will show you the quarantined mails on the right hand side. On the left hand side, there are 3 sections: • Viewing – allows you to select between viewing quarantined mails, critical failures or notifications. • Messages – allows you to perform operations on quarantined mails, such as select all or approve or reject. • Navigation – allows you to navigate. A quarantined item in the remote moderator Manual MailSecurity for Exchange/SMTP Quarantining • 43 4. To approve or reject a mail, expand the quarantined mail by clicking on the arrow to the right of the mail. The reason for quarantining the mail will be listed. You can view the mail by clicking on the show email link. You can view the headers of the mail by clicking on the headers.txt link Viewing email content in the remote moderator 5. You can then either approve or reject the WHOLE MAIL or just a particular MAIL PART: • To approve or reject the whole mail, tick the check box in front of the mail and select Delete, Delete & Notify or Approve in the ‘Messages’ section to the left of the mail. • To approve or reject a mail part, click on the appropriate button just below the mail part. Approving mail using the web based moderator 6. Besides quarantined mails, you can view: Critical Failures: Lists all processing errors 44 • Quarantining Manual MailSecurity for Exchange/SMTP Notifications: Lists all messages that GFI MailSecurity has generated regarding events that happened, such as updating the virus definition files. To view these simply click on the appropriate heading in the ‘Viewing’ section. Quarantined mail from the user point of view The quarantining of mail is largely transparent to the mail user. It differs slightly depending on which mode you are running GFI MailSecurity in. If running in SMTP gateway mode For inbound & outbound mail, users will receive the quarantined mail or attachment as soon as the administrator approves it. If running in VS API Exchange mode For inbound mail, users will receive the quarantined email or attachment as soon as the administrator approves it. For outbound mail however, the procedure is a little more complex. This is due to the fact that GFI MailSecurity does not receive recipient information via VS API, and therefore, GFI MailSecurity will generate a mail that the user has to forward to the original recipient. Forwarding an attachment that got quarantined to the original recipient Ticketing system (VS API mode) The system that allows outbound mails to be sent after they have been quarantined is called the ticketing system. Basically what happens is that a new message, containing the file attachment or the original mail that was quarantined is sent to the user, accompanied by Manual MailSecurity for Exchange/SMTP Quarantining • 45 a ticket number, giving the user 24 hours to forward the mail or attachment to the original recipient. The user can modify the body of this approval ticket mail, but not the attachment. Setting up the web based moderator In order to use the web based moderator, you will need to setup the moderator via the IIS configuration. To do this, follow these steps: 1. The MailSecurity installation installs all the necessary files in the MailSecurity\RemoteModerator folder. This folder contains a sub folder wwwroot, which contains the Web based Moderator files. Creating the virtual directory. 2. To use the Web based moderator, you need to create a virtual directory in IIS, pointing to the wwwroot folder. To do this, open up Internet Services Manager, right click on the Web Site node, and from the popup menu select New – Virtual Directory. Naming a Virtual Directory Alias. 3. This will start the Virtual Directory Creation Wizard. Click Next to continue. Now you need to give the alias for the virtual directory. In 46 • Quarantining Manual MailSecurity for Exchange/SMTP this case it is RemoteModerator, but you can enter whatever name you like, as long as it follows the folder naming conventions used in Microsoft Windows. See Figure 3 below. Selecting the web site content directory. 4. Now enter the path where the content is located. From the wizard select browse, and select the sub folder wwwroot under RemoteModerator folder in the MailSecurity installation path. 5. Next we need to set the access permissions for the Remote Moderator Client. From the check boxes available select only Read and Run Scripts. Now click next to finish the Virtual Directory Creation Wizard Setting the Virtual Directory Access Permissions. Manual MailSecurity for Exchange/SMTP Quarantining • 47 The newly created virtual directory. 6. Now right click on the newly created virtual directory, located under the web root of your web site server and select properties Virtual Directory Properties Tab. 7. From the properties dialog, select the Read, Log Visits and Index this resource check boxes in the Virtual Directory tab. For Execute Permissions, select Scripts Only. See Figure 9 for more information. 8. Next press on the configuration button. The Application Configuration dialog pops up. Go to the App Options tab and set the settings as shown in the screenshot. Make sure to set the ASP Script Timeout value to 600 or above. Some operations can take time, especially if the machine is heavily loaded. This makes sure that the scripts will not timeout. Press OK when ready to close the dialog. 48 • Quarantining Manual MailSecurity for Exchange/SMTP Settings in Application Configuration dialog. 9. Press OK once again in the properties dialog box to close it. Securing the web based moderator Since the Remote Moderator Client provides administrative control on messages and files, quarantined by GFI MailSecurity or GFI DownloadSecurity, it is important that proper authentication is performed. There are three ways to secure the Remote Moderator Client. These are Basic Authentication, Digest and Integrated Windows Authentication. Integrated Windows Authentication is the preferred choice in an Active Directory environment, because it makes the authentication process seamless, since initially it does not prompt users for their user name or password information. Rather, it uses the current Windows user information on the client computer for authentication. If you are installing GFI MailSecurity on a DMZ, you must use Basic authentication. The following steps show how to secure access to the Web based moderator. 1. Open up Internet Services Manager. Right click on the Remote Moderator Client virtual directory under your server web site and select properties. 2. Under the Virtual Directory tab make sure to deselect Directory Browsing. 3. Select the Documents tab and remove all the default documents. Add the following default document ‘main.asp’. Manual MailSecurity for Exchange/SMTP Quarantining • 49 Default document for the Web based moderator. 4. Next select the Directory Security tab and click on the Edit button for the Anonymous access and authentication control group. 