Home

Administration and Configuration Manual

image

Contents

1. Configuring other mail filters 37 Match whole words only Block emails when the keywords specified match whole words Apply above conditions to Select this option to apply this rule also to text in attachments In the attachments Attachment filtering area specify the attachments to apply or exclude from this rule 6 Select the Subject tab to specify keywords to block in the email subject General Body Subject Actions Users Folders WY Content Filtering Subject V Enable subject content filtering Block emails with the following phrases in the Subject field Enter phrase es Phrases Medicine Remove Selected Free drugs Options Match whole words only Screenshot 31 Content Filtering Subject Tab 7 Select Enable subject content filtering to enable scanning for keywords in the email subject 8 In the Enter phrase text box specify keywords to block and click Add B To remove an added keyword select it from the Phrases box and click Remove A Selected 9 From the Options area configure how keywords are matched Select Match whole words only to block emails where the keywords specified match whole words in the subject Step 3 Configuring the actions to take on detected emails 1 Click the Actions tab to configure what should be done when this rule is triggered 2 To block an email that matches the rule conditions select Block attachment and perform this action and select one of the fo
2. Only the Virus Scanning Engines are utilized for Information Store Protection Use the Virus Scanning Engines node to configure which engines are used for Information Store Scanning Information Store Virus Scanning Engines Status Engine Status License Priority N Norman Anti Virus Enabled Licensed 0 V McAfee Anti Virus Enabled Licensed 1 Ko Kaspersky Anti Virus Enabled Licensed 2 S BitDefender Anti Virus Enabled Licensed 3 a AVG Anti Virus Enabled Licensed 4 Screenshot 25 Information Store Protection node 2 In the Information Store Virus Scanning tab check Enable Information Store Virus Scanning and click Apply The status of the Virus Scanning Engines used to scan the Information Store is displayed in the table You can also disable a particular anti virus engine from Information Store Scanning To do this navigate to the Virus Scanning Engines page select the anti virus engine and disable Enable Information Store Virus Scanning VSAPI 32 Configuring Virus Scanning Engines Administration and Configuration Manual 5 11 2 VSAPI settings The method used by GFI MailSecurity to access emails and attachments in the Microsoft Exchange Information Store is VSAPI Virus Scanning Application Programming Interface GFI MailSecurity allows you to specify the method to use when scanning the Information Store 1 Click the GFI MailSecurity gt Virus Scanning Engines gt Information Store Protection node Information Store Vir
3. Contents 1 Introduction 1 1 1 Introduction to GFI MailSecurity 2 c 0ccecscse ceeds esedeccveccecsdeccesess 1 1 2 Using this WialUalivsedie sce nreveivearveervebivesiveniceeiesaixeauceleeacebieuees 1 2 About GFI MailSecurity 3 2 1 GFI MallSecurity components ccccsersoccsvcvcsvecseecysacvecceawevercneecy eas 3 2 2 How GFI MailSecurity works ssesssssssesssssssesssssereseseseeesessseee 3 e a Ea E E vs saeemuvdiessne vases 5 3 Monitoring the GFI MailSecurity status 7 3 1 Introduction ins cisccdesstncudadcardeneioranedinencs ndisenss eaeecharedsaeseeetzaceeses 7 3 2 Status and statistical Information sssessssssesssesssessssesseessseee 7 3 3 Email processing lOGS sas cidvcaseensdsnrcanyevesewsiiiducadeeveseensisieasdiuveaus 10 3 4 Virus scanning engine UPdates ccccceesssscccccceesessccccoeeeeeees 11 4 General settings 13 4 1 Introduction csscovstatecdedivawrocetuiwedeltwoeveududaverd ined vouainusvexdienweouss 13 4 2 Configuring the administrator s email address eeeeeeee cess eeeeee 13 4 3 Configuring proxy server settings for automatic updates 13 4 4 Adding Local DOMAINS rscissecscsvsscscvedaviserevssasaresensissedewaasradsseesens 15 4 5 SMTP server DINGINGS lt i veciiesciiusiciaaveeceswecrveeueeessadicacs rivieri ssis siise 15 4 6 Managing local users ssessesssescsescosesosesosescosscosescsescoseeosesoo 16 5 Configuring Virus Scanning Engines 19 Sell Ntrod C
4. Quarantine Automatically Delete T Send a sanitized copy of the original email to recipient s Screenshot 42 Configuring password protected archives options 48 Configuring other mail filters Administration and Configuration Manual This filter allows you to quarantine or delete emails that contain password protected archives To configure this filter 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Decompression 2 From the list of available filters click Check password protected archives 3 To enable this filter select the Check password protected archives checkbox 4 Specify what to do when an email contains an archive that triggers this filter Quarantine Quarantines blocked emails Automatically Delete Deletes blocked emails When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI MailSecurity may not be able to block outbound emails but instead replaces the blocked content with a threat report 5 Select Send a sanitized copy of the original email to recipient s to choose whether to forward a copy of the blocked email to the recipients but with the malicious content removed 6 Click the Actions tab to configure further actions 7 GFI MailSecurity can send email notifications whenever an email triggers this filter To enable this feature select any of the following options Notify administrator Notify the administrator whenever this engine blocks an email To
5. A technology that provides a variety of network services including LDAP directory services See Active Directory Software that detects malware such as Trojan horses in emails files and applications A network of infected computers that run autonomously and are controlled by a hacker cracker A scanning module that decompresses and analyzes archives attached to an email An internet facing section of a network that is not part of the internal network Its purpose typically is to act as a gateway between internal networks and the internet Email attacks where known email addresses are used as a template to create other email addresses A database used by TCP IP networks that enables the translation of hostnames to IP addresses and provides other domain related information See Demilitarized Zone See Domain Name System See Mail Exchange Information that precedes the email text body within an email message This includes the sender recipient subject sending and receiving time stamps etc An attack method that uses known vulnerabilities in applications or operating systems to compromise the security of a system The computer server in a LAN that is directly connected to an external network In GFI MailSecurity gateway refers to the email servers within the company that first receive email from external domains A filtering module within GFI MailSecurity that scans and removes html scripting code from emails Hy
6. GFI Product Manual GFI MailSecurity Administration and Configuration Manual GFI http www gfi com info gfi com The information and content in this document is provided for informational purposes only and is provided as is with no warranty of any kind either express or implied including but not limited to the implied warranties of merchantability fitness for a particular purpose and non infringement GFI Software is not liable for any damages including any consequential damages of any kind that may result from the use of this document The information is obtained from publicly available sources Though reasonable effort has been made to ensure the accuracy of the data provided GFI makes no claim promise or guarantee about the completeness accuracy recency or adequacy of information and is not responsible for misprints out of date information or errors GFI makes no warranty express or implied and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document If you believe there are any factual errors in this document please contact us and we will review your concerns as soon as practical All product and company names herein may be trademarks of their respective owners GFI MailSecurity is copyright of GFI SOFTWARE Ltd 1999 2011 GFI Software Ltd All rights reserved Document Version MSEC UM EN 01 00 01 Last updated September 6 2011
7. Sender Subject Scan Result All z Recipient From u B t T A ts Clear Filters Screenshot 8 Email processing logs filter Filtering the email processing logs simplifies the reviewing process by providing the possibility to find particular emails From the Filter area specify any of the following criteria Sender Specify the full or part of an email address to display only the emails sent by matching senders Recipient Specify the full or part of an email address to display only the emails sent to matching recipients Subject Specify the full or part of an email subject to display only the emails with a matching subject Scan result From the drop down list select whether to display only emails with a particular scan result for example quarantined emails only From amp To Specify a date and time range to display emails processed during that particular period Click Clear Filters to remove specified filters and to show all email logs 3 4 Virus scanning engine updates Dashboard Logs Updates Y Virus scanning engines updates gt Engine Info Engine Last Update Status S BitDefender AntiVirus Never No updates currently in progress N Norman AntiVirus Newer Downloading in progress wi McAfee Antivirus Never No updates currently in progress K Kaspersky AntiVirus Never No updates currently in progress i AVG Antivirus Never No updates currently in progress AVG LinkScanner Never No updates currentl
8. Reporting Administration and Configuration Manual Reporting Ea Configure Reporting Current Database Settings Current type Microsoft Access Current location C Program Files x86 GFl ContentSecurityiMailSecurityidataireports mdb New Database Settings Database type C MS Access e SOL Server soL server reporting Detected server mS_SOL_ Server x Manually specified server Po Database MSEC db l Screenshot 77 Configuring SQL Server Database backend 3 Select SQL Server 4 Select Detected server and select the automatically detected SQL Server from the list If the server is not detected select Manually specified server and key in the IP address or server name of the Microsoft SQL Server 5 Key in the credentials with permissions to read write to the database 6 Click Get Database List to extract the list of databases from the server 7 From the Database list select the database created for GFI MailSecurity Reporting 8 Click Apply Administration and Configuration Manual Reporting 85 9 Miscellaneous 9 1 Patch Checking The Patch Checking feature verifies if there are any software patches available for your version of GFI MailSecurity by directly connecting to the GFI Update Servers It is highly recommended to check for patches periodically to keep GFI MailSecurity a running efficiently 1 Navigate to GFI MailSecurity gt General gt Patch Check
9. Screenshot 70 Quarantine folder RSS feed List of Quarantined Emails in Search Folder List of Quarantined Emails in selected Search Folder Viewing the full security threat report of a quarantined email Quarantine Options configuration page The Quarantine Action Form Quarantine Options configuration page Quarantine RSS feeds GFI MailSecurity SwitchBoard Directory Harvesting filter Reporting page Configuring a Microsoft Access database backend Configuring SQL Server Database backend List of available patches Version Information page Tracing settings Failed emails notification Screenshot 82 Adding VSAPI performance monitor counters in Windows 2008 Server Screenshot 84 Adding VSAPI performance monitor counters Monitoring Virus Scan Files Scanned in Windows Server 2008 Performance Monitor 94 1 Introduction 1 1 Introduction to GFI MailSecurity Email is frequently used as a means for distributing harmful content for example through email attachments GFI MailSecurity acts as an email firewall to protect an email system against malicious email attacks The software uses various methods to block malicious emails such as multiple virus scanning engines and link scanning technology Using the GFI MailSecurity web based interface you can easily configure and optimize the software for your requirements Blocked emails can then be reviewed and the appropriate action taken accordingly 1 2 Using this manual T
10. Select Enable background scanning to run Information Store Scanning in the background AN Background scanning causes all the contents of the Information Store to be scanned This can result in a high processing load on the Microsoft Exchange server depending on the amount of items stored in the Information Store It is recommended to enable this option only during periods of low server activity such as during the night 4 Select a VSAPI scan method On access scanning New items in the Information Store are scanned as soon as they are accessed by the email client This introduces a short delay before the email client displays the contents of a new message Administration and Configuration Manual Configuring Virus Scanning Engines 33 Pro active scanning New items added to the Information Store are added to a queue for scanning This is the default and recommended mode of operation since in general the delay associated with on access scanning is avoided NOTE In the event that an email client tries to access an item that is still in the queue it will be allocated a higher scanning priority so that it is scanned immediately 5 Click Apply 34 Configuring Virus Scanning Engines Administration and Configuration Manual 6 Configuring other mail filters Apart from virus scanning engines GFI MailSecurity also includes a number of other mail filtering mechanisms as described in this chapter 6 1 Content Filtering 6 1 1 Introductio
11. ContentSecurity MailSecurity Logs lt filename gt txt 8 Select Updates tab to configure GFI MailSecurity to download Trojan amp Executable Scanner updates automatically or to notify the administrator whenever new updates are available 56 Configuring other mail filters Administration and Configuration Manual Automatic update options Configure the automatic update options Iv Automatically check for updates Downloading option Check for updates and download ai Download check after the specified number of hours I Last update Newer Update options V Enable email notifications upon successful updates Notifications will always be sent for unsuccessful updates Click the button below to force the updater service to download the most recent updates Download updates Screenshot 49 Trojan and Executable Scanner Updates tab 9 To enable the automatic updating of Trojan amp Executable Scanner select Automatically check for updates check box 10 From the Downloading options list select one of the following download options Only check for updates Automatically check for updates and notify the administrator whenever updates are available This option will NOT download the available updates automatically Check for updates and Automatically check for and download all available updates download 11 In Download check after the specified number of hours text box specify how often you want GFI MailSecurit
12. Default quarantine folder RSS Feed Status Interval Maximum Items SEFF Today Disabled 10 minutes 100 I Enable Quarantine RSS feeds on this folder Refresh feed content every minutes Feed should contain at most items Please use the following address to subscribe to this feed http WVYINSERYB 30 MailSecurityRSSirssteed aspx feedName today xml amp uniqueid e6b9a2th 92ce 3971 e9d8 ece4da4534 NOTE If you give everyone access to the RSS feeds from the GFI MailSecurity SwitchBoard application or disable NTLM security on the RSS feeds virtual directory anyone will be able to subscribe to this feed If you suspect unauthorized users managed to get a copy of this URL click the Reset Feed URL button to generate a new URL and click the Apply button Reset Feed URL AAA SEFF Yesterday Disabled 10 minutes 100 Edit SEFF This Week Disabled 10 minutes 100 Edit EE All terns Enabled 10 minutes 100 Edit Screenshot 71 Quarantine folder RSS feed 4 Select Enable Quarantine RSS feeds on this folder checkbox 5 Specify the refresh interval in minutes in the Refresh feed content every text box The default value is 10 minutes 6 Specify the maximum number of items you want the feed to include in the Feed should contain at most text box The default value is 100 items B You can change the URL of an RSS feed by clicking Reset Feed URL To change the URL 1 ofall enabled RSS feeds click Edit to the right of the OPML entry and
13. MailSecurity data You can also use a Microsoft SQL Server database for reports Administration and Configuration Manual Reporting 83 Configuring a Microsoft Access database backend Reporting m Configure Reporting Current Database Settings Current type Microsoft Access Current location C Program Files x86 GFl ContentSecurityiMailSecurityidataireports mdb New Database Settings Database type MS Access C SOL Server Microsoft Access reporting File C Program Files x86 GFl ContentSecurity MailSecurity Wdataeports mdb Screenshot 76 Configuring a Microsoft Access database backend 1 Navigate to GFI MailSecurity gt Reporting gt Configure Database 2 Select MS Access 3 Key in the complete path including filename and mdb extension of the database file If you only specify a filename the database file is created in the following default path lt GFI MailSecurity installation path gt ContentSecurity MailSecurity data 4 Click Apply 8 3 1 Configuring a Microsoft SQL Server database backend 1 Create a new database in Microsoft SQL Server It is recommended to create a dedicated user login in Microsoft SQL Server for GFI d MailSecurity and assign it the database owner role For information how to create a new database in Microsoft SQL Server refer to 4 http kbase gfi com showarticle asp id KBID003379 2 Navigate to GFI MailSecurity gt Reporting gt Configure Database 84
14. Suspicious 8 31 2005 7 35 51 AM Enabled F 11 3 Java security vulnerability High alert 6 17 2008 7 24 38 AM Enabled 12 MSScriptControl ScriptControl ActiveX scripting High alert 8 31 2005 7 36 26 AM Enabled 13 3 Office XP ActiveX control exploit Suspicious 8 31 2005 7 36 39 AM Enabled 14 Windows 2000 indexing service ActiveX scripting High alert 8 31 2005 7 36 54 AM Enabled E 16 Local Java Applet execution High alert 4 13 2006 11 52 38 AM Enabled 17 3 Remote File reading High alert 8 31 2005 7 37 37 AM Enabled E 18 9 Fragmented Message Suspicious 8 8 2002 12 00 00 AM Enabled E 19 Long Subject Suspicious 10 20 2002 12 00 00 AM Enabled 20 Double Extension Suspicious 10 20 2002 12 00 00 AM Enabled Da Screenshot 53 Email Exploit list 2 Select the check box of the exploit s that you want to enable or disable 3 Click Enable Selected or Disable Selected accordingly 6 6 The HTML Sanitizer 6 6 1 Introduction The HTML Sanitizer scans and removes scripting code within the email body of emails that have the MIME type set to text html all attachments of type htm or html Why remove HTML scripts The introduction of HTML email has allowed senders to include scripts in email that can be triggered automatically upon opening an email HTML scripts are used both in a number of common viruses and in one off attacks directed towards particular users companies In a
15. administrator s email address GFI MailSecurity sends important notifications to the administrator via email To set up the administrator s email address 1 From the GFI MailSecurity Configuration navigate to GFI MailSecurity gt General gt Settings and select the General tab General Updates Local Domains ra General Settings Administrator email Enter the administrator s email address in the field below Notifications sent to the administrator will be sent to this email address Administrator Email Admministrator tcdomainb com NOTE GFI MailSecurity will communicate this email address to the GFI servers GFI will only use this email address to send important GFI MailSecurity notices directly to the administrator Screenshot 10 Specifying the administrator s email address 2 Key in the administrator s email address in the Administrator email area 3 Click Apply 4 3 Configuring proxy server settings for automatic updates GFI MailSecurity automatically searches for and downloads updates for example virus definitions updates and Trojan amp Executable Scanner definitions from the GFI update servers If the server on which GFI MailSecurity is installed connects to the internet through a proxy server configure the proxy server settings as follows 1 From the GFI MailSecurity Configuration navigate to GFI MailSecurity gt General gt Settings and select Updates tab Administration and Configuration Manual
