Advertisement

Quick Links

AVG 9.0 Email Server Edition
User Manual
Document revision 90.4 (9. 3. 2010)
C opyright AVG Technologies C Z, s.r.o. All rights reserved.
All other trademarks are the property of their respective owners.
This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data
Security, Inc. C reated 1991.
This product uses code from C -SaC zech library, C opyright (c) 1996-2001 Jaromir Dolecek
(dolecek@ics.muni.cz).
This product uses compression library zlib, C opyright (c) 1995-2002 Jean-loup Gailly and Mark Adler.
A V G 9 .0 E mail Server E dition © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
1

Advertisement

Table of Contents
loading

Summary of Contents for AVG AVG 9.0 EMAIL SERVER EDITION - V 90.4

  • Page 1 User Manual Document revision 90.4 (9. 3. 2010) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data Security, Inc.
  • Page 2: Table Of Contents

    Contents ........................4 1. Introduction ........................5 2. AVG Installation Requirements ......................5 2.1 Operation Systems Supported ......................5 2.2 Email Servers Supported ......................5 2.3 Hardware Requirements ......................6 2.4 Uninstall Previous Versions ......................6 2.5 MS Exchange Service Packs ........................
  • Page 3 ........................35 6. AVG for Kerio MailServer ......................35 6.1 Configuration ......................35 6.1.1 Antivirus ......................35 6.1.2 Attachment Filter ........................40 7. Anti-Spam Configuration ......................40 7.1 Anti-Spam Interface ......................42 7.2 Anti-Spam Principles ......................42 7.3 Anti-Spam Settings ......................
  • Page 4: Introduction

    Congratulations on your purchase of AVG 9.0 Email Server Edition! AVG 9.0 Email Server Edition is one of a range of award winning AVG products designed to provide you with peace of mind and total security for your PC. As with all AVG products AVG 9.0 Email Server Edition has been completely re-designed, from...
  • Page 5: Avg Installation Requirements

    2. AVG Installation Requirements 2.1. Operation Systems Supported AVG 9.0 Email Server Edition is intended to protect e-mail servers running under the following operating systems: Windows 2008 Server Edition (x86 and x64) · Windows 2003 Server (x86, x64) SP1 ·...
  • Page 6: Uninstall Previous Versions

    · 2.4. Uninstall Previous Versions If you have an older version of AVG Email Server installed, you will need to uninstall it manually before installing AVG 9.0 Email Server Edition. You must manually perform the uninstallation of the previous version, using the standard windows functionality.
  • Page 7 For MS Exchange 2003 Server no additional service pack is needed; however, it is recommended to keep your system as up to date with the latest service packs and hotfixes as possible in order to obtain maximal available security. Service Pack for MS Exchange 2003 Server (optional): http://www.microsoft.com/exchange/evaluation/sp2/overview.mspx At the beginning of the setup, all system libraries versions will be examined.
  • Page 8: Avg Installation Process

    3. AVG Installation Process To install AVG on your computer, you need to get the latest installation file. You can use the installation file from the CD that is a part of your box edition but this file might be out-of-date. Therefore we recommended getting the latest installation file online.
  • Page 9: License Agreement

    Having confirmed the license agreement you will be redirected to the Checking System Status dialog. This dialog does not require any intervention; your system is being checked before the AVG installation can start. Please wait until the process has finished, then continue automatically to the following dialog.
  • Page 10: Select Installation Type

    AVG with non-standard settings. E.g. to fit specific system requirements. 3.5. Activate AVG In the Activate your AVG License dialog you have to fill in your registration data. Type in your name (User Name field) and the name of your organization (Company Name field).
  • Page 11: Custom Installation - Destination Folder

    The Destination folder dialog allows you to specify the location where AVG should be installed. By default, AVG will be installed to the program files folder located on drive C:. If you want to change this location, use the Browse button to display the drive structure, and select the respective folder.
  • Page 12: Custom Installation - Component Selection

    AVG edition. Only those components will be offered to be installed within the Component Selection dialog! Remote Administration component - if you intend to connect AVG to an AVG · DataCenter (AVG Network Editions), then you need to select this option.
  • Page 13: Custom Installation - Datacenter