5. Select Integrated Windows authentication (recommended if installed on the internal network) OR Basic Authentication check box (if installed in the DMZ). Ensure Anonymous access is deselected. Authentication methods for Remote Moderator Client. If using Integrated Windows authentication, then authentication will occur against Active Directory. This means you do not need to configure additional users. If you use basic authentication, authentication will occur against the local user database on the machine. In this case you must create user names and passwords on 50 • Quarantining Manual MailSecurity for Exchange/SMTP that local machine. For more information on securing IIS, please review the IIS documentation. Be sure not to allow anonymous access! 6. Now restrict access to the accounts you want by using NTFS permissions. Open up Explorer and navigate to the wwwroot subfolder under RemoteModerator folder in the MailSecurity installation path. Right click on the ‘wwwroot’ sub folder and select properties and then the Security tab. 7. Add / remove the users / groups you want to allow access to the Remote Moderator Client. To allow access only to users forming part of the administrators group you would set the security tab as in the screenshot. Click OK. You have now secure the web based moderator. Setting the Web based Moderator NTFS permissions. If you are using GFI DownloadSecurity: You need to exclude the URL of the web based moderator, in order to avoid duplicate quaranting of files. To do this: 1. Open up the ISA Management console. Expand the Server node where GFI DownloadSecurity is installed, and go to the Extensions – Web Filters sub node. Right-click on the DownloadSecurity filter item in the right pane of the ISA Management console. 2. In the DownloadSecurity Filter Properties dialog box, add the domain of the server where you have installed the Remote Moderator Client, to the Do not scan these URL’s list. Press the OK button to close the dialog box. This will cause GFI DownloadSecurity not to check files on the web based moderator website. Manual MailSecurity for Exchange/SMTP Quarantining • 51 Configuring Virus checking Configuring scanning engines GFI MailSecurity can virus check all inbound, internal and outbound mail. All mails with viruses will be quarantined for review by an administrator. One of the key features of GFI MailSecurity is that it can use one or more virus scanning engines. As standard, both the Norman Virus Control engine and the BitDefender virus scanning engine are included. Optionally you can license the McAfee virus scanning engine. The Norman Anti virus engine is a proven and reliable virus detection engine, which has received many awards and certifications, including the industry leading certifications of ICSA, VirusBTN and Check mark. The BitDefender is a new and innovative virus scanning engine, which has receive ICSA certification. It is important to note that checking inbound mail with an anti virus engine is only a small part of GFI MailSecurity. You must setup content checking of inbound and outbound mail as well, in order to block email with scripts. Configuring Virus scanning engines To configure virus checking, go to the virus scanning engines node. This node lists all installed virus scanning engines. You can configure each virus scanning engine separately. Deleting/Quarantining infected mails You configure GFI MailSecurity to either delete a virus infected mail, delete the infected part only (for example the attachment) or quarantine a virus infected mail. This can be done from the Virus scanning engines properties dialog. To do this: Manual MailSecurity for Exchange/SMTP Configuring Virus checking • 53 Virus Scanning Properties 1. Go to the Virus scanning engines node, right click and select properties. 2. The Virus scanning engines properties dialog will appear. Select whether to quarantine, delete infected message part only or delete entire mail and click OK. Norman Virus Control configuration To configure the Norman Virus Control engine: 1. Go to the Virus scanning engines > Norman Virus Control node, right click and select properties. 2. Enable virus checking for inbound mail, internal mail, outbound mail or all. Virus checking options 54 • Configuring Virus checking Manual MailSecurity for Exchange/SMTP Microsoft Office macro settings 3. Norman Virus Control also allows you to block Office documents that contain macros. You can select one of the following options: Do not check macros (not recommended) – This option will cause GFI MailSecurity to ignore macros and just rely on the anti virus engine to check for new viruses. Block all documents containing macros – This option will quarantine all Microsoft Office attachments that contain macros. Blocking word macros It is highly recommended to quarantine all macros. This will effectively protect you 100% from any unknown macro viruses. Some macros are not viruses, but macros received via the Internet are highly suspicious. Of course the Virus engine will check for known viruses, but new email viruses can spread so fast that your system can become infected before the virus signatures has been updated. (This happens with all anti virus engines). In addition, malicious hackers, could use a custom made macro embedded in a word document to attack your company to install a Trojan or obtain confidential information. Norman scanner engine information 4. The section in the general tab displays the scanning engine version as well as the date of the current signature files. Virus updates settings Virus updates settings You can set-up virus update settings from the updates tab. To enable checking for updates, ensure that the ‘Automatically check for updates option is ticked’. You can then choose to automatically download the updates or just be notified when new updates are available. You can specify the interval under the ‘Download/Check every:’ option. Manual MailSecurity for Exchange/SMTP Configuring Virus checking • 55 Triggering the virus update manually You can trigger a manual download of the virus updates by clicking on the 'Download updates now' button. Update options General update options, for example download mode and download location, can be configured General > General settings node in the MailSecurity configuration. For more information on general update options, please see the General Options chapter, paragraph update options. Norman Web site For more information about the virus patterns included in the Norman Virus Control (NVC) engine, go to the NVC website at: http://www.norman.no/technical_nvc.shtml BitDefender configuration To configure the BitDefender engine: 1. Go to the Virus scanning engines > BitDefender node, right click and select properties. 2. Enable virus checking for inbound/internal and/or outbound mail. The anti virus engine options are identical to the options for the Norman engine. For a description, see the paragraph on the Norman Virus Control configuration. Configuring the BitDefender anti virus engine BitDefender Web site For more information about the virus patterns included in the BitDefender engine, go to the BitDefender website at: http://www.bitdefender.com 56 • Configuring Virus checking Manual MailSecurity for Exchange/SMTP McAfee configuration Note: The Mc Afee engine is purchased separately: The engine is not included in the base product. As standard, GFI MailSecurity includes both the Norman and the Bitdefender anti virus engine. For pricing information on adding the Mcafee anti virus engine, please see the GFI website. To configure the McAfee engine: 1. Go to the Virus scanning engines > McAfee node, right click and select properties. 