16. administrator tcdomainb com rbrown tcdomainb com Screenshot 14 User Manager 16 General settings Administration and Configuration Manual The User Manager tab displays the list of local users and allows you to add or remove local users The list of local users is used when configuring user based rules such as Attachment Filtering rules and Content Filtering rules GFI MailSecurity automatically populates the list of local users using the sender s email address in outbound emails To add a new local user 1 Enter the email address in the Email address box 2 Click Add 3 Repeat to add more local users and click Apply To remove a local user 1 Select the local user you want to remove from the Local Users list and click Remove 2 Repeat to remove more local users and click Apply Administration and Configuration Manual General settings 17 5 Configuring Virus Scanning Engines 5 1 Introduction GFI MailSecurity uses multiple Virus Scanning Engines to scan all emails for the presence of viruses As part of its standard package GFI MailSecurity ships with Norman and BitDefender Virus Scanning Engines You can also acquire a license for the following anti virus engines AVG Kaspersky McAfee This chapter describes how to configure Virus Scanning Engines updates actions and the scanning sequence 5 2 AVG configuration General Actions Updates AVG AntiVirus Options V Enable Gateway Scann
17. automatically purged if they are older than 10 day s ID Module Reason Sender Recipient s Subject Date Source Virus good z detected T s 7 13 2010 Gateway O 75 Scanning test_file_virus sender maliciousdoma bjones tcdomainb com one 3 00 58 PM SMTP Engines haha Virus z 1 I 72 Scanning detected sender maliciousdoma bijones tcdomainb com hello S20 O Gateway r test_file_virus 3 00 32 PM SMTP Engines triggered rule content g Content ated 7 F F iep news 7 13 2010 Gateway Fikering PNET Pas sexual sender maliciousdoma bjones tcdomainb com 5 22 2 55 39 PM SMTP triggered rule content policy block sexual sender mialiciousdoma bjones tcdomainb com content energy 7 13 2010 Gateway Content D 59 issues 2 55 26 PM SMTP Filtering Page s lt 1 23 13 gt Edit search folder Delete search folder Screenshot 65 List of Quarantined Emails in selected Search Folder 2 Select the checkbox next to the quarantined email s to approve and click Delete items Alternatively click Delete all to approve all emails in the list Delete and Notify You can also notify the intended recipients when you delete an email from quarantine 1 Use the search features described in the previous sections to return a list of quarantined emails 2 Click on the email to view the email contents 3 Click Delete and Notify Administration and Configuration Manual Quarantine 77 7 2 5 Rescanning quarantined
18. click Reset all the URLs When changing URLs ensure to update all present subscriptions accordingly 7 Click Apply 7 4 2 Subscribing to Quarantine RSS feeds Subscribing to all enabled Quarantine RSS feeds 1 Navigate to GFI MailSecurity gt Quarantine gt Quarantine RSS Feeds 2 In the RSS Feeds area right click on icon and click Copy Shortcut to copy the RSS feed URL 3 Use the copied URL in your RSS Feed Reader application to create a new RSS feed subscription Subscribing to a search folder Quarantine RSS feed To subscribe to an RSS feed of a default or custom search folder 1 Navigate to GFI MailSecurity gt Quarantine gt Quarantine RSS Feeds 2 In the RSS Feeds area right click on icon next to the search folder to subscribe to and click Copy Shortcut to copy the RSS feed URL 3 Use the copied URL in your RSS Feed Reader application to create a new RSS feed subscription Administration and Configuration Manual Quarantine 77 7 4 3 Securing access to the GFI MailSecurity Quarantine RSS feeds You can configure GFI MailSecurity to create quarantine RSS feeds on specific quarantine folders To configure who can subscribe to the quarantine RSS feeds 1 Navigate to Start gt Programs gt GFI MailSecurity gt GFI MailSecurity SwitchBoard GFI MailSecurity SwitchBoard GFI MailSecurity User Interface Mode Tracing Other Configuration user interface mode Select the user inter
19. configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 8 To log the occurrence of this activity to a log file select the Log occurrence to this file check box In the text box specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file will be stored in the following default location lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Logs lt filename gt txt 9 Click Apply Check corrupted archives This filter allows you to quarantine or delete emails that contain corrupted archives To configure this filter 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Decompression 2 From the list of available filters click Check corrupted archives 3 To enable this filter select the Check corrupted archives checkbox 4 Specify what to do when an email contains an archive that triggers this filter Quarantine Quarantines blocked emails Automatically Delete Deletes blocked emails When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI MailSecurity may not be able to block outbound emails but instead replaces the blocked content with a threat report 5 Select Send a sanitized copy of the original email to recipi
20. emails The Quarantine Store allows you to rescan quarantined emails For example to re check an email with updated anti virus signatures 1 Use the search features described in the previous sections to return a list of quarantined emails 2 Select the checkbox next to the quarantined email s to rescan and click Rescan items Alternatively click Rescan all to approve all emails in the list 7 2 6 Viewing the full security threat report of an email To view the full security threat report of a quarantined email 1 Use the search features described in the previous sections to return a list of quarantined emails 2 Click on the email to view the full security threat report Quarantined email Showing details for quarantined item 66 Sanitize and Approve Delete and Notify Download item Back Item Information Source Gateway SMTP E 9 24 2010 ne 12 31 20 AM Subject this is a threat email ee From malicious sender com Module Content T Filtering 0 bjones masterdomain com Scan Modules Content Filtering Attachments Quarantined item has no attachments to display Message Text Text Body Please click here to see quarantined content a The message body might contain malicious content Instead of displaying the message body the threat description is being shown The following table shows the threat details for this message body To view the actual message body please click the link above P
21. installation path gt ContentSecurity MailSecurity Logs lt filename gt txt 11 Click Apply Administration and Configuration Manual Quarantine 81 8 Reporting 8 1 Introduction Use the GFI MailSecurity Reporting option to configure logging of statistical data such as the amount of emails being processed and quarantined into a database You can then install the GFI MailSecurity ReportPack add on to generate reports based on the data collected in the database For more information about the GFI MailSecurity ReportPack navigate to GFI MailSecurity gt Reporting gt GFI MailSecurity ReportPack Reporting is enabled by default 8 2 Enabling reporting 1 Navigate to GFI MailSecurity gt Reporting Reporting E Reporting Reporting records statistical information to a database This data is later used to generate reports of your choice This dialog allows you to configure the database backend for the reports MV Enable Reporting Current database settings Current type Microsoft Access Current location C Program Files x86 GFI ContentSecurity MailSecurity data reports mdb Screenshot 75 Reporting page 2 Select Enable Reporting check box In the Current database settings area the type and location of the database are displayed 8 3 Configuring the database By default GFI MailSecurity uses a Microsoft Access database reports mdb located in lt GFI MailSecurity installation path gt ContentSecurity
22. monitor and use it to create a new subscription in the RSS feed reader NOTE Only users given access privilege through the GFI MailSecurity SwitchBoard tool are allowed to subscribe to the Quarantine RSS feeds Please visit http kbase gfi com showarticle asp id KBID002661 for a list of freely available RSS feed readers which are known to support authentication and have been tested out with the GFI MailSecurity Quarantine RSS Feeds I Enable Quarantine RSS Feeds If the above checkbox is unchecked no feeds will be generated regardless of the individual filter s settings RSS Feeds To subscribe to all enabled feeds copy the URL associated with the orange Edit OPML button a Default quarantine folder RSS Feed Status Interval Maximum Items BLEJ Today Disabled 10 minutes 100 Edit BIJ Yesterday Disabled 10 minutes 100 Edit ESET This Week Disabled 10 minutes 100 Edit EE All Items Enabled 10 minutes 100 Edit Custom quarantine folder RSS Feed Status Interval Maximum Items My Search Folder Enabled 10 minutes 100 Edit Screenshot 70 Quarantine RSS feeds 2 Select the Enable Quarantine RSS Feeds checkbox 3 From the RSS Feeds area click Edit to the right of the quarantine search folder for which to enable RSS feeds 76 Quarantine Administration and Configuration Manual RSS Feeds 2 5 To subscribe to all enabled feeds copy the URL associated with the orange OPML button Edit
23. resolved emails can be re scanned by GFI MailSecurity as explained in the following sections to determine if they are Safe to be delivered Files with extension PROP in the failedmails folder are used for troubleshooting purposes When reprocessing failed emails these files can be deleted GFI MailSecurity installed on Microsoft Exchange Server 2007 2010 1 Change the extension of TXT files in the failedmails folder to EML 2 Move renamed files to the following folder lt drive gt Program Files Microsoft Exchange Server TransportRoles Replay To automatically change the extension of all TXT files in the failedmails folder to EML files from command prompt change the directory to the failedmails folder and run the following command ren txt eml GFI MailSecurity installed on Microsoft Exchange Server 2003 1 Move emails in txt format to the following folder lt Microsoft Exchange installation path gt Exchsrvr Mailroot vsi 1 PickUp GFI MailSecurity installed on Gateway server 1 Move emails in txt format to the following folder lt drive gt Inetpub mailroot Pickup 9 4 2 Failed emails notifications GFI MailSecurity can be configured to notify the administrator whenever an email fails processing To configure the administrator s email address refer to chapter Configuring the administrator s email address 1 Navigate to Start gt Programs gt GFI MailSecurity gt GFI MailSecurity Switchboard Administrat
24. spam feature For more information click here Rule Status Priority Iv aY CONTENT POLICY Block all potentially malicious attachments Enabled 2 wes Pah POLICY Block most common video attachments Enabled 3 al rm CONTENT POLICY Block most common image attachments Disabled 4 aw jpg etc mi bal ee Black most common audio attachments Disabled 5 av Screenshot 40 Selecting an attachment Filtering rule for removal AN Deleted rules are not recoverable 1 Navigate to the GFI MailSecurity gt Scanning amp Filtering gt Attachment Filtering node 2 From the Attachment Filtering page select the checkbox of the rule s that you want to remove 3 Click Remove Selected to delete the selected rules 6 2 5 Modifying an existing rule 1 Click the GFI MailSecurity gt Scanning amp Filtering gt Attachment Filtering node 2 From the Attachment Filtering page click the name of the rule to modify 3 Perform the required changes in the rule properties and click Apply to apply changes 6 2 6 Changing the rule priority Attachment Filtering rules are applied in the same order from top to bottom as they are listed in the Attachment Filtering page that is rule with priority value 1 is checked first To change the sequence priority of rules 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Attachment Filtering 2 From the Attachment Filtering page click the up or down arrows to respectively i
25. to add or remove local domains after installation follow these steps 1 From the GFI MailSecurity Configuration navigate to GFI MailSecurity gt General gt Settings and select Local Domains tab 2 Key in the name of the domain to add in the Domain text box 3 Click Add to include the stated domain in the Local domains list To remove a listed domain select it from the list and click Remove 4 Click Apply 4 5 SMTP server bindings B The SMTP Server bindings tab is not available when GFI MailSecurity is installed on a 1 Microsoft Exchange Server 2007 2010 machine General Updates Local Domains Bindings User Manager a SMTP Bindings Configure SMTP bindings Select the SMTP server from the following list The SMTP server instance selected will also be used to send notifications 4 Default SMTP Virtual Server Screenshot 13 Binding GFI MailSecurity to a different SMTP Server Administration and Configuration Manual General settings 15 GFI MailSecurity relies on the IIS SMTP service to send and receive emails By default it binds to your default SMTP virtual server If however you have multiple SMTP virtual servers installed on your machine select to which one you want to bind GFI MailSecurity You can select your virtual SMTP server both during the installation stage as well as from the Bindings tab after the installation To change the current SMTP Virtual Server 1 From the GFI MailSecurity Configurati
26. 0 2010 08 59 21 safe sender com bjones masterdomain com Safe email OK 08 10 2010 08 59 20 safe sender com bjones masterdomain com Safe email OK Screenshot 7 Email processing logs From GFI MailSecurity you can monitor all processed emails in real time Navigate to GFI MailSecurity gt Dashboard and select the Logs tab to display the list of processed emails The following details are displayed for each email processed Date Time Sender Recipient s Subject Scan Result The Scan Result column shows the action taken on the email 10 Monitoring the GFI MailSecurity status OK Email is not blocked by GFI MailSecurity and is delivered to its intended recipients Quarantined Email is blocked by an engine or filter that has the action set to Quarantine Click Quarantine to review the email NOTE The email cannot be previewed in quarantine if it was manually deleted or it was blocked by a rule configured to save emails to a folder on disk Deleted Failed Email is blocked by an engine or filter with the action set to delete detected emails Email could not be scanned by GFI MailSecurity Email is moved to the following folder lt GFI MailSecurity installation path gt GFl Content Security MailSecurity FailedMails For more information about failed emails refer to http kbase gfi com showarticle asp id KBID003263 Administration and Configuration Manual Filtering the email processing logs gt Filter
27. 7 To enable this option select the Stop virus scanning the current item if viruses are detected by check box and specify the number of virus scanners that need to detect a virus to stop virus scanning in the box Click Apply You can also instruct GFI MailSecurity to stop further scanning by all other modules such as the Email Exploit Engine To enable this feature select Stop scanning even for non virus related threats check box and click Apply 5 11 Configuring Information Store Scanning When GFI MailSecurity is installed on the Microsoft Exchange server machine you can utilize GFI MailSecurity to scan the Microsoft Exchange Information Store for viruses B When GFI MailSecurity is installed on a Microsoft Exchange Server 2007 2010 machine a Information Store Protection is available only when both the Mailbox Server Role and Hub Transport Server Role are installed This section will show you how to enable Information Store Scanning and select the scan method used by VSAPI Virus Scanning API 5 11 1 Information Store Scanning 1 Click the GFI MailSecurity gt Virus Scanning Engines gt Information Store Protection node Information Store Virus Scanning VSAPI Settings 4 Configures Information Store Virus Scanning IV Enable Information Store Virus Scanning When this option is enabled the contents of the Microsoft Exchange Information Store are scanned for viruses through the Microsoft Exchange Virus Scanning API SAPI
28. GFI MailSecurity gt Scanning amp Filtering gt Content Filtering 2 From the Content Filtering page click the up or down amp arrows to respectively increase or decrease the priority of the rule 3 Repeat step 2 until rules are placed in the desired sequence 6 2 Attachment Filtering 6 2 1 Introduction The Attachment Filtering feature allows you to set up rules to filter what types of email attachments to allow and block on the mail server A rule is composed of Attachment types to block Actions to take when a matching attachment is found Administration and Configuration Manual Configuring other mail filters 47 The users to which a rule applies Attachment Filtering hi Gp Configure attachment filtering settings This filter generates alerts as well as blocks quarantines and moves to specific folders all inbound foutbound emails which meet the configured attachment conditions NOTE This is NOT an anti spam feature For more information click here Remove Selected Enable Selected Disable Selected Add Rule Rule Status Priority CONTENT POLICY Block all potentially malicious attachments Enabled 1 aes E CONTENT POLICY Block most common video attachments Enabled 2 ale avi etc O TEN POLICY Block most common image attachments Disabled 3 ale Jpg etc O 5 aA sadis Y Block most common audio attachments Disabled 4 ay L Mmpo etc Screenshot 35 Attachment Filtering p
29. General settings 13 General Updates Local Domains Y Automatic checking for updates Proxy server settings Configure proxy settings V Enable proxy serwer Proxy server 92 168 1 1 5 n 080 Proxy authentication settings Configure proxy authentication settings M Enable proxy authentication Username admin Password For security reasons the length in the password box above does not necessarily reflect the true password length Screenshot 11 Updates server proxy settings 2 Select the Enable proxy server checkbox 3 In the Proxy server field key in the Machine Name or IP address of the proxy server 4 In the Port field key in the port to connect on default value is 8080 5 If the proxy server requires authentication select the Enable proxy authentication check box and key in the user name and password in the Username and Password fields respectively 6 Click Apply 14 General settings Administration and Configuration Manual 4 4 Adding Local Domains General Updates Local Domains or Local Domains ow Configure local domains Domain a Local domains list tcdomainb com Remove Screenshot 12 Local Domains list GFI MailSecurity requires the list of local domains to enable it to distinguish between inbound outbound or internal emails During installation GFI MailSecurity automatically imports local domains from the IIS SMTP service If however you wish
30. Logging quarantine actions GFI MailSecurity provides the option to store a log of actions taken on quarantined emails Use this feature for example in environments where multiple administrators are assigned the task to review quarantined emails Each quarantine action is displayed in the following format Date Time User Operation Sender Recipients Subject 74 Quarantine Administration and Configuration Manual For example 2010 09 28 9 25 05 Administrator Approve malicious external com bob jones mydomain com EmailSubject To enable this feature 1 Navigate to GFI MailSecurity gt Quarantine gt Quarantine Options Audit options V Save quarantine audit to this file quarantineaudit log If no path is specified the audit file will be saved to the MailSecurity Data folder by default Audit files are saved with the current year number appended to the specified filenames e g quarantineaudit_2010 log Screenshot 69 Quarantine Options configuration page 2 In the Audit options area select Save quarantine audit to this file 3 Specify where to store the audit file and the filename Key in either a file name in LOG format This option stores the audit file in lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Data ETA path and file name in LOG format This option stores the audit file in a custom ocation E The year is appended to the audit file na
31. Scanner Actions Notification options M Notify administrator E Notify local user Logging options M Log occurrence to this file Screenshot 48 Trojan and Executables Scanner Actions Tab 5 Click the Actions tab to configure the actions you want GFI MailSecurity to take on emails containing a malicious executable Emails blocked by the Trojan amp Executable Scanner are always quarantined B When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI 4 MailSecurity may not be able to block outbound emails but instead replaces the blocked content e g the attachment with a threat report 6 GFI MailSecurity can send email notifications whenever malicious executables are detected To enable this feature select any of the following options Notify administrator Notify the administrator whenever this engine blocks an email To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 7 To log the occurrence of this activity to a log file select Log occurrence to this file checkbox In the text box specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file will be stored in the following default location lt GFI MailSecurity installation path gt
