Installation instructions
GFI MailSecurity for Exchange/SMTP Contents iii
Configuring decompression filter actions ..................................................................... 84
Enable/disable decompression filters .......................................................................... 85
The Trojan & Executable Scanner 87
Introduction to the Trojan & Executable Scanner ........................................................ 87
What is a Trojan horse? ..................................................................................... 87
Difference between Trojans and viruses ............................................................ 87
How does the Trojan & Executable Scanner work?........................................... 87
Configuring the Trojan & Executable Scanner ............................................................. 88
Configuring the security level ............................................................................. 88
Configuring actions ............................................................................................ 89
Trojan & Executable Scanner updates ........................................................................ 89
Triggering the Trojan & Executable Scanner update manually ......................... 90
The Email Exploit Engine 91
Introduction to e-mail exploits ...................................................................................... 91
What is an exploit? ............................................................................................. 91
What is an e-mail exploit? .................................................................................. 91
Difference between Anti-Virus software & Email Exploit
Detection software ............................................................................................. 91
Configuring the Email Exploit Engine........................................................................... 91
Enable/Disable email exploits ............................................................................ 91
Configuring the Email Exploit Engine properties ................................................ 92
Email Exploit Engine updates ...................................................................................... 94
Triggering the Email Exploit Engine update manually ....................................... 94
The HTML Sanitizer 95
Introduction to the HTML Sanitizer .............................................................................. 95
Why remove HTML scripts? ............................................................................... 95
Configuring the HTML Sanitizer ................................................................................... 95
Patch Checking 97
Introduction to Patch Checking .................................................................................... 97
Downloading and installing software patches .............................................................. 97
Quarantine 99
Introduction to the Quarantine Store ............................................................................ 99
The Quarantine Store................................................................................................... 99
Searching for emails in the Quarantine Store .................................................. 100
Search Folders ........................................................................................................... 101
What is a search folder? .................................................................................. 101
Why are search folders useful? ........................................................................ 101
Grouping quarantined emails in Search Folders .............................................. 101
Changing Search Folder properties ................................................................. 105
Deleting Search Folders ................................................................................... 105
Approving emails from the Quarantine Store ............................................................. 105
Deleting emails from the Quarantine Store ................................................................ 106
Rescanning emails from the Quarantine Store .......................................................... 107
View the full security threat report of an email ........................................................... 108
Enable email approval via HTML approval forms ...................................................... 110
How to approve or delete quarantined emails from an email
client ................................................................................................................. 111
Quarantined mail from the user point of view ............................................................ 111
Enable quarantine RSS feeds .................................................................................... 112
What is RSS? ................................................................................................... 112
How does GFI MailSecurity use RSS? ............................................................ 112
How do I configure RSS on a quarantine folder?............................................. 113