background image

AVG 9.0 Email Server Edition © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.

40

The message without its infected or prohibited attachment will be (apart from
the actions selected below) forwarded to the specified e-mail address. This can
be used to verify the correct functioning of the antivirus and/or attachment
filter.

In the list of extensions, each item has four fields:

·

Type

 – specification of the kind of attachment determined by the extension

given in the Content field. Possible types are File name or MIME type. You can
select the respective box in this field to include/exclude the item from
attachment filtering.

·

Content

 – an extension to be filtered can be specified here. You can use

operation system wildcards here (for example the string ‘*.doc.*’ stands for any
file with the .doc extension, and any other extension following).

·

Action

 – define action to be performed with the particular attachment. Possible

actions are Accept (accept the attachment), and Block (block the attachment
as defined in the Action tab dialog).

·

Description

 – description of the attachment is defined in this field.

An item is removed from the list by pressing the Remove button. You can add another
item to the list by pressing the 

Add…

 button. Or, you can edit an existing record by

pressing the 

Edit…

 button. The following window then appears:

·

In the Description field you can write a short description of the attachment to be

Summary of Contents for 9.0 EMAIL SERVER EDITION

Page 1: ...e the property of their respective owners This product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromir Dolecek dolecek ics muni cz This product uses compression library zlib Copyright c 1995 2002 Jean loup Gailly and Mark Adler AVG 9 0 Email Server Edition User ...

Page 2: ...e 10 3 5 Activate AVG 11 3 6 Custom Installation Destination Folder 12 3 7 Custom Installation Component Selection 13 3 8 Custom Installation DataCenter 14 3 9 Setup Summary 14 3 10 Installing 14 3 11 Installation Complete 16 4 E mail Scanner for MS Exchange Server 2007 16 4 1 Overview 19 4 2 E mail Scanner for MS Exchange routing TA 21 4 3 E mail Scanner for MS Exchange SMTP TA 21 4 4 E mail Scan...

Page 3: ...chment Filter 42 7 Anti Spam Configuration 42 7 1 Anti Spam Interface 44 7 2 Anti Spam Principles 44 7 3 Anti Spam Settings 44 7 3 1 Anti Spam Training Wizard 44 7 3 2 Select Folder with Messages 44 7 3 3 Message filtering options 50 7 4 Performance 51 7 5 RBL 52 7 6 Whitelist 53 7 7 Blacklist 54 7 8 Advanced Settings 55 8 AVG Settings Manager 58 9 FAQ and Technical Support ...

Page 4: ...products AVG 9 0 Email Server Edition has been completely re designed from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way AVG has been designed and developed to protect your computing and networking activity Enjoy the experience of full protection from AVG Note This documentation contains description of specific E mail Serve...

Page 5: ...rver with Service Pack 1 or higher version Note for Exchange 2000 Server Service Pack 1 or higher needs to be applied before you can use the AVG engine AVG for MS Exchange 2000 2003 Server uses the VSAPI 2 0 or 2 5 with Exchange 2003 Server application interface which is covered in this Service Pack MS Exchange 2003 Server version MS Exchange 2007 Server version AVG for Kerio MailServer version 5 ...

Page 6: ...ou can proceed to uninstall your previous version of AVG File Server Edition This can be done easily from the start menu Start All Programs AVG Uninstall AVG If you have previously used the AVG 8 x or older version do not forget to uninstall also individual server plug ins 2 5 MS Exchange Service Packs Since AVG for MS Exchange 2000 2003 Server uses the VSAPI 2 0 2 5 virus scanning interface you m...

Page 7: ...ies versions will be examined If it is necessary to install newer libraries the installer will rename the old ones with a delete extension They will be deleted after the system restart Service Pack for MS Exchange 2007 Server optional http www microsoft com downloads details aspx FamilyID 44c66ad6 f185 4a1d a9ab 473c1188954c displaylang en ...

Page 8: ... installation The sales number can be found on the CD packaging If you purchased your copy of AVG on line your license number will have been delivered to you via e mail Once you have downloaded and saved the installation file on your hard drive you can launch the installation process The installation is a sequence of dialog windows with a brief description of what do at each step In the following ...

Page 9: ...ept the agreement by checking the I have read license agreement checkbox and pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately Use the Printable version button to open the license agreement in a new window suitable for printing 3 3 Checking System Status Having confirmed the license ag...

Page 10: ...l always have the possibility to do so directly in the AVG application Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g to fit specific system requirements 3 5 Activate AVG In the Activate your AVG License dialog you have to fill in your registration data Type in your name User Name field and the name of your organiz...

