MailScanner: Buy The Book!

Julian Field mailscanner at ecs.soton.ac.uk
Wed Sep 15 08:49:23 IST 2004


<x-flowed>
At 02:57 15/09/2004, you wrote:
>Can I have the table of content of  the book. I can't find it in the above
>site.

Chapter
Introduction..........................................................................
7
A Brief History of
MailScanner....................................................................7
How MailScanner
Works..............................................................................7
2 Chapter
Planning the
Installation...................................................... 13
System Requirements
................................................................................13
Firewall and Network
Requirements.........................................................14
Installing Red Hat Enterprise
Linux..........................................................14
Installing the Message Transfer
Agent......................................................15
Installing sendmail
.....................................................................................15
Installing Exim
...........................................................................................15
Installing
Postfix.........................................................................................15
Installing MailScanner
...............................................................................15
Installing
SpamAssassin.............................................................................16
3 Chapter
MailScanner Configuration.................................................. 19
MailScanner
Files.......................................................................................19
Getting Started with MailScanner Configuration
.....................................20
Before you
start..........................................................................................20
MailScanner.conf
Parameters....................................................................21
General settings
.........................................................................................21
System
Settings..........................................................................................22
Incoming Work Dir
Settings.......................................................................23
Quarantine and Archive
Settings...............................................................24
Processing Incoming Mail
..........................................................................25
Virus Scanning and Vulnerability Testing
.................................................28
Options specific to Sophos
Anti-Virus........................................................31
Options specific to ClamAV Anti-Virus
......................................................32
Removing/Logging dangerous or potentially offensive content ...............32
Attachment Filename
Checking.................................................................35
4
Reports and
Responses..............................................................................
36
Changes to Message Headers
................................................................... 39
Notifications back to the senders of blocked messages
........................... 42
Changes to the Subject:
line...................................................................... 43
Changes to the Message
Body................................................................... 45
Mail Archiving and
Monitoring.................................................................. 46
Notices to System Administrators
............................................................. 46
Spam Detection and Virus Scanner Definitions
........................................ 47
Spam Detection and Spam Lists (DNS blocklists)
.................................... 48
SpamAssassin.............................................................................................
50
What to do with spam
................................................................................
53
Logging.......................................................................................................
56
Advanced SpamAssassin Settings
............................................................. 57
Advanced Settings
.....................................................................................
58
4 Chapter
SpamAssassin Configuration.............................................. 63
spam.assassin.prefs.conf
........................................................................... 64
SpamAssassin and DNS
.............................................................................
64
White and Black
Listing.............................................................................
64
Bayesian Filtering
......................................................................................
65
Network
Checks.........................................................................................
66
Adding SpamAssassin Rules
...................................................................... 67
Changing SpamAssassin Rule
Scores........................................................ 68
SpamAssassin SURBL
rules....................................................................... 68
5 Chapter
Advanced Configuration via Rulesets ................................. 71
Ruleset Formats
.........................................................................................
71
Direction.....................................................................................................
71
Pattern........................................................................................................
72
Result..........................................................................................................
73
6 Chapter
Related Applications
........................................................... 75
MailWatch for MailScanner
....................................................................... 75
MailScanner Webmin Module
................................................................... 76
Vispan.........................................................................................................
76
MailScanner-mrtg
......................................................................................
76
5
phplistadmin...............................................................................................77
Network Spam
Checks...............................................................................77
DCC.............................................................................................................77
Razor...........................................................................................................77
http://razor.sourceforge.net/......................................................................78
Pyzor
...........................................................................................................78
Tuning.........................................................................................................79
Trouble shooting
........................................................................................80
Getting Help
...............................................................................................80
AppendixA
Installing Red Hat Enterprise Linux.................................. 83
AppendixB
Installing Third Party Virus Scanners ............................... 85
AppendixC
Practical Ruleset Examples ............................................... 89
Spam Black
List..........................................................................................89
Only Sign Outgoing Messages
...................................................................89
Use Different Signatures for Different Domains
.......................................90
Only Virus Scan Some
Domains.................................................................90
Send System Administrator Notices to Several People
............................90
Scan for spam only from certain domains
.................................................91
Filename and Filetype Checking for Specified Domains
..........................92
AppendixD
Upgrading MailScanner (rpm Version)............................. 95
The
Upgrade...............................................................................................95
Upgrading Mailscanner.conf
.....................................................................95
Installing .rpmnew
files..............................................................................96

1 Training Introduction
....................................................................................................
101
2 Email Message Structure
..............................................................................................
105
3 The Mail Delivery
Process............................................................................................
111
4 MailScanner: What It
Does...........................................................................................
117
5 Detailed Analysis
..........................................................................................................
123
5.1 Child Processes
.....................................................................................................
129
5.2 Spam Checking
.....................................................................................................
135
5.3 Spam
Actions........................................................................................................
159
5.4 Attachment Extraction
..........................................................................................
171
5.5 Attachment Checks
...............................................................................................
181
5.6 Virus
Scanning......................................................................................................
203
5.7 HTML Checks
......................................................................................................
213
5.8 Quarantine & Modifying Messages
...................................................................... 223
5.9 Silent & Non-Forging Viruses
..............................................................................
245
100
5.10 Message
Responses...............................................................................................
253
5.11 Macro-virus Disinfection
......................................................................................
261
6 Administration
..............................................................................................................
269
7 Configuration
................................................................................................................
279
7.1
Rulesets.................................................................................................................
285
7.2 Custom Functions
.................................................................................................
297
7.3 Internationalisation &
Reports..............................................................................
305
7.4 Directory
Structure................................................................................................
309
7.5 Startup and
Shutdown...........................................................................................
315
8 Charity
Support.............................................................................................................
327

--
Julian Field
www.MailScanner.info
MailScanner thanks transtec Computers for their support

PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654

------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).
</x-flowed>



More information about the MailScanner mailing list