Virus Protection - Unix Specific Instructions.
For most linux systems
(not Mac/OSX) we recommend CLAMAV as the primary scanner, it's
easy to install on most unix systems and gives a good broad
protection.
The settings below are an example, the auto configure button in
the web admin virus page should configure surgemail correctly but
you must manually install CLAMAV yourself first (See below)
For Mac/OSX use Avast (see instructions below)
CLAMAV Settings.
These will be set in surgemail.ini by the auto config button: (path
to clamdscan may vary)
g_virus_cmd "/bin/clamdscan --stdout --no-summary
--remove $FILE$"
g_virus_cmd_codes "1"
g_virus_strangers "true"
g_toscan_path "/tmp/toscan" (if using
SELINUX then move this elsewhere, it must be accessible by clamd and
mail users)
CLAMAV Installation
On most modern systems you can install clamav by typing:
Ubuntu:
sudo apt-get install clamav clamav-daemon
clamdscan
Fedora:
sudo yum install clamav clamav-scanner
Test you have installed it successfully:
/bin/clamdscan --stdout /etc/surgemail.ini
If this fails take steps to remedy it.
You may need to make minor changes to /etc/clamd.conf or create the
user account clamav...
That should be all you need to do, then use the auto configure
inside surgemail's virus page to set surgemails settings and test
it.
If you are using SELinux either disable it, or move the scanning
folder outside of /tmp to a newly created path, be sure to create
the path with full read access for clamd and owned by user 'mail'
mkdir /toscan
chown mail /toscan
chmod 0775 /toscan
(in surgemail) g_toscan_path "/toscan"
If that doesn't work check this page for Operating System Specific
packages for most versions of linux, or if all else fails you can
follow the build from source instructions:
https://www.clamav.net/documents/installing-clamav
Optional setting
You may also wish to use
our cloud based scanner to enhance clamav scanning.
g_virus_cloud "true"
Note that this setting sends samples of attachments from your
server to our cloud server for analysis, the samples are never
stored/kept after scanning. Only a subset of suspect high
risk messages are scanned this way. This setting should not
be used on large servers with more than 1000 users. For
large high volume servers you may consider it worthwhile to use a
third party scanner instead, see below.
MAC/OSX Avast Installation
1) Install free version of
avast for osx: https://www.avast.com/en-nz/free-mac-security
2) Make sure that in Preferences - Shields:
- Web shield is
disabled
- Mail shield is
disabled
- FileSystemShield
is enabled
In filesystem shield settings you can specify directories to NOT
scan. There is no specifying of directories to scan. Add any
directories you want to not scan making sure that surgemail's
scanning directory remains scanned. Surgemail uses /tmp/toscan
which osx translates to /private/tmp/toscan on recent version of
OSX.
Also make sure that:
- Preferences -
Shields - filesystem shield - settings : is set to "Move
infected files to chest"
- Preferences - Popups
- warnings : is set to OFF
- Preferences - Popups
- alerts : is set to OFF
3) Enable in surgemail using surgemail.ini:
g_virus_cmd "do_not_run"
Third party scanners for linux
You may wish to use the scanning avast linux scanner, there is an
additional license fee for this, use these settings:
g_virus_cmd "\bin\scan $FILE$"
g_virus_cmd_codes "1"
Download link: https://www.avast.com/linux-server-antivirus