2. Enable virus checking for inbound/internal and/or outbound mail. The anti virus engine options are identical to the options for the Norman engine. For a description, see the paragraph on the Norman Virus Control configuration. Configuring the McAfee anti virus engine McAfee Web site For more information about the virus patterns included in the McAfee engine, go to the McAfee website at: http://www.mcafee.com Kaspersky configuration Note: The Kaspersky virus engine is purchased separately: The engine is not included in the base product. As standard, GFI MailSecurity includes both the Norman and the Bitdefender anti virus engine. For pricing information on adding the Kaspersky anti virus engine, please see the GFI website. To configure the Kaspersky engine: 1. Go to the Virus scanning engines > Kaspersky node, right click and select properties. 2. Enable virus checking for inbound/internal and/or outbound mail. Manual MailSecurity for Exchange/SMTP Configuring Virus checking • 57 The anti virus engine options are identical to the options for the Norman engine. For a description, see the paragraph on the Norman Virus Control configuration. Configuring the Kaspersky anti virus engine Kaspersky Web site For more information about the virus patterns included in the Kaspersky engine, go to the Kaspersky website at: http://www.kaspersky.com 58 • Configuring Virus checking Manual MailSecurity for Exchange/SMTP The Email Exploit engine Introduction to e-mail exploits What is an exploit? An exploit uses known vulnerabilities in applications or operating systems to compromise the security of a system, for example execute a program or command, or install a backdoor. It "exploits" a feature of a program or the operating system for its own use. What is an e-mail exploit? An email exploit is an exploit launched via email. An email exploit is essentially an exploit that can be embedded in an email, and executed on the recipient’s machine either once the user opens or receives the email. This allows the hacker to bypass firewalls and anti-virus products. Difference between Anti Virus software & Email exploit detection software Anti-virus software is designed to detect malicious code. It does not necessarily analyze the method being used to execute the code. The email exploit detection engine analyses emails for exploits - i.e., it scans for methods to execute a program or command on the user’s system. The email exploit engine does not check whether the program is malicious or not. Rather, it assumes a security risk if an email is using an exploit in order to run a program or command - whether or not the actual program or command is malicious. In this manner, the email exploit engine works like an intrusion detection system (IDS) for email. The email exploit engine might cause more false positives, but it is more secure than a normal antivirus package, simply because it uses a totally different way of checking for e-mail threats. Furthermore, the email exploit engine is optimized for finding exploits in email, and can therefore be more effective at this job than a general purpose anti-virus engine. Manual MailSecurity for Exchange/SMTP The Email Exploit engine • 59 Configuring the email exploit engine Configuring the Email exploit engine Disabling email exploits You can configure which exploits GFI MailSecurity should check for. For example, some exploits might not apply to your network, in which case you can disable checking for them. You can disable an exploit check by going to the exploit engine node and right clicking on the exploit in the right pane, and selecting disable. You can disable all exploits by disabling the email exploit engine. To do this right click on the email exploit engine node and select ‘disable engine’. Email exploit engine properties Email exploit engine properties 60 • The Email Exploit engine Manual MailSecurity for Exchange/SMTP You can configure what GFI MailSecurity should do with an email that contains an email exploit. You can either quarantine or delete the email. You can change this setting by right-clicking on the exploit engine node, and selecting properties. Email exploit update settings Configuring exploit updates You can configure the Email Exploit engine to automatically download new exploits as they come available. This can be configured from the updates tab of the Email Exploit general properties dialog. To access this dialog right click on the Email Exploit Engine node, right-click and select properties. To enable checking for updates, ensure that the ‘Automatically check for updates option is ticked’. You can then choose to automatically download the updates or just be notified when new updates are available. You can specify the interval under the ‘Download/Check every:’ option. Triggering the update manually You can trigger a manual download of the updates by clicking on the 'Download updates now' button. Update options General update options, for example download mode and download location, can be configured from the General > General settings node in the MailSecurity configuration. For more information on general update options, please see the General Options chapter, paragraph update options. Manual MailSecurity for Exchange/SMTP The Email Exploit engine • 61 The HTML Threat Engine Introduction to the HTML Threat Engine The HTML threat engine (previously called email threat engine) is designed to analyze HTML emails for potential threats and defuse them. The HTML threat engine basically analyses inbound HTML e-mail for HTML scripts. As soon as it finds an HTML script, it disables the script by replacing the script with placeholders. The effect of this is that the mail can still be sent to the recipient, and the recipient can read the email as usual, including formatting and images, but the e-mail is totally harmless. This HTML defusing is an automatic process and happens without administrator intervention. The HTML defusing process is patented by GFI Software Ltd. Why defuse HTML scripts? The introduction of HTML mail has allowed senders to include scripts in email that can be triggered automatically upon opening mail. HTML scripts are used in a number of headline hitting viruses, such as the KAK worm. Also HTML scripts can be used in one-off attacks directed towards particular users and particular companies. So it’s recommended that you disable HTML scripts in e-mail. The HTML script defuser is an easy way to do this. Manual MailSecurity for Exchange/SMTP The HTML Threat Engine • 63 Configuring the HTML Threat Engine Configuring the HTML Threat engine The email threat engine is installed and configured by default. All you need to do is enable it and select medium or high security. In medium security mode, all highly dangerous HTML scripts are defused. In High Security mode, ALL HTML scripts are defused. 