32. Sender Search for emails sent from a particular email address Recipient Search for emails sent to a particular email address Search options Quarantined by E Attachment Checking T ony Item direction IV Inbound Screenshot 61 New Search Folder search options 7 Specify other search criteria in the Search options area Quarantined by Search for emails quarantined by a specific filter Select a filter from the list next to this option for example Attachment Filtering NOTE Since an email can be blocked by multiple security threats or content policy infringements you can choose to show only emails that were blocked by one specific filter To do this select only next to the filters dropdown list 68 Quarantine Administration and Configuration Manual Item direction Limits the items included in this search folder to either Inbound or Outbound emails NOTE 1 Leave this option unselected if you want to include both Inbound and Outbound emails in this Search Folder NOTE 2 This option is only available when GFI MailSecurity is not installed on a Microsoft Exchange machine or when the Item source selected is Gateway Date filter E Date Day Time hh mm ss amjpm AN Screenshot 62 New Search Folder filtering by date 8 A search folder can also filter emails by date From the Date filter area select the Date checkbox and specify Specific date Filters emails by a specific date Key in or select a date i
33. age To configure attachment rules navigate to GFI MailSecurity gt Scanning amp Filtering gt Attachment Filtering This page allows you to view create enable disable or delete rules 6 2 2 Creating an Attachment Filtering rule 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Attachment Filtering node 2 Click Add Rule 42 Configuring other mail filters Administration and Configuration Manual General Actions Users Folders ky Attachment Filtering Rule display name Rule name My custom rule Email checking M Check inbound emails M Check outbound emails M Check internal emails Attachment blocking Block all Block this list 7 Do not block attachments which are smaller than the following size in Kb Block all except this list Enter filenames with optional wildcards feg vbs eg letter vbs eg happy exe eg orders mdb Remove Selected orders mdb Options T Block all files greater than the following size in Kb ee Screenshot 36 Attachment Filtering General Tab 3 Specify a name for the rule in the Rule name text box 4 Select whether to scan inbound and or outbound emails Check inbound emails Select this option to scan incoming emails Check outbound emails Select this option to scan outgoing emails Check internal emails Select this option to scan internal emails NOTE This option is only available when GFI M
34. ailSecurity is installed on the Microsoft Exchange server 5 In the Attachment Blocking area specify the types of attachments to block Block all Block all email attachments of any type Block this list Block a custom list of attachment types Key in a filename and or attachment type to block in the Enter filename with optional wildcards text box and click Add Repeat this step for all filenames and or attachment types to block Administration and Configuration Manual Configuring other mail filters 43 Do not block attachments Select this option to allow attachment types in the list that are smaller than a which are smaller than the particular size Specify the size in Kb in the text box provided following size in Kb Block all except this list Block all attachments except the ones specified in the list Key in a filename and or attachment type to exclude in the Enter filename with optional wildcards text box and click Add Repeat this step for all filenames and or attachment types to exclude B When specifying filenames and or attachment types you can use asterisk wildcards 4 For example specifying orders mdb refers to all files of type mdb that contain the string orders in the file name Specifying jpg will block all images of type jpg To remove an entry from the list select it and click Remove Selected 6 You can also block attachments that have a size bigger than a particular size To enable this option from the Op
35. al 11 In the Update options area select Enable email notifications upon successful updates to send an email notification to the administrator whenever Trojan amp Executable Scanner is updated successfully An email notification is always sent when an update fails 12 To check for and download updates immediately click Download updates 13 Click Apply 60 Configuring other mail filters Administration and Configuration Manual 6 5 3 Enabling Disabling email exploits To enable disable email exploits 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Email Exploit Engine Exploit List Email Exploit i ji T Email Exploit Engine ID Description Last Updated Status ff CLS ID File Extension High alert 7 11 2007 8 54 20 AM Enabled E 2 Iframe within an HTML email Suspicious 9 1 2005 2 03 08 PM Enabled s F 3 Malformed File Extension High alert 2 15 2002 12 00 00 AM Enabled g E 4 3 Java ActiveX Component Exploit High alert 8 31 2005 7 25 26 AM Enabled E 5 Mime header vulnerability High alert 4 28 2006 12 56 339PM_ Enabled E 6 ASX buffer overflow High alert 8 31 2005 7 26 10 AM Enabled E 7 Document Open method Exploits Possible intrusion attempt 6 17 2008 7 24 38 AM Enabled F 8 Popup Object exploit High alert 4 28 2006 12 05 43 PM Enabled 9 Object CODEBASE file execution High alert 6 17 2008 7 24 38 AM Enabled F 10 3 Local file reading execution
36. and Configuration Manual Condition entry Edit condition drugstore A A Add Condition Update Oo N AND NOT v OR NOT Conditions list Current conditions viagra OR drugs OR medicine Remove Allthese conditions are validated as a single condition using the OR operator for each entry Clicking on an entry will copy the condition text in the condition entry above for editing Screenshot 29 Content Filtering Body Tab setting conditions 3 From the Condition entry area key in keywords to block in the Edit condition box You can also use conditions AND OR AND NOT and OR NOT to use a combinations of keywords 4 To add the keyword or combination of keywords keyed in click Add Condition E To modify an entry in the Conditions list select it and make the required changes in the Condition entry box Click Update to apply changes To remove an entry from the Conditions list select it and click Remove Options M Match whole words only Iv Apply above conditions to attachments Attachment filtering Check all attachments having file extensions in this list Check all except attachments having file extensions in this list File extension entry eg txt eg jpg a File extensions Screenshot 30 Content Filtering Body Tab configuring other options 5 From the Options area configure other settings Administration and Configuration Manual
37. and unprocessed emails in the selected period Monitoring the GFI MailSecurity status 9 3 3 Email processing logs Dashboard Logs Updates Y The Logs show all the email scanning activity in chronological order Filter x Sender Subject Scan Result All z Recipient From r EQ To Le B Clear Filters Date Time Sender Recipient s Subject Scan Result 08 10 2010 09 00 13 corrupt sender com bjones masterdomain com Failed Failed 08 10 2010 08 59 44 safe sender com bjones masterdomain com Safe email OK 08 10 2010 08 59 43 safe sender com bjones masterdomain com Safe email OK 08 10 2010 08 59 34 safe sender com bjones masterdomain com Safe email OK 08 10 2010 08 59 34 malicious sender com bjones masterdomain com Contains virus Quarantined 08 10 2010 08 59 33 safe sender com bjones masterdomain com Safe email OK 08 10 2010 08 59 33 08 10 2010 08 59 33 08 10 2010 08 59 31 08 10 2010 08 59 31 malicious sender com malicious sender com safe sender com malicious sender com bjones masterdomain com bjones masterdomain com bjones masterdomain com bjones masterdomain com Contains virus Contains virus Safe email Contains virus Quarantined Quarantined OK Quarantined 08 10 2010 08 59 30 safe sender com bjones masterdomain com Safe email OK 08 10 2010 08 59 30 corrupt sender com bjones masterdomain com Failed Failed 08 10 2010 08 59 27 safe sender com bjones masterdomain com Safe email OK 08 1
38. antine This feature will automatically keep your quarantine store clean from malicious spam email M Enable directory harvesting protection Lookup options C Use native Active Directory lookups Use LDAP lookups LDAP Settings Server 127 0 0 1 Port 636 Base DN I Anonymous bind Update DN list User Password For security reasons the length in the password box above does not necessarily reflect the true password length Email address test Email address administrator mydomain com Test Logging options Iv Log occurrence to this file director yharvesting txt M Use SSL Screenshot 74 Directory Harvesting filter 3 Select Enable directory harvesting protection checkbox 4 Select the user lookups method to use Use native Active Directory lookups Use LDAP lookups Select this option if GFI MailSecurity is installed in Active Directory mode and has access to ALL users on Active Directory Skip to step 9 NOTE 1 When GFI MailSecurity is installed in Active Directory user mode on a DMZ the AD of a DMZ usually does not include all the network users email recipients In this case configure directory harvesting to use LDAP lookups NOTE 2 When GFI MailSecurity is behind a firewall the Directory Harvesting feature might not be able to connect directly to the internal Active Directory because of Firewall settings Use LDAP lookups to connect to the internal Active Directory of your netw
39. antined emails SMTP traffic will be displayed Any All quarantined items will be displayed irrespective of the source Administration and Configuration Manual Quarantine 67 Auto Purging With the auto purge option you can automate the management of the items stored in this search folder Items that have been quarantined for at least the number of days you specify will be automatically deleted from the quarantine system IV Enable Auto purging Automatically purge items older than day s Screenshot 59 New Search Folder auto purge settings 5 You can also configure auto purge settings for this search folder If you configure auto purging on a search folder GFI MailSecurity deletes any emails in that search folder that are older than the number of days specified To enable auto purging select Enable Auto purging and specify a value in the Automatically purge items older than box AN Purged items are not recoverable Keyword search Quarantine reason DL S Ey Item subject DL Sender V sender maliciousdomain com Recipient DL S Screenshot 60 New Search Folder searching by keywords 6 In the Keywords search area specify the search criteria that will determine the contents of this folder You can select any of the following options Quarantine reason Search for emails containing specific text in the quarantine reason Item subject Search for emails containing specific text in the email subject
40. antined emails in this period 383 E Unprocessed emails in this period 0 Screenshot 6 The GFI MailSecurity Charts The Charts area displays graphical information about emails processed by GFI MailSecurity Select the time period from the drop down list to display information for that period in the charts Total emails processed Total quarantined emails Unprocessed emails in the last 24 hours View charts for this period Email scanning timeline time graph Scan statistics pie chart Safe emails in this period Quarantined emails in this period Unprocessed emails in this period Administration and Configuration Manual Shows various global statistics including total number of emails scanned and quarantined by GFI MailSecurity since installation and unprocessed emails in the last 24 hours Enables you to select a period for which to view charts Available options are Last 6 hours Last 24 hours Last 48 hours Last 7 days NOTE Options displayed depend on how long GFI MailSecurity has been installed For example if GFI MailSecurity was installed 24 hours ago Last 48 hours and Last 7 days options are not available Shows a time graph in intervals for the time period selected The graph shows the number of safe quarantined and failed emails A graphical distribution of the total number of safe quarantined and failed emails for the time period selected Shows the number of safe quarantined
41. applies the appropriate action depending on the scan results ACTION Accepted If the email is safe delivery to the user s mailbox is allowed Blocked When a compromised email is detected the appropriate action is taken by GFI MailSecurity depending on which action is configured for example the email is quarantined 2 2 2 Outgoing email Outgoing email LS GFI MailSecurity So Yo Qa amp Blocked Scanning amp filtering Accepted Sent for delivery Screenshot 2 Outgoing email Q Outgoing email is relayed to the GFI MailSecurity machine Q Email is scanned by GFI MailSecurity using the email scanning engines and filters configured to scan outbound emails EMAIL SCANNING ENGINE DESCRIPTION Virus Scanning Engines Scan emails for viruses and malicious code Some engines also include other features such as macro checking link scanning and Sandbox technology Content and attachment Block emails that match any rules containing pre configured conditions within the filtering email body or attachments Trojan amp executable Analyzes the function of executable files for malicious code scanner Email exploit engine Checks if attachments contain any exploits HTML Sanitizer Scans and removes html code with email body and attachments 9 GFI MailSecurity applies the appropriate action depending on the scan results SCAN RESULT ACTION Accepted If the email is safe delivery to the user s mailbox is allowe
42. at Message HTML File Edit Yiew Insert Format Tools Actions Help F Ga Reply Reply to All Forward 2a 4 X e A OF From Administrator Sent Tue 10 13 2009 4 22 PM To John Smith Cc Subject Notification GFI MailSecurity detected s threat Dear Administrator On the 13 October 2009 GFI MailSecurity quarantined the following item Item ID 7 Highest Priority Module Attachment Filtering Subject callcall From jackb external com To ismith masterdomain com Threats detected Filename Reason Attachment Filtering Triggered rule CONTENT POLICY 0 U funny mp3 258 Block all potentially malicious attachments Please select from the following options More details Approve Sanitize and Approve Delete Delete and Notify Screenshot 68 The Quarantine Action Form When a Quarantine Action Form is received review it and select one of the following actions directly from the Quarantine Action Form s body More details Launches the Quarantine Store page containing further information about this email Approve Release the email from the Quarantine Store and deliver it to its intended recipients Sanitize and Approve Sanitize the email from malicious content release it from the Quarantine Store and deliver it to its intended recipients Delete Permanently deletes the email Delete and Notify Permanently delete the email and send an email notification to the email s recipient 7 3 3
43. be able to use the Information Store Virus Scanning feature you must enable the option from Information Store Protection node For more information about Information Store Protection refer to Configuring Information Store Scanning section in this chapter 5 Select Actions tab to configure the actions to take when this anti virus engine finds malicious emails Refer to the Virus scanner actions section in this chapter 6 Select Updates tab to configure the update options for this anti virus engine Refer to the Virus scanner updates section in this chapter 7 Click Apply to save changes AVG web site For more information about AVG anti virus engine visit the AVG website at http www avg com 5 2 1 AVG LinkScanner When using the AVG Anti Virus engine it is also possible to use the AVG LinkScanner to block emails that contain links to known malicious web pages The AVG LinkScanner checks each link in an email against a list of URLs that are known sources of exploits and other malicious content AVG LinkScanner can also be configured to scan the content of links destination pages for exploits 20 Configuring Virus Scanning Engines Administration and Configuration Manual General Actions Updates AVG LinkScanner Options V Scan Inbound SMTP Email Scan links destination pages for exploits NOTE This feature requires http internet access Test http access AVG LinkScanner Version Information Engine versi
44. cked content with a threat report 3 Select Send a sanitized copy of the original email to recipient s to choose whether to forward a copy of the blocked email to the recipients but with the malicious content removed 7 Click the Actions tab to configure further actions 8 GFI MailSecurity can send email notifications whenever an email triggers this filter To enable this feature select any of the following options Notify administrator Notify the administrator whenever this engine blocks an email To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 9 To log the occurrence of this activity to a log file select the Log occurrence to this file check box In the text box specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file will be stored in the following default location lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Logs lt filename gt txt 10 Click Apply Check size of uncompressed files in archives General Actions E Decompression engine V Check size of uncompressed files in archives Decompression engine options and actions Maximum size of uncompressed files in archive in Mb Please select the action to take when this rule is vio
45. click Administrative Tools 3 In the Administrative Tools window double click Performance to start the Performance monitor MMC 4 From the System Monitor viewing pane click Add to load the Add Counters dialog Add Counters 24 xX Use local computer counters Select counters from computer NWIN2K3ENTSVR k Performance object MSExchangelS z C All counters eae Select counters from list Select instances from list Virus Scan Bytes Scanned Virus Scan Files Cleaned Vitus Scan Files Cleaned sec Virus Scan Files Quarantined Virus Scan Files Quarantined se Virus Scan Files Scanned Ma b Add Explain Close Screenshot 82 Adding VSAPI performance monitor counters 5 From the Performance object dropdown list select MSExchangelS 6 Click Select counters from list 7 Select any Virus Scan counter you need to add as listed in the Performance monitor counters section below 8 Click Add 9 Repeat step 7 and 8 to add all the performance counters needed 10 Click Close The counters of added processes are now displayed in the Performance Monitor 9 6 2 Performance counter in Windows 2008 Server In a Microsoft Exchange Server 2007 2010 environment the VSAPI performance monitor 4 counters are only available on machines with the Mailbox Server Role installed To add and view the performance monitor counter in Windows 2008 Server follow these steps 1 Navigate to Start gt Cont
46. com 26 Configuring Virus Scanning Engines Administration and Configuration Manual 5 6 Norman configuration General Actions Updates IN Norman AntiVirus Options V Enable Gateway Scanning SMTP V Scan Inbound SMTP Email V Scan Outbound SMTP Email V Enable Information Store Virus Scanning VSAPI _ Enable Sandbox Macro Checking Do not check macros Block all documents containing macros Norman Scanner Engine Version Information Scanner Engine Version 6 3 2 Binary viruses Signature version 06 03 0 Binary viruses signature date 2009 11 08 16 12 47 Binary viruses signature count 4346375 Macro viruses Signature version 06 03 0 Macro viruses signature date 2009 08 19 23 35 38 Macro viruses signature count 20457 Engine licensing Engine Licensing Status Evaluation expires Sunday October 03 2010 Automatic Updates Licensing Evaluation expires Sunday October 03 Status 2010 Screenshot 20 Virus Scanning Engines Norman configuration page 1 Navigate to GFI MailSecurity gt Virus Scanning Engines gt Norman Anti Virus In this page you can also review the anti virus engine licensing and version information ou 2 Select Enable Gateway Scanning SMTP check box to scan SMTP traffic using this Virus Scanning Engine 3 Select whether to scan inbound and or outbound emails using this Virus Scanning Engine Scan inbound SMTP email Select this option to scan incoming emai
47. d Medium Security Quarantines suspicious executables If the executable contains 1 high risk signature or a combination of high risk and low risk signatures it will get quarantined Low Security Quarantines executables that are most probably malicious If the executable contains at least 1 high risk signature it will get quarantined Screenshot 47 Trojan and Executable Scanner General Tab 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Trojan amp Executable Scanner 2 Select Enable Trojan amp Executable Scanner to activate this filter 3 In Email checking area specify the emails to check for Trojans and other malicious executables by selecting Check inbound emails Scan incoming emails for Trojans and malicious executable files Check outbound emails scan outgoing emails for Trojans and malicious executable files 4 From the Security settings area choose the required level of security High Security Blocks all executables that contain any known malicious signatures Medium Security Blocks suspicious executables Emails are blocked if an executable contains one high risk signature or a combination of high risk and low risk signatures Low Security Blocks only malicious executables Emails are blocked if an executable contains at least one high risk signature Administration and Configuration Manual Configuring other mail filters 55 General Actions Updates WY Trojan amp Executable
