..........30 Appendix B. PHP License from the author. ESET, spol. s r. o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
1. Introduction Dear user, you have acquired ESET Mail Security - the premier security system running under the Linux, BSD and Solaris OS. As you will soon find out, ESET's state-of-the-art scanning engine has unsurpassed scanning speed and detection rates combined with a very small footprint that makes it the ideal choice for any Linux, BSD and Solaris OS server.
Page 4
Low system requirements To run efficiently, ESET Mail Security requires just 16MB of hard-disk space and 32MB of RAM. It runs smoothly under the 2.2.x, 2.4.x and 2.6.x Linux OS kernel versions as well as under 5.x, 6.x FreeBSD OS kernel versions.
ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r. o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
Page 6
ESETS object files directory The directory where the relevant ESET Mail Security object files and libraries are stored. The abbreviation @LIBDIR@ will be used for future references to this directory. The @LIBDIR@ value for the following Operating Systems is listed...
After purchasing ESET Mail Security, you will receive your authorization data (username/password and license key). This data is necessary for both identifying you as our customer and allowing you to download updates for ESET Mail Security. The username/password data is also required for downloading the initial installation package from our web site.
Once ESET Mail Security is successfully installed, you should become familiar with its architecture. Figure 4-1. Structure of ESET Mail Security. The structure of ESET Mail Security is shown in Figure 4-1. The system is comprised of the following parts: CORE The Core of ESET Mail Security is the ESETS daemon (esets_daemon).
Page 9
intercept various data flow types in the computer and/or its neighborhood, and prepare it for scanning. Note that in addition to the various parameters used for system configuration, there are also rules governing the organization of the file. For detailed information on the most effective way to organize this file, please refer to the esets.cfg(5) and esets_daemon(8) man pages, as well as relevant agents‘...
5. Integration with Email Messaging System This chapter describes the integration of ESET Mail Security with a variety of known email messaging systems. It is extremely important to understand the basic principles of an email messaging system (see figure 5-1) and how ESET Mail Security integrates with it.
Security comes with five content filters that are built for the most common MTA programs, such as MTA Sendmail, Postfix, Exim, QMail and ZMailer. Check that your MTA is properly configured and running. Then, configure ESET Mail Security for bi-directional email message scanning by running the following script: /usr/sbin/esets_setup Select MTA and content filter install options.
MUA. To configure ESET Mail Security for scanning of email messages downloaded from POP3 or IMAP server, run the following script: /usr/sbin/esets_setup Select the POP3 or IMAP install option. This will set the given ESETS module to listen on a predefined port and redirect applicable IP packets.
To install the product with amavisd-new, unpack and install the source amavisd-new-2.x.y.tgz in your installation directory. Next, configure the product with the newly installed amavisd-new. To do this, delete the clause for ‘ESET Software ESETS’ and then replace the clause for ‘ESET Software ESETS - Client/Server Version’ in the file ‘amavisd.conf’...
6. Important ESET Mail Security mechanisms 6.1 Handle Object Policy The Handle Object Policy (see figure 6-1) mechanism provides filtering of scanned objects based on their status. This functionality is based on the following configuration options: action_av action_av_infected action_av_notscanned action_av_deleted For detailed information on these options, please refer to the esets.cfg(5) man page.
6.2 User Specific Configuration The purpose of the User Specific Configuration mechanism is to provide a higher degree of customization and functionality. It allows the sytem administrator to define ESETS antivirus scanner parameters based on the user who is accessing file system objects. A detailed description of this functionality can be found in the esets.cfg(5) man page;...
In addition, users can choose to provide the ESET virus laboratory team with supplementary information using the ‘samples_provider_mail’ and/or ‘samples_provider_country’ configuration options. The information collected using these options will assist in providing the ESET team with an overview about a given infiltration which may be spreading over the Internet.
Figure 6-1. ESET Security for Linux - Home screen. The web interface window of ESET Mail Security is divided into two main sections. The primary window, that serves to display the contents of the selected menu option and the main menu. This horizontal bar on the top lets you...
Figure 6-2. ESET Licenses. You can enable the license notification option in the Global section options. If enabled, this functionality will notify you 30 days prior to your license expiration. 6.6.2 SMTP+Postfix configuration example ESETS can be configured in two ways. In this example we will demonstrate how to use both when configuring the...
Performs On-demand scans as requested, and submits the resulting scan logs back to ERA Server NOTE: For this option to be available you must have a valid license for ESET File Security. Adds logs of notable scans performed by the ESETS daemon to Threat logs...
These functionalities are not supported: Firewall Log Remote installation For more information, please read the ESET Remote Administrator manual. This manual is located on our web site at the following link: http://www.eset.com/documentation 6.7.1 Remote Administration usage example Before commencing any remote administration process ensure your system fulfills the three following prerequisites:...
7.1 ESETS update utility To maintain the effectiveness of ESET Mail Security, the virus signature database must be kept up to date. The esets_update utility has been developed for this purpose. See the esets_update(8) man page for details. To launch an update, the configuration options ‘av_update_username‘...
8. Let us know Dear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET Mail Security installation, configuration and maintenance. However, our goal is to continually improve the quality and effectiveness of our documentation. If you feel that any sections in this Guide are unclear or incomplete, please let us know by contacting Customer Care: http://www.eset.com/support...
9. Appendix A. ESETS setup and configuration 9.1 Setting ESETS for MTA Postfix Inbound email message scanning Warning: This installation is not compatible with SELinux. Either disable SELinux or proceed to the next section. The objective of this installation is to insert esets_mda before the original Postfix MDA. The MDA to be used (with arguments) is set in the Postfix parameter ‘mailbox_command’.
9.2 Setting ESETS for MTA Sendmail Inbound email message scanning Warning: This installation is not compatible with SELinux. Either disable SELinux or proceed to the next section. The objective of this installation is to insert esets_mda before Sendmail’s original MDA. NOTE: On FreeBSD, Sendmail may be communicating with MDA using LMTP.
#!/bin/sh A=”$1”; shift exec qmail-start.orig ”|@BINDIR@/esets_mda ‘$A’”’ -- --sender=”$SENDER” --recipient=”$RECIPIENT”’ “$@” This will start Qmail using esets_mda for local deliveries. However, the original delivery specification is passed to qmail-local through esets_mda. Note that in this configuration esets_mda will use Qmail’s recognized exit codes (see the qmail-command(8) man page).
9.5 Setting ESETS for MTA Exim version 4 Inbound email message scanning The goal of this installation is to create an Exim transport from esets_mda for local users. In the [mda] section of the ESETS configuration file, set this parameter: mda_path = ”/usr/sbin/exim”...
smtp-policy is filtering all email according to your needs. 9.7 Setting ESETS for outbound email message scanning Outbound email message scanning is performed using the esets_smtp daemon. In the [smtp] section of the ESETS configuration file, set these parameters: agent_enabled = yes listen_addr = ”192.168.1.0”...
Page 29
ipchains -A INPUT -p tcp -i if0 --dport 143 -j REDIRECT 8143 If IP-filtering is being performed by the iptables administration tool, the rule is: iptables -t nat -A PREROUTING -p tcp -i if0 --dport 143 -j REDIRECT --to-ports 8143 On FreeBSD, the rule is as follows: ipfw add fwd 192.168.1.10,8143 tcp from any to any 143 via if0 in On NetBSD and Solaris:...
10. Appendix B. PHP License The PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1.
Need help?
Do you have a question about the MAIL SECURITY - FOR LINUX BSD AND SOLARIS and is the answer not in the manual?
Questions and answers