Installation manual

11
5.1 Bi-directional email message scanning in MTA
Bi-directional email message scanning mode allows the user to scan inbound email messages as well as outbound, using the
same implementation algorithm. The bi-directional content filter method is MTA dependent. ESET Mail Security comes with five
content filters that are built for the most common MTA programs, such as MTA Sendmail, Postfix, Exim, QMail and ZMailer.
Check that your MTA is properly configured and running. Then, configure ESET Mail Security for bi-directional email message
scanning by running the following script:
/usr/sbin/esets_setup
Select MTA and content filter install options. The ESETS module being used is also displayed.
Note that the installer backs up all modified configuration files and can display every command that it will execute after your
approval. It can also be used for uninstalling. Detailed steps for all possible scenarios are described in appendix A of this
documentation.
5.2 Scanning of inbound email messages
Inbound email message scanning is performed during message transfer between MTA and MDA. Incoming emails are
intercepted by the
esets_m d a
module, scanned by the ESETS daemon and delivered to MAILBOX using the original MDA. As shown
in figure 5-1, virus scanning can be enabled by setting the proper configuration of MTA and the
esets_m d a
module. ESET Mail
Security supports most common MTA programs, such as MTA Sendmail, Postfix, Exim, QMail and ZMailer. ESETS supports any
MDA. In particular, the following MDAs were tested: procmail, maildrop, deliver and local.mail.
Check that your MTA is properly configured using the original MDA and that the MTA is running. Then configure ESET Mail
Security for inbound email message scanning by running the following script:
/usr/sbin/esets_setup
Select MDA and inbound install options. The ESETS module used is also displayed.
Note that the installer backs up all modified configuration files and can display every command that it will execute after your
approval. Also use it for uninstall. Detailed steps for all possible scenarios are described in the appendix A of this
documentation.
5.3 Scanning of outbound email messages
Outbound email message scanning is performed during transfer of email messages between the local MUA and the MTA.
Configure ESET Mail Security for outbound email message scanning by running the following script:
/usr/sbin/esets_setup
Select the SMTP install option. This will set the
esets_smtp
module to listen on a predefined port and redirect applicable IP
packets. Check the newly added firewall rule to see if any changes are necessary.
Note that the installer backs up all modified configuration files and can display every command that it will execute after your
approval. It can also be used for uninstalling. Detailed steps for all possible scenarios are described in appendix A of this
documentation.
5.4 Scanning of email messages downloaded from POP3/IMAP server
POP3/IMAP messages scanning is performed during message transfer between MAILBOX and MUA. All emails requested by
POP3/IMAP clients are intercepted by the
esets_p o p 3
(or
esets_im a p
) agent module and scanned by the ESETS daemon for
infiltrations. ESET Mail Security supports most common MUA programs, such as Microsoft Outlook, Evolution, Mozilla
Thunderbird and others. Note that there is restriction in ESET Mail Security functionality when emails downloaded by Mozilla
Thunderbird using IMAP communication protocol. An email in this case is requested and downloaded part by part and built
directly by Mozilla Thunderbird. For this reason it is not possible to write proper information about the infiltrations found into
the header and body of the email and thus the functionality is deactivated for this MUA.
To configure ESET Mail Security for scanning of email messages downloaded from POP3 or IMAP server, run the following
script:
/usr/sbin/esets_setup
Select the POP3 or IMAP install option. This will set the given ESETS module to listen on a predefined port and redirect
applicable IP packets. Check the newly added firewall rule to see if any changes are necessary.
Note that the installer backs up all modified configuration files and can display every command that it will execute after your