48. d Blocked When a compromised email is detected the appropriate action is taken by GFI MailSecurity depending on which action is configured for example the email is quarantined 2 2 3 Other features Apart from scanning incoming and outgoing emails GFI MailSecurity also includes the features listed below FEATURE DESCRIPTION Internal emails scanning Attachment Filtering and Content Filtering can be configured to scan internal emails when GFI MailSecurity is installed on the Microsoft Exchange server 4 About GFI MailSecurity Administration and Configuration Manual FEATURE DESCRIPTION Information Store Protection Scans the Microsoft Exchange Information Store using the Virus Scanning Engines Directory Harvesting Deletes emails addressed to nonexistent users from the Quarantine Store Quarantine Store A central repository within GFI MailSecurity where all blocked emails are retained until review 2 3 Licensing For information on licensing refer to http www gfi com products gfi mailsecurity pricing licensing Administration and Configuration Manual About GFI MailSecurity 5 3 Monitoring the GFI MailSecurity status 3 1 Introduction The GFI MailSecurity Dashboard node provides important information in real time that enables you to monitor the functionality of GFI MailSecurity This includes Important statistical information about blocked emails Status of GFI MailSecurity services Graphical presentation
49. d in XSL based notification templates Notify user and notify manager notifications in notifyuser folder and notifymanager folder respectively ARIABLE jtemsenderemailaddress The sender s email address itemsubject The quarantined email subject jtemdeliverytime The date and time the message was delivered jtemrecipients recipient The message recipients Use xsl for each to enumerate action Action taken on message by GFI MailSecurity shortdate Date when email was processed Short date format longdate Date when email was processed Long date format time24 Time when email was processed 24 hour format time12 Time when email was processed infringedrules rule List of rules infringed Use xsl for each to enumerate jtemmessageid The message ID of the email processed itemscandirection 0 Inbound 1 Outbound 4 Mixed Itemsendername The sender s name Itemscanresult The scan result Administration and Configuration Manual Miscellaneous 97 9 6 Monitoring Virus Scanning API When GFI MailSecurity is installed on the Microsoft Exchange machine you can monitor Virus Scanning API performance using the Performance Monitor MMC 9 6 1 Performance counter in Windows 2003 Server To add and view the performance monitor counter in Windows 2003 Server follow these steps 1 Click on Start gt Control Panel 2 In the Control Panel window double
50. ddition HTML scripts are rarely used in legitimate emails Administration and Configuration Manual Configuring other mail filters 67 6 6 2 Configuring the HTML Sanitizer 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt HTML Sanitizer HTML Sanitizer Whitelist g wrk Configure HTML Sanitizer The HTML Sanitizer scans the HTML body part of an email and any attachments with extension htm html and sanitizes the content by removing all the scripting code The content layout and formatting of the email are not altered The HTML Sanitizer guarantees that the emails end users receive are free from HTML scripting code and thus safe for viewing V Enable the HTML Sanitizer Email checking Select the emails you want the HTML Sanitizer to scan and clean V Check inbound emails V Check outbound emails Screenshot 54 HTML Sanitizer configuration page 2 To enable the HTML Sanitizer select Enable the HTML Sanitizer checkbox 3 Select the emails to check for HTML scripts and clean by selecting any of the following options Check inbound emails Scan and sanitize HTML scripts from all incoming emails Check outbound emails Scan and sanitize HTML scripts from all outgoing emails 4 Click Apply 6 6 3 HTML Sanitizer Whitelist The HTML Sanitizer Whitelist excludes emails received from specific senders from being processed by the HTML Sanitizer To manage senders in the HTML Sanitizer Whiteli
51. der maliciousdoma bjones tcdomainb com 5 22 2 55 39 PM SMTP content triggered rule content Content seat x z energy 7 13 2010 Gateway O Filtering policy block sexual sender maliciousdoma bjones tcdomainb com issues 2 55 26 PM SMTP content 5 Page s lt 123 13 gt Edit search folder Delete search folder Screenshot 64 List of Quarantined Emails in Search Folder 2 Select the checkbox next to the quarantined email s to approve and click Approve Alternatively click Approve all to approve all emails in the list 70 Quarantine Administration and Configuration Manual Sanitize and Approve GFI MailSecurity also allows you to remove malicious html scripts in the email body or in html attachments before approving Emails quarantined by the Information Store VSAPI source cannot be sanitized To sanitize and approve a quarantined email 1 Use the search features described in the previous sections to return a list of quarantined emails 2 Click on the email to view the email contents 3 Click Sanitize and Approve 7 2 4 Permanently deleting quarantined emails 1 Use the search features described in the previous sections to return a list of quarantined emails Quarantine a Use this page to sort and manage quarantined items Approve items Delete items Items per page Approve all Delete all Rescan all Update LEJ RSS feed disabled Configure R55 feeds Items in this search folder are
52. do not need to input the full name of the users groups or public folder It is 4 enough to enter part of the name GFI MailSecurity will list all the names that contain the specified characters For example if you input sco GFI MailSecurity will return names like Scott Adams and Freeman Prescott if they are available 16 Select the check box next to the name s that you want to add to the list and click OK To remove entries from the list select the user user group public folder you want to d remove and click Remove If no names are included in the list GFI MailSecurity automatically applies this rule to all email users 17 Repeat steps 14 to 16 to add all the required users to the list 18 Click Apply 6 2 3 Enabling disabling rules To enable or disable attachment filtering rules 1 Navigate to the GFI MailSecurity gt Scanning amp Filtering gt Attachment Filtering node 2 From the Attachment Filtering page select the checkbox of the rule s to enable or disable 3 Click Enable Selected or Disable Selected accordingly 46 Configuring other mail filters Administration and Configuration Manual 6 2 4 Removing attachment rules Attachment Filtering ky Configure attachment filtering settings This filter generates alerts as well as blocks quarantines and moves to specific folders all inbound foutbound emails which meet the configured attachment conditions NOTE This is NOT an anti
53. e buttons to add or remove users or groups from the list For each entry select Allow or Deny checkboxes to allow or deny access 4 Click OK to finalize access permissions 5 Click OK and wait while applying the new settings 6 When the process completes click OK 7 5 Directory Harvesting Directory harvesting attacks occur when malicious mail senders send emails to randomly generated email addresses While some of these email addresses match real users the majority of addresses are invalid The GFI MailSecurity Directory Harvesting feature scans emails for non existing local email addresses before these are stored to the Quarantine Store If an email is triggered as a Directory harvesting attack it is permanently deleted This reduces the number of emails for administrative reviewing 7 5 1 Configuring Directory Harvesting The Directory Harvesting filter requires access to the list of local addresses This is done either via Active Directory or if communication with Active Directory is not possible via an LDAP server 1 Navigate to GFI MailSecurity gt Quarantine gt Quarantine Options 2 Click the Directory Harvesting tab Administration and Configuration Manual Quarantine 79 Quarantine Mode Directory Harvesting y Directory Harvesting If you enable directory harvesting protection on the quarantining system GFI MailSecurity will delete items that have only non existent recipients instead of storing them in the quar
54. e recipient s since they may contain malicious content GFI MailSecurity moves these emails to the following folder lt GFI MailSecurity installation path gt Content Security MailSecurity failedmails Solution If any legitimate emails are moved to the failedmails folder these can be manually re processed for delivery For more information how to do this in various environments refer to http kbase gfi com showarticle asp id KBID003263 GFI MailSecurity returns the following Cause error An attached file is detected as being a file with multiple file types The file was blocked by the Solution attachment filtering module at file type checking stage The attachment claimed to be a lt filetype 1 gt which is For information how to resolve this issue refer to http kbase gfi com showarticle asp id KBID001922 identified as being an attachment in NOTE The solution to this issue requires changes in the Windows category lt filetype 1 gt The file was Registry It is important to follow the steps described in the solution detected to belong to the category with attention as incorrect configuration can cause serious system wide lt filetype 2 gt problems Administration and Configuration Manual Troubleshooting 97 10 5 Request technical support If you have referred to this manual and our Knowledge Base articles and you still cannot solve issues with the software contact the GFI Technical Support team by filling in an online
55. ed copy of the original email to recipient s Screenshot 43 Configuring recursive archives options This filter allows you to quarantine or delete emails that contain recursive archives Recursive archives also known as nested archives are archives that contain other multiple levels of sub archives that is archives within archives A high number of archive levels can indicate a malicious archive Recursive archives can be used in a DoS Denial of Service attack since most content scanning and anti virus packages crash while attempting to scan nested archive levels To configure this filter 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Decompression 2 From the list of available filters click Check for recursive archives 3 To enable this filter select the Check for recursive archives checkbox 4 Specify the maximum number of recurring archives in the Maximum number of recurring archives text box If an archive contains more recurring archives than the specified number the email is triggered as malicious 5 Specify what to do when an email contains an archive that triggers this filter Quarantine Quarantines blocked emails 50 Configuring other mail filters Administration and Configuration Manual Automatically Delete Deletes blocked emails When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI MailSecurity may not be able to block outbound emails but instead replaces the blo
56. ed processes are now displayed in the Performance Monitor E Reliability and Performance Monitor E File Action View Favorites Window Help S os B Reliability and Performance E gm Monitoring Tools ES Performance Monitor E Reliability Monitor E 3 Data Collector Sets El Reports WIA 2 00 8 dI e N ilu 0 11 44 25 AM show Color_ Scale Counter insta Parent 11 43 15 AM Last 164 000 Average Maximum 11 43 45 AM 11 44 24 AM 164 000 Minimum 164 000 164 000 Duration 1 40 Object Computer _ Processor WWINSERYB MSExchangeIS WINSERYB MSExchangelS a S WWINSERYB 1 0 Processor Time _Total 10 0 Virus Scan Files Cleanedj sec 1 0 Virus Scan Fil jarantined 0 25 Scanned Screenshot 84 Monitoring Virus Scan Files Scanned in Windows Server 2008 Performance Monitor 9 6 3 Performance monitor counters The following VSAPI Performance Monitor counters are available Virus Scan Messages Processed Virus Scan Messages Processed sec Virus Scan Messages Cleaned Virus Scan Messages Cleaned sec Virus Scan Messages Quarantined Virus Scan Messages Quarantined sec Virus Scan Files Scanned Virus Scan Files Scanned sec Virus Scan Files Cleaned Virus Scan Files Cleaned sec Virus Scan Files Quarantined Virus Scan Files Quarantined sec Virus Scan Bytes Scanned Virus Scan Queue Length Virus Scan Folders Scanned in Background 94 Miscellaneo
57. eenshot 56 Quarantine Store status page Content search From the Quick Search area of the Quarantine page specify any of the following search criteria and click Search to display matching quarantined emails Search in Specify a name or email address of a sender or recipient to find quarantined emails sender recipients sent from or addressed to that user You can also specify part of the name or email address and GFI MailSecurity returns all matching senders recipients Search in subject Specify a keyword or phrase to find quarantined emails that contain that specific text in the subject Search in quarantine Specify a keyword or phrase to find quarantined emails that contain that specific reason text in the quarantine reason Search by date From the Quarantined Items area of the Quarantine page select one of the preconfigured folders that return quarantined emails depending on the date when the email was quarantined 66 Quarantine Administration and Configuration Manual These folders can also be accessed from the GFI MailSecurity tree as sub nodes of the Quarantine node The default search folders that filter quarantined emails by date are Today Yesterday This week 7 2 2 Search Folders A Search Folder is a folder that has a custom search query associated to it and displays all quarantined emails that match the search query Examples of search folders A search folder that displays only outbound emails that
58. ent s to choose whether to forward a copy of the blocked email to the recipients but with the malicious content removed Administration and Configuration Manual Configuring other mail filters 49 6 Click the Actions tab to configure further actions 7 GFI MailSecurity can send email notifications whenever an email triggers this filter To enable this feature select any of the following options Notify administrator Notify the administrator whenever this engine blocks an email To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 8 To log the occurrence of this activity to a log file select the Log occurrence to this file check box In the text box specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file will be stored in the following default location lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Logs lt filename gt txt 9 Click Apply Check for recursive archives General Actions E Decompression engine V Check for recursive archives Decompression engine options and actions Maximum number of recurring archives Please select the action to take when this rule is violated Quarantine Automatically Delete V Send a sanitiz
59. eral Tab Attachment Filtering Actions Tab Attachment Filtering Users Folders Tab Add users to an attachment Filtering rule Selecting an attachment Filtering rule for removal The decompression engine filters list Configuring password protected archives options Configuring recursive archives options Configuring checks for the size of uncompressed files in archives Configuring the amount of files in archive check Disabling Decompression tool filters Trojan and Executable Scanner General Tab Trojan and Executables Scanner Actions Tab Trojan and Executable Scanner Updates tab Email Exploit Engine General Tab Email Exploit Engine Actions Tab Email Exploit Engine Updates Tab Email Exploit list HTML Sanitizer configuration page HTML Sanitizer Whitelist page Quarantine Store status page New Search Folder folder name New Search Folder selecting the source New Search Folder auto purge settings New Search Folder searching by keywords New Search Folder search options Screenshot 62 Screenshot 63 Screenshot 71 Screenshot 72 Quarantine RSS feeds Access Control Lists Screenshot 74 Screenshot 75 Screenshot 76 Screenshot 77 Screenshot 78 Screenshot 79 Screenshot 80 Screenshot 73 Screenshot 81 Screenshot 83 New Search Folder filtering by date Search Folder options Screenshot 64 Screenshot 65 Screenshot 66 Screenshot 67 Screenshot 68 Screenshot 69
60. es masterdomain com sca Screenshot 33 Add users to a Content Filtering rule 4 In the User Lookups window specify the name of the email user user group or public folder that you wish to add to the list and click Check Names Matching users groups or public folders are listed below You do not need to input the full name of the users groups or public folder It is 4 enough to enter part of the name GFI MailSecurity will list all the names that contain the specified characters For example if you input sco GFI MailSecurity will return names like Scott Adams and Freeman Prescott if they are available 5 Select the check box next to the name s that you want to add to the list and click OK B To remove entries from the list select the user user group public folder you want to J remove and click Remove If no names are included in the list GFI MailSecurity automatically applies this rule to a all email users 6 Repeat steps 3 to 5 to add all the required users to the list 7 Click Apply to save the newly created rule 6 1 3 Enabling disabling rules To enable disable content filtering rules 1 Navigate to the GFI MailSecurity gt Scanning amp Filtering gt Content Filtering node 2 From the Content Filtering page select the checkbox of the rule s to enable or disable 3 Click Enable Selected or Disable Selected accordingly 40 Configuring other mail filters Administration and Configura
61. ether to scan inbound and or outbound emails using this Virus Scanning Engine Scan inbound SMTP email Select this option to scan incoming emails Scan outbound SMTP email Select this option to scan outgoing emails 4 If you installed GFI MailSecurity on the Microsoft Exchange machine you will also have the option to scan the Information Store using this Virus Scanning Engine To scan the Information Store select the Enable Information Store Virus Scanning VSAPI check box Administration and Configuration Manual Configuring Virus Scanning Engines 25 To be able to use the Information Store Virus Scanning feature you must enable the option from Information Store Protection node For more information about Information Store Protection refer to Configuring Information Store Scanning section in this chapter 5 McAfee can also be used to block emails with attachments that contain macros Enable this feature from the Macro Checking area by selecting Block all documents containing macros 6 Select Actions tab to configure the actions to take when this anti virus engine finds malicious emails Refer to the Virus scanner actions section in this chapter 7 Select Updates tab to configure the update options for this anti virus engine Refer to the Virus scanner updates section in this chapter 8 Click Apply to save changes McAfee website For more information about McAfee anti virus engine visit the McAfee website at http www mcafee
62. face mode you want to use to configure and manage GFI MailSecurity Local mode Configure and manage GFI MailSecurity from this machine only IIS mode Configure and manage GFI MailSecurity remotely IIS user interface mode options Website name Defaut Web Site http WIN2K3SERY 80 Virtual directory M ailSecurity Security RSS Virtual directory MailSecurityRSS ASS Security IIS mode configuration URL http 7AW IN2K3SER V 80 MailSecurity IIS mode quarantine URL http AWIN2K3SERV 80 MailS ecurity quarantine i Cancel Apply Screenshot 72 GFI MailSecurity SwitchBoard 2 In the GFI MailSecurity SwitchBoard dialog box click RSS Security IIS mode access control list xi Access to the RSS feeds can be restricted to specific users or groups Below you can configure the access control list for the feed URL RSS URL Access Control List oes Name Type Deny S amp MASTER DOMAIN Administrators roles Iv O SA MASTER DOMAINS Enterprise Admins roles M E B MASTER DOMAIN Domain Admins roles M O amp MASTER DOMAIN Administrator users M E SESBUILTIN Administrators roles M O Add Remove Cancel Screenshot 73 Quarantine RSS feeds Access Control Lists 78 Quarantine Administration and Configuration Manual 3 In the IIS mode access control list dialog box you can configure who can subscribe to the quarantine RSS feeds Click Add or Remov
63. gate to GFI MailSecurity gt Virus Scanning Engines gt BitDefender Anti Virus In this page you can also review the anti virus engine licensing and version information PN Administration and Configuration Manual Configuring Virus Scanning Engines 23 2 Select Enable Gateway Scanning SMTP check box to scan SMTP traffic using this Virus Scanning Engine 3 Select whether to scan inbound and or outbound emails using this Virus Scanning Engine Scan inbound SMTP email Select this option to scan incoming emails Scan outbound SMTP email Select this option to scan outgoing emails 4 If you installed GFI MailSecurity on the Microsoft Exchange machine you will also have the option to scan the Information Store using this Virus Scanning Engine To scan the Information Store select the Enable Information Store Virus Scanning VSAPI check box To be able to use the Information Store Virus Scanning feature you must enable the option from Information Store Protection node For more information about Information Store Protection refer to Configuring Information Store Scanning section in this chapter 5 BitDefender can also be used to block emails with attachments that contain macros Enable this feature from the Macro Checking area by selecting Block all documents containing macros 6 Select Actions tab to configure the actions to take when this anti virus engine finds malicious emails Refer to the Virus scanner actions section in this cha