64 • The HTML Threat Engine Manual MailSecurity for Exchange/SMTP The Trojan & Executable Scanner Introduction to the Trojan & executable scanner GFI MailSecurity 8 includes an advanced Trojan and executable scanner, which is able to analyze what an executable does, and quarantine any executables (for example Trojans) which perform suspicious activities. What Is A Trojan Horse? The Trojan Horse got its name from the old mythical story about how the Greeks gave their enemy a huge wooden horse as a gift during the war. The enemy accepted this gift and they brought it into their kingdom, and during the night, Greek soldiers crept out of the horse and attacked the city. In computers a Trojan horse is a way to enter a victims computer undetected, allowing unrestricted access to the data stored on that computer to the attacker, causing great damage to the victim, just like the citizens of Troy. A Trojan can be hidden, as a program that is being run on your computer which you don’t know about, or it can be ‘wrapped’ into a legitimate program meaning that a program that you use might have hidden functions that you don’t know about. Difference between Trojans and Viruses The difference between Trojans and Viruses is that Trojans are often ‘one-off’ executables, targeted towards a specific user to obtain specific information. Anti virus software, which is ‘signature based’ is unable to detect these types of Trojans. In deed any software that uses signatures only to detect malicious software will not be effective in detecting these threats (including specialized anti Trojan software). Signature based software can only detect known viruses and Trojans, which is why they need frequent updates. However, these types of software will never get to know about these one-off Trojans. Manual MailSecurity for Exchange/SMTP The Trojan & Executable Scanner • 65 The Trojan executable scanner configuration How the Trojan & executable scanner works GFI MailSecurity takes a different approach by including built-in intelligence to rate the risk-level of an executable. It decompiles the executable, and detects in real time what the executable might do. It compares these actions to a database of malicious actions and then rates the risk level of the executable. This way, potentially dangerous, unknown or one-off Trojans can be detected before they enter your network. Configuring the Trojan & Executable scanner The Trojan & Executable scanner can be configured from the Trojan & Executable scanner node. If you select the Trojan & Executable Scanner node, the checks that the Trojan executable scanner performs are listed in the right-hand side pane. However this is just for informational purposes. The main configuration option is selecting the security level of the Trojan & Executable scanner. What this does is determine what level of risk you allow an executable to have before it is quarantined. High Security quarantines almost all executables. Low security will allow many executables through. Configuring security level Selecting the security level. To configure the security level, right click on the Trojan Executable scanner node and select properties. 66 • The Trojan & Executable Scanner Manual MailSecurity for Exchange/SMTP Now move the slider to select what risk level of executables you want to let through: • High Security: Quarantines almost all executables. executable contains any signature it will get quarantined. • Medium Security: Quarantines suspicious executables. If the executable contains 1 high risk signature or a combination of high risk and low risk signatures it will get quarantined. • Low Security: Quarantines executables which are most probably malicious. If the executable contains at least 1 high risk signature it will get quarantined. If the Skip attachment checking If an executable is quarantined because of its risk level, the administrator must approve or reject the executable. You can configure GFI MailSecurity to then bypass the attachment checking module, in order to avoid the file being quarantined again. To do this, tick the check box next to ‘Skip Attachment checking if the executable is approved’ Trojan & Executable scanner update settings Configuring Trojan & exe scanner definition updates You can configure the Trojan & Executable Scanner to automatically download new updates as they come available. This can be configured from the updates tab of the Trojan and Executable scanner properties dialog. To access this dialog right click on the Trojan & Executable Scanner node, right-click and select properties. To enable checking for updates, ensure that the ‘Automatically check for updates option is ticked’. You can then choose to automatically download the updates or just be notified when new updates are Manual MailSecurity for Exchange/SMTP The Trojan & Executable Scanner • 67 available. You can specify the interval under the ‘Download/Check every:’ option. Triggering the update manually You can trigger a manual download of the updates by clicking on the 'Download updates now' button. Update options General update options, for example download mode and download location, can be configured from the General > General settings node in the MailSecurity configuration. For more information on general update options, please see the General Options chapter, paragraph update options. 68 • The Trojan & Executable Scanner Manual MailSecurity for Exchange/SMTP Decompression engine Introduction to the decompression engine The decompression engine is used to decompress compressed files (archives). The GFI decompression engine can recognize 70+ different compression formats. The decompression engine Configuring the decompression engine You can specify the way that files should be decompressed in the decompression engine node. The node lists what can be configured in the right pane: 1. Check password protected archives 2. Check corrupted archives 3. Check for amount of files in archives 4. Check for recursive archives 5. Check size of uncompressed files in archives 6. Scan within archives You can enable or disable each option by either right-clicking on them and disabling/enabling via a popup menu or by double-clicking on the option to get the properties for that option. Manual MailSecurity for Exchange/SMTP Decompression engine • 69 Check password protected archives What to do with password protected archives This option allows you to configure what to do with password protected archives. You can: Quarantine – This will quarantine the archive for administrator review Skip all modules - this will allow the archive to bypass all content security & anti virus checking. Be careful with this option! Automatically delete – this will automatically delete the archive. Optionally you can notify user via email when the password protected file is deleted. Check corrupted archives This option allows you to configure what to do with corrupted archives. You can: Quarantine – This will quarantine the archive for administrator review Skip all modules - this will allow the archive to bypass all content security & anti virus checking. Be careful with this option! Automatically delete – this will automatically delete the archive. Optionally you can notify user when a corrupted file is deleted automatically. 