ESET MAIL SECURITY - ANNEXE 209 Installation Manual page 21

Table of Contents

Advertisement

Taking into account these drawbacks, content filtering using AMaViS is recommended only if
the system administrator does not require the features discussed above.
5.5.2.1. amavis configuration
Configuration of amavis is performed during the amavis installation. After unpacking the
source amavis-0.x.y.tgz, create the file amavis/av/esets_cli with these contents:
#
# ESET Software ESETS Command Line Interface
#
if ($esets_cli) {
do_log(2,"Using $esets_cli");
chop($output = `$esets_cli --subdir $TEMPDIR/parts`);
$errval = retcode($?);
do_log(2,$output);
if ($errval == 0) {
$scanner_errors = 0;
} elsif ($errval == 1 || $errval == 2 || $errval == 3) {
$scanner_errors = 0;
@virusname = ($output =~ /virus="([^"]+)"/g);
do_virus();
} else {
do_log(0,"Virus scanner failure: $esets_cli (error code: $errval)");
}
}
The script above accepts the email message only when it is accepted in esets_cli's HOP
(Handle Object Policy). The email message is blocked in any other instance. If a virus is found, the
virus name is extracted from the output.
Next, if you are using the Linux RSR package, you must update your PATH environment
variable with this command:
export PATH="$PATH:/opt/eset/esets/bin"
To successfully install amavis, you may need to install additional software such as arc, unarj,
unrar, or zoo. You must also make a symlink in /usr/bin from 'uncompress' to 'gzip' and create
the amavis user in the amavis group with a home directory of /var/amavis. Then continue with
the usual installation process (./configure, make, make install) and follow the README.mta rules
according your mail server.
5.5.2.2. amavisd configuration
Configuration of amavisd is performed during installation. Unpack the source amavisd-0.x.tgz
and follow the rules for amavis described in section 5.5.1.1 of this guide. After performing 'make
install' , you may need to move '/usr/etc/amavisd.conf' to '/etc' and execute the 'make install'
process again.
21

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MAIL SECURITY - ANNEXE 209 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Mail security

Table of Contents