64. his file In the text box specify Path and file name to a custom location on disk where to store the log file or The file name only The log file will be stored in the following default location lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Logs lt filename txt gt Step 4 Specifying the users to apply this rule to By default the rule is applied to all email users GFI MailSecurity however allows you to apply this rule to a custom list of email users 1 To specify the users to apply this rule to select Users Folders tab General Body Subject Actions Users Folders g Content Filtering Users Folders Please select users this rule will apply to Only this list Al except this list Bob Jones bjones tcdomainb com Add Remove Screenshot 32 Content Filtering Users Folders Tab 2 Specify the users to apply this rule to Only this list Apply this rule to a custom list of email users groups or public folders All except this list Apply this rule to all email users except for the users groups or public folders specified in the list 3 To add email users user groups and or public folders to the list click Add Administration and Configuration Manual Configuring other mail filters 39 ia GFI MailSecurity User Lookup Windows Internet Explorer User Lookups amp Configure Users Name Email Address Email Aliases No other v Bob Jones bjon
65. his user manual is a comprehensive guide that aims to assist systems administrators in configuring and using GFI MailSecurity in the best way possible It builds up on the instructions provided in the GFI MailSecurity Getting Start Guide and describes the configuration settings that systems administrators must do to achieve the best possible results out of the software The GFI MailSecurity Getting Start Guide can be accessed from http www gfi com mailsecurity manual 1 2 1 Manual structure This manual contains the following chapters Chapter 1 Introduction Introduces this manual Chapter 2 About GFI MailSecurity Provides basic information about GFI MailSecurity Chapter 3 Monitoring email processing status Describes how to use the GFI MailSecurity Dashboard to monitor the status of the software including monitoring email processing activity Chapter 4 General settings Provides instructions on how to configure basic settings of GFI MailSecurity Chapter 5 Configuring Virus Scanning Engines Describes how to configure and optimize anti virus scanning engines Chapter 6 Configuring other mail filters Describes how to configure the other mail scanning features included with GFI MailSecurity Chapter 7 Quarantine Provides instructions how to use and customize the GFI MailSecurity Quarantine Chapter 8 Reporting Describes how to configure the reporting database to generate reports using the GFI MailSecurity ReportPack Cha
66. icate with the product s quarantine store to view further details of quarantined items and approve or discard them V Send quarantine approval forms by email Select recipient Send to administrator Send to the following email address o Audit options V Save quarantine audit to this file quarantineaudit log If no path is specified the audit file will be saved to the MailSecurity Data folder by default Audit files are saved with the current year number appended to the specified filenames e g quarantineaudit_2010 log Screenshot 67 Quarantine Options configuration page 2 In the Quarantine mode page select Send quarantine approval forms by email checkbox to enable the sending of Quarantine Action Forms 3 From the Select recipient area specify the recipient of the Quarantine Action Forms Send to administrator Sends Quarantine Action Forms to the administrator To configure the administrator s email address refer to chapter Configuring the administrator s email address Administration and Configuration Manual Quarantine 73 Send to the following email Sends Quarantine Action Forms to another email address Key in the recipient address in the text box provided 4 Click Apply 7 3 2 Reviewing quarantined emails Recipients of the Quarantine Action Forms can carry out various actions on quarantined emails directly from the email client Notification GFI MailSecurity detected s thre
67. icious or not Rather it assumes a security risk if an email is using an exploit in order to run a program or command whether or not the actual program or command is malicious 6 5 2 Configuring the Email Exploit Engine To configure the Email Exploit Engine properties 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Email Exploit Engine General Actions Updates gt Email Exploit Engine Email checking This scanner can be applied to both inbound and outbound emails Select below Y Check inbound emails V Check outbound emails Screenshot 50 Email Exploit Engine General Tab 3 From the General tab select whether to scan inbound and or outbound emails Check inbound emails Select this option to scan incoming emails Check outbound emails Select this option to scan outgoing emails 3 Click the Actions tab to configure what should be done when an email is blocked by the Email Exploit Engine When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI MailSecurity may not be able to block outbound emails but instead replaces the blocked content e g the attachment with a threat report 58 Configuring other mail filters Administration and Configuration Manual General Actions Updates Y Email Exploit Actions Actions Please select the action to take when one of the listed exploits is detected O Quarantine email Delete email Notification options M Notify administ
68. ick Add Rule Administration and Configuration Manual Configuring other mail filters 35 General Body Subject Actions Users Folders ef Content Filtering Please specify a friendly name for this rule New Content Checking Rule Email checking This rule can be applied to both inbound and outbound emails Select below V Check inbound emails V Check outbound emails V Check internal emails PGP Encryption This rule can be set to block any PGP encrypted mail Enable or disable this option below V Block PGP encrypted emails Screenshot 28 Content Filtering General Tab 2 Specify a name for the rule in the Rule name text box 3 Select which emails to scan Check inbound emails Select this option to scan incoming emails Check outbound emails Select this option to scan outgoing emails Check internal emails Select this option to scan internal emails NOTE This option is only available when GFI MailSecurity is installed on the Microsoft Exchange server 4 To block emails encrypted using PGP technology select Block PGP encrypted emails PGP encryption is a public key cryptosystem often used to encrypt emails Step 2 Configuring terms to block 1 Select the Body tab to specify the keywords in the email body to block 2 Select Block emails if content is found matching these conditions checkbox to enable scanning of body for keywords 36 Configuring other mail filters Administration
69. ing Patch Checking rr Patch Checking Check for patches Screenshot 78 List of available patches 2 Click Check for patches to connect to the GFI Update Server and check for available updates 3 Click the Download link of patches to download 4 On completion install the downloaded updates B Since the software patches vary in file format for example dll exe etc read the 4 relative patch information for installation instructions To access the installation instructions and other information applicable to a patch click the Information link provided in the list of available updates An incorrect patch installation might cause the product to malfunction or degrade its performance 9 2 Version Information Version Information Version Information Product description Product name GFI MailSecurity for Exchange SMTP Company name GFI Software Ltd Current build version information Version 2011 Build 20101028 Check if newer build exists Screenshot 79 Version Information page Administration and Configuration Manual Miscellaneous 87 To view the GFI MailSecurity version information navigate to GFI MailSecurity gt General gt Version Information The version information page displays the GFI MailSecurity installation version number and the build information To check whether you have the latest build of GFI MailSecurity installed on your machine click Check if newer build exists B Always quote you
70. ing SMTP V Scan Inbound SMTP Email V Scan Outbound SMTP Email W Enable Information Store Virus Scanning VSAPI AVG Scanner Engine Version Information Scanner engine version 1 7 9836 Scanner engine release date 2010 06 29 12 00 00 Virus database version 271 1 1 2984 Virus database release date 2010 07 05 18 36 00 Engine licensing Engine Licensing Status Evaluation expires Sunday October 03 2010 Automatic Updates Licensing Evaluation expires Sunday October 03 Status 2010 Screenshot 15 Anti virus Scanning Engines AVG configuration page General Tab 1 Navigate to GFI MailSecurity gt Virus Scanning Engines AVG Anti Virus In this page you can also review the anti virus engine licensing and version A information Administration and Configuration Manual Configuring Virus Scanning Engines 19 2 Select Enable Gateway Scanning SMTP check box to scan SMTP traffic using this Virus Scanning Engine 3 Select whether to scan inbound and or outbound emails using this Virus Scanning Engine Scan inbound SMTP email Select this option to scan incoming emails Scan outbound SMTP email Select this option to scan outgoing emails 4 If you installed GFI MailSecurity on the Microsoft Exchange machine you will also have the option to scan the Information Store using this Virus Scanning Engine To scan the Information Store select the Enable Information Store Virus Scanning VSAPI check box To
71. interface for more information refer to The Quarantine Store Through an email action form sent to the administrator for more information refer to Quarantine Action Forms Using Quarantine RSS Feeds for more information refer to Quarantine RSS feeds These quarantine management methods allow administrators to review approve or delete quarantined emails If the administrator approves a quarantined email GFI MailSecurity immediately releases the email from the Quarantine Store and delivers it to its recipients 7 2 The Quarantine Store The Quarantine Store is accessible from the GFI MailSecurity web interface and the administrator can manage quarantined emails To access the GFI MailSecurity Quarantine Store navigate to GFI MailSecurity gt Quarantine 7 2 1 Searching for quarantined emails The administrator has various options to search through quarantined emails Administration and Configuration Manual Quarantine 65 Quarantine d Use this page to perform quick searches and manage quarantined content in categories Quick Search Please select and use the following fields to perform quarantine content search Search in sender frecipients Search in subject Search in quarantine reason ee Quarantined Items Folder Items Today 75 Yesterday 0 This week 75 All items 75 Current search folders Folder Items Auto purging New search folder Scr
72. ion and Configuration Manual Miscellaneous 89 GFI MailSecurity SwitchBoard GFI MailSecurity User Interface Mode Tracing Other m Failed Mail Notifications This option sends notifications to the admnistrator s email address if any emails failed to be scanned by GFI MailSecurity V Send Notifications on Failed Mail OK Cancel Apply Screenshot 81 Failed emails notification 2 Select Other tab 3 Select Send Notifications on Failed Mail 4 Click Apply 9 5 Notification templates Notifications GFI MailSecurity sends notification emails to the administrator user whenever an event that needs attention occurs There are two types of notifications Administrative notifications GFI MailSecurity sends these notifications for example when a license is going to expire when a new patch is available and when new anti virus engine updates are available End user notifications GFI MailSecurity sends these notifications to the sender recipient of an email when an email gets quarantined or modified Templates There are two types of templates Tag based templates Use tags in the form TAGNAME to indicate fields which need to be replaced with dynamic data XSL based templates An XSL style sheet used in conjunction with dynamically created XML data to generate the notification message Notification email messages are generated from templates stored in 90 Miscellaneous Administra
73. lated Quarantine Automatically Delete Send a sanitized copy of the original email to recipient s Screenshot 44 Configuring checks for the size of uncompressed files in archives This filter allows you to block or delete emails with archives that exceed the specified physical size when uncompressed Hackers sometimes use this method in a DoS Denial of Service attack by sending an archive that can be uncompressed to a very large file that crashes content security or anti virus software To configure this filter 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Decompression 2 From the list of available filters click Check size of uncompressed files in archives Administration and Configuration Manual Configuring other mail filters 57 3 To enable this filter select the Check size of uncompressed files in archives checkbox 4 Specify the maximum size of uncompressed archives in the Maximum size of uncompressed files in archive in Mb text box If an uncompressed archive s size is bigger than the specified value the email is triggered as malicious 5 Specify what to do when an email contains an archive that triggers this filter Quarantine Quarantines blocked emails Automatically Delete Deletes blocked emails B When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI 4f MailSecurity may not be able to block outbound emails but instead replaces the blocked content with a threa
74. lder When deleting a search folder no emails are deleted from the quarantine store 7 2 3 Approving quarantined emails There might be instances where GFI MailSecurity incorrectly identifies as malicious false positive or the email contains an attachment that triggered a particular filter but you still want to deliver to its recipient for example a jpg image that triggered Attachment Filtering GFI MailSecurity allows the administrator to approve a quarantine email so that the email is released from the Quarantine Store and delivered to its intended recipients To approve emails 1 Use the search features described in the previous sections to return a list of quarantined emails Quarantine ha Use this page to sort and manage quarantined items Approve items Delete items Items per page Approve all Delete all Update EEJ RSS feed disabled Configure RSS feeds Items in this search folder are automatically purged if they are older than 10 day s ID Module Reason Sender Recipients Subject Date Source Virus good 3 detected of A F 7 13 2010 Gateway D 75 Scanning test_file_virus sender mialiciousdoma bjones tcdomainb com one 3 00 58 PM SMTP Engines haha Virus detected 7 13 2010 Gatewa I 72 Scanning R sender maliciousdoma bjones tcdomainb com hello i y Y z test_file_virus 3 00 32 PM SMTP Engines triggered rule content s Content ad ei F F iep news 7 13 2010 Gateway O Filtering policy black sexual sen
75. ll infected emails detected by the selected Virus Scanning Engine in the Quarantine Store You can subsequently review approve delete all the quarantined emails For more information about Quarantine refer to the Quarantine chapter in this manual Delete item Deletes infected emails 3 Select Send a sanitized copy of the original email to recipient s to choose whether to forward a copy of the blocked email to the recipients but with the malicious content removed This feature is not applicable to emails scanned using the Information Store Virus Scanning feature 4 GFI MailSecurity can send email notifications whenever an infected inbound email is detected To enable this feature select any of the following options Notify administrator Notify the administrator whenever the virus scanner detects an infected email To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked malicious email 5 To log the virus scanning activity to a log file select Log occurrence to this file In the text box specify Path and file name to a custom location on disk where to store the log file or The file name only The log file will be stored in the following default location lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Logs lt filename txt gt Administration and Configuration Manual Config
76. llowing options Quarantine email Stores emails containing the keyword s in the Quarantine Store You can subsequently review approve delete all the quarantined emails For more information about Quarantine refer to the Quarantine chapter in this manual 38 Configuring other mail filters Administration and Configuration Manual Delete email Deletes emails containing the blocked keyword s Move to folder Moves the email to a folder on disk Key in the full folder path where to store blocked emails When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI MailSecurity may not be able to block outbound emails but instead replaces the blocked content e g the attachment with a threat report 3 Select Send a sanitized copy of the original email to recipient s to choose whether to forward a copy of blocked emails to the recipients but with the malicious content removed 4 You can configure rule to send email notifications to the administrator and or user whenever an email containing an attachment is blocked To do this from the Notification options area select Notify administrator Notify the administrator whenever the rule is triggered To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 5 To log the activity of this rule to a log file select Log rule occurrence to t
77. ls Scan outbound SMTP email Select this option to scan outgoing emails 4 Select Enable Sandbox to use the Norman Anti Virus Sandbox feature This executes email attachments in a virtual environment and monitors all actions and effects on a system If an attachment exhibits viral behavior email is marked as malicious and all appropriate actions are taken Administration and Configuration Manual Configuring Virus Scanning Engines 27 B Since this check is executed in a virtual environment it does not pose any threats to 4 the machine or network where GFI MailSecurity is installed 5 If you installed GFI MailSecurity on the Microsoft Exchange machine you will also have the option to scan the Information Store using this Virus Scanning Engine To scan the Information Store select the Enable Information Store Virus Scanning VSAPI check box B To be able to use the Information Store Virus Scanning feature you must enable the option from Information Store Protection node For more information about Information Store Protection refer to Configuring Information Store Scanning section in this chapter 6 Norman can also be used to block emails with attachments that contain macros Enable this feature from the Macro Checking area by selecting Block all documents containing macros 7 Select Actions tab to configure the actions to take when this anti virus engine finds malicious emails Refer to the Virus scanner actions section in this chap
78. lugin Threat Content Filtering Words in body triggered rule Test rule Words found threat Screenshot 66 Viewing the full security threat report of a quarantined email 3 Click Back to return to the list of quarantined emails 7 2 7 Downloading quarantined email AN Emails in Quarantine Store may contain malicious content Use this feature with caution 72 Quarantine Administration and Configuration Manual 1 Use the search features described in the previous sections to return a list of quarantined emails 2 Click on the email to download 3 Click Download Item 4 Click OK in the confirmation dialog 5 Select to open or save the email in eml format 7 3 Quarantine Action Forms GFI MailSecurity can also be configured to notify the administrator or authorized users via email Quarantine Action Form whenever an email is quarantined The Quarantine Action Form contains details related to the quarantined email including the reason why it was blocked and any attachments that were included in the email The administrator can then action the quarantined email for example approve the email directly from the email client 7 3 1 Enabling Quarantine Action Forms 1 Navigate to GFI MailSecurity gt Quarantine gt Quarantine Options Quarantine Mode Directory Harvesting B04 Quarantine mode Email options Select where the quarantine approval forms will be sent These forms allow their recipient to commun
79. man 27 P Performance 90 91 92 perimeter server 97 proxy 13 14 Q Quarantine 28 36 42 47 48 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 R RSS Feeds 74 75 76 S SMTP 15 16 19 22 23 24 26 65 SMTP Server 95 SQL 82 83 T Trojan 13 52 53 54 55 58 X XSL 88 89 Index 101 USA CANADA CENTRAL AND SOUTH AMERICA 15300 Weston Parkway Suite 104 Cary NC 27513 USA Telephone 1 888 243 4329 Fax 1 919 379 3402 Email ussales gfi com UK AND REPUBLIC OF IRELAND Magna House 18 32 London Road Staines Middlesex TW18 4BP UK Telephone 44 0 870 770 5370 Fax 44 0 870 770 5377 Email sales gfi co uk EUROPE MIDDLE EAST AND AFRICA GFI House San Andrea Street San Gwann SGN 1612 Malta Telephone 356 2205 2000 Fax 356 2138 2419 Email sales gfi com AUSTRALIA AND NEW ZEALAND 83 King William Road Unley 5061 South Australia Telephone 61 8 8273 3000 Fax 61 8 8273 3099 Email sales gfiap com