70 • Decompression engine Manual MailSecurity for Exchange/SMTP Check for recursive archives What to do with recursive archives This option allows you to configure what to do with archives that contain more then a certain number of levels of archives (archives within archives). This is also referred to as a recursive archive or a nested archive. A high number of archive levels can indicate a malicious archive: Recursive archives can be used in a DoS attack, since many content scanning & anti virus packages will crash if you send them a recursive archive with many levels of archives. You can configure the maximum level of archives, and what to do with an archive that contains more levels of archives. Then you can: Quarantine – This will quarantine the file for administrator review Automatically delete – This will automatically delete the archive. Optionally you can notify user via email when an archive is automatically deleted. Check for amount of files in archives This option allows you to configure what to do with archives that contain more then a certain number of archives. You can configure the limit of archives an archive should contain, and what to do with archives that contain more then that limit. Then you can: Quarantine – This will quarantine the archive for administrator review Automatically delete – This will automatically delete the archives. Optionally you can notify user via email when an archive is automatically deleted. Check size of uncompressed files in archives This option allows you to configure what to do with compressed archives which, when unpacked, are larger then a certain size. Hackers sometimes use this method in a DoS attack: By sending a file that uncompresses to a very large file, they can often crash content Manual MailSecurity for Exchange/SMTP Decompression engine • 71 security or anti virus software. You can configure the total size of the uncompressed files, and what to do with archives that contain more then that limit. Then you can: Quarantine – This will quarantine the archive for administrator review. Automatically delete – This will automatically delete the archive. Optionally you can notify user via email when an archive is automatically deleted. Scan within archives This option allows you to disable attachment checking of files in archives. Effectively it means that files in the archive will bypass the attachment checking module. 72 • Decompression engine Manual MailSecurity for Exchange/SMTP Remote monitoring & administration Installing the remote monitor/configuration GFI MailSecurity can be configured and monitored remotely. To be able to monitor and configure GFI MailSecurity remotely, you must first install the GFI MailSecurity remote admin tools. The GFI MailSecurity remote monitor The set-up for these tools can be found in the GFI MailSecurity subdirectory 'remote install'. To install the remote monitor: 1. Go to the machine on which you wish to install the remote configuration. 2. In Windows explorer, browse to the machine running GFI MailSecurity, and go to the remoteinstall share. Double-click 'remotetools.exe' and follow the set-up instructions. 3. You will be asked to specify the machine name where GFI MailSecurity is running. When set-up is finished, you can go to the GFI MailSecurity admin tools program group to configure or monitor the GFI MailSecurity server remotely. NOTE: If you can't access the share, set-up read and write permissions to the following directories: <GFI MailSecurity root folder>\RemoteInstall (sharename RemoteInstall) <GFI MailSecurity root folder>\Data (sharename Data) <%RootDrive%>\Program Files\Common Files\GFi Shared\GFIM\Data (sharename GFIMDat) Check that you can actually read and write to the shares from the machine where the Remote admin tools will be installed. Note: By default only administrators have access to the remote monitor and configuration share. If you add additional users, you have to give users access to the share. Configuring & monitoring GFI MailSecurity remotely To configure GFI MailSecurity remotely: Manual MailSecurity for Exchange/SMTP Remote monitoring & administration • 73 1. Click Start > Programs > GFI MailSecurity admin tools and select GFI MailSecurity configuration. The GFI MailSecurity configuration will start. 2. You can now modify GFI MailSecurity settings as if you we're on the GFI MailSecurity server. To monitor GFI MailSecurity remotely: 1. Click Start > Programs > GFI MailSecurity admin tools and select GFI MailSecurity monitor. 2. You can now monitor GFI MailSecurity remotely. Switching to another server to monitor or configure Configuring a different GFI MailSecurity server If you have multiple GFI MailSecurity servers in your network, you can manage them from the same Remote configuration. To switch to another server to configure: 1. Right-click on the root node, GFI MailSecurity, and select 'Connect to another computer' Switch to another server to configure or monitor 2. Now enter the computer name and click OK. You can now configure another server. Monitoring a different GFI MailSecurity server 1. In the file menu, select the option 'Connect' 2. Now enter the computer name and click OK. You will now be monitoring another server. 74 • Remote monitoring & administration Manual MailSecurity for Exchange/SMTP General options General options The general node allows you to configure a number of general options, including general settings, licensing and versioning information. To configure general settings, right click on the general > general settings node, and select properties. Configuring general settings (gateway) Manual MailSecurity for Exchange/SMTP General options • 75 Server name: All notifications and quarantined mails are sent via the SMTP service or Exchange Server. By default the server on which GFI MailSecurity is installed is used. If you need to change this to another machine, you can do so here. The Verify button allows you to verify that GFI MailSecurity can send mail via this server. Update options Configuring update options The options for updating Virus definitions, Email Exploits and Trojan and Executable scanner definitions are configured from the Updates tab in the General properties dialog. In this tab you can configure: • Whether to check for updates on the internet • Or download updates from a directory on your network. This option is useful if you have many MailSecurity servers and you prefer to download the updates to a single central location. If you select to check updates from the internet, you have to select 2 further options: Download mode You can select between HTTP, active FTP or passive FTP. We recommend using active FTP or HTTP. Using HTTP saves you having to configure the firewall. WE RECOMMEND USING HTTP IF YOU HAVE A FIREWALL! Preferred Update server You can select a preferred update server. Select update.gfi.com if you are located in the US/Canada and update.gfisoftware.com if you are located in Europe or other part of the world. 