spam and viruses can be defeated simply by deploying MailScanner. systems, this first version of the MailScanner Manual includes only installation. MailScanner Guide. Contents. Acknowledgements; Brief Description; Features and Highlights; How It Works; Presentation given at JANET NetWorkshop Abstract. A guide to installing and using MailScanner, and a complete training manual describing its operation and use in fine detail.

Author: Nikogor Nekora
Country: Thailand
Language: English (Spanish)
Genre: Relationship
Published (Last): 17 April 2013
Pages: 163
PDF File Size: 15.34 Mb
ePub File Size: 7.73 Mb
ISBN: 842-7-90865-908-6
Downloads: 78274
Price: Free* [*Free Regsitration Required]
Uploader: Kazraramar

These “viruses” are called “spam-viruses”. It is easy to install into an existing e-mail gateway, requiring very little knowledge of sendmail and no change to an existing sendmail configuration. When a virus or attachment is replaced by a plain-text warning, should the warning be in an attachment?

For example, a rule starting rename to. When using MailScanner, this is split into two separate jobs, each handled by a different sendmail process and a different queue. The SpamAssassin system is also supported as an optional extra, mailscannfr if installed will greatly improve the ability to be able to identify spam.

MailScanner: A User Guide And Training Manual

This is the version number of the MailScanner distribution that created this configuration file. Still deliver after cleaning messages that contained viruses listed in the above option “Silent Viruses” to the recipient?

If this is set less than or equal to zero, then no size checking is done. Microsoft Outlook hide common file extensions in an attempt to not baffle the user. It can also detect almost all unsolicited commercial e-mail spam passing through it and respond to all incidents in a wide variety of ways.

If SpamAssassin takes longer than this in secondsthe check is abandoned and the timeout noted. Append the new data to the existing header “add”: So if a message is bigger than a certain size, it is highly unlikely to be spam. Forces a re-read of all the configuration files too, so new updates to the bad phishing sites list are guidw frequently. If at any time the process is interrupted by, for example, MailScanner being killed or the entire computer crashingno mail will be lost.


Limiting this saves a lot of time checking huge messages. The first placeholder will contain the ‘external’ variable representation of the MailScanner setting being looked-up and the second placeholder will contain the hostname of the host that is requesting the data.

For Exim, it defaults to “posix”. Add a new header “replace”: The rules created by the “sa-update” tool are searched for here. To clear out the database, just delete the file, MailScanner will re- create it automatically when it starts. Maailscanner can specify a comma-separated list of actions if you need mailscannet than 1 action per rule.

To minimise any chance of message corruption, any messages that are found to be entirely clean and uninfected are moved directly between the two queues; no attempt is made to rebuild them from their constituent MIME entities.

Set this value to 0 to disable this feature. The name of a file containing a list of directory names, which can in turn contain wildcards.

Sign Messages Already Processed. There have, in the past, been a few Perl modules which have managed to leak memory, and this simply avoids this ever causing problems by giving the operating system regular opportunities to clear up from the application.

This means the message stays the same size, but is usable by non-Outlook recipients. This option is intended for people who want to log more information about messages than what is put in syslog. This is the name of the file that translates the names of the virus scanners into the commands that have to be run to do the actual scanning. If your queue is bigger than this size a lot of the time, then some messages could be greatly delayed.

This option is intended for people who want to log per-batch information.

This sets the name of the Watermark header. This can also be the filename of a ruleset. Set where to find all the strings used so they can be translated into your local language. When they are found the following header will be added to your message before it is passed to SpamAssassin, listing all the “spam-viruses” that were found as a comma- separated list.


This is useful if you are wary about your users sending encrypted messages to your competition. This makes it very easy for users to be able to filter their mail using whatever SpamAssassin threshold they want. This is very useful when you are injecting mail into a MailScanner server using “fetchmail” as otherwise all mail will appear to be coming from the the IP address of the system running “fetchmail”, and not the address the mail actually came from.

Set location of incoming mail queue This can be any one of 1.

MailScanner: A User Guide And Training Manual – ePrints Soton

MailScanner itself is entirely open source, but it uses widely known commercial virus scanning packages at its core. Maiscanner keywords within this are: This is just like the “Spam Actions” option above, except that it applies when the score from SpamAssassin is higher than the “High SpamAssassin Score” value.

Another word that can be put in this list is the special keyword Zip-Password: Once the size limit is reached, MailScanner reverses towards the start of the message, until it hits a line that is blank. This will be the simple cut-off point for messages that are larger than this number. This could be achieved by using a ruleset. This can be used to implement any custom action you require. This is very useful for removing return-receipt requests and any headers which mean special things to your email client application.

Z nod32 for No32 before version 1. It can be used to replace the functionality of MCP, but without the large processing overhead that involves. The options are best listed in a mmailscanner categories. It is very strange but may not detect all viruses when started from a symlink or scanning a directory path including symlinks. Log all occurrences of “Silent Viruses” as defined above?