80. mation Store Protection node For more information about Information Store Protection refer to Configuring Information Store Scanning section in this chapter 22 Configuring Virus Scanning Engines Administration and Configuration Manual 5 Select Actions tab to configure the actions to take when this anti virus engine finds malicious emails Refer to the Virus scanner actions section in this chapter 6 Select Updates tab to configure the update options for this anti virus engine Refer to the Virus scanner updates section in this chapter 7 Click Apply to save changes Kaspersky web site For more information about Kaspersky anti virus engine visit the Kaspersky website at http www kaspersky com 5 4 BitDefender configuration General Actions Updates S BitDefender AntiVirus Options V Enable Gateway Scanning SMTP V Scan Inbound SMTP Email V Scan Outbound SMTP Email V Enable Information Store Virus Scanning VSAPI Macro Checking Do not check macros J Block all documents containing macros BitDefender Version Information Build AVCORE v1 0 build 2409 i386 May 9 2007 18 01 21 Signatures 513583 Engine licensing Engine Licensing Status Evaluation expires Sunday October 03 2010 Automatic Updates Licensing Evaluation expires Sunday October 03 Status 2010 Screenshot 18 Virus Scanning Engines BitDefender configuration page General Tab 1 Navi
81. me and hence a new audit file is automatically 1 created each year This prevents that the file becomes very large 4 Click Apply 7 4 Quarantine RSS feeds RSS Really Simple Syndication is a protocol used to distribute frequently updatable content or feeds for example news items with its subscribers An RSS Feed Reader is required by subscribers to view RSS feeds RSS feeds usually include a summary of the content and a link to view the full article To facilitate the monitoring of quarantined emails RSS feeds can be used The Quarantine RSS feed displays quarantined emails for management of these emails B GFI MailSecurity Quarantine RSS feeds can be used on most RSS Feed Readers For a list 4 of freely available RSS Feed Readers that were tested with GFI MailSecurity Quarantine RSS feeds refer to http kbase gfi com showarticle asp id KBID002661 7 4 1 Enabling Quarantine RSS Feeds 1 Navigate to GFI MailSecurity gt Quarantine gt Quarantine RSS Feeds Administration and Configuration Manual Quarantine 75 Quarantine RSS Feeds Configure RSS feeds on the quarantine search folders GFI MailSecurity uses RSS Really Simple Syndication feeds to inform you when new items are blocked in the quarantine To read Quarantine RSS Feeds you can use an RSS feed reader program to subscribe to the feed To subscribe to a feed copy the URL associated with the orange RSS button to the left of the Quarantine folder you want to
82. n The Content Filtering feature allows you to set up rules to filter emails containing particular keywords or a combination of keywords in an email A rule is composed of Keywords to block in the email body subject or attachment Actions to take when a keyword is found The users to which a rule applies B Although this feature can be used as a filter against spam email it is recommended to use dedicated software to block spam For more information refer to http kbase gfi com showarticle asp id KBID003342 Content Filtering e Configure content filtering settings This filter generates alerts as well as blocks quarantines and mowes to specific folders all inbound outbound emails containing listed keywords NOTE This is NOT an anti spam feature For more information click here Remove Selected Enable Selected Disable Selected Add Rule Rule Status Priority CONTENT POLICY Block Racial Content Enabled 0 a ov CONTENT POLICY Block Sexual Content Enabled 1 gt CONTENT POLICY Block Profanities Disabled 2 gt Screenshot 27 Content Filtering page To configure content rules navigate to GFI MailSecurity gt Scanning amp Filtering gt Content Filtering This page allows you to view create enable disable or delete rules 6 1 2 Creating a Content Filtering rule Step 1 Configuring basic rule settings 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Content Filtering node and cl
83. n the Day text box You can also search by a specific email time To do this select the Time check box and input a time value Date Range Filters emails by a range of dates Specify a start date in the Day from box and an end date in the Day to box You can also search by a time range To do this select the Time from and Time to checkboxes and specify a time range B To search for a time range in one particular day select Date Range and input the same date in both Day from and Day to boxes Specify the time range in the Time from and Time to boxes 9 Click Save folder to create the search folder Modifying a Search Folder 1 Navigate to GFI MailSecurity gt Quarantine gt Search Folders gt lt search folder to modify gt Quarantine a Use this page to sort and manage quarantined items Delete tems RESC Items per page LEEF RSS feed disabled Configure RSS feeds ID Module Reason Sender Recipient s Subject Date Source Page s lt Edit search folder Delete search folder Screenshot 63 Search Folder options 2 Click Edit search folder and make the required changes to the search folder properties Administration and Configuration Manual Quarantine 69 3 Click Save folder to apply changes Deleting Search Folders 1 Navigate to GFI MailSecurity gt Quarantine gt Search Folders gt lt search folder to modify gt 2 Click Delete search folder 3 Click OK to confirm deletion of the fo
84. ncrease or decrease the priority of the rule 3 Repeat step 2 until rules are placed in the desired sequence 6 3 Decompression engine 6 3 1 Introduction The Decompression engine decompresses and analyzes archives attached to an email Administration and Configuration Manual Configuring other mail filters 47 Decompression A Decompression Engine Disable Selected Enable Selected Description Status Check password protected archives Enabled F Check corrupted archives Enabled Check for recursive archives Enabled Check size of uncompressed files in archives Enabled Check for amount of files in archives Enabled F Scan within archives Enabled Screenshot 41 The decompression engine filters list The following is a list of checks performed by the decompression engine Password protected archives Corrupted archives Recursive archives Size of decompressed files in archives Amount of files in archives Scan within archives 6 3 2 Configuring the decompression engine filters To configure any decompression engine filter 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Decompression 2 Click the decompression filter to configure Check password protected archives General Actions E Decompression engine V Check password protected archives Actions Please select the action to take when this rule is violated
85. nd can cause downtime and loss of data to the victim Hackers typically hide Trojans in applications that appear to perform a legitimate function How does the Trojan amp Executable Scanner work GFI MailSecurity rates the risk level of an executable file by decompiling the executable and detecting in real time what the executable might do Subsequently it compares capabilities of the executable to a database of malicious actions and rates the risk level of the file With the Trojan amp Executable scanner you can detect and block potentially dangerous unknown or one off Trojans before they compromise your network 6 4 2 Configuring the Trojan amp Executable Scanner This section describes how to customize the GFI MailSecurity Trojan amp Executable Scanner 54 Configuring other mail filters Administration and Configuration Manual General _ Actions _ Updates _ A Trojan amp Executable Scanner Y V Enable Trojan amp Executable scanner This scanner can be applied to both inbound and outbound emails Select below V Check inbound emails V Check outbound emails Security settings GFI Content Security contains built in intelligence to rate the risk level of an executable Select the level of security you would like to use This will determine what risk ratings are allowed through High Security Quarantines almost all executables If the executable contains any signature it will get quarantine
86. ns V Enable Gateway Scanning SMTP v Scan Inbound SMTP Email V Scan Outbound SMTP Email V Enable Information Store Virus Scanning VSAPI Kaspersky Scanner Engine Version Information Scanner engine version Version 8 0 2 45 Virus Signature count 3139985 Virus signature date 2009 11 06 03 29 00 Engine licensing Engine Licensing Status Evaluation expires Sunday October 03 2010 Automatic Updates Licensing Evaluation expires Sunday October 03 Status 2010 Screenshot 17 Anti virus Scanning Engines Kaspersky configuration page General Tab 1 Navigate to GFI MailSecurity gt Virus Scanning Engines Kaspersky Anti Virus In this page you can also review the anti virus engine licensing and version information oa 2 Select Enable Gateway Scanning SMTP check box to scan SMTP traffic using this Virus Scanning Engine 3 Select whether to scan inbound and or outbound emails using this Virus Scanning Engine Scan inbound SMTP email Select this option to scan incoming emails Scan outbound SMTP email Select this option to scan outgoing emails 4 If you installed GFI MailSecurity on the Microsoft Exchange machine you will also have the option to scan the Information Store using this Virus Scanning Engine To scan the Information Store select the Enable Information Store Virus Scanning VSAPI check box B To be able to use the Information Store Virus Scanning feature you must enable the 4 option from Infor
87. of email activity List of emails processed Status of virus scanning engines updates Configure the refresh settings from the top side of the page Select Auto refresh dashboard amp logs to automatically refresh the page at a particular interval To change the time interval key in a custom value in the Refresh time interval in seconds box and click Set Interval You can also click Refresh to refresh the page manually 3 2 Status and statistical information Lol Logs amp The Dashboard shows the GFI MailSecurity status and provides statistical information Services a B GFI Content Security Attendant B GFI Content Security Auto Updater Quarantine Store Size GFI MailSecurity Attendant Free Disk Space B GFI MailSecurity Scan Engine Email Statistics Total emails processed 8098 Total quarantined emails 833 View charts for this period Last 6 Hours Email Scanning Timeline JN Emails Time E Safe emails in this period 1083 For more information on how to reprocess failed emails click here Quarantine Statistics Emails in Quarantine Store 4 E Quarantined emails in this period 383 Updates gt 933 32 17 MB 101 89 GB gt Unprocessed emails in the last 24 hours 0 Emails processed in this period 1266 Scan Statistics E Unprocessed emails in this period 0 Screenshot 3 The GFI MailSecurity Dashboard Navigate to GFI MailSecurity g
88. on 9 0 0 853 Database date time Sun Aug 01 21 35 08 2010 Engine licensing Engine Licensing Status Evaluation expires Sunday October 03 2010 Automatic Updates Licensing Evaluation expires Sunday October 03 Status 2010 Screenshot 16 AVG LinkScanner options 1 Navigate to GFI MailSecurity gt Virus Scanning Engines AVG Anti Virus gt AVG LinkScanner 2 Select Scan inbound SMTP emails to scan incoming emails using AVG LinkScanner 3 Select Scan links destination pages for exploits to check the content of links destination pages for exploits This feature requires HTTP access Click Test http access to verify that AVG LinkScanner can access the links destination pages If test fails ensure that the GFI MailSecurity machine has internet connectivity If the A machine connects to the internet using a proxy server configure proxy settings as described in section Configuring proxy server settings for automatic updates in this manual 4 Select Actions tab to configure the actions to take when this anti virus engine finds malicious emails Refer to the Virus scanner actions section in this chapter 5 Select Updates tab to configure update options Refer to the Virus scanner updates section in this chapter 6 Click Apply to save changes Administration and Configuration Manual Configuring Virus Scanning Engines 21 5 3 Kaspersky configuration General Actions Updates K Kaspersky AntiVirus Optio
89. on navigate to GFI MailSecurity gt General gt Settings and select Bindings tab 2 Select the required SMTP Virtual Server from the detected list of servers present in your domain 3 Click Apply 4 6 Managing local users GFI MailSecurity uses 3 ways to retrieve users depending on the installation environment The number of users retrieved is also used for licensing purposes Zad 4 6 1 GFI MailSecurity installed in Active Directory mode When GFI MailSecurity is not installed on the same machine as your mail server and Active Directory is present then GFI MailSecurity retrieves mail enabled users from the Active Directory domain of which the GFI MailSecurity machine forms part GFI MailSecurity installed on the Microsoft Exchange machine When GFI MailSecurity is installed on the same machine as Microsoft Exchange GFI MailSecurity retrieves the users that have a mailbox on the same Microsoft Exchange Server 4 6 2 GFI MailSecurity installed in SMTP mode When you choose to install GFI MailSecurity in SMTP mode the list of local users is stored in a database managed by GFI MailSecurity To populate and manage the user list when GFI MailSecurity is installed in SMTP mode navigate to GFI MailSecurity gt General gt Settings gt User Manager tab General Updates Local Domains Bindings User Manager amp User Manager Configure local users Email address Local Users bjones tcdomainb com jsmith tcdomainb com
90. ore information about Attachment Filtering and Content Filtering refer to Attachment Filtering and Content Filtering sections respectively in this manual Administration and Configuration Manual Configuring other mail filters 53 6 3 3 Enable disable decompression filters Decompression E Decompression Engine Disable Selected Enable Selected Description Status v Vv Check for recursive archives Enabled Check size of uncompressed files in archives Enabled Check for amount of files in archives Disabled Scan within archives Enabled Screenshot 46 Disabling Decompression tool filters To enable or disable decompression filters 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Decompression 2 From the Decompression engine page select the checkbox of the filters to enable or disable 3 Click Enable Selected or Disable Selected accordingly 6 4 The Trojan amp Executable Scanner 6 4 1 Introduction GFI MailSecurity includes an advanced Trojan and Executable Scanner that analyzes and determines the function of an executable file This scanner can subsequently quarantine any executables that perform suspicious activities such as Trojans What is a Trojan horse In computer technology a Trojan horse is a covert attack vector that compromises a victim s computer while remaining undetected This enables the attacker access to the data stored on that computer Subsequently the attacker can compromise the data a
91. ork and ensure to enable default port 389 on your Firewall Select this option when GFI MailSecurity is installed in SMTP mode and or when GFI MailSecurity does not have direct access to the full list of users 5 Specify the LDAP server name or IP address in the Server text box 80 Quarantine Administration and Configuration Manual z3 In an Active Directory environment the LDAP server is typically the Domain Controller 6 Specify the port number default 389 in the Port text box If connection to the LDAP server is via SSL select Use SSL and the default port changes to 636 E Ensure that the port is enabled from the Firewall 7 Click Update DN list to populate the Base DN list and select the Base DN that is the top level in the Active Directory hierarchy 8 If your LDAP server requires authentication specify the User and Password Alternatively if no authentication is required select Anonymous bind 9 Test your configuration settings by specifying a valid email address in the Email address box and click Test If the email address is not found review the configuration settings 10 To log Directory Harvesting activity to a log file select Log occurrence to this file and specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file is stored in the following default location lt GFI MailSecurity
92. ownload Select this option if you want GFI MailSecurity to check for and automatically download any updates available for the virus scanner 4 Specify how often you want GFI MailSecurity to check download updates for this Virus Scanning Engine by specifying an interval value in hours 5 In the Update options area select Enable email notifications upon successful updates to send an email notification to the administrator whenever the virus scanning engine updates successfully 30 Configuring Virus Scanning Engines Administration and Configuration Manual B An email notification is always sent when an update fails 6 To check for and download updates immediately click Download updates 7 Click Apply to save changes Downloading anti virus updates manually To check for and download updates for a Virus Scanning Engine click Download updates from the Updates tab of the Virus Scanning Engine page 5 9 Setting the Virus Scanning Engines scan sequence GFI MailSecurity scans each email through each licensed anti virus scanning engine The order of priority and sequence how GFI MailSecurity executes scanning can be configured from the Virus Scanning Engines page B The engine with priority 0 has the top priority and is the first engine to scan 1 inbound outbound emails To configure the execution order of the Virus Scanning Engines follow these steps 1 Navigate to the GFI MailSecurity gt Virus Scanning Engines node Engine Stat
93. pertext Transfer Protocol A protocol used to transfer hypertext data between servers and internet browsers See Internet Information Services A set of Internet based services created by Microsoft Corporation for internet servers See Lightweight Directory Access Protocol An application protocol used to query and modify directory services running over TCP IP The DNS record used to identify the IP addresses of the domain s mail servers All malicious types of software that are designed to compromise computer security and which usually spread through malicious methods A message queue implementation for Windows Server operating systems See Multipurpose Internet Mail Extensions See Microsoft Message Queuing Services A standard that extends the format of e mail to support text other than ASCII non text attachments message bodies with multiple parts and header information in non ASCII character sets Glossary 99 PGP encryption Public folder Quarantine Store Recursive archives RSS feeds Secure Sockets Layer Simple Mail Transport Protocol SMTP SSL Trojan horse Virus scanning engine Zombie 100 Glossary A public key cryptosystem often used to encrypt emails A common folder within Microsoft Exchange that allows users to share information A central repository within GFI MailSecurity where all blocked emails are retained until they are reviewed by an administrator Archives that contain multi
94. ple levels of sub archives that is archives within archives Also known as nested archives A protocol used by websites to distribute content feeds that frequently changes for example news items with its subscribers A protocol to ensure an integral and secure communication between networks An internet standard used for email transmission across IP networks See Simple Mail Transport Protocol See Secure Sockets Layer Malicious software that compromises a computer by disguising itself as legitimate software A virus detection technology implemented within antivirus software that is responsible for the actual detection of viruses An infected computer that is made part of a Botnet through malware Administration and Configuration Manual Index A Active Directory 97 anti virus 56 88 AVG 19 20 B BitDefender 23 24 25 27 D Database 16 52 81 82 83 Decompression engine 45 46 DMZ 97 Domain 15 78 DoS 48 E email 3 13 17 27 28 32 37 38 41 43 44 45 47 49 50 51 56 57 58 59 64 66 69 70 71 79 88 89 97 Exploit Engine 55 56 57 58 G gateway 67 H Harvesting 77 78 HTML Sanitizer 59 60 Hub Transport 65 l IIS 15 Internet 89 IP 78 K Kaspersky 21 22 Administration and Configuration Manual L Licensing 5 M Mailbox 90 McAfee 24 25 Microsoft Exchange 3 31 65 90 Microsoft Exchange Server 95 MIME 59 MSMQ 97 N Nor
95. pter 7 Select Updates tab to configure the update options for this anti virus engine Refer to the Virus scanner updates section in this chapter 8 Click Apply to save changes BitDefender website For more information about BitDefender anti virus engine visit the BitDefender website at http www bitdefender com 24 Configuring Virus Scanning Engines Administration and Configuration Manual 5 5 McAfee configuration General Actions Updates Y McAfee AntiVirus Options V Enable Gateway Scanning SMTP WM Scan Inbound SMTP Email V Scan Outbound SMTP Email V Enable Information Store Virus Scanning VSAPI Macro Checking Do not check macros Block all documents containing macros McAfee Version Information Version 5400 1158 Signatures 583376 avvscan dat build date 11 8 2009 avvynames dat build date 11 8 2009 avvclean_dat build date 11 8 2009 Engine licensing Engine Licensing Status Evaluation expires Sunday October 03 2010 Automatic Updates Licensing Evaluation expires Sunday October 03 Status 2010 Screenshot 19 Virus Scanning Engines McAfee configuration page General Tab 1 Navigate to GFI MailSecurity gt Virus Scanning Engines gt McAfee Anti Virus In this page you can also review the anti virus engine licensing and version information ca 2 Select Enable Gateway Scanning SMTP check box to scan SMTP traffic using this Virus Scanning Engine 3 Select wh
