Manual Kls
Manual Kls
Administrator's Guide
Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers
to most questions that may arise.
Attention! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to
this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal
reproduction or distribution of this document or parts hereof will result in civil, administrative, or criminal liability under
applicable law.
Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission
of Kaspersky Lab.
This document and related graphic images can be used exclusively for informational, non-commercial, or personal use.
This document may be amended without prior notice. You can find the latest version of this document on the Kaspersky
Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used herein the rights
to which are owned by third parties, or for any potential damages associated with the use of such documents.
http://www.kaspersky.com
http://support.kaspersky.com
2
TABLE OF CONTENTS
ABOUT THIS GUIDE .....................................................................................................................................................8
In this document .......................................................................................................................................................8
Document conventions ........................................................................................................................................... 11
3
ADMINISTRATOR'S GUIDE
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE ........... 48
About manual integration ........................................................................................................................................ 48
Manual Integration with Sendmail server ................................................................................................................ 49
Integration using the .mc file ............................................................................................................................. 50
Integration using the .cf file ............................................................................................................................... 51
Manual Integration with Exim mail server ............................................................................................................... 52
After-queue integration by rerouting .................................................................................................................. 52
Before-queue integration using dynamic linking................................................................................................ 55
Manual Integration with qmail server ...................................................................................................................... 58
Manual integration with a Postfix mail server.......................................................................................................... 59
After-queue integration ..................................................................................................................................... 59
Before-queue integration .................................................................................................................................. 61
Integration using the Milter protocol .................................................................................................................. 63
Manual integration with the Amavis interface ......................................................................................................... 64
Integration by means of user scripts ....................................................................................................................... 65
Types of user scripts ......................................................................................................................................... 66
General requirements for user scripts ............................................................................................................... 66
Searchemail script ............................................................................................................................................ 67
Searchusers script ............................................................................................................................................ 67
Getuseraccount script ....................................................................................................................................... 68
Login script........................................................................................................................................................ 68
4
TABLE OF CONTENTS
5
ADMINISTRATOR'S GUIDE
INTEGRATING THE APPLICATION WITH AN EXTERNAL USER SERVICE USING THE LDAP PROTOCOL ....... 121
About integration with an external user service via LDAP .................................................................................... 121
Configuring the application connection to an external user service using LDAP .................................................. 121
Checking the server connection using LDAP........................................................................................................ 123
Adding senders / recipients from an external user service to rules ....................................................................... 123
Adding personal black and white lists of addresses ............................................................................................. 124
Setting up integration with the custom directory service ....................................................................................... 125
Managing untrusted certificates ............................................................................................................................ 126
6
TABLE OF CONTENTS
7
ABOUT THIS GUIDE
This document is the Administrator's Guide to installing, configuring, and using the Kaspersky Security 8.0 for Linux®
Mail Server (hereinafter also "Kaspersky Security"). This document is intended for application administrators. The Guide
is intended for technical specialists who carry out the installation and administration of Kaspersky Security and provide
support for organizations that use Kaspersky Security.
Provide readily available information on issues related to the operation of Kaspersky Security.
Describe additional sources of information about the application and ways of receiving technical support.
IN THIS SECTION
IN THIS DOCUMENT
This document includes the following sections:
This section describes sources of information about the application and lists websites that you can use to discuss the
application's operation.
Kaspersky Security 8.0 for Linux Mail Server (on page 14)
This section contains information on the purpose, key features, and composition of the application. It shows the function
of each part of the package supplied and a range of services available to registered users of the application. This section
contains hardware and software requirements which the computer must meet for the installation of Kaspersky Security.
This section describes Kaspersky Security and the logic of their interaction.
This section contains step-by-step instructions for application installation and removal.
Manual integration of Kaspersky Security with mail servers and Amavis interface (see page 48)
This section contains information about how to manually integrate Kaspersky Security for Linux Mail Server with Exim,
Postfix, Sendmail, qmail, and Amavis.
8
ABOUT THIS GUIDE
This section provides information about general terms related to the application activation. Read this section to learn
more about the purpose of the License Agreement, ways of activating the application, and license renewal.
This section describes how you can start and stop the application.
This section contains information about how to check the level of protection of the mail server and related problems.
This section contains a description of the basic concepts and principles of using the application, and information about
how to configure it.
This section contains information about Anti-Spam protection of messages and how to configure it.
This section contains information about Anti-Virus protection of messages and how to configure it.
This section contains information about Anti-Phishing protection of messages and how to configure it.
This section contains information about content filtering of messages and how to configure it.
This section contains information on how to configure additional settings for the application.
Integration with an external user service via LDAP (see page 121)
This section contains information about how to integrate Kaspersky Security with an external user service using the
LDAP protocol.
This section contains information about how to use Kaspersky Linux Mail Security via the SNMP protocol and configure
runtime trap events.
This section describes how you can manage accounts of company employees and configure their settings.
9
ADMINISTRATOR'S GUIDE
This section contains information about Backup and how to use it.
This section contains information about mail notifications and how to configure them.
This section contains information about reports and statistics on the operation of the application.
This section contains information about the Event log and how to configure it.
This section contains information about the Trace log and how to configure it.
This section provides information about how to ensure that the application detects viruses and their modifications and
performs the correct actions on them.
Administering the application through Kaspersky Security Center (see page 158)
This section describes how you can manage Kaspersky Security 8.0 for Linux Mail Server through Kaspersky Security
Center.
This section provides information about how to obtain technical support and the requirements for receiving help from
Technical Support.
This section provides information about the third-party code used in the application.
Trademark notices
This section lists trademarks of third-party manufacturers that were used in the document.
Index
This section allows you to quickly find required information within the document.
10
ABOUT THIS GUIDE
DOCUMENT CONVENTIONS
The document text is accompanied by semantic elements to which we recommend paying particular attention: warnings,
hints, and examples.
Document conventions are used to highlight semantic elements. Document conventions and examples of their use are
shown in the table below.
Example: Examples are given on a yellow background under the heading "Example".
...
Update means... The following semantic elements are italicized in the text:
The Databases are out of date event new terms;
occurs.
names of application statuses and events.
Press ENTER. Names of keyboard keys appear in bold and are capitalized.
Press ALT+F4. Names of keys that are connected by a + (plus) sign indicate the use of a key
combination. Those keys must be pressed simultaneously.
Click the Enable button. Names of application interface elements, such as entry fields, menu items, and
buttons, are set off in bold.
To configure a task schedule: Introductory phrases of instructions are italicized and are accompanied by the
arrow sign.
In the command line, type help. The following types of text content are set off with a special font:
The following message then appears: text in the command line;
Specify the date in dd:mm:yy text of messages that the application displays on screen;
format.
data that the user must enter.
<User name> Variables are enclosed in angle brackets. Instead of a variable, the
corresponding value should be inserted, with angle brackets omitted.
11
SOURCES OF INFORMATION ABOUT THE
APPLICATION
This section describes sources of information about the application and lists websites that you can use to discuss the
application's operation.
You can select the most suitable information source, depending on the issue's level of importance and urgency.
IN THIS SECTION
online help;
documentation.
If you cannot find a solution for your issue, we recommend that you contact Kaspersky Lab Technical Support (see the
section "Technical support by phone" on page 162).