Page 11: ...xt button to continue the installation process If in the previous step you have selected the standard installation you will be redirected directly to the Setup Summary dialog If custom installation was selected you will continue with the Destination Folder dialog 3 6 Custom Installation Destination Folder ...

Page 12: ...stalled If the default settings do not suit you you can remove add specific components However you can only select from components that are included in your purchased AVG edition Only those components will be offered to be installed within the Component Selection dialog Remote Administration component if you intend to connect AVG to an AVG DataCenter AVG Network Editions then you need to select th...

Page 13: ...going and internal e mail messages going through the MS Exchange HUB role Available for MS Exchange 2007 and can be installed for HUB role only E mail Scanner for MS Exchange SMTP Transport Agent Checks all e mail messages coming through the MS Exchange SMTP interface Available for MS Exchange 2007 only and can be installed for both EDGE and HUB roles E mail Scanner for MS Exchange VSAPI Checks al...

Page 14: ...alling dialog shows the progress of the installation process and does not require any intervention Please wait until the installation is complete then you will be redirected to the Installation Complete dialog 3 11 Installation Complete The Installation Complete dialog is the last step of the AVG installation process AVG is now installed on your computer and fully functional The program is running...

Page 15: ...AVG 9 0 Email Server Edition 2009 Copyright AVG Technologies CZ s r o All rights reserved 15 AVG for Kerio MailServer ...

Page 16: ...ration options are fully integrated within the AVG 9 0 Email Server Edition as server components Basic overview of the individual server components Anti Spam Anti Spam Server for MS Exchange Checks all incoming e mail messages and marks unwanted e mails as SPAM It uses several analyzing methods to process each e mail message offering maximum possible protection against unwanted e mail messages ...

Page 17: ...ent Checks all e mail messages coming through the MS Exchange SMTP interface Available for MS Exchange 2007 only and can be installed for both EDGE and HUB roles EMS VSAPI E mail Scanner for MS Exchange VSAPI Checks all e mail messages stored in user mailboxes If any viruses are detected they are moved to the Virus Vault or completely removed Double click a required component to open its interface...

Page 18: ...eporting By default there are displayed only results for the last two days You can change the displayed period by amending the following options o Show last insert preferred days and hours o Show selection choose a custom time and date interval o Show all Displays results for the whole time period Use Refresh button to reload the results Refresh statistical values updates stats displayed above Res...

Page 19: ...nts overview You will find more information on individual settings of all components in the chapters below 4 2 E mail Scanner for MS Exchange routing TA To open the settings of E mail Scanner for MS Exchange routing transport agent select the Settings button from the interface of the component From the Server components list select the E mail Scanner for MS Exchange routing TA item The Basic Setti...

Page 20: ...Spyware threats check this option to report the presence of potentially unwanted programs and spyware Scan inside archives check this option to let the scanner look also inside archived files zip rar etc The E mail attachments reporting section allows you to choose which items should be reported during scanning If checked each e mail with such an item will contain INFORMATION tag in the message su...

Page 21: ... SMTP Transport Agent is exactly the same as in the case of routing transport agent For more information please see the E mail Scanner for MS Exchange routing TA chapter above There are also these sub items available in the following tree structure Detection actions Mail filtering 4 4 E mail Scanner for MS Exchange VSAPI This item contains settings of the E mail Scanner for MS Exchange VSAPI ...

Page 22: ... for each database which guarantees other tasks e g e mail messages storage in the Microsoft Exchange database are always carried out preferentially Proactive Scan incoming messages You can enable or disable the proactive scanning function of VSAPI 2 0 2 5 here This scanning occurs when an item is delivered to a folder but a request has not been made by a client As soon as messages are submitted t...

Page 23: ...is method during scanning Report Potentially Unwanted Programs and Spyware threats check this option to report the presence of potentially unwanted programs and spyware Scan inside archives check this option to let the scanner look also inside archived files zip rar etc The E mail attachments reporting section allows you to choose which items should be reported during scanning The default configur...

Page 24: ...software interaction http support microsoft com default aspx scid kb en us 823166 for information on additional VSAPI 2 5 features in Exchange 2003 Server application There are also these sub items available in the following tree structure Detection actions Mail filtering 4 5 Detection_Actions In the Detection actions sub item you can choose automatic actions that should take place during the scan...

Page 25: ... the roll down menu to choose an action for each item None no action will be taken Move to Vault the given threat will be moved to Virus Vault Remove the given threat will be removed To select a custom subject text for messages that contain the given item threat check the Mark subject with box and fill in a preferred value Note The last mentioned feature is not available for E mail Scanner for MS ...