96. pter 9 Miscellaneous Provides information how to use and configure other features of the product Chapter 10 Troubleshooting Contains information on how to deal with any problems encountered while using GFI MailSecurity Also provides extensive support information Chapter 11 Glossary Defines technical terms used within GFI MailSecurity 1 2 2 Terms and conventions used in this manual The following terms and conventions are used in the documentation of this manual Administration and Configuration Manual Introduction 7 For any technical terms and their definitions as used in this manual refer to the Glossary chapter 2 Introduction Administration and Configuration Manual 2 About GFI MailSecurity 2 1 GFI MailSecurity components GFI MailSecurity scan engine The GFI MailSecurity scan engine analyzes the con tent of all inbound and outbound email If you install GFI MailSecurity on the Microsoft Exchange Server it will also scan the Microsoft Exchange Information Store and internal emails When GFI MailSecurity quarantines an email it informs the appropriate supervisor administrator via Email or RSS feed depending on the options configured GFI MailSecurity web interface Through the GFI MailSecurity web interface you can Monitor email scanning activity Manage scanning and filtering engines Configure GFI MailSecurity settings Review quarantined emails GFI MailSecurity Switchboard Use the GFI MailSec
97. r GFI product Version and Build information when contacting GFI a support 9 3 Tracing GFI MailSecurity provides the facility of creating log files for debugging purposes When enabled GFI MailSecurity stores a number of log files in the following folders lt GFI MailSecurity installation path gt GFl ContentSecurity DebugLogs lt GFI MailSecurity installation path gt GFl ContentSecurity MailSecurity DebugLogs lt GFI MailSecurity installation path gt GFl ContentSecurity WwwConf DebugLogs B Use tracing for troubleshooting purposes or when contacting GFI Support It is J recommended that tracing is disabled if there are performance issues with the GFI MailSecurity machine To enable or disable Tracing 1 Navigate to Start gt GFI MailSecurity gt GFI MailSecurity Switchboard and select Tracing tab GFI MailSecurity SwitchBoard GFI MailSecurity User Interface Made Tracing Other M Tracing options Configure the GFI MailSecurity tracing options Tracing is a means of creating log files which are helpful for debugging purposes Log files will be created in the DebugLogs folders under the ContentSecurity MailSecurity and WwwConf folders You can enable and disable any or all of the tracing options available below Enabled Disabled Tracing es GFI ContentSecurity Attendant pez GFI MailSecurity Scan Engine pez GFI MailSecurity Attendant s GFI MailSecurity Configuration Eea GFI MailSecurit
98. rator E Notify local user Logging options Iv Log occurrence to this file EmailExploit txt Screenshot 51 Email Exploit Engine Actions Tab 4 In the Actions area select one of the following options Quarantine email Stores blocked emails in the Quarantine Store Delete email Deletes blocked emails B Actions always affect the whole email containing the blocked attachment even if there 1 are other attachments that do not contain exploits 5 When an email exploit is detected you can also inform the administrator and or user by sending email notifications To do this from the Notification options area select Notify administrator Notify the administrator whenever this engine blocks an email To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 6 To log the activity of the Email Exploit Engine to a log file select Log rule occurrence to this file In the text box specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file will be stored in the following default location lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Logs lt filename gt txt 7 You can configure GFI MailSecurity to download Email Exploit Engine updates automatically or
99. reenshot 58 Screenshot 59 Screenshot 60 Screenshot 61 Incoming email Outgoing email The GFI MailSecurity Dashboard The GFI MailSecurity Services The GFI MailSecurity Quarantine Statistics The GFI MailSecurity Charts Email processing logs Email processing logs filter Virus scanning engines updates Specifying the administrator s email address Updates server proxy settings Local Domains list Binding GFI MailSecurity to a different SMTP Server User Manager Anti virus Scanning Engines AVG configuration page General Tab AVG LinkScanner options Anti virus Scanning Engines Kaspersky configuration page General Tab Virus Scanning Engines BitDefender configuration page General Tab Virus Scanning Engines McAfee configuration page General Tab Virus Scanning Engines Norman configuration page Virus Scanning Engine Configuration page Actions Tab Virus Scanning Engines Configuration page Updates Tab Virus Scanning Engines scan priority list Configure virus scanning optimizations Information Store Protection node VSAPI scan settings Content Filtering page Content Filtering General Tab Content Filtering Body Tab setting conditions Content Filtering Body Tab configuring other options Content Filtering Subject Tab Content Filtering Users Folders Tab Add users to a Content Filtering rule Selecting a Content Filtering rule for removal Attachment Filtering page Attachment Filtering Gen
100. rol Panel gt Administrative Tools gt Reliability and Performance Monitor 92 Miscellaneous Administration and Configuration Manual 2 In the monitor dialog expand Monitoring Tools and select Performance Monitor 3 From the viewing pane click Add to load the Add Counters dialog Add Counters Xx Available counters Added counters Select counters from computer lt Local computer gt Browse MSExchangeIS Virus Scan Files Cleaned sec Counter Virus Scan Bytes Scanned Virus Scan Files Quarantined Virus Scan Files Cleaned virus Scan Files Quarantined sec Virus Scan Files Scanned virus Scan Files Scanned sec Virus Scan Folders Scanned in Background Virnie Sean Mace anec Claaned zi Instances of selected object Add gt gt Remove lt lt MV Show description Help ae Description Total number of separate files processed by virus scanner a Screenshot 83 Adding VSAPI performance monitor counters in Windows 2008 Server 4 From the Select counters from computer dropdown list select the computer to monitor 5 From the list of available counters expand MSExchangelS 6 Select any Virus Scan counter you need to add as listed in the Performance monitor counters section below and click Add 7 Repeat step 8 for each process to monitor 8 Click Ok to apply changes Administration and Configuration Manual Miscellaneous 93 The counters of add
101. seesieaieebiveelerteweens 97 10 2 Knowledge Base viccicsssscdseutsenveenscredesedsvawavaeavidasndsieessressedesniraas 97 10 3 Web POM se sce onesies ew pare E EE E E EEEE eee EE a 97 10 4 COMMON 1SSUCS ix ssceserdecdesicy onana vdneednuvandsavevivedeve veveidvavevaddsavered 97 10 5 Request technical support sssssssssesssseseessssseesssseseeseseeeeessse 98 10 6 Build notifications asss cov covidauawinddeuqreusiniaeauiiverveniidiaveus aaweruc 98 11 Glossary 99 Index 101 List of screenshots Screenshot 1 Screenshot 2 Screenshot 3 Screenshot 4 Screenshot 5 Screenshot 6 Screenshot 7 Screenshot 8 Screenshot 9 Screenshot 10 Screenshot 11 Screenshot 12 Screenshot 13 Screenshot 14 Screenshot 15 Screenshot 16 Screenshot 17 Screenshot 18 Screenshot 19 Screenshot 20 Screenshot 21 Screenshot 22 Screenshot 23 Screenshot 24 Screenshot 25 Screenshot 26 Screenshot 27 Screenshot 28 Screenshot 29 Screenshot 30 Screenshot 31 Screenshot 32 Screenshot 33 Screenshot 34 Screenshot 35 Screenshot 36 Screenshot 37 Screenshot 38 Screenshot 39 Screenshot 40 Screenshot 41 Screenshot 42 Screenshot 43 Screenshot 44 Screenshot 45 Screenshot 46 Screenshot 47 Screenshot 48 Screenshot 49 Screenshot 50 Screenshot 51 Screenshot 52 Screenshot 53 Screenshot 54 Screenshot 55 Screenshot 56 Screenshot 57 Sc
102. st select the Whitelist tab from the HTML Sanitizer node 62 Configuring other mail filters Administration and Configuration Manual _HTML Sanitizer Whitelist ZV Whitelist The HTML Sanitizer Whitelist allows you to exclude emails received from specific senders from being processed by the HTML Sanitizer Whitelist Whitelist entry Whitelist masterdomain cam john domain com Remove examples sender domain com domain com w amp r domain com Screenshot 55 HTML Sanitizer Whitelist page The list of whitelisted senders is displayed in the Whitelist area Adding an HTML Sanitizer Whitelist entry 1 In the Whitelist entry text box key in an email address an email domain for example domain com or an email sub domains for example domain com and click Add 2 Click Apply Deleting an HTML Sanitizer Whitelist entry 1 Select the entry to delete from the Whitelist area and click Remove 2 Click Apply Administration and Configuration Manual Configuring other mail filters 63 7 Quarantine 7 1 Introduction The GFI MailSecurity Quarantine is a central repository where all emails that fail any of the content policy or content security checks are stored This ensures that users do not receive malicious email in their mailbox and that no email is lost This chapter describes the three methods how administrators can manage quarantined emails Via the GFI MailSecurity web
103. support request form or by phone Online Fill out the support request form on http support gfi com supportrequestform asp Follow the instructions on this page closely to submit your support request Phone To obtain the correct technical support phone number for your region visit http www gfi com company contact htm NOTE Before you contact our Technical Support team have your Customer ID available Your Customer ID is the online account number that is assigned to you when you first register your license keys in our Customer Area from http customers gfi com We will answer your query within 24 hours or less depending on your time zone 10 6 Build notifications We strongly suggest that you subscribe to our build notifications list This way you will be immediately notified about new product builds To subscribe to our build notifications visit http www gfi com pages productmailing htm 98 Troubleshooting Administration and Configuration Manual 11 Glossary Active Directory AD Anti virus software Botnet Decompression engine Demilitarized Zone Directory harvesting Domain Name System DMZ DNS DNS MX Email headers Exploit Gateway HTML Sanitizer HTTP lis Internet Information Services LDAP Lightweight Directory Access Protocol Mail Exchange Malware Microsoft Message Queuing Services MIME MSMQ Multipurpose Internet Mail Extensions Administration and Configuration Manual
104. t ContentSecurity MailSecurity Logs lt filename gt txt 12 By default the rule is applied to all email users GFI MailSecurity however allows you to apply this rule to a custom list of email users To specify the users to apply this rule to select Users Folders tab General Actions Users jFolders frs Attachment Filtering Users Folders Please select users this rule will apply to Only this list All except this list Bob Jones bjones tcdomainb com Add Remove Screenshot 38 Attachment Filtering Users Folders Tab 13 Specify the users to apply this rule to Administration and Configuration Manual Configuring other mail filters 45 Only this list Apply this rule to a custom list of email users groups or public folders All except this list Apply this rule to all email users except for the users groups or public folders specified in the list 14 To add email users user groups and or public folders to the list click Add fe GFI MailSecurity User Lookup Windows Internet Explorer User Lookups amp Configure Users Name Email Address Email Aliases No other v Bob Jones bjones masterdomain com e Screenshot 39 Add users to an attachment Filtering rule 15 In the User Lookups window specify the name of the email user user group or public folder that you wish to add to the list and click Check Names Matching users groups or public folders are listed below You
105. t Dashboard to open the Dashboard page This page displays GFI MailSecurity statistics status of services and a graphical presentation of email activity More details on these sections are provided below Administration and Configuration Manual Monitoring the GFI MailSecurity status 7 Services Services B GFI Content Security Attendant B GFI Content Security Auto Updater cri MailSecurity Attendant B GFI MailSecurity Scan Engine Screenshot 4 The GFI MailSecurity Services The Services area displays the status of the GFI MailSecurity services A Indicates that the service is stopped 2 STRAE tan IOI ASNA AOE Quarantine Statistics Quarantine Statistics Emails in Quarantine Store 27 Quarantine Store Size 6 55 MB Free Disk Space 118 77 GB Screenshot 5 The GFI MailSecurity Quarantine Statistics The Quarantine Statistics area displays the following statistical information Quarantine Store size The size on disk of the Quarantine Store database 8 Monitoring the GFI MailSecurity status Administration and Configuration Manual Email Statistics Email Statistics Total emails processed 8098 View charts for this period Last 6 Hours Email Scanning Timeline Emails Total quarantined emails 833 gt Unprocessed emails in the last 24 hours 0 v Emails processed in this period 1266 Scan Statistics Time W Safe emails in this period 1083 E Quar
106. t report 6 Select Send a sanitized copy of the original email to recipient s to choose whether to forward a copy of the blocked email to the recipients but with the malicious content removed 7 Click the Actions tab to configure further actions 8 GFI MailSecurity can send email notifications whenever an email triggers this filter To enable this feature select any of the following options Notify administrator Notify the administrator whenever this engine blocks an email To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 9 To log the occurrence of this activity to a log file select the Log occurrence to this file check box In the text box specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file will be stored in the following default location lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Logs lt filename gt txt 10 Click Apply Check for amount of files in archives General Actions ke Decompression engine V Check for amount of files in archives Decompression engine options and actions If number of files within archive exceeds 2000 Please select the action to take when this rule is violated Quarantine Automatically Dele
107. tON i saicicdetasstadssauveevesienvivesddesiusctaeeedesnsssaveeees G 19 5 2 AVG configurations cresi senes reds ox EEEE EEE EEE ead 19 5 3 Kaspersky configuration ssssssesssesessssseesssessseesseessseseseessee 22 5 4 BitDefender configuration ccccecccccceeessscccceceeesssccccceeeneees 23 5 95 McAfee config ration sisececrsosessicsniissivoorendsines itest vosn atine s aens ee 25 5 6 Norman configuration ss ccave vere sasivarcedveverseeiiidecadsevereenseieiandeveinn 27 5 7 Vir s scanner ACTIONS eee ke cee eee teen teen eee e eects eee eeeeeeees 28 5 8 Vir s scanner pdates cvecave suisse woesauaevens lawvegeaue uesaancnavesmenacroet 30 5 9 Setting the Virus Scanning Engines scan sequence ee eeeee cece eee 31 5 10 Configuring Virus Scanning Optimizations cccceee cess eeeeeeeeeees 31 5 11 Configuring Information Store Scanning ssssssssssessssesssesesessseee 32 6 Configuring other mail filters 35 6 1 Content Filtering sscrscsrsericiricersssriseriessissviesiiv ei irsui usiessa is 35 6 2 Attachment PICS ING fase cetsiceicuce ba nears n riers nng EE E 41 6 3 Decompression engine sosesssssoseseseossesesesssucesosesuessosesesssose 47 6 4 The Trojan amp Executable Scanner ssssssssssseseseseseseseosseesssees 54 6 5 The Email Exploit Engine seesessesessosessssessenessosesuesesnesessosee 58 6 6 The HTML Sanitizer seco cc2ccaniensslebsdeiseaevegeiiediiaddeadi
108. te Send a sanitized copy of the original email to recipient s Screenshot 45 Configuring the amount of files in archive check 52 Configuring other mail filters Administration and Configuration Manual This filter allows you to quarantine or delete emails that contain an excessive amount of compressed files within an attached archive You can specify the number of files allowed in archive attachments from the configuration options included in this filter To configure this filter 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Decompression 2 From the list of available filters click Check for amount of files in archives 3 To enable this filter select the Check for amount of files in archives checkbox 4 Specify the maximum number of files in archives in the If the number of files within archive exceeds text box If the archive contains more files than the specified value the email is triggered as malicious 5 Specify what to do when an email contains an archive that triggers this filter Quarantine Quarantines blocked emails Automatically Delete Deletes blocked emails When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI MailSecurity may not be able to block outbound emails but instead replaces the blocked content with a threat report 6 Select Send a sanitized copy of the original email to recipient s to choose whether to forward a copy of the blocked email to the recipien
109. ter 8 Select Updates tab to configure the update options for this anti virus engine Refer to the Virus scanner updates section in this chapter 9 Click Apply to save changes Norman website For more information about Norman Virus Control NVC anti virus engine visit the NVC website at http www norman com 5 7 Virus scanner actions General Actions Updates Y Virus Scanner Actions Actions Please select the actions to take when a virus is found Quarantine item C Delete item M Send a sanitized copy of the original email to recipientis NOTE Sanitization does not work for Information Store SAPH items Notification options I Notify administrator I Notify local user Logging options Iv Log occurrence to this file norman txt 28 Configuring Virus Scanning Engines Administration and Configuration Manual Screenshot 21 Virus Scanning Engine Configuration page Actions Tab In GFI MailSecurity you can configure what each of the installed Virus Scanning Engines should do whenever an infected email is detected When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI MailSecurity may not be able to block outbound emails but instead replaces the blocked content e g the attachment with a threat report 1 Select the virus scanner that you want to configure actions for and select the Actions tab 2 Choose the action to take when an email is blocked Quarantine item Stores a
110. the full folder path where to store blocked emails Actions always affect the whole email containing the blocked attachment even if there are other attachments that do not trigger this rule When GFI MailSecurity is installed on same machine as Microsoft Exchange 2003 GFI MailSecurity may not be able to block outbound emails but instead replaces the blocked content e g the attachment with a threat report 9 Select Send a sanitized copy of the original email to recipient s to choose whether to forward a copy of the blocked email to the recipients but with the malicious content removed 10 You can configure rule to send email notifications to the administrator and or user whenever an email containing an attachment is blocked To do this from the Notification options area select Notify administrator Notify the administrator whenever the rule is triggered To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 11 To log the activity of this rule to a log file select Log rule occurrence to this file check box In the text box specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file will be stored in the following default location lt GFI MailSecurity installation path g
111. tion Manual 6 1 4 Removing content filtering rules Content Filtering ry Configure content filtering settings This filter generates alerts as well as blocks quarantines and moves to specific folders all inbound foutbound emails containing listed keywords NOTE This is NOT an anti spam feature For more information click here Remove Selected Enable Selected Disable Selected Add Rule Rule Status Priority CONTENT POLICY Block Racial Content Enabled 0 gt CONTENT POLICY Block Sexual Content Enabled 2 a CONTENT POLICY Block Profanities Disabled 3 gt Screenshot 34 Selecting a Content Filtering rule for removal AN Deleted rules are not recoverable 1 Navigate to the GFI MailSecurity gt Scanning amp Filtering gt Content Filtering node 2 From the Content Filtering page select the checkbox of the rule s that you want to remove 3 Click Remove Selected 6 1 5 Modifying an existing rule 1 Click the GFI MailSecurity gt Scanning amp Filtering gt Content Filtering node 2 From the Content Filtering page click the name of the rule to modify 3 Perform the required changes in the rule properties and click Apply to apply changes 6 1 6 Changing rule priority Content Filtering rules are applied in the same order from top to bottom as they are listed in the Content Filtering page that is rule with priority value 1 is checked first To change the sequence priority of rules 1 Navigate to