To use information sources on the Kaspersky Lab website, an Internet connection should be established.
The Kaspersky Lab website features an individual page for each application.
On the page (http://www.kaspersky.com/linux-mail-security), you can view general information about the application, its
functions and features.
The http://www.kaspersky.com web page contains a link to a section describing the product and how to obtain a license
or extend an existing one.
The application's Knowledge Base page at the Technical Support Service website
Knowledge Base is a section on the Technical Support website that provides advice on using Kaspersky Lab
applications. The Knowledge Base comprises reference articles grouped by topics.
On the page of the application in the Knowledge Base (http://support.kaspersky.com/klms8), you can read articles that
provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install,
and use the application.
12
SOURCES OF INFORMATION ABOUT THE APPLICATION
Articles may provide answers to questions that are out of scope of Kaspersky Linux Mail Security, being related to other
Kaspersky Lab applications. They also may contain news from the Technical Support Service.
Help provides information on managing protection, configuring the application, and performing common user tasks using
the web-interface of Kaspersky Security 8.0 for Linux Mail Server (hereinafter the "web interface").
Documentation
The distribution kit includes documents that help you to install and activate the application on the computers of a local
area network, configure its settings, and find information about the basic techniques for using the application.
To connect Kaspersky Security manual pages under the Linux operating system,
MANPATH /opt/kaspersky/klms/share/man
To connect Kaspersky Security manual pages under the FreeBSD™ operating system,
add the following string to the /etc/manpath.config (or man.conf) configuration file:
MANDATORY_MANPATH /usr/local/man
In this forum you can view existing topics, leave your comments, create new topics.
13
KASPERSKY SECURITY 8.0 FOR LINUX
MAIL SERVER
Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 protects incoming and outgoing email messages (or
"messages") against malware, spam and phishing, and provides content filtering. Kaspersky Security runs under Linux
and FreeBSD operating systems, and can be used on high-load mail servers.
Detecting objects that are infected, probably infected, password-protected, or inaccessible for scanning.
Neutralizing the threats revealed in files and mail messages; disinfecting objects.
Saving Backup copies of messages before Anti-Virus scanning and filtering in Backup; saving messages from
Backup to a file on the hard drive and delivering messages from Backup to recipients.
Processing mail in accordance with the rules defined for existing groups of senders and recipients.
Notifying the sender, recipients, and administrator of detected messages containing objects that are infected,
probably infected, password-protected, or inaccessible for scanning.
Updating the application databases (Anti-Virus, Anti-Spam, and Anti-Phishing databases) from the update
servers of Kaspersky Lab according to schedule or on demand.
Getting application runtime info and statistics via SNMP as well as enabling / disabling event traps.
Configuring the settings and managing the application using the standard tools of the operating system from the
command line or using a web-based interface.
All commands and paths in the document are specified for the Linux operating system. Information about application file
locations on computers with the FreeBSD operating system is available in the "Application file locations on a computer
running FreeBSD section (see page 166)".
If you copy any code strings from the Guide to the mail server configuration file, be sure to delete the backslashes (\) and
their trailing LFs.
IN THIS SECTION
Distribution kit.................................................................................................................................................................. 16
14
KASPERSKY SECURITY 8.0 FOR LINUX MAIL SERVER
Intel® Xeon® 3040 or Intel Core™ 2 Duo 1.86 GHz or faster processor;
2 GB RAM;
4 GB available on the hard drive to install application and store temporary and log files.
Software requirements:
CentOS-6.4.
FreeBSD 8.4.
FreeBSD 9.1.
Canaima 3.0.
CentOS-6.4.
FreeBSD 8.4.
15
ADMINISTRATOR'S GUIDE
FreeBSD 9.1.
Canaima 3.0.
Kaspersky Security requires the Perl 5 programming language of version 5.8.5 or later.
exim-4.71 or later;
postfix-2.5 or later;
qmail-1.03;
sendmail-8.14 or later.
To run the Kaspersky Security web interface, one of the following browsers must be installed on the computer:
To enable the operation of the Kaspersky Security web interface, an Apache web server must be installed on the
computer hosting the web interface.
DISTRIBUTION KIT
You can purchase the application through Kaspersky Lab's online stores (for example, http://www.kaspersky.com, in the
Online Shop section) or partner companies.
The content of the distribution kit may differ depending on the region, in which the application is distributed.
If Kaspersky Security is purchased through an online store, the application is copied from the store's website. Information
required to activate the application is sent to you by email after payment.
For more details on ways of purchasing and the distribution kit, contact the Sales Department by the
sales@kaspersky.com.
16
APPLICATION ARCHITECTURE
This section describes Kaspersky Security and the logic of their interaction.
IN THIS SECTION
MAIN COMPONENTS
Kaspersky Security includes the following components:
Filter – receives and forwards mail messages to/from the application's mail server. Kaspersky Security includes
several filters used in accordance with the mail server and the type of integration with Kaspersky Security:
Milter.
Smtp-proxy.
Dlfunc.
Qmail-queue binary.
Klms-watchdog – the main component for processing mail messages. It consists of the following modules:
Scan Logic is a module that controls message scanning (hereinafter also "Scan Logic module"). It includes
a MIME parser and content filter.
AP-engine – scans messages for phishing threats (hereinafter "the Anti-Phishing engine").
Settings-manager – stores task and rule settings for processing messages in the database; exports and
imports these settings and notifies other modules of any changes.
Facade – allows the application to interface with utilities and administration systems.
17
ADMINISTRATOR'S GUIDE
Klms-postgres – a database storing application settings, statistics for reports, and metadata of objects in
Backup. Metadata of objects in backup may be stored in a database that is stored externally (outside the
application).
Klms-control– a utility used to set application settings (task settings and message processing rules (see section
"About message processing rules" on page 76)), view runtime statistics, manage Backup, and run tasks.
OPERATION ALGORITHM
The application runs according to the following algorithm:
1. The filter receives a message from the mail server and forwards it to the Scan Logic module.
2. The Scan Logic message scanning control module determines the rule by which the application will process the
email message (see section "About message processing rules" on page 76).
3. The application scans the message in accordance with the settings for the rule. If all scans are set to run in
accordance with the rule settings, the application performs them in the following order:
a. Anti-Spam scan;
b. Anti-Virus scan (see section "About Anti-Virus email protection" on page 92);
c. Anti-Phishing scan (see section "About Anti-Phishing email protection" on page 101);
d. content filtering (see section "About content filtering of messages" on page 105).
4. Based on the results of message scanning, Scan Logic adds a status tag at the beginning of the message
subject (Subject field) and adds an information X-header (see section "About information X-headers" on
page 83) to the message header.
5. After completing all scans, depending on the message status (see section "About scan and content filtering
statuses" on page 75) the application takes the action (see section "About actions on objects" on page 80)
configured in the message processing rule settings on the message. Infected objects are treated by default, and
cured if possible.
6. After scanning and processing, Scan Logic forwards the message to the filter.
7. The filter forwards the processed message with notifications on the scan and disinfection results to the mail
server.
8. The mail server delivers the message to local users or routes it to other mail servers.
18
INSTALLING AND REMOVING THE
APPLICATION
This section contains step-by-step instructions for application installation and removal.