76 • General options Manual MailSecurity for Exchange/SMTP Note about Proxy servers: GFI MailSecurity uses Internet Explorer settings to download, so if you use a proxy server, you must setup Internet Explorer to work correctly with that proxy server. Note about Firewall & FTP: If you are behind a firewall, and have selected to use active FTP, you have to enable an FTP connection on the firewall which lets the machine where GFI MailSecurity is installed open an FTP connection (PORT 21 & 20) to host ftp.gfi.com or ftp.gfifax.de For a description how to make this set-up with Microsoft ISA server, see the chapter 'Advanced Use'. If you have a firewall, do not select passive FTP. We recommend using HTTP if you have a firewall. Note: If you don’t wish to configure your firewall to allow FTP downloads, simply select HTTP as the download mode If downloading fails: If the download of the virus update files fails, a file called autodown.txt will be created in the GFI MailSecurity/debuglogs directory. If this happens, please send these files to support@gfi.com. VS API Scanning modes This section applies only to the Exchange VS API mode If you have installed GFI MailSecurity in VS API mode, the general settings dialog will contain a VS API tab. Here you can configure the VS API Scanning mode: You can select the type of VS API scanning mode that you want GFI MailSecurity to use. GFI MailSecurity supports all 3 VS API scanning modes. These scanning modes are part of VS API. You can select which scanning mode GFI MailSecurity should use from the General options > VS API tab. The VS API tab is located in the general properties dialog, which can be accessed by right clicking on the general > general settings node and selecting properties. VS API provides 3 scanning modes. Two of these modes, on demand and pro active, are mutually exclusive, where as background scanning can be turned on as an option in either mode. On demand scanning In this mode, a new message gets scanned as it gets accessed by the e-mail client. That means there will be a short delay before the user can access the message. Manual MailSecurity for Exchange/SMTP General options • 77 GFI MailSecurity VS API scanning modes Pro active scanning In this mode, new messages get submitted to the queue for scanning upon receipt. However if an e-mail client accesses a new message, scanning of this message will receive higher priority. This is the recommended scanning mode. Background scanning In this mode, all EXISTING messages in the store are scanned. This setting will cause GFI MailSecurity to scan all messages in the stores. Depending on how many messages you have in the stores, Exchange & GFI MailSecurity will be very busy for a period of time after enabling this option. If you want to do this, we suggest switching it on the first time during the night, so that the bulk of the scanning work can be done during the night. For more information about scanning modes: http://support.microsoft.com/default.aspx?scid=kb;EN-US;q285667 Adding additional local domains This section applies only to the SMTP Gateway mode GFI MailSecurity needs to know what your local domains are to be able to know if a mail is inbound or outbound. During installation, GFI MailSecurity will import local domains from the IIS SMTP service. If however you wish to add or remove local domains afterwards, you can do so from the local domains tab in the general > general settings node properties: 78 • General options Manual MailSecurity for Exchange/SMTP Adding a local domain 1. Right-click on the general settings node and select properties to access this dialog. 2. Now enter the local domain This feature is handy because in some cases you might want to configure local mail routing in IIS differently, for example add domains which are local for mail routing purposes but are not local for your mail server. Changing the bindings Changing the SMTP server that GFI MailSecurity is bound to This section applies only to the SMTP Gateway mode Manual MailSecurity for Exchange/SMTP General options • 79 GFI MailSecurity relies on the IIS SMTP service to send and receive SMTP mail. It binds with your default SMTP virtual server. If you have multiple SMTP virtual servers installed on your machine, you can bind GFI MailSecurity to another SMTP virtual server in this dialog. Checking number of licensed users Checking number of licensed users The License key dialog not only allows you to enter the License key, it allows also you to see how many licenses you must have for GFI MailSecurity. Underneath the License key edit box, GFI MailSecurity will list how many mailboxes/users it sees. You can use this information to check if you have licensed GFI MailSecurity accordingly. 80 • General options Manual MailSecurity for Exchange/SMTP Version information Checking GFI MailSecurity version information The node General > Version Information contains GFI MailSecurity version and build information. You can check if you have the latest version installed using the 'Check for latest version on website' button. Version information is also very useful when contacting GFI support. This will allow us to know exactly which version you have. Manual MailSecurity for Exchange/SMTP General options • 81 Advanced topics Determining Outbound/Inbound/Internal mail This section applies only to the Exchange VS API mode GFI MailSecurity uses a set of rules to determine whether a mail is inbound, internal or outbound. In some cases it may be important to understand the logic used. This logic is based on determining if the user is present in Active Directory or not. When is a mail outbound? GFI MailSecurity will assume a mail is outbound if the sender is an internal user and the recipient is an external user. To determine whether a sender or recipient is external or internal, GFI MailSecurity makes an Active Directory query. If the user is present, he is assumed to be an internal user. When is a mail inbound? GFI MailSecurity will assume a mail is inbound if the sender is an external user and the recipient is an internal user. It will use AD to determine whether the sender/recipient is external or internal. When is a mail internal? If both the sender and the recipient appear in Active Directory then the mail is internal. Because of various reasons, we can not determine 100% if an email is internal or inbound. This is the reason why, for security reasons, you can not create separate rules for internal mail. Assuming you would set up more relaxed rules for internal mail, a security hole might appear. What if the mail has multiple recipients, both internal and external? In this case, all rules will be applied. So if a mail contains an internal recipient that has a specific rule specified, the rule will be applied. If the mail also contains an outbound rule linked to the sender, then this rule will be applied also. User synchronization with Exchange 5.5 If you are using GFI MailSecurity in gateway mode with Microsoft Exchange server 5.5, GFI MailSecurity installs a synchronization service that updates the GFI MailSecurity user database automatically. This eliminates the hassle of synchronizing users manually between Exchange Server 5.5 and GFI MailSecurity. Manual MailSecurity for Exchange/SMTP Advanced topics • 83 During set-up, the Synchronization wizard prompts you for all the relevant information. However, after set-up you can change Exchange Server name/IP, synchronization interval and the Exchange sites that are synchronized. This can be done from the General > User Synchronization node. Right click on the node to bring up the User Synchronization Properties dialog. Here you can change Exchange Server machine IP & synchronization interval. User synchronization properties Clicking on the sites button allows you to specify which sites you want GFI MailSecurity to synchronize with. 84 • Advanced topics Manual MailSecurity for Exchange/SMTP GFI MailSecurity logging GFI