Page 26: ...uld be automatically removed if any The following options are available Remove attachments check this box to enable the feature Remove all executable files removes all executables Remove all documents removes all document files Remove files with these comma separated extensions fill the box with file extensions you wish to automatically remove Separate the extensions with comma ...

Page 27: ... 2000 2003 configuration options are fully integrated within the AVG 9 0 Email Server Edition as a server component The server components include the following Basic overview of the individual server components Anti Spam Anti Spam Server for MS Exchange Checks all incoming e mail messages and marks unwanted e mails as SPAM It uses several analyzing methods to process each e mail message offering ...

Page 28: ...ses are detected they are moved to the Virus Vault or completely removed Double click a required component to open its interface With the exception of Anti Spam all the components share the following common control buttons and links Available links Scan Results Opens a new dialog where you can review scan results Here you can check messages divided into several tabs according to their severity See...

Page 29: ...rn to the Server components overview You will find more information on individual settings of all components in the chapters below 5 2 VSAPI 2 0 Virus Scanning API 2 0 VSAPI 2 0 as provided in MS Exchange 2000 Server does not allow the deletion of infected e mail files Since the virus infected e mail message attachment cannot be deleted its filename is changed AVG for Exchange 2000 2003 Server app...

Page 30: ...ttings section contains the following options Enable component uncheck to disable the whole component Language select preferred component language The Logging settings section Log file size choose a preferred size of the log file Default value 100 MB The Scan settings section Background Scan you can enable or disable the background scanning process here Background scanning is one of the features o...

Page 31: ...al scanning queue as low priority maximum of 30 items They are scanned on the first in first out FIFO basis If an item is accessed while still in the queue it is changed to high priority Note Overflow messages will continue to the store unscanned Note Even if you disable both Background Scan and Proactive Scan options the on access scanner will be still active when an user will try to download a m...

Page 32: ...w The following options are available Report password protected archives Report password protected documents Report files containing macro Report hidden extensions Generally all these features are user extensions of the Microsoft VSAPI 2 0 2 5 application interface services For the detailed information on the VSAPI 2 0 2 5 please refer to the following links and also the links accessible from the ...

Page 33: ...n the Detection actions sub item you can choose automatic actions that should take place during the scanning process The actions are available for the following items Infections PUP Potentially Unwanted Programs Warnings Information Use the roll down menu to choose an action for each item None no action will be taken ...

Page 34: ...ltering sub item you can choose which attachments should be automatically removed if any The following options are available Remove attachments check this box to enable the feature Remove all executable files removes all executables Remove all documents removes all document files Remove files with these comma separated extensions fill the box with file extensions you wish to automatically remove S...

Page 35: ...AVG 9 0 Email Server Edition 2009 Copyright AVG Technologies CZ s r o All rights reserved 35 comma ...

Page 36: ...ion In order to activate e mail protection of Kerio MailServer by the AVG scanning engine launch the Kerio Administration Console application In the control tree on the left side of the application window choose the Content Filter sub branch in the Configuration branch Clicking the Content Filter item will display a dialog with three items Spam Filter Antivirus see section Antivirus Attachment Fil...

Page 37: ...tion to be carried out when a virus is detected in a message or when a message is filtered by an attachment filter o Discard the message when selected the infected or filtered message will be deleted o Deliver the message with the malicious code removed when selected the message will be delivered to the recipient but without the possibly harmful attachment o Forward the original message to adminis...

Page 38: ...not be scanned o Deliver the original message with a prepared warning the message or attachment will be delivered unchecked The user will be warned that the message may still contain viruses o Reject the message as if it was virus the system will react the same way as when a virus was detected i e the message will be delivered without any attachment or rejected This option is safe but sending pass...

Page 39: ...ionally you can change the following settings Send a warning to sender that the attachment was not delivered The sender will receive a warning from Kerio MailServer that he she has sent a message with a virus or blocked attachment Forward the original message to administrator address The message will be forwarded as it is with the infected or forbidden attachment to a defined email address regardl...

Page 40: ...e item from attachment filtering Content an extension to be filtered can be specified here You can use operation system wildcards here for example the string doc stands for any file with the doc extension and any other extension following Action define action to be performed with the particular attachment Possible actions are Accept accept the attachment and Block block the attachment as defined i...

Page 41: ...ail message contains an attachment where field you can select the type of attachment File name or MIME type You can also choose a particular extension from the offered extensions list or you can type the extension wildcard directly In the Then field you can decide whether to block the defined attachment or accept it ...

Page 42: ...he Anti Spam server component s dialog in the Server Components section left menu It contains a brief information about the functionality of the server component information on its current status Anti Spam Server for MS Exchange component is active and some statistics Available links Scan Results Opens a new dialog where you can review anti spam scan results ...