IN THIS SECTION
PREPARING TO INSTALL
Before you install Kaspersky Security:
make sure that your computer meets hardware and software requirements (see section "Hardware and software
requirements" on page 15);
download the Kaspersky Security installation package in .tgz, .deb, or .rpm format from the website of the online
store to your computer (see section "Distribution kit" on page 16);
install the glibc package (64-bit operating systems require the 32-bit version of glibc).
Before installing Kaspersky Security on a computer running the Debian or Ubuntu operating system, you need to execute
the following command: # locale-gen en_US.UTF-8.
The installation package for the Kaspersky Security web interface is required only if you want to manage the application
through the browser.
make sure that your computer meets the hardware and software requirements;
download the installation package for the Kaspersky Security web interface in .deb or .rpm format from the
Online Shop (the installation package for the web interface is required only if you want to manage the
application through the browser);
19
ADMINISTRATOR'S GUIDE
install the following Apache modules: mod_ssl, mod_include, mod_dir, mod_expires (if not already installed)
and enable them using the command: # a2enmod (if not already enabled):
# a2enmod ssl
# a2enmod include
# a2enmod dir
# a2enmod expires
For the localization packages to work correctly, the system has to support the corresponding languages.
For example, if you need to install the Russian localization package klms-l10n-ru_<version_number>_i386.deb
under Debian GNU/Linux 6.0, make sure that the system supports the Russian language before installing it.
To do so, execute the following command that shows the list of languages supported by the system:
# locale -a
# dpkg-reconfigure locales
Follow the same steps for the Chinese language or any other localization.
1. Installing the Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 package (see section "Installing
Kaspersky Security on top of the previous version" on page 21) on top the Kaspersky Security 8.0 for Linux Mail
Server Critical Fix 1 package.
2. Updating Kaspersky Security settings (see page 22) using the application settings update script.
3. Installing the Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 web interface package (see
section "Installing the Kaspersky Security web interface on top of the previous version" on page 22) on top of
the Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1 web interface package.
Steps 1 and 3 can be performed simultaneously if Kaspersky Security and the application web interface are
installed on the same mail server.
4. Updating Kaspersky Security web interface settings (see page 23) using the application web interface settings
update script.
5. Installing Kaspersky Security language packages (see section "Preparing to install" on page 19) over the
language packages of the previous application version.
After Kaspersky Security is upgraded, the threat detection statistics, reports, and objects in Backup and Anti-Spam
Quarantine are preserved.
20
INSTALLING AND REMOVING THE APPLICATION
If Kaspersky Security localization packages were installed for the previous version of the application, it is required to
delete localization packages prior to upgrading by executing the following command:
# rpm -e klms_<localization>
IN THIS SECTION
Installing the Kaspersky Security web interface on top of the previous version .............................................................. 22
Installing Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 on a computer running
under the Linux operating system
To install Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 from an RPM package, execute the
following command:
To install Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 from a DEB package on a 32-bit
operating system, execute the following command:
# dpkg -i klms_<version_number>_i386.deb
To install Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 from a DEB package on a 64-bit
operating system, execute the following command:
Installing Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 on a computer running
under the FreeBSD operating system
Prior to installing Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 on a computer running under the
FreeBSD operating system, remove the previous version of Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1.
To remove the previous version of Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1, execute the following
command:
# pkg_delete klms_<version_number>
Do not run the klms-cleanup script after removing the previous version of Kaspersky Security 8.0 for Linux Mail
Server Critical Fix 1, as doing so will erase information about the configured application settings.
21
ADMINISTRATOR'S GUIDE
To install Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1, execute the following command:
# pkg_add klms_<version_number>.tgz
After installing Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1, run the Kaspersky Security settings
update script (see section "Updating Kaspersky Security settings" on page 22).
The configured application settings and mail server integration settings are preserved on computers running under the
Linux operating system after Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1 is upgraded to Kaspersky
Security 8.0 for Linux Mail Server Maintenance Pack 1. You have to update the Kaspersky Security settings in order to
apply the values of settings that have been added or modified in Kaspersky Security 8.0 for Linux Mail Server
Maintenance Pack 1.
The application has to be integrated with the mail server again manually or automatically on computers running under the
FreeBSD operating system after Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1 is upgraded to Kaspersky
Security 8.0 for Linux Mail Server Maintenance Pack 1.
To run the Kaspersky Security settings update script, execute the following command:
under Linux:
# /opt/kaspersky/klms/bin/klms-upgrade.pl
under FreeBSD:
# /usr/local/bin/klms-upgrade.pl
The script will prompt you to specify the values of Kaspersky Security settings one step at a time.
When upgrading Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1 to Kaspersky Security 8.0 for Linux Mail
Server Maintenance Pack 1, automatic update of application settings via the auto-reply file is not possible.
Installing the Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 web interface on a
computer running under the Linux operating system
To install the Kaspersky Security web interface from an RPM package on a 32-bit operating system, execute the
following command:
# rpm -U klmsui-<version_number>.i386.rpm
22
INSTALLING AND REMOVING THE APPLICATION
To install the Kaspersky Security web interface from an RPM package on a 64-bit operating system, execute the
following command:
# rpm -U klmsui-<version_number>.x86_64.rpm
To install the Kaspersky Security web interface from a DEB package on a 32-bit operating system, execute the
following command:
# dpkg -i klmsui_<version_number>_i386.deb
To install the Kaspersky Security web interface from a DEB package on a 64-bit operating system, execute the
following command:
# dpkg -i klmsui_<version_number>_amd64.deb
After the command is executed, the application web interface is installed automatically.
Installing the Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 web interface on a
computer running under the FreeBSD operating system
Prior to installing the Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 web interface on a computer
running under the FreeBSD operating system, remove the Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1 web
interface.
To remove the Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1 web interface, execute the following
command:
# pkg_delete klmsui-<version_number>
To install the Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 web interface, execute the following
command:
# pkg_add klmsui-<version_number>.tgz
After the command is executed, the application web interface is installed automatically.
After installing the Kaspersky Security 8.0 for Linux Mail Server Maintenance Pack 1 web interface, run the Kaspersky
Security web interface settings update script (see section "Updating Kaspersky Security web interface settings" on
page 23).
To run the Kaspersky Security web interface settings update script, execute the following command:
under Linux:
# /opt/kaspersky/klmsui/bin/klmsui-upgrade.pl
under FreeBSD:
# /usr/local/bin/klmsui-upgrade.pl
When updating web interface of Kaspersky Security 8.0 for Linux Mail Server Critical Fix 1 to Kaspersky Security 8.0 for
Linux Mail Server Maintenance Pack 1, automatic update of application settings via the auto-reply file is not possible.
23
ADMINISTRATOR'S GUIDE
1. Installing the Kaspersky Security package (see section "Step 1. Installing the Kaspersky Security package" on
page 24).
You must have root privileges to initiate installation of the Kaspersky Security package.
2. Installing the Kaspersky Security web interface package (see section "Step 2. Installing the Kaspersky Security
web interface package" on page 24).
Installation of this package is required only if you want to manage the application through the browser.
3. Installing localization packages. Installation packages must be installed prior to running initial application
configuration scripts of Kaspersky Security. Only in this case will you be able to read the License Agreement
and the Kaspersky Security Network Statement in the right language.
