Summary of Contents for AVG EMAIL SERVER EDITION 2011 - REV 2011.01
Page 1
User Manual Document revision 2011.01 (22. 9. 2010) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data Security, Inc.
Congratulations on your purchase of AVG Email Server Edition 2011! AVG Email Server Edition 2011 is one of a range of award winning AVG products designed to provide you with peace of mind and total security for your PC. As with all AVG products AVG Email Server Edition 2011 has been completely re-designed, from the ground up, to deliver AVG’s renowned and accredited security protection in a new,...
· 2.4. Uninstall Previous Versions If you have an older version of AVG Email Server installed, you will need to uninstall it manually before installing AVG Email Server Edition 2011. You must manually perform the uninstallation of the previous version, using the standard windows functionality.
Once you have uninstalled the Email Server Edition, you can proceed to uninstall · your previous version of AVG File Server Edition. This can be done easily from the start menu Start/All Programs/AVG/Uninstall AVG If you have previously used the AVG 8.x or older version, do not forget to ·...
3. AVG Installation Process To install AVG on your computer, you need to get the latest installation file. You can use the installation file from the CD that is a part of your box edition but this file might be out-of-date. Therefore we recommended getting the latest installation file online.
Enter your license number into the License Number text field. The license number will be in the confirmation e-mail that you received after purchasing your AVG on-line. You must type in the number exactly as shown. If the digital form of the license number is available (in the email), it is recommended to use the copy and paste method to insert Press the Next button to continue the installation process.
Quick Install and Custom Install. For most users, it is highly recommended to keep to the Quick Install that installs AVG in fully automatic mode with settings predefined by the program vendor. This configuration provides maximum security combined with the optimal use of resources.
The Destination folder dialog allows you to specify the location where AVG should be installed. By default, AVG will be installed to the program files folder located on drive C:. If you want to change this location, use the Browse button to display the drive structure, and select the respective folder.
Page 12
AVG is now installed on your computer and fully functional. The program is running in the background in fully automatic mode. To individually setup protection for your e-mail server, follow the appropriate chapter: E-mail Scanner for MS Exchange Server 2007/2010 ·...
4. E-mail Scanner for MS Exchange Server 2007/2010 4.1. Overview The AVG for MS Exchange Server 2007/2010 configuration options are fully integrated within the AVG Email Server Edition 2011 as server components. Basic overview of the individual server components: Anti-Spam - Anti-Spam Server for MS Exchange ·...
Page 14
EMS (SMTP) - E-mail Scanner for MS Exchange (SMTP Transport Agent) · Checks all e-mail messages coming through the MS Exchange SMTP interface. Available for MS Exchange 2007/2010 only and can be installed for both EDGE and HUB roles. EMS (VSAPI) - E-mail Scanner for MS Exchange (VSAPI) ·...
Page 15
Here you can check messages divided into several tabs according to their severity. See configuration of individual components for amending the severity and reporting. By default there are displayed only results for the last two days. You can change the displayed period by amending the following options: Show last - insert preferred days and hours.
You will find more information on individual settings of all components in the chapters below. 4.2. E-mail Scanner for MS Exchange (routing TA) To open the settings of E-mail Scanner for MS Exchange (routing transport agent) , select the Settings button from the interface of the component. From the Server components list select the E-mail Scanner for MS Exchange (routing TA) item: The Basic Settings section contains the following options:...
scanning. Report Potentially Unwanted Programs and Spyware threats - check this · option to report the presence of potentially unwanted programs and spyware. Report enhanced set of Potentially Unwanted Programs - check to detect · extended package of spyware: programs that are perfectly ok and harmless when acquired from the manufacturer directly, but can be misused for malicious purposes later, or programs that always harmless but might be unwanted (various toolbars etc.).
Background scanning is one of the features of the VSAPI 2.0/2.5 application interface. It provides threaded scanning of the Exchange Messaging Databases. Whenever an item that has not been scanned with the latest AVG virus base update is encountered in the users’ mailbox folders, it is submitted to AVG for Exchange Server to be scanned.
Page 19
A specific low priority thread is used for each database, which guarantees other tasks (e.g. e-mail messages storage in the Microsoft Exchange database) are always carried out preferentially. Proactive Scan (incoming messages) · You can enable or disable the proactive scanning function of VSAPI 2.0/2.5 here. This scanning occurs when an item is delivered to a folder, but a request has not been made by a client.
when acquired from the manufacturer directly, but can be misused for malicious purposes later, or programs that always harmless but might be unwanted (various toolbars etc.). This is an additional measure that increases your computer security and comfort even more, however it can possibly block legal programs, and is therefore switched off by default.
Page 21
we recommend a small fix (see below) to resolve this issue instantly. Note: Adjusting registry is advised only to experienced users. We recommend that before you edit the registry, you back up the registry and understand how to restore it if a problem occurs. Open the Registry editor (Windows menu Start/Run, type in regedit and press enter).
4.6. Detection Actions In the Detection actions sub-item you can choose automatic actions that should take place during the scanning process. The actions are available for the following items: Infections · PUP (Potentially Unwanted Programs) · Warnings · Information · Use the roll-down menu to choose an action for each item: None - no action will be taken.
To select a custom subject text for messages that contain the given item/threat, check the Mark subject with... box and fill-in a preferred value. Note: The last mentioned feature is not available for E-mail Scanner for MS Exchange VSAPI. 4.7. Mail Filtering In the Mail Filtering sub-item you can choose which attachments should be automatically removed, if any.
5. E-mail Scanner for MS Exchange Server 2003 5.1. Overview The E-mail Scanner for MS Exchange Server 2003 configuration options are fully integrated within the AVG Email Server Edition 2011 as a server component. The server components include the following: Basic overview of the individual server components: Anti-Spam - Anti-Spam Server for MS Exchange ·...
Page 26
Here you can check messages divided into several tabs according to their severity. See configuration of individual components for amending the severity and reporting. By default there are displayed only results for the last two days. You can change the displayed period by amending the following options: Show last - insert preferred days and hours.
Page 28
AVG for Exchange Server to be scanned. Scanning and searching for the not examined objects runs in parallel. A specific low priority thread is used for each database, which guarantees other tasks (e.g.
Page 29
option to report the presence of potentially unwanted programs and spyware. Report enhanced set of Potentially Unwanted Programs - check to detect · extended package of spyware: programs that are perfectly ok and harmless when acquired from the manufacturer directly, but can be misused for malicious purposes later, or programs that always harmless but might be unwanted (various toolbars etc.).
5.3. Detection Actions In the Detection actions sub-item you can choose automatic actions that should take place during the scanning process. The actions are available for the following items: Infections · PUP (Potentially Unwanted Programs) · Warnings · Information · Use the roll-down menu to choose an action for each item: None - no action will be taken.
5.4. Mail Filtering In the Mail Filtering sub-item you can choose which attachments should be automatically removed, if any. The following options are available: Remove attachments - check this box to enable the feature. · Remove all executable files - removes all executables. ·...
Page 33
In the following section you can specify what to do with an infected or filtered message: If a virus is found in a message · This frame specifies the action to be carried out when a virus is detected in a message, or when a message is filtered by an attachment filter: Discard the message –...
Page 34
(or attachment) will be delivered unchecked. The user will be warned that the message may still contain viruses. Reject the message as if it was virus — the system will react the same way as when a virus was detected (i.e. the message will be delivered without any attachment or rejected).
Page 35
The message without its infected or prohibited attachment will be (apart from the actions selected below) forwarded to the specified e-mail address. This can be used to verify the correct functioning of the antivirus and/or attachment filter. In the list of extensions, each item has four fields: Type –...
7. Anti-Spam Configuration 7.1. Anti-Spam Interface You will find the Anti-Spam server component's dialog in the Server Components section (left menu). It contains a brief information about the functionality of the server component, information on its current status (Anti-Spam Server for MS Exchange component is active.), and some statistics.
Page 38
Here you can check messages detected either as a SPAM (unwanted messages) or a Phishing attempt (an effort to steal your personal data, banking details, identity etc.). By default there are displayed only results for the last two days. You can change the displayed period by amending the following options: Show last - insert preferred days and hours.
7.2. Anti-Spam Principles Spam refers to unsolicited e-mail, mostly advertising a product or service that is mass mailed to a huge number of e-mail addresses at a time, filling recipients’ mail boxes. Spam does not refer to legitimate commercial e-mail for which consumers have given their consent.
- i.e. you allowed reporting of detected threats to AVG. The reporting is taken care of automatically. However, you may mark this check box to confirm you want to be asked before any detected spam gets reported to AVG to make sure the message should really be classified as spam.
Page 41
There are the following options to choose from: A specific e-mail client - if you use one of the listed e-mail clients (MS Outlook, · Outlook Express, The Bat!, Mozilla Thunderbird), simply select the respective option Folder with EML files - if you use any other e-mail program, you should first ·...
Page 42
In this dialog, please select the folder with the messages you want to use for training. Press the Add folder button to locate the folder with the .eml files (saved e-mail messages). The selected folder will then be displayed in the dialog. In the Folders contain drop-down menu, set one of the two options - whether the selected folder contains wanted (HAM), or unsolicited (SPAM) messages.
Note: In case of Microsoft Office Outlook, you will be prompted to select the MS Office Outlook profile first. In the Folders contain drop-down menu, set one of the two options - whether the selected folder contains wanted (HAM), or unsolicited (SPAM) messages. Please note that you will be able to filter the messages in the next step, so the folder does not have to contain only training e-mails.
If you are sure that the selected folder contains only messages you want to use for training, select the All messages (no filtering) option. If you are unsure about the messages contained in the folder, and you want the wizard to ask you about every single message (so that you can determine whether to use it for training or not), select the Ask for each message option.
Page 45
left navigation) offers the Anti-Spam component performance settings. Move the slider left or right to change the level of scanning performance ranging between Low memory / High performance modes. Low memory - during the scanning process to identify spam, no rules will be ·...
7.5. RBL The RBL item open an editing dialog called Realtime Blackhole Lists: In this dialog you can switch on/off the Query RBL servers function. The RBL (Realtime Blackhole List) server is a DNS server with an extensive database of known spam senders.
(spam). You can also compile a list of full domain names (e.g. avg.com), that you know do not generate spam messages. Once you have such a list of senders and/or domain names prepared, you can enter them by either of the following methods: by direct entry of each e-mail address or by importing the whole list of addresses at once.
can be done from Windows Address Book or Microsoft Office Outlook. Export - if you decide to export the records for some purpose, you can do so by · pressing this button. All records will be saved to a plain text file. 7.7.
Import - you can import your existing e-mail addresses by selecting this button. · The input file can be a text file (in plain text format, and the content must contain only one item - address, domain name - per line), WAB file or the import can be done from Windows Address Book or Microsoft Office Outlook.
Apply configuration from file to AVG on this computer · Use this button to open an AVG configuration file (.pck) and apply it to the local installation of AVG. Store local AVG configuration to a file ·...
Page 51
Clone AVG installation · This option allows you to make an exact copy of the local AVG installation by creating an installation package with custom options. To proceed first select folder where the installation script will be saved. Then from the drop-down menu select one of the following: Hidden installation - no information will be displayed during the setup process.
9. FAQ and Technical Support Should you have any problems with your AVG, either business or technical, please refer to the FAQ section of the AVG website at http://www.avg.com. If you do not succeed in finding help this way, contact the technical support department by email.
Need help?
Do you have a question about the EMAIL SERVER EDITION 2011 - REV 2011.01 and is the answer not in the manual?
Questions and answers