    AVG DataCenter. A V G 9 .0 E mail Server E dition © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
  • Page 14: Installing

    3.9. Installing The Installing dialog shows the progress of the installation process, and does not require any intervention. Please wait until the installation is complete, then you will be redirected to the Installation Complete dialog. 3.10. Installation Completion The First Run Wizard is automatically started during the setup process and will require few easy steps to fill-in before you can complete the installation: In the Schedule regular scans and updates dialog set up the interval for new update files accessibility check-up, and define time when the schedule scan should be...
  • Page 15 In this dialog you decide whether you want to activate the option of anonymous reporting of exploits and bad sites to AVG virus lab. If so, please mark the I agree to provide ANONYMOUS information about detected threats to improve my security option.
  • Page 16 E-mail Scanner for MS Exchange Server 2000/2003 · AVG for Kerio MailServer · A V G 9 .0 E mail Server E dition © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
  • Page 17: E-Mail Scanner For Ms Exchange Server 2007/2010

    4. E-mail Scanner for MS Exchange Server 2007/2010 4.1. Overview The AVG for MS Exchange Server 2007 configuration options are fully integrated within the AVG 9.0 Email Server Edition as server components. Basic overview of the individual server components: Anti-Spam - Anti-Spam Server for MS Exchange ·...
  • Page 18 Available for MS Exchange 2007 and can be installed for HUB role only. EMS (SMTP) - E-mail Scanner for MS Exchange (SMTP Transport Agent) · Checks all e-mail messages coming through the MS Exchange SMTP interface. Available for MS Exchange 2007 only and can be installed for both EDGE and HUB roles.
  • Page 19 Here you can check messages divided into several tabs according to their severity. See configuration of individual components for amending the severity and reporting. By default there are displayed only results for the last two days. You can change the displayed period by amending the following options: Show last - insert preferred days and hours.
  • Page 20: E-Mail Scanner For Ms Exchange (Routing Ta)

    Back - press this button to return to the Server components overview. · You will find more information on individual settings of all components in the chapters below. 4.2. E-mail Scanner for MS Exchange (routing TA) To open the settings of E-mail Scanner for MS Exchange (routing transport agent) , select the Settings button from the interface of the component.
  • Page 21: E-Mail Scanner For Ms Exchange (Smtp Ta)

    Log file size - choose a preferred size of the log file. Default value: 100 MB. · The Scanning properties section: Use Heuristics - check this box to enable heuristic analysis method during · scanning. Report Potentially Unwanted Programs and Spyware threats - check this ·...
  • Page 22: E-Mail Scanner For Ms Exchange (Vsapi)

    Background scanning is one of the features of the VSAPI 2.0/2.5 application interface. It provides threaded scanning of the Exchange Messaging Databases. Whenever an item that has not been scanned with the latest AVG virus base update is encountered in the users’ mailbox folders, it is submitted to AVG for Exchange 2007 Server to be scanned.
  • Page 23 not examined objects runs in parallel. A specific low priority thread is used for each database, which guarantees other tasks (e.g. e-mail messages storage in the Microsoft Exchange database) are always carried out preferentially. Proactive Scan (incoming messages) · You can enable or disable the proactive scanning function of VSAPI 2.0/2.5 here. This scanning occurs when an item is delivered to a folder, but a request has not been made by a client.
  • Page 24 Scan inside archives - check this option to let the scanner look also inside · archived files (zip, rar, etc.) The E-mail attachments reporting section allows you to choose which items should be reported during scanning. The default configuration can be easily amended in the Detection actions section, part Information (see below).
  • Page 25: Detection Actions

    4.5. Detection Actions In the Detection actions sub-item you can choose automatic actions that should take place during the scanning process. The actions are available for the following items: Infections · PUP (Potentially Unwanted Programs) · Warnings · Information · Use the roll-down menu to choose an action for each item: None - no action will be taken.
  • Page 26: Mail Filtering

    To select a custom subject text for messages that contain the given item/threat, check the Mark subject with... box and fill-in a preferred value. Note: The last mentioned feature is not available for E-mail Scanner for MS Exchange VSAPI. 4.6. Mail Filtering In the Mail Filtering sub-item you can choose which attachments should be automatically removed, if any.
  • Page 27: E-Mail Scanner For Ms Exchange Server 2000/2003