IN THIS SECTION
To install Kaspersky Security from an .rpm package, execute the following command:
# rpm -i klms-<version_number>.i386.rpm
To install Kaspersky Security from a .deb package on a 32-bit operating system, execute the following command:
# dpkg -i klms_<version_number>_i386.deb
To install Kaspersky Security from a .deb package on a 64-bit operating system, execute the following command:
After Kaspersky Security has been installed, run the Kaspersky Security initial configuration script (see section
"Preparing Kaspersky Security for operation" on page 26).
To install the web interface from a .deb package on a 32-bit operating system, execute the following command:
# rpm -i klmsui-<version_number>.i386.rpm
24
INSTALLING AND REMOVING THE APPLICATION
To install the web interface from a .deb package on a 64-bit operating system, execute the following command:
# rpm -i klmsui-<version_number>.x86_64.rpm
To install the web interface from a .deb package on a 32-bit operating system, execute the following command:
# dpkg -i klmsui_<version_number>_i386.deb
To install the web interface from a .deb package on a 64-bit operating system, execute the following command:
# dpkg -i klmsui_<version_number>_amd64.deb
To install the web interface on a computer running under the FreeBSD operating system, execute the following
command:
# pkg_add klmsui-<version_number>.tgz
After the Kaspersky Security web interface has been installed, run the Kaspersky Security web interface initial
configuration script (see section "Preparing Kaspersky Security web interface for operation" on page 39).
The Kaspersky Security web interface can be installed from a .deb or .rpm package.
To install the web interface from a .deb package on a 32-bit operating system, execute the following command:
# rpm -i klmsui-<version_number>.i386.rpm
To install the web interface from a .deb package on a 64-bit operating system, execute the following command:
# rpm -i klmsui-<version_number>.x86_64.rpm
To install the web interface from a .deb package on a 32-bit operating system, execute the following command:
# dpkg -i klmsui_<version_number>_i386.deb
To install the web interface from a .deb package on a 64-bit operating system, execute the following command:
# dpkg -i klmsui_<version_number>_amd64.deb
To install the web interface on a computer running under the FreeBSD operating system, execute the following
command:
# pkg_add klmsui-<version_number>.tgz
To configure the Facade module that enables the application to interact with utilities and administration systems:
1. Export the Facade task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
25
ADMINISTRATOR'S GUIDE
3. In the <port> </port> section, specify the port for interaction with the web interface.
6. Import the Facade task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
or
# /opt/kaspersky/klms/bin/klms-control \
2. Specify the IP address of the mail server and the port of the Facade module in the line
FastCgiExternalServer /opt/kaspersky/klmsui/share/htdocs/cgi-bin/klwi -host
127.0.0.1:2711.
After the Kaspersky Security web interface has been installed, run the Kaspersky Security web interface initial
configuration script (see section "Preparing Kaspersky Security web interface for operation" on page 39).
Kaspersky Security initial configuration consists of a series of steps in the form of a script for the user's convenience.
The initial configuration script should be started after Kaspersky Security has been installed. The initial configuration
script for Kaspersky Security is included in the installation package.
To run the Kaspersky Security initial configuration script, execute the following command:
under Linux:
# /opt/kaspersky/klms/bin/klms-setup.pl
under FreeBSD:
# /usr/local/bin/klms-setup.pl
26
INSTALLING AND REMOVING THE APPLICATION
IN THIS SECTION
Step 1. Selecting the language for viewing the License Agreement and the Kaspersky Security Network Statement .... 27
Step 8. Selecting the TCP port for interaction with the Apache module .......................................................................... 30
Step 10. Selecting the type of integration with the mail server ........................................................................................ 31
Language selection is available if additional localization packages are installed in the system. If no additional localization
packages have been installed, the text of the License Agreement and the Kaspersky Security Network Statement are
displayed in the English language.
1. Press ENTER.
The text of the License Agreement is displayed. To move through the text, use the cursor control keys or the B
and F keys (to move backward or forward one screen, respectively). To view help, press the H key.
27
ADMINISTRATOR'S GUIDE
4. Press ENTER.
You can also view the text of the License Agreement by opening the relevant file. The file with the text of the End User
License Agreement is located at the following path:
for the application installed on a computer running under Linux: /opt/kaspersky/klms/share/doc/LICENSE, for the
web interface: /opt/kaspersky/klmsui/share/doc/LICENSE;
for the application installed on a computer running under FreeBSD: /usr/local/share/doc/klms/LICENSE, for the
web interface: /opt/kaspersky/klmsui/share/doc/LICENSE.
Kaspersky Security Network (KSN) is an infrastructure of online services that provides access to the online Kaspersky
Lab Knowledge Base, which contains information about the reputation of files, web resources, and software. Data from
Kaspersky Security Network ensures faster response by Kaspersky Security to new threats, improves the performance of
some protection components, and reduces the risk of false positives.
Thanks to users who participate in Kaspersky Security Network, Kaspersky Lab is able to promptly gather information about
types and sources of new threats, develop solutions for neutralizing them, and minimize the number of false positives.
Participation in Kaspersky Security Network also lets you access reputation statistics for applications and websites.
When you participate in the Kaspersky Security Network, certain statistics collected while Kaspersky Linux Mail Security
protects your computer are sent to Kaspersky Lab automatically.
Participation in Kaspersky Security Network is voluntary. You are prompted to decide during initial configuration of
Kaspersky Security, but you can change your decision at any time later.
1. Press ENTER.
The text of the agreement is displayed. To move through the text, use the cursor control keys or the B and F
keys (to move backward or forward one screen, respectively). To view help, press the H key.
To accept the terms of the Kaspersky Security Network Statement, type yes (or y).
To reject the terms of the Kaspersky Security Network Statement, type no (or n).
4. Press ENTER.
Port 443 (TCP) must be open to enable data exchange with KSN.
28
INSTALLING AND REMOVING THE APPLICATION
You can also view the text of the Kaspersky Security Network Statement straight from the file. The file with the text of the
Kaspersky Security Network Statement is located at the following path:
1. Specify the full path to the directory for storing the backup copies of mail messages.
2. Press ENTER.
press ENTER.
You can use an external database as Backup. Kaspersky Security supports PostgreSQL databases of version 9.1 or later.
2. Press ENTER.
press ENTER.
1. Specify the IP address and port number or the UNIX socket that Scan Logic will use to listen for incoming
connections as follows: inet:<port>@<IP address>(for network sockets) or unix:<path to UNIX
socket> (for UNIX sockets).
2. Press ENTER.
29
ADMINISTRATOR'S GUIDE
At this step, you can specify the number of the TCP port to be used by Kaspersky Security for interaction with the web
interface.
If you do not specify a password for access to the web interface at this step, you can do so later using the utility
/opt/kaspersky/klms/bin/klms-control --set-web-admin-password.
To enter a password for access to the web-interface, perform the following steps:
1. Enter yes.
2. Press ENTER.
The password must contain at least eight characters and meet at least three of the following four requirements:
5. Press ENTER.
30
INSTALLING AND REMOVING THE APPLICATION
# /opt/kaspersky/klms/bin/klms-setup.pl
After that you need to select the type of integration of Kaspersky Security with the mail server: automatic or manual.