Page 43: ... there are displayed only results for the last two days You can change the displayed period by amending the following options o Show last insert preferred days and hours o Show selection choose a custom time and date interval o Show all Displays results for the whole time period Use Refresh button to reload the results Refresh statistical values updates stats displayed above Reset statistical valu...

Page 44: ...mail boxes Spam does not refer to legitimate commercial e mail for which consumers have given their consent Spam is not only annoying but also can often be a source of scams viruses or offensive content Anti Spam checks all incoming e mail messages and marks unwanted e mails as SPAM It uses several analyzing methods to process each e mail message offering maximum possible protection against unwant...

Page 45: ...ed as a quite aggressive configuration E mail messages that are possibly spam will be filtered out Non spam messages are likely to be caught as well Value 1 59 Very aggressive configuration Non spam e mail messages are as likely to be caught as real spam messages This threshold range is not recommended for normal use Value 0 In this mode you will only receive e mail messages from senders in your W...

Page 46: ...hat you know the location of your e mail client message folders Then select Folder with EML files which will enable you to locate the desired folder in the next step For faster and easier training process it is a good idea to sort the e mails in the folders beforehand so that the folder you will use for training contains only the training messages either wanted or unwanted However it is not necess...

Page 47: ...ialog In the Folders contain drop down menu set one of the two options whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only training e mails You can also remove unwanted selected folders from the list by clicking the Remove folder button When done click Next...

Page 48: ...ptions whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only training e mails A navigation tree of the selected e mail client is already displayed in the main section of the dialog Please locate the desired folder in the tree and highlight it with your mouse ...

Page 49: ...lect the Ask for each message option For more advanced filtering select the Use filter option You can fill in a word name part of a word or phrase to be searched for in the e mail subject and or the sender s field All messages matching exactly the entered criteria will be used for the training without further prompting Attention When you fill in both text fields addresses that match just one of th...

Page 50: ...ly training data will be used for identification This mode is not recommended for common use unless the computer hardware is really poor High performance this mode will consume large amount of memory During the scanning process to identify spam the following features will be used rules and spam database cache basic and advanced rules spammer IP addresses and spammer databases The Enable on line ch...

Page 51: ...of known spam senders When this feature is switched on all e mail messages will be verified against the RBL server database and marked as spam if identical to any of the database entries The RBL servers databases contain the latest up to the minute spam fingerprints to provide the very best and most accurate spam detection This feature is especially useful for users who receive large amounts of sp...

Page 52: ...item opens a dialog with a global list of approved sender e mail addresses and domain names whose messages will never be marked as spam In the editing interface you can compile a list of senders that you are sure will never send you unwanted messages spam You can also compile a list of full domain names e g avg com that you know do not generate spam messages Once you have such a list of senders an...

Page 53: ...tain only one item address domain name per line Export if you decide to export the records for some purpose you can do so by pressing this button All records will be saved to a plain text file 7 7 Blacklist The Blacklist item opens a dialog with a global list of blocked sender e mail addresses and domain names whose messages will always be marked as spam In the editing interface you can compile a ...

Page 54: ...some purpose you can do so by pressing this button All records will be saved to a plain text file 7 8 Advanced Settings Typically it is recommended to keep the default settings and only change them if you have a valid reason to do so Any changes to configuration should only be done by expert users If you still believe you need to change the Anti Spam configuration at the very advanced level please...

Page 55: ...ailable via Windows Start menu All Programs AVG VER AVG Settings Manager Edit AVG configuration of this computer Use this button to open dialog with advanced settings of your local AVG All changes made here will be reflected also to the local AVG installation Load and edit AVG configuration file If you already have an AVG configuration file pck use this button to open it for editing Once you confi...

Page 56: ...ow and then fill in the required information and confirm your choice Answer No to skip the password creation and continue to save the local AVG configuration to a file Clone AVG installation This option allows you to make an exact copy of the local AVG installation by creating an installation package with custom options To proceed first select folder where the installation script will be saved The...

Page 57: ...VG website to the selected folder or manually put the AVG installation package into that folder You can use the Proxy button to define a proxy server settings if your network requires this for a successful connection By clicking OK the cloning process begins and should shortly finish You may also experience a dialog asking about setting password to Allowed items see above Once finished there shoul...

Page 58: ...hould you have any problems with your AVG either business or technical please refer to the FAQ section of the AVG website at http www avg com If you do not succeed in finding help this way contact the technical support department by email Please use the contact form accessible from the system menu via Help Get help online ...

Reviews: