ii Contents GFI MailSecurity for Exchange/SMTP
Quarantine Upgrade tool .............................................................................................. 39
Using the quarantine upgrade tool ..................................................................... 39
General settings 41
Introduction to settings ................................................................................................. 41
Define the administrator‟s email address ..................................................................... 41
Configuring proxy server settings for automatic updates............................................. 42
Adding Local Domains ................................................................................................. 43
SMTP server bindings .................................................................................................. 43
Managing local users in SMTP mode .......................................................................... 44
To add a new local user follow these steps: ...................................................... 45
To remove a local user follow these steps: ........................................................ 46
Configuring virus checking 47
Configuring Virus Scanning Engines ........................................................................... 47
AVG configuration ........................................................................................................ 48
AVG web site...................................................................................................... 50
Kaspersky configuration ............................................................................................... 50
Kaspersky web site ............................................................................................ 51
BitDefender configuration ............................................................................................ 52
BitDefender website ........................................................................................... 53
McAfee configuration ................................................................................................... 53
McAfee website .................................................................................................. 54
Norman configuration ................................................................................................... 54
Norman website ................................................................................................. 55
Virus scanner actions ................................................................................................... 56
Virus scanner updates ................................................................................................. 57
Triggering the virus update manually ................................................................. 58
Setting the Virus Scanning Engines scan priority ........................................................ 58
Configuring Virus Scanning optimizations ................................................................... 58
Configuring Information Store Scanning ...................................................................... 59
Configuring Attachment Checking 63
Introduction to Attachment Checking ........................................................................... 63
Creating an Attachment Checking rule ........................................................................ 63
Removing attachment rules ......................................................................................... 68
Make changes to an existing rule ................................................................................ 69
Enabling/disabling rules ............................................................................................... 69
Changing the rule priority ............................................................................................. 69
Configuring Content Checking 71
Introduction to Content Checking ................................................................................. 71
Creating a Content Checking rule ................................................................................ 71
Remove content checking rules ................................................................................... 77
Make changes to an existing content checking rule .................................................... 78
Enabling/disabling rules ............................................................................................... 78
Changing the rule priority ............................................................................................. 78
Decompression engine 79
Introduction to the Decompression engine .................................................................. 79
Configuring the decompression engine filters .............................................................. 80
Check password protected archives .................................................................. 80
Check corrupted archives .................................................................................. 80
Check for recursive archives .............................................................................. 81
Check size of uncompressed files in archives ................................................... 82
Check for amount of files in archives ................................................................. 83
Scan within archives .......................................................................................... 83