Exim.
Postfix.
Sendmail
qmail.
1. Enter the number specified next to the name of the mail server.
2. Press ENTER.
3. Depending on which server you selected at step 1 of the instructions, perform the actions described in the
sections that follow:
If you choose not to integrate the application with the mail server at this step automatically, you can perform manual
integration later (see section "Manual integration of Kaspersky Security with mail servers and Amavis interface" on
page 48).
2. Press ENTER.
IN THIS SECTION
31
ADMINISTRATOR'S GUIDE
If the initial configuration script cannot find the path to the directory containing the qmail executable file during
installation, perform the following instructions.
To specify the path to the directory containing the qmail executable file:
1. Specify the full path to the directory containing the qmail executable file.
2. Press ENTER.
If the initial configuration script cannot find the standard qmailq user account during installation, specify the user
account with the rights to start the qmail service.
1. Specify the user account with the rights to start the qmail service.
2. Press ENTER.
If you want changes to be made to the .mc file and then use that file to create the .cf file during integration,
enter 1.
If you want changes to be made to the .cf configuration file during integration, enter 2.
2. Press ENTER.
3. Specify the IP address and port number or the UNIX socket that the filter will use to listen for incoming
connections as follows: inet:<port>@<IP address> (for network sockets) or unix:<path to UNIX
socket> (for UNIX sockets).
4. Press ENTER.
5. Select the action that the Sendmail server must take on the message in case of filter error:
If you want Sendmail to accept the message without scanning, enter 2 to select the accept option.
If you want Sendmail to reject the message, enter 1 to select the reject option.
If you want Sendmail to notify the sender of the temporary inability to accept the message, enter 3 to select
the tempfail option.
6. Press ENTER.
32
INSTALLING AND REMOVING THE APPLICATION
If you want to perform a before-queue integration of Kaspersky Security with Exim using dynamic linking
(dlfunc), enter 1.
Make sure that Exim supports dlfunc-based content filtering. To do so, run the exim -bV command. The
following represents a positive result: Expand_dlfunc.
If you want to perform after-queue integration of Kaspersky Security with Exim via SMTP by rerouting, enter 2.
2. Press ENTER.
a. Specify the port number where the smtp_proxy filter will listen for messages from the mail server.
b. Press ENTER.
c. Specify the port number where the message will go after being scanned.
d. Press ENTER.
2. Press ENTER.
3. Specify the IP address and port number or UNIX socket that the smtp_proxy filter will use to listen for messages
from the mail server as follows: inet:<port>@<IP address>(for network sockets) or unix:<path to
UNIX-socket> (for UNIX sockets).
If you selected the first option at step 1, the default UNIX socket is unix.
If you selected the second option at step 1, only network socket is available in the following format
inet:<port>@<IP address>. The default socket is inet:10025@127.0.0.1.
If you selected the third option at step 1, the default UNIX socket is
unix:/var/run/klms/klms_milter_sock.
33
ADMINISTRATOR'S GUIDE
4. Press ENTER.
5. If you entered 2 at step 1, specify the port number to which the message will be forwarded after being scanned.
6. Press ENTER.
7. If you entered 3 at step 1, select the action that Postfix must take on the message in case of filter error:
If you want Postfix to accept the message without scanning, enter 2 to select the accept option.
If you want Postfix to reject the message, enter 1 to select the reject option.
If you want Postfix to notify the sender of the temporary inability to accept the message, enter 3 to select
the tempfail option.
8. Press ENTER.
If you do not use a proxy server to connect to the Internet, press ENTER.
You will be prompted to specify the IP address and port of the proxy server.
enter the proxy server address in the IP_address_of_proxy_server:port format and press Enter.
You will be prompted to choose whether or not authentication is required upon connecting to the proxy server:
2. Enter the password for accessing the proxy server and press Enter.
34
INSTALLING AND REMOVING THE APPLICATION
2. Press ENTER.
2. Press ENTER.
The database update schedule is configured by default, with databases updated once every 5 minutes.
A file with saved answers can be created using the --create-auto-install=<full path to the
configuration file> parameter when executing the initial application configuration script.
To start initial configuration of Kaspersky Security in automatic mode, execute the following command:
under Linux:
/opt/kaspersky/klms/bin/klms-setup.pl \
under FreeBSD:
/usr/local/bin/klms-setup.pl \
The settings of the configuration file with answers are given in the following table.
35
ADMINISTRATOR'S GUIDE
36
INSTALLING AND REMOVING THE APPLICATION
EXIM_INTEGRATION_TYPE The setting is required if the MTA value is equal to dlfunc | afterqueue
"exim".
Type of integration with the Exim mail server.
If the line with this setting is skipped, the setting
takes the value "dlfunc" (if the Exim version has
been compiled with support of dynamic linking).
The setting is ignored if the value of the MTA
setting is not equal to "exim".
EXIM_FORWARD_PORT Optional setting. <port>
TCP port for forwarding scanned messages in the
case of integration with the Exim mail server.
If the line with this setting is skipped, the setting
takes the value "10026".
The setting is ignored if the value of the MTA
setting is not equal to "exim".
37
ADMINISTRATOR'S GUIDE
38
INSTALLING AND REMOVING THE APPLICATION
Initial configuration of the Kaspersky Security web interface consists of a series of steps in the form of a script for the
user's convenience. The initial configuration script should be started after the Kaspersky Security web interface has been
installed. The initial configuration script for the Kaspersky Security web interface is included in the installation package.
To run the initial configuration script for the Kaspersky Security web interface, execute the following command:
under Linux:
# /opt/kaspersky/klmsui/bin/klmsui-setup.pl
under FreeBSD:
# /usr/local/bin/klmsui-setup.pl
39
ADMINISTRATOR'S GUIDE
The Administrator account is used for access to the Kaspersky Security web-interface. The password for this
account is defined during initial configuration of Kaspersky Security (see section "Step 9. Assigning a password to
access the web interface" on page 30).
IN THIS SECTION
Starting automatic initial configuration of the web interface of Kaspersky Security ......................................................... 43
Language selection is available if you have installed at least one additional localization package. If no additional
localization packages have been installed, the text of the License Agreement is displayed in the English language.
1. Press ENTER.
The text of the License Agreement is displayed. To move through the text, use the cursor control keys or the B
and F keys (to move backward or forward one screen, respectively). To view help, press the H key.
4. Press ENTER.
You can also view the text of the License Agreement by opening the relevant file. The file with the text of the End User
License Agreement is located at the following path:
for the application installed on a computer running under Linux: /opt/kaspersky/klms/share/doc/LICENSE, for the
web interface: /opt/kaspersky/klmsui/share/doc/LICENSE;
for the application installed on a computer running under FreeBSD: /usr/local/share/doc/klms/LICENSE, for the
web interface: /opt/kaspersky/klmsui/share/doc/LICENSE.
40
INSTALLING AND REMOVING THE APPLICATION
# a2enmod ssl
# a2enmod include
# a2enmod dir
# a2enmod expires
At this step, you can specify the Apache web server to be used by Kaspersky Security.
The initial configuration script for the application web interface automatically determines the location of the configuration
and executable files of the Apache service and displays information about the Apache web server that is located.