MailSecurity log files GFI MailSecurity maintains a number of log files in the logs subdirectory. These logs allow you to track the activity of GFI MailSecurity. The logs will include information on which mails included viruses or which mails triggered content or attachment checking rules. You can open the logs with Microsoft Excel or Access to do further analysis on these logs. You can configure which logs you want GFI MailSecurity to log to. This can be done from the GFI MailSecurity > Logging node. Configuring ISA server to allow downloading of updates If your GFI MailSecurity server is running behind a firewall, you will need to allow the machine running GFI MailSecurity to download updates from the GFI site through port 21 & port 20. If you are running Microsoft ISA server, you can find a step by step procedure in our knowledgebase. If GFI MailSecurity is NOT installed on the same machine as Microsoft ISA Server, follow the procedure described at http://kbase.gfi.com/showarticle.asp?id=KBID001346 If GFI MailSecurity is installed on the same machine as Microsoft ISA Server, follow the procedure described at: http://kbase.gfi.com/showarticle.asp?id=KBID001347 Enabling Event Logging for the Virus Scanning API This section applies only to the Exchange VS API mode This information can be found in the Microsoft Knowledgebase (Q294336). Manual MailSecurity for Exchange/SMTP Advanced topics • 85 The VS API includes inbuilt event logging that you can turn on. To set the level of detail that is logged by the virus scanning API: 1. Start Exchange System Manager. 2. In the console tree, double-click Servers, right-click the server on which you want to set the logging detail level, and then click Properties. 3. Click the Diagnostics Logging tab. 4. In Services, click MSExchangeIS\System. 5. In Categories, click Virus Scanning. Click one of the following logging levels, as appropriate: • None • Minimum • Medium • Maximum Setting Virus Scanning API Performance Monitor Counters This section applies only to the Exchange VS API mode This information can be found in the Microsoft Knowledgebase (Q285696) In addition to event logging, the VS API also has the capability to create performance counters. The following Performance Monitor counters are available: • Messages Processed. This is a cumulative value of the total number of top-level messages that are processed by the virus scanner. • Messages Processed/sec. This counter represents the rate at which top-level messages are processed by the virus scanner. • Messages Cleaned. The total number of top-level messages that are cleaned by the virus scanner. • Messages Cleaned/sec. The rate at which top-level messages are cleaned by the virus scanner. • Messages Quarantined. The total number of top-level messages that are put into quarantine by the virus scanner. 86 • Advanced topics • Messages Quarantined/sec. The rate at which top-level messages are put into quarantine by the virus scanner. • Files Scanned. The total number of separate files that are processed by the virus scanner. • Files Scanned/sec. The rate at which separate files are processed by the virus scanner. • Files Cleaned. The total number of separate files that are cleaned by the virus scanner. • Files Cleaned/sec. The rate at which separate files are cleaned by the virus scanner. • Files Quarantined. The total number of separate files that are put into quarantine by the virus scanner. Manual MailSecurity for Exchange/SMTP • Files Quarantined/sec. The rate at which separate files are put into quarantine by the virus scanner. • Bytes Scanned. The total number of bytes in all of the files that are processed by the virus scanner. • Queue Length. The current number of outstanding requests that are queued for virus scanning. • Folders Scanned in Background. The total number of folders that are processed by background scanning. • Messages Scanned in Background. The total number of messages that are processed by background scanning. Customizing the notification templates Configuring the notification templates GFI MailSecurity sends out various notification messages to the sender or recipient of an e-mail that gets quarantined or modified, as well as various messages to the administrator/manager. These messages are based on a set of templates, which can be edited from the Notification templates node. The templates contain the text of the message, as well as fields that are replaced by values upon generation of the notification message. You may wish to modify these notification templates. The most obvious reason is to localize/translate them to another language. Alternatively you might feel that the templates can be modified to explain a particular rule set or policy you have better. To modify a template, simply double-click on the corresponding template in the right-hand pane. This will open up the template in Notepad and allow you to edit the notification message. Here is a list of template file names and what they do: Filename Description Quarsubj.txt Template includes the subject of a Quarantined action message sent to manager or administrator. This subject appears on the mail sent to the person who must reject or approve a mail. quarbody.htm Message body of the Quarantined action message sent to (VSAPI mode manager or administrator. This mail is sent to the person that only) should approve or reject the mail. quarbodymsec. Message body of the Quarantined action message sent to htm (Gateway manager or administrator. This mail is sent to the person that mode only) should approve or reject the mail. quarappsubj.txt Contains the subject sent to a sender when the mail is approved to Manual MailSecurity for Exchange/SMTP Advanced topics • 87 be sent out or when the mail is approved and the recipient receives the mail. quarappticketbo Template includes the body of the "Approval ticket message", sent dy.txt (VSAPI to sender when he is allowed to send out a particular attachment mode only) or text. (in case of outbound mail) quarappbody.txt Template includes the message body of a mail that is sent to recipient when a mail item, sent to that recipient, is approved. The approved mail item will be attached to this mail. notifyusersubj.tx Notification message subject sent to recipient. This mail only gets t sent if "Notify User via e-mail" is enabled in the action tab of a rule. notifyuserbody.t xt Notification message body sent to recipient. This mail only gets sent if "Notify User via e-mail" is enabled in the action tab of a rule. notifymanagers ubj.txt Notification message subject sent to manager or administrator. This mail only gets sent if "Notify manager via e-mail is enabled in the action tab of a rule. notifymanagerb ody.txt Notification message body sent to manager or administrator. This mail only gets sent if "Notify manager via e-mail is enabled in the action tab of a rule. notifyuserappsu bj.txt Template includes the subject of a mail that is sent to recipient when a mail item, sent to that recipient, has been rejected/deleted. notifyuserappbo dy.txt Template includes the message body of a mail that is sent to recipient when a mail item, sent to that recipient, has been rejected/deleted. violatedel.txt Template includes the message body of a mail that is sent to notify a recipient