AVG Email Server Edition User Manual Document revision 2015.12 (28.7.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.
Contents 1. Introduction 2 2. AVG Installation Requirements 3 2.1 Operation Systems Supported 3 2.2 Email Servers Supported 3 2.3 Hardware Requirements 3 2.4 Uninstall Previous Versions 4 2.5 MS Exchange Service Packs 4 3. AVG Installation Process 5 3.1 Installation Launch 5 3.2 License Agreement 6 3.3 Activate Your License 6 3.4 Select Installation Type 7 3.5 Custom Install - Custom Options 8 3.6 Installation Completion 10 4. After Installation 11 5.
1. Introduction This user manual provides comprehensive documentation for AVG Email Server Edition. Congratulations on your purchase of AVG Email Server Edition! AVG Email Server Edition is one of a range of award winning AVG products designed to provide you with peace of mind and total security for your server.
2. AVG Installation Requirements 2.1. Operation Systems Supported AVG Email Server Edition is intended to protect mail servers running under the following operating systems: Windows 2012 Server R2 Edition Windows 2012 Server Edition (x86 and x64) Windows 2008 Server R2 Edition Windows 2008 Server Edition (x86 and x64) Windows 2003 Server (x86, x64) SP1 2.2.
2.4. Uninstall Previous Versions If you have an older version of AVG Email Server installed, you will need to uninstall it manually before installing AVG Email Server Edition. You must manually perform the uninstallation of the previous version, using the standard windows functionality. From the start menu Start/Settings/Control Panel/Add or Remove Programs select the correct program from the list of installed software (or you can do this maybe even easier via menu Start/All Programs/AVG/Uninstall AVG).
3. AVG Installation Process To install AVG on your computer, you need to get the latest installation file. You can use the installation file from the CD that is a part of your box edition but this file might be out-of-date. Therefore we recommended getting the latest installation file online. You can download the file from the AVG website (at http:// www.avg.com/download?prd=msw).
3.2. License Agreement This dialog allows you to read the license conditions. Use the Printable version button to open the license text in a new window. Press the Accept button to confirm and continue to the next dialog. 3.3. Activate Your License In the Activate your License dialog you have to fill in your license number. Enter your license number into the License Number text field. The license number will be in the confirmation email that you received after purchasing your AVG on-line.
Press the Next button to continue the installation process. 3.4. Select Installation Type The Select type of Installation dialog offers the choice of two installation options: Express Install and Custom Install.
For most users, it is highly recommended to keep to the Express Install that installs AVG in fully automatic mode with settings predefined by the program vendor. This configuration provides maximum security combined with the optimal use of resources. In the future, if the need arises to change the configuration, you will always have the possibility to do so directly in the AVG application.
Basic overview of the individual server components (under the Server branch): Anti-Spam Server for MS Exchange Checks all incoming email messages and marks unwanted emails as SPAM. It uses several analyzing methods to process each email message, offering maximum possible protection against unwanted email messages. Email Scanner for MS Exchange (routing Transport Agent) Checks all incoming, outgoing and internal email messages going through the MS Exchange HUB role.
3.6. Installation Completion If you selected the Remote Administration module during module selection, then the final screen will allow you to define the connection string for connecting to your AVG DataCenter. This dialog also allows you to decide whether you want to participate in the Product Improvement Program that collects anonymous information on detected threats in order to increase the overall Internet security level.
4. After Installation Immediately after the installation is done, the AVG Email Server Edition main screen appears: This manual only deals with the AVG Email Server Edition specific features; all other components and settings are being described in the AVG Desktop manual. To access the main server components dialog, click the Server button (the one circled in red in the screenshot above).
Please note that all server components will be available (unless you chose not to install some of them during the installation process, of course) only if you are using MS Exchange 2007 or higher. MS Exchange 2003 only supports Anti-Spam and Email Scanner (VSAPI) components.
5. Email Scanners for MS Exchange 5.1. Overview Basic overview of the individual Email Scanner server components: EMS (routing) - Email Scanner for MS Exchange (routing Transport Agent) Checks all incoming, outgoing and internal email messages going through the MS Exchange HUB role. Available for MS Exchange 2007/2010/2013 and can be installed for HUB role only. EMS (SMTP) - Email Scanner for MS Exchange (SMTP Transport Agent) Checks all email messages coming through the MS Exchange SMTP interface.
