Bitdefender Security for Mail Servers

Total Page:16

File Type:pdf, Size:1020Kb

Bitdefender Security for Mail Servers User's guide Copyright© 2007 BitDefender BitDefender Security for Mail Servers BitDefender Security for Mail Servers User's guide BitDefender Published 2007.07.13 Version 1.2.2384 Copyright© 2007 BitDefender Feuer und Wasser kommt nicht zusammen Kann man nicht binden sind nicht verwandt In Funken versunken steh ich in Flammen und bin im Wasser verbrannt Im Wasser verbrannt BitDefender Security for Mail Servers Table of Contents End User Software License Agreement . ix Preface . xiii 1. Conventions used in this book . xiii 1.1. Typographical conventions . xiii 1.2. Admonitions . xiv 2. Book structure . xv 3. Request for Comments . xv Description and features . 1 1. Who is BitDefender? . 3 1.1. Why BitDefender? . 3 2. Product features . 5 2.1. BitDefender Security for Mail Servers . 5 2.2. Key Features . 6 3. BitDefender architecture . 7 3.1. The core modules . 7 3.2. The integration agents . 9 3.2.1. Sendmail . 9 3.2.2. qmail . 9 3.2.3. Courier . 10 3.2.4. CommuniGate Pro . 10 3.2.5. SMTP Proxy . 10 3.2.6. Postfix . 11 Installation . 13 4. Prerequisites . 15 4.1. System requirements . 15 4.1.1. Hardware system requirements . 15 4.1.2. Software system requirements . 15 4.1.3. Mail servers minimum required versions . 16 4.2. Package naming convention . 16 4.2.1. Linux convention . 17 4.2.2. FreeBSD convention . 17 5. Package installation . 19 5.1. Getting BitDefender Security for Mail Servers . 19 5.2. Install the package . 19 5.2.1. Install the Linux packages . 19 v BitDefender Security for Mail Servers 5.2.2. Install the FreeBSD package . 21 5.2.3. Install the language package . 21 5.3. The installer . 22 5.4. MTA integration . 23 5.4.1. CommuniGate Pro . 24 5.4.2. Courier . 25 5.4.3. Sendmail Milter . 26 5.4.4. qmail . 26 5.4.5. Postfix . 27 5.4.6. SMTP . 27 6. Uninstall . 29 6.1. Uninstall the rpm package . 29 6.2. Uninstall the deb package . 29 6.3. Uninstall the ipk package . 29 6.4. Uninstall the FreeBSD package . 30 6.4.1. Uninstall a locally downloaded package . 30 Using BitDefender . 31 7. Configuration . 33 7.1. Basic configuration . 33 7.2. Antivirus settings . 34 7.3. Antispam settings . 35 7.4. Group management . 40 7.5. The BitDefender Logger Daemon . 42 7.5.1. The Logger Plugins . 43 7.6. Quarantine . 45 8. Start-up and Shut-down . 49 8.1. Start-up . 49 8.2. Shut-down . 50 8.3. Restart . 51 9. Product registration . 53 10. BitDefender status output . 55 10.1. Process status . 55 10.2. Basic information . 55 10.3. Statistical report . 56 11. Testing BitDefender . 57 11.1. Antivirus test . 57 11.1.1. Infected email attachment . 58 11.1.2. Infected attached archive . 58 11.2. Antispam test . 58 12. Updates . 61 12.1. Automatic update . 61 vi 12.1.1. Time interval modification . 61 12.1.2. Live! Update proxy configuration . 62 12.2. Manual update . ..
Recommended publications
  • Computer Viruses and Malware Advances in Information Security
    Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A.
    [Show full text]
  • Metadefender Core V4.13.2
    MetaDefender Core v4.13.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Bitdefender Security for Mail Servers Administrator's Guide
    Security for Mail Servers ADMINISTRATOR'S GUIDE Bitdefender Security for Mail Servers Administrator's Guide Publication date 2016.12.15 Copyright© 2016 Bitdefender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able of Contents Preface .............................................................................. vii 1. Conventions Used in This Book . vii 1.1. Typographical Conventions . vii 1.2. Admonitions . ix 2. Book Structure . ix 3. Request for Comments . x Description ........................................................................ 1 1. Features and Benefits .......................................................... 2 1.1. Key Features . 2 1.2. Key Benefits . 2 2. Architecture .................................................................... 4 2.1. Core Modules . 4 2.2. Integration Agents . 5 2.2.1. Sendmail . 6 2.2.2. qmail . 6 2.2.3. Courier . 6 2.2.4. CommuniGate
    [Show full text]
  • The Proceedings Of
    the association for computational heresy presents a record of the proceedings of SIGBOVIK 2017 the eleventh annual intercalary robot dance party in celebration of workshop on symposium about 26th birthdays; in particular, that of harry q. bovik carnegie mellon university pittsburgh, pa april 0, 2017 i SIGBOVIK A Record of the Proceedings of SIGBOVIK 2017 ISSN 2155-0166 April 0, 2017 Copyright is maintained by the individual authors, though obviously this all gets posted to the Internet and stuff, because it’s 2017. Permission to make digital or hard copies of portions of this work for personal use is granted; permission to make digital or hard copies of portions of this work for classroom use is also granted, but seems ill-advised. Abstracting with credit is permitted; abstracting with credit cards seems difficult. Additional copies of this work may be ordered from Lulu; refer to http://sigbovik.org for details. ii SIGBOVIK 2017 Message from the Organizing Committee th hese are the proceedings of the Ï«ÏÏ annual conference of the Special Interest Group on Harry Q.Ï Bovik, organised by the Association for Computational Heresy in honour of Harry Q. Bovik’s E.«...th birthday. «Ï; was a monumental year for SIGBOVIK. We experienced a factor of Ï, increase in submis- sions over last year, that’s to say, we received t,««« submissions. For your convenience, we made a histogram showing the number of submissions across time in Figure Ï. As much as we would have liked to accept all of these scientific breakthroughs, they would have caused our proceedings to weigh about ÊEÊ lbs or t kg, and face it, nobody needs that heavy of a paper paperweight.
    [Show full text]
  • Viruses Revealed
    Y L F M A E T Team-Fly® Blind Folio i Viruses Revealed David Harley, Robert Slade, Urs Gattiker Osborne/McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2001 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data- base or retrieval system, without the prior written permission of the publisher. 0-07-222818-0 The material in this eBook also appears in the print version of this title: 0-07-213090-3. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales pro- motions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at [email protected] or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms.
    [Show full text]
  • AVIEN Malware Defense Guide for the Enterprise Copyright © 2007 by Elsevier, Inc.All Rights Reserved
    436_XSS_FM.qxd 4/20/07 1:18 PM Page ii 447_Malware_pd_FM.qxd 7/13/07 1:45 PM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assortment of valueadded features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations.
    [Show full text]