    5. E-mail Scanner for MS Exchange Server 2000/2003 5.1. Overview The E-mail Scanner for MS Exchange Server 2000/2003 configuration options are fully integrated within the AVG 9.0 Email Server Edition as a server component. The server components include the following: Basic overview of the individual server components: Anti-Spam - Anti-Spam Server for MS Exchange ·...
  • Page 28 Checks all e-mail messages stored in user mailboxes. If any viruses are detected, they are moved to the Virus Vault, or completely removed. Double-click a required component to open its interface. With the exception of Anti- Spam, all the components share the following common control buttons and links: Scan Results ·...
  • Page 29 Here you can check messages divided into several tabs according to their severity. See configuration of individual components for amending the severity and reporting. By default there are displayed only results for the last two days. You can change the displayed period by amending the following options: Show last - insert preferred days and hours.
  • Page 30: Vsapi 2.0

    Virus Scanning API 2.5 (VSAPI 2.5 as provided in MS Exchange 2003 Server) also allows deletion of infected messages. This feature can be set up in AVG for MS Exchange 2000/2003 Server configuration dialog. 5.3. E-mail Scanner for MS Exchange (VSAPI) This item contains settings of the E-mail Scanner for MS Exchange (VSAPI).
  • Page 31 Background scanning is one of the features of the VSAPI 2.0/2.5 application interface. It provides threaded scanning of the Exchange Messaging Databases. Whenever an item that has not been scanned with the latest AVG virus base update is encountered in the users’ mailbox folders, it is submitted to AVG for Exchange 2007 Server to be scanned.
  • Page 32 The minimum number of threads is computed as ('number of processors'+1) divided by 2. The maximum number of threads is computed as 'Number of Processors' multiplied by 5 + 1. If the value is the minimum or lesser value or the maximum or greater, the default value is used.
  • Page 33: Detection Actions

    There are also these sub-items available in the following tree structure: Detection actions · Mail filtering · 5.4. Detection Actions In the Detection actions sub-item you can choose automatic actions that should take place during the scanning process. The actions are available for the following items: Infections ·...
  • Page 34: Mail Filtering

    None - no action will be taken. · Move to Vault - the given threat will be moved to Virus Vault. · Remove - the given threat will be removed. · 5.5. Mail Filtering In the Mail Filtering sub-item you can choose which attachments should be automatically removed, if any.
  • Page 35: Avg For Kerio Mailserver

    6.1.1. Antivirus To activate AVG for Kerio MailServer, select the Use external antivirus checkbox and choose the AVG Email Server Edition item from the external software menu in the Antivirus usage frame of the configuration window: A V G 9 .0 E mail Server E dition © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
  • Page 36 In the following section you can specify what to do with an infected or filtered message: If a virus is found in a message · This frame specifies the action to be carried out when a virus is detected in a message, or when a message is filtered by an attachment filter: Discard the message –...
  • Page 37 Deliver the original message with a prepared warning — the message (or attachment) will be delivered unchecked. The user will be warned that the message may still contain viruses. Reject the message as if it was virus — the system will react the same way as when a virus was detected (i.e.
  • Page 38 external address. Forward the filtered message to administrator address · The message without its infected or prohibited attachment will be (apart from the actions selected below) forwarded to the specified e-mail address. This can be used to verify the correct functioning of the antivirus and/or attachment filter.
  • Page 39 In the If a mail message contains an attachment where field you can select the · type of attachment (File name or MIME type). You can also choose a particular extension from the offered extensions list, or you can type the extension wildcard directly.
  • Page 40: Anti-Spam Configuration

    7. Anti-Spam Configuration 7.1. Anti-Spam Interface You will find the Anti-Spam server component's dialog in the Server Components section (left menu). It contains a brief information about the functionality of the server component, information on its current status (Anti-Spam Server for MS Exchange component is active.), and some statistics.
  • Page 41 Here you can check messages detected either as a SPAM (unwanted messages) or a Phishing attempt (an effort to steal your personal data, banking details, identity etc.). By default there are displayed only results for the last two days. You can change the displayed period by amending the following options: Show last - insert preferred days and hours.
  • Page 42: Anti-Spam Principles