If the initial configuration script for the application web interface correctly identified the location of the configuration and
executable files of the Apache server, you need to confirm it.
If the initial configuration script for the web interface did not correctly locate the configuration and executable files for the
Apache service, or if you do not want to use the selected Apache web server, you need to manually specify the location
of the Apache service files of the Apache web server that you want to use.
2. Press ENTER.
2. Press ENTER.
4. Press ENTER.
6. Press ENTER.
8. Press ENTER.
If the Apache server virtual host is defined by its name, enter name.
If the Apache server virtual host is defined by its port number, enter port.
41
ADMINISTRATOR'S GUIDE
If the Apache server virtual host is defined by its directory, enter dir.
When using the Apache web server virtual host defined by its directory, Kaspersky Security uses the
connection settings specified in the Apache configuration file. An insecure HTTP connection is established
by default. You can manually configure the Apache web server virtual host to use an encrypted SSL
connection.
2. Press ENTER.
If you selected the name option at step 1, enter the name of the virtual host for the Apache web server.
If you selected the port option at step 1, enter the port number of the virtual host for the Apache web
server.
If you selected the dir option at step 1, enter the path to the directory where files of the Kaspersky
Security web interface will be stored.
4. Press ENTER.
To specify an IP address and port number to enable interaction between the Apache web server and Kaspersky
Security:
1. Enter the IP address and port number in the format: <IP address>:<port>.
2. Press ENTER.
You can create a new certificate or specify the path to a private key file and the path to an existing certificate on the
computer.
1. Enter new.
2. Press ENTER.
42
INSTALLING AND REMOVING THE APPLICATION
To specify the path to a private key file and the path to an existing certificate:
2. Specify the path to the private key file and press ENTER.
To start initial configuration of the Kaspersky Security web interface in automatic mode, execute the following
command:
under Linux:
/opt/kaspersky/klmsui/bin/klmsui-setup.pl \
under FreeBSD:
/usr/local/bin/klmsui-setup.pl \
The settings of the configuration file with answers are given in the following table.
43
ADMINISTRATOR'S GUIDE
Kaspersky Security Center supports the following operations in administering Kaspersky Security installed on mail
servers:
44
INSTALLING AND REMOVING THE APPLICATION
To configure the process of administering Kaspersky Security via Kaspersky Security Center:
1. Install Network Agent (see section "Installing Network Agent" on page 45). Network Agent comes in a separate
package together with the Kaspersky Security setup package.
2. Configure Network Agent settings (see section "Configuring Network Agent settings" on page 45) using the
initial configuration script.
3. Install Kaspersky Security Console Plug-in. For detailed information on installing Kaspersky Security Console
Plug-in, refer to the Kaspersky Security Center Administrator's Guide.
IN THIS SECTION
Network Agent comes in a separate package together with the Kaspersky Security distribution kit.
# rpm -i klnagent-<version_number>.i386.rpm
# dpkg -i klnagent_<version_number>_i386.deb
To install Network Agent from a .deb-package on a 64-bit operating system, execute the following command:
After the command is executed, the installation process will be performed automatically.
The initial configuration script must be started after Network Agent has been installed from the .rpm-package.
To run the Network Agent configuration script, execute the following command:
# /opt/kaspersky/klnagent/lib/bin/setup/postinstall.pl
45
ADMINISTRATOR'S GUIDE
2. Specify the Administration Server port number or use the default port number (14000).
3. Specify the SSL port number of the Administration Server or use the default port number (13000).
4. Specify whether the SSL connection should be used for data transfer. By default, the SSL connection is
enabled.
5. Specify whether the Network Agent should be used as a gateway to connect to Kaspersky Security Center. By
default, the connection to Kaspersky Security Center is direct, i.e. without a gateway.
To obtain detailed information on setting up Network Agent, please refer to the Kaspersky Security Center
Administrator's Guide.
To check the connection to Kaspersky Security Center, execute the following command:
# /opt/kaspersky/klnagent/bin/klnagchk
# rpm -e klms
You can remove Kaspersky Security, installed from a .deb package in one of the following ways:
remove the application, but keep data created and used by the application during run time;
To remove Kaspersky Security installed from an .deb package, execute the following command:
# dpkg -r klms
If necessary, you can later delete all files and folders remaining after removal of the application (see section "Actions
after removing Kaspersky Security" on page 47).
To remove Kaspersky Security installed from a .deb-package completely (including all files and directories), execute
the following command:
# dpkg -P klms
To remove Kaspersky Security installed on a computer running under the FreeBSD, execute the following
command:
# pkg_delete klms-<version_number>
The application is removed automatically. Kaspersky Security is removed and integration with the mail server is canceled.
46
INSTALLING AND REMOVING THE APPLICATION
Kaspersky Security includes scripts to delete files and directories that remain following removal of the application.
under Linux:
# /var/opt/kaspersky/klms/cleanup.sh
under FreeBSD:
# /var/db/kaspersky/klms/cleanup.sh
2. Enter yes to confirm deletion of data remaining after the removal of Kaspersky Security.
47
MANUAL INTEGRATION OF KASPERSKY
SECURITY WITH MAIL SERVERS AND
AMAVIS INTERFACE
This section contains information about how to manually integrate Kaspersky Security with Exim, Postfix, Sendmail,
qmail, as well as with the Amavis interface.
IN THIS SECTION
You can integrate Kaspersky Security with the following mail servers manually:
Exim (see section "Manual integration with Exim mail server" on page 52).
Postfix (see section "Manual integration with Postfix mail server" on page 59).
Sendmail (see section "Manual integration with Sendmail mail server" on page 49).
qmail (see section "Manual integration with qmail mail server" on page 58).
Amavis (see section "Manual integration with the Amavis interface" on page 64).
Kaspersky Security supports integration with mail servers through the klms service, which receives processing requests
from the mail server.
If the application is integrated with the mail server manually, you need to:
Under FreeBSD you can configure the klms service to start automatically at operating system startup.
48
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
klmsdb_enable=YES
klms_enable=YES
For Exim and Postfix mail servers, Kaspersky Security supports both before-queue and after-queue integration. In the
case of before-queue integration, messages are forwarded to Kaspersky Security for scanning before insertion in the
mail server queue, while after-queue integration sends messages to Kaspersky Security for scanning after they are
inserted in the mail server queue.
The Kaspersky Security filter and the mail server communicate via sockets.
Example:
when defining a network socket, the port number must be above 1024;
when defining a UNIX socket, the filter and kluser must have the rights to access the socket.
To integrate the application with a Sendmail server, you to modify the Sendmail configuration file manually.
In the [global] section set the true value for theheader-guard setting of the klms_filter.conf filter settings file.
by modifying the .mc file and then creating the .cf file from it using the m4 macro processor.
If you modify the .cf file only, all modifications will be lost on any subsequent creation of the .cf file from the .mc file.