112. tion and Configuration Manual lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Templates The templates contain the text of notification messages as well as field names that are replaced by dynamic values upon generation of the notification message 9 5 1 Customizing notification templates z3 Always take a backup of templates before modification z Before modifying XSL based templates make sure you are proficient in XML and XSL Incorrect code can cause GFI MailSecurity to not send notification emails E Template folder names and template file names are predefined and should not be changed To customize a notification template 1 Navigate to lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Templates 2 Open the folder containing the template to modify Each folder can contain any of the following files html txt An HTML type body template text txt A plain text body template subject txt Subject template 3 Take a backup of the template s to modify 4 Open the template to modify in a text editor for example Notepad and customize accordingly 5 Save changes To check whether an XSL based template is well formed save a copy of the template in xml extension and load it in Microsoft Internet Explorer If the template is well formed the browser loads the code correctly If it contains errors the browser specifies the location code where issues are located Variables use
113. tions area select Block all files greater than the following size in Kb and specify the maximum attachment size in Kb B This feature blocks all attachments with a file size bigger than the one specified d irrespective if the attachment matches an entry in the Attachment blocking list General Actions Users fFolders WY Attachment Filtering Actions Actions I Block attachment and perform this action Quarantine email Delete email C Move to folder on disk Loo E M Send a sanitized copy of the original email to recipientis Notification options M Notify administrator M Notify local user Logging options IV Log rule occurrence to this file my_attachment_fittering_rule txt Screenshot 37 Attachment Filtering Actions Tab 7 Click the Actions tab to configure what happens when this rule is triggered 8 To block an email that matches the rule conditions from being delivered to recipients select Block attachment and perform this action and select one of the following options 44 Configuring other mail filters Administration and Configuration Manual Quarantine email Stores emails containing blocked attachments in the Quarantine Store You can subsequently review approve delete all the quarantined emails For more information about Quarantine refer to the Quarantine chapter in this manual Delete email Deletes emails containing blocked attachments Move to folder Moves the email to a folder on disk Key in
114. to notify the administrator whenever new updates are available To configure updates click the Updates tab Administration and Configuration Manual Configuring other mail filters 59 General Actions Updates OY Email Exploit Updates Automatic update options Configure the automatic update options Iv Automatically check for updates Downloading option Check for updates and download x Download check after the specified number of hours I Last update Newer Update options I Enable email notifications upon successful updates Notifications will always be sent for unsuccessful updates Click the button below to force the updater service to download the most recent updates Download updates Update Status No updates currently in progress Screenshot 52 Email Exploit Engine Updates Tab 8 To enable the automatic updating of Email Exploit Engine select Automatically check for updates check box 9 From the Downloading options list select one of the following download options Only check for updates Automatically check for updates and notify the administrator whenever updates are available This option will NOT download the available updates automatically Check for updates and Automatically check for and download all available updates download 10 In Download check after the specified number of hours text box specify how often you want GFI MailSecurity to check for updates by typing an hourly interv
115. ts but with the malicious content removed 7 Click the Actions tab to configure further actions 8 GFI MailSecurity can send email notifications whenever an email triggers this filter To enable this feature select any of the following options Notify administrator Notify the administrator whenever this engine blocks an email To configure the administrator s email address refer to chapter Configuring the administrator s email address Notify local user Notify the email local recipients about the blocked email 9 To log the occurrence of this activity to a log file select the Log occurrence to this file check box In the text box specify Path and file name including txt extension to a custom location on disk where to store the log file or The file name only including txt extension The log file will be stored in the following default location lt GFI MailSecurity installation path gt ContentSecurity MailSecurity Logs lt filename gt txt 10 Click Apply Scan within archives attachment checking Through the Scan within archives option you can apply Attachment Filtering and Content Filtering of files within archives 1 Navigate to GFI MailSecurity gt Scanning amp Filtering gt Decompression 2 From the list of available filters click Scan within archives 3 To enable scanning within archives select the Apply Attachment and Content Filtering rules within archives checkbox 4 Click Apply For m
116. ubleshooting 10 1 Introduction The troubleshooting chapter explains how you should go about resolving any issues that you might encounter The main sources of information available to users are The manual most issues can be solved by reading this manual GFI Knowledge Base articles Web forum Contacting GFI Technical Support 10 2 Knowledge Base GFI maintains a Knowledge Base which includes answers to the most common problems If you have a problem consult the Knowledge Base first The Knowledge Base always has the most up to date listing of technical support questions and patches To access the Knowledge Base visit http kbase gfi com 10 3 Web Forum User to user technical support is available via the web forum The forum can be found at http forums gfi com 10 4 Common issues ISSUE ENCOUNTERED POSSIBLE CAUSE AND SOLUTION Error when receiving emails This error occurs when emails are relayed from the IIS SMTP server to Body type not supported by Remote the Microsoft Exchange server This happens because Microsoft Exchange Host Server versions 4 0 5 0 and 5 5 are not able to handle 8 bit MIME messages For instructions how to turn off 8BITMIME in Windows Server 2003 refer to http support microsoft com default aspx scid kb en us Q262168 Legitimate emails are moved to the Cause failedmails folder When GFI MailSecurity is not able to scan incoming emails these emails are not delivered to th
117. uring Virus Scanning Engines 29 5 8 Virus scanner updates General Actions Updates Y Configure the Automatic Updates For This Profile Automatic Checking For Updates Automatic update options Configure the automatic update options IV Automatically check for updates Downloading option Check for updates and download x Download check after the specified number of hours I Last update Newer Update options V Enable email notifications upon successful updates Notifications will always be sent for unsuccessful updates Click the button below to force the updater service to download the most recent updates Download updates Update Status No updates currently in progress last update failed Screenshot 22 Virus Scanning Engines Configuration page Updates Tab You can configure GFI MailSecurity to download virus scanner updates automatically or to notify the administrator whenever new updates are available 1 Select the virus scanner to configure and select the Updates tab 2 Select the Automatically check for updates check box to enable anti virus engine auto update 3 From the Downloading option list select one of the following options Only check for updates Select this option if you want GFI MailSecurity to just check for and notify the administrator when updates are available for the virus scanner This option will NOT download the available updates automatically Check for updates and d
118. urity Switchboard to configure The GFI MailSecurity launch mode Website and Virtual Directory names for the web interface and quarantine Tracing options to create log files for debugging purposes 2 2 How GFI MailSecurity works This section provides a high level overview on how GFI MailSecurity works 2 2 1 Incoming email Incoming email LS lo GFI MailSecurity f Pa Ye gt ae Blocked Scanning amp filtering Accepted Delivered to user s mailbox Screenshot 1 Incoming email Q Incoming email is relayed to the GFI MailSecurity machine 2 Email is scanned by GFI MailSecurity using the email scanning engines and filters configured to scan inbound emails DESCRIPTION Virus Scanning Engines Scan emails for viruses and malicious code Some engines also include other features such as macro checking link scanning and Sandbox technology Content and attachment Block emails that match any rules containing pre configured conditions within filtering the email body or attachments Administration and Configuration Manual About GFI MailSecurity 3 EMAIL SCANNING ENGINE DESCRIPTION Decompression engine Analyzes compressed attachments for potentially malicious content Trojan amp executable scanner Analyzes the function of executable files for malicious code Email exploit engine Checks if attachments contain any exploits HTML Sanitizer Scans and removes html code with email body and attachments 9 GFI MailSecurity
119. us This is a cumulative value of the total number of top level messages that are processed by the virus scanner This counter represents the rate at which top level messages are processed by the virus scanner The total number of top level messages that are cleaned by the virus scanner The rate at which top level messages are cleaned by the virus scanner The total number of top level messages that are put into quarantine by the virus scanner The rate at which top level messages are put into quarantine by the virus scanner The total number of separate files that are processed by the virus scanner The rate at which separate files are processed by the virus scanner The total number of separate files that are cleaned by the virus scanner The rate at which separate files are cleaned by the virus scanner The total number of separate files that are put into quarantine by the virus scanner The rate at which separate files are put into quarantine by the virus scanner The total number of bytes in all of the files that are processed by the virus scanner The current number of outstanding requests that are queued for virus scanning The total number of folders that are processed by background scanning Administration and Configuration Manual Virus Scan Messages Scanned in The total number of messages that are processed by background scanning Background Administration and Configuration Manual Miscellaneous 95 10 Tro
120. us License Priority a AVG Anti Virus Gateway sear Drang Licensed 0 gt Information Store Scanning Enabled S BitDefender Anti virus C teway Scanning Enabled Licensed 1 a Information Store Scanning Enabled IN Norman Anti Virus Gateway ee velba she Licensed 2 gt Information Store Scanning Enabled W McAfee Anti Virus Bene soe eee Licensed 3 a Information Store Scanning Enabled TA Gateway scanning Enabled Kaspersky Anti Licensed 4 gt K SE Va Information Store Scanning Enabled i g AVG LinkScanner Gateway scanning Enabled Licensed 5 gt Screenshot 23 Virus Scanning Engines scan priority list 2 In the right pane the Virus Scanning Engines are listed in descending order of priority 3 To change the virus scanning execution priority click the up or down arrows to respectively increase or decrease the priority of the virus scanner 5 10 Configuring Virus Scanning optimizations From the GFI MailSecurity gt Virus Scanning Engines node you can instruct GFI MailSecurity to stop scanning an item if a particular number of virus scanning engines detect a virus in that item Virus Scanning Optimizations Iv Stop virus scanning the current item if viruses are detected by 2 virus scanners Iv Stop all further scanning including non virus related threats scanning Screenshot 24 Configure virus scanning optimizations Administration and Configuration Manual Configuring Virus Scanning Engines 3
121. us Scanning VSAPI Settings 4 Configures VSAPI Settings Microsoft Exchange Virus Scanning API VSAPI settings Enable background scanning Enabling background scanning will cause all the contents of the Information Store to be scanned Depending on how many items you have in the Information Store the Exchange server might get very busy during this process Itis recommended that this option be enabled only during times of low server activity typically at night C On access scanning New items in the Information Store are scanned through VSAPI as they are accessed New email messages are therefore scanned as they are accessed by the email client This means that there might be a short delay before the email client displays the contents of a new message Pro active scanning When anew item is submitted to the Information Store itis immediately added to a queue for scanning If a new item is accessed while itis still in the scanning queue itwill be allocated a higher priority for scanning If an email client attempts to access anew message while itis still in the scanning queue scanning of this message will therefore receive higher priority This is the recommended mode of operation since it causes the Information Store to attempt scanning of an item upon receipt doing away as much as possible with the delay associated with on access scanning Screenshot 26 VSAPI scan settings 2 Select the VSAPI Settings tab 3 Optional
122. wasiianiieed eens 61 7 Quarantine 65 Ply Introduction s3c2otr ca heava re tis stare hecea es gts ven eseve se Histeeeu E a ees 65 7 2 The Quarantine Store ccc cccccee ene e eee cccecenneesecceeseeeseeccecetecens 65 7 3 Quarantine Action FOrMs cc ccc cece ccc ee esc cceecceeeesceeeucceeeuceeees 73 7 4 Quarantine RSS feeds ccc cccccec ene e ec cccceceeneeeeceeeseeeneeececetesens 75 7 5 Directory Harvesting ccscccscccscccscccsccescccsccessccsccssacesscesaes 79 8 Reporting 83 8 1 Introduction wus coe seisiccds naxacdnscdvcnetaceia cans sirios c cnensnad ndiaeticteeciiu 83 8 2 Enap ng rePOrtNg cisccuidassce cadence ddaceveviidenweriiearvewisaweaciceaweorss 83 8 3 Configuring the database sesssssssssssssssessseseseseseosssesssees 83 9 Miscellaneous 87 9 1 Patch Checking 2 osvaruccenaneaddnecteasdeeadsu ct ecaaie ces aeas teecadeumeoeaaaaadees 87 9 2 Version Information avout cenavorcuddaveciivswcaucewdeverd eaavevsa teaventeeweores 87 93 TACNE eesse ria can ceene ciate ote seats ete esate ote cena whe cade whe canes he reas wae ease ee 88 OA Failed Gigi Soacsenestutewastewineccrewdedatawececawswneceicbauuerdniaunccacteneeees 89 9 5 NOLITICALION TEMPlAteS s csscivewcssnsraadewiiaveicenateew eoasieeneseaeneacopeenae 90 9 6 Monitoring Virus Scanning API ie ccivsvevesswasveansravesescvesesasens veraiertees 92 10 Troubleshooting 97 10 1 Introd ction scsvevitensvieicotacourestarseucebaweavatiwse
123. were quarantined by the Virus Scanning Engines A search folder that displays inbound emails that were quarantined in a particular date range and addressed to a particular user To display emails in a particular search folder navigate to GFI MailSecurity gt Quarantine gt Search Folders and click a search folder displayed in the Quarantined Items area Creating a new Search Folder 1 Navigate to GFI MailSecurity gt Quarantine gt Search Folders 2 Click New search folder Define a new folder Search folder name My Search Folder Screenshot 57 New Search Folder folder name 3 In the Search folder name text box key in a name for the new search folder Item source Please select item source Gateway SMTP Screenshot 58 New Search Folder selecting the source 4 If GFI MailSecurity is installed on the Microsoft Exchange Server machine you can limit the emails in this search folder to those blocked from a particular source From the Item source area select one of the following sources Information Store Quarantined items forming part of the Information Store VSAPI Information Store Quarantined items forming part of the Information Store that were scanned through Transport the Hub Transport Agent This option is only available when GFI MailSecurity is installed on a Microsoft Exchange Server 2007 2010 machine with the Hub Transport Server Role installed Gateway SMTP Inbound or outbound quar
124. y SwitchBoard lt I lt I lt I lt I lt I OOooOooO OK Cancel Apply Screenshot 80 Tracing settings 2 Select Enabled next to the feature to enable logging for or Disable to disable logging GFI ContentSecurity Attendant Log files related to the viewer application when GFI MailSecurity is loaded in local mode 88 Miscellaneous Administration and Configuration Manual GFI MailSecurity Scan Engine Log files for the scanning engines and filters GFI MailSecurity Attendant Log files for all the components except scanning functions of GFI MailSecurity such as the Quarantine Store GFI MailSecurity Configuration Log files for the GFI MailSecurity web interface GFI MailSecurity Switchboard Log files related to the operation and usage of the Switchboard 3 Click Apply to apply changes and click OK when all settings are applied successfully 9 4 Failed emails There may be instances where GFI MailSecurity is not able to scan an email for example spam emails containing corrupted header information In this case GFI MailSecurity blocks the email since it may contain malicious content and moves it to the following folder lt GFI MailSecurity installation path gt Content Security MailSecurity failedmails 9 4 1 Reprocessing legitimate emails that fail If a large number of legitimate emails are being moved to the failedmails folder it is recommended to contact GFI Support to resolve the issue When the issue is
125. y in progress NOTE GFI MailSecurity checks for and downloads updates for each virus scanning engine sequentially Update allengines Screenshot 9 Virus scanning engines updates The updates of virus scanning engines can be monitored from a central configuration page Navigate to GFI MailSecurity gt Dashboard and select the Updates tab to review the following update information Engine Virus scanning engines Last Update Displays the date and time of the last successful update Status Shows the current status of the updating process Click Update all engines to check for and download all updates Administration and Configuration Manual Monitoring the GFI MailSecurity status 17 The updates are checked for and downloaded as configured in the virus scanning engine configuration pages Click on the engine name to load the configuration pages and navigate to the Updates tab For more information refer to Virus scanner updates section B Updates for each virus scanning engine are checked for and downloaded sequentially J one virus scanning engine update at a time 12 Monitoring the GFI MailSecurity status Administration and Configuration Manual 4 General settings 4 1 Introduction The Settings node enables you to configure a number of options Administrator s email address Proxy settings for automatic updates The list of Local Domains SMTP server bindings The list of local users 4 2 Configuring the
126. y to check for updates by typing an hourly interval 12 In the Update options area select Enable email notifications upon successful updates to send an email notification to the administrator whenever Trojan amp Executable Scanner is updated successfully An email notification is always sent when an update fails 13 To check for and download updates immediately click Download updates 14 Click Apply Administration and Configuration Manual Configuring other mail filters 57 6 5 The Email Exploit Engine 6 5 1 Introduction What is an exploit An exploit uses known vulnerabilities in applications or operating systems to compromise the security of a system It exploits a feature of a program or the operating system for its own use For example execute a program or command or install a backdoor What is an e mail exploit An email exploit is an exploit launched via email An email exploit is essentially an exploit that can be embedded in an email and executed on the recipient s machine either when the user receives or opens the email Difference between Anti Virus software amp Email Exploit Detection software Anti virus software is designed to detect malicious code It does not necessarily analyze the method used to execute the code whereas the Email Exploit Detection Engine scans for methods that execute a program or command on the user s system The Email Exploit Engine does not check whether the program is mal

Download Pdf Manuals

image

Related Search

Related Contents

Hotpoint HSZ2321L User's Manual    Manual de instrucciones de válvulas internas de la serie tipo C831  VIA EPIA SP Motherboard  資料 5  User Manual  Reparatec R2  

Copyright © All rights reserved.
Failed to retrieve file