    7.2. Anti-Spam Principles Spam refers to unsolicited e-mail, mostly advertising a product or service that is mass mailed to a huge number of e-mail addresses at a time, filling recipients’ mail boxes. Spam does not refer to legitimate commercial e-mail for which consumers have given their consent.
  • Page 43: Anti-Spam Training Wizard

    Value 90-99 - Most incoming e-mail messages will be delivered normally (without · being marked as spam). The most easily identified spam will be filtered out, but a significant amount of spam may still be allowed through. Value 80-89 - E-mail messages likely to be spam will be filtered out.
  • Page 44 There are the following options to choose from: A specific e-mail client - if you use one of the listed e-mail clients (MS Outlook, · Outlook Express, The Bat!, Mozilla Thunderbird), simply select the respective option Folder with EML files - if you use any other e-mail program, you should first ·...
  • Page 45 In this dialog, please select the folder with the messages you want to use for training. Press the Add folder button to locate the folder with the .eml files (saved e-mail messages). The selected folder will then be displayed in the dialog. In the Folders contain drop-down menu, set one of the two options - whether the selected folder contains wanted (HAM), or unsolicited (SPAM) messages.
  • Page 46: Message Filtering Options

    Note: In case of Microsoft Office Outlook, you will be prompted to select the MS Office Outlook profile first. In the Folders contain drop-down menu, set one of the two options - whether the selected folder contains wanted (HAM), or unsolicited (SPAM) messages. Please note that you will be able to filter the messages in the next step, so the folder does not have to contain only training e-mails.
  • Page 47: Performance

    In this dialog, you can set filtering of the e-mail messages. If you are sure that the selected folder contains only messages you want to use for training, select the All messages (no filtering) option. If you are unsure about the messages contained in the folder, and you want the wizard to ask you about every single message (so that you can determine whether to use it for training or not), select the Ask for each message option.
  • Page 48: Rbl

    slider left or right to change the level of scanning performance ranging between Low memory / High performance modes. Low memory - during the scanning process to identify spam, no rules will be · used. Only training data will be used for identification. This mode is not recommended for common use, unless the computer hardware is really poor.
  • Page 49: Whitelist

    The RBL (Realtime Blackhole List) server is a DNS server with an extensive database of known spam senders. When this feature is switched on, all e-mail messages will be verified against the RBL server database and marked as spam if identical to any of the database entries.
  • Page 50: Blacklist

    (spam). You can also compile a list of full domain names (e.g. avg.com), that you know do not generate spam messages. Once you have such a list of senders and/or domain names prepared, you can enter them by either of the following methods: by direct entry of each e-mail address or by importing the whole list of addresses at once.
  • Page 51: Advanced Settings

    unwanted messages (spam). You can also compile a list of full domain names (e.g. spammingcompany.com), that you expect or receive spam messages from. All e-mail from the listed addresses/domains will be identified as spam. Once you have such a list of senders and/or domain names prepared, you can enter them by either of the following methods: by direct entry of each e-mail address or by importing the whole list of addresses at once.
  • Page 52: Avg Settings Manager

    Apply configuration from file to AVG on this computer · Use this button to open an AVG configuration file (.pck) and apply it to the local installation of AVG. Store local AVG configuration to a file ·...
  • Page 53 Clone AVG installation · This option allows you to make an exact copy of the local AVG installation by creating an installation package with custom options. To proceed first select folder where the installation script will be saved. Then from the drop-down menu select one of the following: Hidden installation - no information will be displayed during the setup process.
  • Page 54 Allowed items (see above). Once finished, there should be AvgSetup.bat available in the chosen folder along with other files. If you run the AvgSetup.bat file, it will install AVG according to the parameters chosen above.
  • Page 55: Faq And Technical Support

    9. FAQ and Technical Support Should you have any problems with your AVG, either business or technical, please refer to the FAQ section of the AVG website at http://www.avg.com. If you do not succeed in finding help this way, contact the technical support department by email.

This manual is also suitable for:

9.0 email server

Table of Contents