IN THIS SECTION
49
ADMINISTRATOR'S GUIDE
define(`_FFR_MILTER', `true')dnl
INPUT_MAIL_FILTER(`KLMS_Milter,`S=$filter_socket,${fail_type}T=S:3m;R:5m;E:10m') \
dnl
where $filter_socket stands for the IP address and port number or the UNIX socket that the filter uses to
listen for incoming connections as follows: inet:port@IP address (for network sockets) or unix:<path
to UNIX socket> (for UNIX sockets);
${fail_type} defines the action to be taken by the Sendmail server on messages if the filter works
incorrectly. ${fail_type} can take the values "F=R," or "F=T," or nothing. R means reject, T means
tempfail; if you replace ${fail_type} with a blank string, messages will be skipped. The recommended
option is tempfail.
Example:
INPUT_MAIL_FILTER(`KLMS_Milter,`S=inet:10025@127.0.0.1,F=T,T=S:3m;R:5m;E:10m')dnl
3. Compile the .cf configuration file according to your operating system settings.
6. In the [global] section, specify the path to the sendmail file in the following line:
7. Specify the IP address and port number or UNIX socket where the filter will listen for incoming connections in
the following string of the [milter] section of the /etc/opt/kaspersky/klms/klms_filters.conf file (under Linux)
or /usr/local/etc/kaspersky/klms/klms_filters.conf (under FreeBSD):
Example:
socket=inet:10025@127.0.0.1
SENDMAIL_MILTER=1
START_MILTER=1
50
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
#KLMS-milter-begin-filter
O InputMailFilters=KLMS_Milter
O Milter.macros.helo={tls_version}, {cipher}, \
O Milter.macros.envfrom=i, {auth_type}, \
#KLMS-milter-end-filter
#KLMS-milter-begin-socket
XKLMS_Milter, S=$filter_socket,${fail_type}T=S:3m;R:5m;E:10m
#KLMS-milter-end-socket
where $filter_socket stands for the IP address and port number or the UNIX socket that the filter uses to
listen for incoming connections as follows: inet:port@IP address (for network sockets) or unix:<path
to UNIX socket> (for UNIX sockets);
${fail_type} defines the action to be taken by the Sendmail server on messages if the filter works
incorrectly. ${fail_type} can take the values "F=R," or "F=T," or nothing. R means reject, T means
tempfail; if you replace ${fail_type} with a blank string, messages will be skipped. The recommended
option is tempfail.
Example:
INPUT_MAIL_FILTER(`KLMS_Milter,`S=inet:10025@127.0.0.1,F=T,T=S:3m;R:5m;E:10m')dnl
5. In the [global] section, specify the path to the sendmail file in the following line:
51
ADMINISTRATOR'S GUIDE
6. Specify the IP address and port number or UNIX socket where the filter will listen for incoming connections in
the following string of the [milter] section of the /etc/opt/kaspersky/klms/klms_filters.conf file (under Linux)
or /usr/local/etc/kaspersky/klms/klms_filters.conf (under FreeBSD):
socket=inet:<port>@<IP-address> or<UNIX-socket>
Example:
socket=inet:10025@127.0.0.1
SENDMAIL_MILTER=1
START_MILTER=1
After-queue integration via SMTP by rerouting. With after-queue integration, all messages that are forwarded via
the computer go to Kaspersky Security for scanning after they have been inserted in the Exim mail server
queue.
Before-queue integration via dlfunc. With before-queue integration, messages go to Kaspersky Security for
scanning before insertion in the Exim mail server queue.
IN THIS SECTION
The filter must be configured to intercept messages from the Exim mail server via socket-in. This socket
must be specified in the configuration of the application.
The filter must forward messages to Scan Logic for scanning via the scanner socket. This socket must be
specified in the configuration of the application.
The filter must return messages to the Exim mail server via socket-out. This socket must be specified in the
configuration of the application.
52
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
When after-queue integration with the Exim mail server is used for rerouting, socket-in, scanner, and socket-out
must point to a network socket.
Depending upon the specific distribution of the operating system, you have to modify one or several configuration files of
the Exim mail server. For example, in Debian and Ubuntu Exim configuration may consist of several files in the
/etc/exim/conf.d directory or a single file only.
2. In the [routers] section of Exim configuration file(s), add after the line
begin routers
#klms-filter-begin-2
klms_dnslookup:
driver = dnslookup
domains = ! +local_domains
verify_only
pass_router = smtp_proxy
no_more
klms_system_aliases:
driver = redirect
allow_fail
allow_defer
data =${lookup{$local_part}lsearch{/etc/aliases}}
verify_only
pass_router = smtp_proxy
klms_localuser:
driver = accept
check_local_user
verify_only
pass_router = smtp_proxy
53
ADMINISTRATOR'S GUIDE
failed_address_router:
driver = redirect
verify_only
condition = "{0}"
allow_fail
no_more
smtp_proxy:
driver = manualroute
{eq {\$received_protocol}{spam-scanned}} \\
}{0}{1}}"
transport = smtp_proxy
self = send
#klms-filter-end-2
where $forward_port is the port number of the socket where the message will go after being scanned by
Kaspersky Security.
3. In the [transports] section of Exim configuration file(s), add after the line
begin transports
#klms-filter-begin-3
smtp_proxy:
driver = smtp
port = $scanner_port
delay_after_cutoff = false
allow_localhost
#klms-filter-end-3
where $scanner_port stands for the port, which filter uses to wait for messages.
54
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
4. In the main Exim configuration file (exim.conf or update-exim.conf.conf), specify the substring in the form
127.0.0.1.$forward_port as follows:
dc_local_interfaces=<IP-address1>.<port1>:127.0.0.1.$forward_port
or
local_interfaces=<IP-address1>.<port1>:127.0.0.1.$forward_port
where the 127.0.0.1.$forward_port substring is required to enable Exim to accept processed messages
from the filter and listen for data on $forward_port.
5. Compile the Exim configuration file (files) according to your operating system settings.
EXIM_INTEGRATION_TYPE= after-queue
START_SMTP_PROXY=1
socket-in=inet:$scanner_port@127.0.0.1
socket-out=inet: $forward_port@127.0.0.1
10. Set the true value in the [global] section for theheader-guard setting.
In case of manual compilation, you have to add the following lines to Makefile:
EXPAND_DLFUNC=yes
EXTRALIBS= -export-dynamic
When before-queue integration via a dynamic library is used, the filter must transfer messages for scanning to ScanLogic
through ServiceSocket. This socket must be specified in the configuration of the application.
Depending upon the specific distribution of the operating system, you have to modify one or several configuration files of
the Exim mail server. For example, in Debian and Ubuntu Exim configuration may consist of several files in the
/etc/exim/conf.d directory or a single file only.
55
ADMINISTRATOR'S GUIDE
1. Make sure that Exim supports dlfunc-based content filtering. To do so, run the exim -bV command.
3. Modify the access control list for acl_smtp_data. To do that, find in the Exim configuration file(s) the line that
looks like:
acl_smtp_data = acl_check_data (the line may contain another access control list instead of
acl_check_data)
#klms-filter-begin
set acl_m_klms_result =
'$acl_m_klms_result\'}}\
'$acl_m_klms_result\'}}\
56
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
'$acl_m_klms_result\'}}\
'$acl_m_klms_result\'}}\
{\N^250 (.+)$\N}{$1}{}} \
'$acl_m_klms_result\'}}
set acl_m_klms_answer =
#klms-filter-end
4. Compile the .so module according to the settings of your operating system (optional).
57
ADMINISTRATOR'S GUIDE
5. Add the user kluser to the group to which the exim process belongs.
6. In the [global] section set the false value for the header-guard setting of the klms_filter.conf filter
settings file.