Opens a new dialog where you can review scan results: Here you can check messages divided into several tabs according to their severity. See configuration of individual components for amending the severity and reporting. By default there are displayed only results for the last two days. You can change the displayed period by amending the following options: o Show last - insert preferred days and hours. o Show selection - choose a custom time and date interval.
The Basic Settings section contains the following options: Enable component - uncheck to disable the whole component. Language - select preferred component language. Certify messages - check this if you wish to add a certification note to all scanned messages. You can customize the message in the next field. The Scanning properties section: Use Heuristics - check this box to enable heuristic analysis method during scanning.
The following options are available: Report password protected archives Report password protected documents Report files containing macro Report hidden extensions There are also these sub-items available in the following tree structure: Detection actions Mail filtering 5.3. Email Scanner for MS Exchange (SMTP TA) The configuration for the Email Scanner for MS Exchange (SMTP Transport Agent) is exactly the same as in the case of routing transport agent.
5.4. Email Scanner for MS Exchange (VSAPI) This item contains settings of the Email Scanner for MS Exchange (VSAPI). The Basic Settings section contains the following options: Enable component - uncheck to disable the whole component. Language - select preferred component language. The Scan settings section: Background Scan - you can enable or disable the background scanning process here. Background scanning is one of the features of the VSAPI 2.0/2.5 application interface.
Overflow messages will continue to the store unscanned. Even if you disable both Background Scan and Proactive Scan options, the on access scanner will be still active when an user will try to download a message with the MS Outlook client. Scan RTF - you can specify here, whether the RTF file type should be scanned or not.
Report password protected archives Report password protected documents Report files containing macro Report hidden extensions Generally, some of these features are user extensions of the Microsoft VSAPI 2.0/2.5 application interface services. For the detailed information on the VSAPI 2.0/2.5 please refer to the following links (and also the links accessible from the referenced ones): http://support.microsoft.com/default.
High severity detections – malicious codes that copy and spread themselves, often unnoticed until the damage is done. Medium severity detections – such programs, in general, vary from positively serious to only potential threats to your privacy. Information severity detections – includes all detected potential threats that cannot be classified as any of the above categories. Use the roll-down menu to choose an action for each item: None - no action will be taken.
Remove all executable files - removes all executables. Remove all documents - removes all document files. Remove files with these comma separated extensions - fill the box with file extensions you wish to automatically remove. Separate the extensions with comma. Move filtered attachments into virus vault - check if you don't want the filtered attachments to be removed completely.
6. Anti-Spam Server for MS Exchange 6.1. Anti-Spam Principles Spam refers to unsolicited email, mostly advertising a product or service that is mass mailed to a huge number of email addresses at a time, filling recipients’ mail boxes. Spam does not refer to legitimate commercial email for which consumers have given their consent. Spam is not only annoying, but also can often be a source of scams, viruses or offensive content. Anti-Spam checks all incoming email messages and marks unwanted emails as SPAM.
6.3. Anti-Spam Settings 6.3.1. Settings In this dialog you can check the Turn on Anti-Spam protection checkbox to allow/forbid the anti-spam scanning of email communication. In this dialog you can also select more or less aggressive scoring measures. The Anti-Spam filter assigns each message a score (i.e. how similar the message content is to SPAM) based on several dynamic scanning techniques.
Modify subject for messages marked as spam - tick this check box if you would like all messages detected as spam to be marked with a specific word or character in the Email subject field; the desired text can be typed in the activated text field.
6.3.3. Whitelist The Whitelist item opens a dialog with a global list of approved sender email addresses and domain names whose messages will never be marked as spam. In the editing interface you can compile a list of senders that you are sure will never send you unwanted messages (spam). You can also compile a list of full domain names (e.g. avg.com), that you know do not generate spam messages.
6.3.4. Blacklist The Blacklist item opens a dialog with a global list of blocked sender email addresses and domain names whose messages will always be marked as spam. In the editing interface you can compile a list of senders that you expect to send you unwanted messages (spam). You can also compile a list of full domain names (e.g. spammingcompany.com), that you expect or receive spam messages from. All email from the listed addresses/domains will be identified as spam.
Spamcatcher (MailShell Inc.). Any inappropriate changes may result in bad performance or incorrect component functionality. If you still believe you need to change the Anti-Spam configuration at the very advanced level, please follow the instructions provided directly in the user interface.
7. FAQ and Technical Support Should you have any problems with your AVG, either business or technical, please refer to the FAQ section of the AVG website at http://www.avg.com. If you do not succeed in finding help this way, contact the technical support department by email. Please use the contact form accessible from the system menu via Help / Get help online.