that part of the mail, sent to him/her, has been deleted. violatequar.txt Template includes the message body of a mail that is sent to notify a recipient that part of the mail, sent to him/her, has been quarantined. Template fields The templates contain fields that are replaced by values upon generation of the notification message by GFI MailSecurity. In the below table each field is explained. Tag Description [QMC_ID] ID of this quarantined item. [LAST_ERROR] Last error reported by the module that quarantined this item. [LAST_MODULE] The last module to quarantine this item [MORE_INFO] More information on the last error [OBJECT_DATE] Date and time when item was quarantined [OBJECT_USER_NAME] Name of user who caused this quarantine [OBJECT_USER_EMAIL] Email of user who caused this quarantine [OBJECT_MANAGER_NA ME] Name of manager of user who quarantine. (Or default manager) [OBJECT_MANAGER_EM AIL] Email of manager of user who caused this quarantine. (Or default manager) [ACTION] The action taken [ITEM] The name of the object caused this [MESSAGE_BODY] Not yet defined [TTL] Time to live (the date when this object will be deleted from the Quarantine system [WEB_SERVER] The IP or server name where the Web monitor is listening. Used mainly for form processing and not 88 • Advanced topics Manual MailSecurity for Exchange/SMTP display purposes. [QUAR_PATH] The full path of the quarantine item. Will be in the format: Rule://QTYPE/QID. Used mainly for form processing and not display purposes. [QUAR_SECURITY_GUID] The QMC_QUAR_SECURITY GUID from the QMC record for this quarantined item. Used mainly for form processing and not display purposes. [QUAR_TTL] Time to live in floating point format. Used mainly for form processing and not display purposes. [QUAR_SECURITY_PREFI The QMC_QUAR_SECURITY PREFIX from the QMC X] record for this quarantined item. Used mainly for loop protection and not display purposes. It is automatically added to the end of every subject generated. [PRODUCT_NAME] Identifies the source of this item. Current values are: DSEC for download security MSEC for mail security exchange 2000 MSEC GWAY for mail security (Gway version) [GFISCAN_DAT_CONTEN TTYPE] The content-type of the quarantined item [GFISCAN_DISPLAY_SEN DER] The display name of the sender [GFISCAN_DISPLAY_TO] The display name of the recipient(s) [GFISCAN_DISPLAY_CC] The display name of the CC'd recipient(s) [GFISCAN_SUBJECT] The subject of the quarantined item [GFISCAN_MBX] The mailbox of the quarantined item (only available in MSEC exchange) [GFISCAN_STOREDB] The db store of the quarantined item (only available in MSEC exchange) [GFISCAN_FOLDER] The folder of the quarantined item (only available in MSEC exchange) Manual MailSecurity for Exchange/SMTP Advanced topics • 89 Troubleshooting Introduction The troubleshooting chapter explains how you should go about resolving issues you have. The main sources of information available to users are: • The manual – most issues can be solved by reading the manual. • The GFI knowledgebase – accessible from the GFI website. • The GFI support site. • Contacting the support@gfi.com • Contacting the GFI support department using our live support service at http://support.gfi.com/livesupport.asp • Contacting our support department by telephone. GFI support department by email at Knowledgebase GFI maintains a knowledgebase, which includes answers to most common problems. If you have a problem, please consult the knowledgebase first. The knowledgebase always has the most up-todate listing of support questions and patches. The knowledgebase can be found on http://kbase.gfi.com Request support via e-mail If, after using the knowledgebase and this manual, you have any problems that you cannot solve, you can contact the GFI support department. The best way to do this is via e-mail, since you can include vital information as an attachment that will enable us to solve the issues you have more quickly. The Troubleshooter, included in the program group, generates automatically a series of files needed for GFI to give you technical support. The files would include the configuration settings etc. To generate these files, start the troubleshooter and follow the instructions in the application. In addition to collecting all the information, it also asks you a number of questions. Please take your time to answer these questions accurately. Without the proper information it will not be possible to diagnose your problem. Then go to the support directory, located under the main program directory, ZIP the files, and send the generated files to support@gfi.com. Manual MailSecurity for Exchange/SMTP Troubleshooting • 91 Ensure that you have registered your product on our website first, at http://www.gfi.com/pages/regfrm.htm! We will answer your query within 24 hours or less, depending on your time zone. Request support via webchat You may also request support via Live support (webchat). You can contact the GFI support department using our live support service at http://support.gfi.com/livesupport.asp Ensure that you have registered your product on our website first, at http://www.gfi.com/pages/regfrm.htm! Request support via phone You can also contact GFI by phone for technical support. Please check our support website for the correct numbers to call, depending on where you are located, and for our opening times. Support website: http://support.gfi.com Ensure that you have registered your product on our website first, at http://www.gfi.com/pages/regfrm.htm! Web Forum User to user support is available via the web forum. The forum can be found at: http://forums.gfi.com/ Build notifications We strongly suggest that you subscribe to our build notifications list. This way, you will be immediately notified about new product builds. To subscribe to our build notifications, go to: http://support.gfi.com 92 • Troubleshooting Manual MailSecurity for Exchange/SMTP M Index A attachment checking 25, 30, 31 Attachment checking rule 25, 30 B background scanning 3, 85 Background scanning 3, 75– 76, 85 Bitdefender 51, 54–55, 54, 55 macro viruses 2, 53 macros 2, 51–53 Mail essentials 8, 19 mail relay server 1, 13 MailSecurity scan engine 6 McAfee 2, 51, 55 Microsoft Exchange Administrator 18 Microsoft Exchange server 2000 9, 14, 18 moderator 7, 35, 39–40 moderator client 7, 35, 39–40 MX record 14, 19 N Norman 2, 51–53, 54, 55, 56 Norman Virus Control 52–53, 54–55 nslookup 19 O On demand scanning 75 C Collaboration Data Objects 14 conditions 26–27 configuration 7 content checking 1–2, 4, 25– 28, 29–30, 33, 51 Content checking rule 25, 28, 30 P Password 10, 20 Performance Monitor 3, 84 perimeter network 13 POP3 19 Pro active scanning 76 public folder 35–36, 38 S D DMZ - demilitarized zone 13 DownloadSecurity 8 E Email exploit detection 2, 57 email exploits 2 Event Logging 3, 83 Exchange 2000 VS API mode 3, 9, 30, 81 SMTP gateway 1, 4–5, 13, 43 SMTP gateway mode 3, 13, 43 SMTP Service 14–17, 74 SMTP/POP3 mail server 19 T Troubleshooting 20, 89 V F fault tolerance 13 I IIS 5 14, 20 ISA server 8, 75, 83 virus 1–7, 9, 40–54, 40–54, 83–84 Virus updates 53–54 W Windows 2000 Server 9, 14 L Licensing 78 logging 3, 83 Lotus Notes 6, 13, 14, 19 Love Letter 1–2, 25 Manual MailSecurity for Exchange/SMTP Troubleshooting • 93