EXIM_INTEGRATION_TYPE=dlfunc
The Kaspersky Security installation package contains a compiled dynamically loaded dlfunc library for all operating
systems supported by the application. The source files required for the dlfunc library are located in the directory
/opt/kaspersky/klms/share/src/dlfunc (under Linux) or /usr/local/share/klms/src/dlfunc (under FreeBSD).
4. Open the folder /opt/kaspersky/klms/share/src/dlfunc (for Linux) or the folder /usr/local/share/klms/src/dlfunc (for
FreeBSD)
Messages are sent for scanning before insertion in the mail queue (before-queue filtering).
58
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
3. Copy the filter file from the Kaspersky Security distribution kit into the qmail folder using the following command:
under Linux:
under FreeBSD:
4. Set the following access rights for the qmail-queue and qmail-queue-real files:
# ls -la /var/qmail/bin/qmail-queue*
5. In the klms_filter.conf filter settings file, in section [global], make sure that the header-guard setting is set
to true.
After-queue integration. With after-queue integration, all messages that are forwarded via the protected
computer go to the application for scanning after they have been inserted in the Postfix mail server queue.
Before-queue integration. With before-queue integration, messages go to the application for scanning before
insertion in the Postfix mail server queue.
Integration using the Milter protocol. In this case, messages are forwarded to the application for scanning via the
Milter protocol.
IN THIS SECTION
AFTER-QUEUE INTEGRATION
When "after-queue" integration is used and messages are forwarded to Kaspersky Security for scanning from the Postfix
mail server, the following conditions must be satisfied:
The filter must be configured to intercept messages from the Postfix mail server via socket-in. This socket
must be specified in the configuration of the application.
The filter must forward messages to Scan Logic for scanning via the scanner socket. This socket must be
specified in the configuration of the application.
The filter must return messages to the Postfix mail server via socket-out. This socket must be specified in
the configuration of the application.
59
ADMINISTRATOR'S GUIDE
When Kaspersky Security is integrated with the Postfix mail server, socket-in, scanner, and socket-out can point
to a network socket or to a local one.
#klms-begin-afterqueue-filter
content_filter =klms_postfix-afterqueue:$sock_postfix_format
#klms-end-afterqueue-filter
where $sock_postfix_format stands for the IP address and port number or the UNIX socket where the filter
will listen for incoming connections, as follows: inet:<IP address>:<port> (for network sockets) or
unix:<path to UNIX socket> (for UNIX sockets).
#klms-begin-afterqueue-filter
klms_postfix-afterqueue\tunix - - \
n - 10 smtp
-o smtp_send_xforward_command=yes
127.0.0.1:$forward_port\tinet\tn - n - 10 smtpd
-o content_filter=
-o receive_override_options=no_unknown_recipient_checks,\
no_header_body_checks,no_address_mappings
-o smtpd_helo_restrictions=
-o smtpd_client_restrictions=
-o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_mynetworks,reject
-o mynetworks=127.0.0.0/8,[::1]/128
-o smtpd_authorized_xforward_hosts=127.0.0.0/8,[::1]/128
#klms-end-afterqueue-filter
127.0.0.1:$forward_port\tinet\tn - n - 10 smtpd is
required to enable Postfix to accept processed messages from the filter and listen for data on $forward_port.
60
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
POSTFIX_INTEGRATION_TYPE=afterqueue
START_SMTP_PROXY =1
8. In the [global] section set the false value for theheader-guard setting.
socket-in=<IP address and port number> or <UNIX socket>, defined in step 2 for
$sock_postfix_format
socket-out=inet: $forward_port@127.0.0.1
using the format inet:<port>@<IP address> (for network sockets) or unix:<path to UNIX socket>
(for UNIX sockets).
Example:
socket-in=inet:10025@127.0.0.1
socket-out=inet: 10026@127.0.0.1
BEFORE-QUEUE INTEGRATION
When "before-queue" integration is used and messages are forwarded to Kaspersky Security for scanning and then
returned to the Postfix mail server, the following conditions must be satisfied:
The filter must be configured to intercept messages from the Postfix mail server via socket-in. This socket
must be specified in the configuration of the application.
The filter must forward messages to Scan Logic for scanning via the scanner socket. This socket must be
specified in the configuration of the application.
The filter must return messages to the Postfix mail server via socket-out. This socket must be specified in
the configuration of the application.
When Kaspersky Security is integrated with the Postfix mail server, socket-in, scanner, and socket-out can point
to a network socket or to a local one.
#klms-postfix-prequeue-start
61
ADMINISTRATOR'S GUIDE
-o smtpd_proxy_filter=$sock_postfix_format
#klms-postfix-prequeue-end
where $sock_postfix_format stands for the IP address and port number or the UNIX socket where the filter
will listen for incoming connections, as follows: inet:<IP address>:<port> (for network sockets) or
unix:<path to UNIX socket> (for UNIX sockets).
3. Add the following strings in the end of the master.cf configuration file:
#klms-begin
-o smtp_send_xforward_command=yes
127.0.0.1:$forward_port\tinet\tn - n - 10 smtpd
-o receive_override_options=no_unknown_recipient_checks, \
no_header_body_checks,no_address_mappings
-o smtpd_helo_restrictions=
-o smtpd_client_restrictions=
-o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_mynetworks,reject
-o mynetworks=127.0.0.0/8,[::1]/128
-o smtpd_authorized_xforward_hosts=127.0.0.0/8,[::1]/128
#klms-end
127.0.0.1:$forward_port\tinet\tn - n - 10 smtpd is
required to enable Postfix to accept processed messages from the filter and listen for data on $forward_port.
POSTFIX_INTEGRATION_TYPE= prequeue
START_SMTP_PROXY =1
7. In the [global] section set the false value for the header-guard setting.
socket-in=<IP address and port number> or <UNIX socket>, defined in step 2 for
$sock_postfix_format
socket-out=inet: $forward_port@127.0.0.1
62
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
using the format inet:<port>@<IP address> (for network sockets) or unix:<path to UNIX socket>
(for UNIX sockets).
Example:
socket-in=inet:10025@127.0.0.1
socket-out=inet: 10026@127.0.0.1
The filter must be configured to intercept messages from the Postfix mail server via socket. This socket must
be specified in the configuration of the application.
The filter must forward messages to Scan Logic for scanning via the scanner socket. This socket must be
specified in the configuration of the application.
When Kaspersky Security is integrated with the Postfix mail server, socket and scanner can point to a network socket
or to a local one.
postconf -e $milter_socket
where $milter_socket stands for the IP address and port number or the UNIX socket where the filter will
listen for incoming connections, as follows: inet:port@IP address (for network sockets) or unix:<path
to UNIX socket> (for UNIX sockets).
#lms-milter-begin
{cert_issuer}
milter_default_action = $fail_type
milter_protocol = 3
milter_connect_timeout=180
milter_command_timeout=180
63
ADMINISTRATOR'S GUIDE
milter_content_timeout=600
#lms-milter-end
${fail_type} defines the action to be taken by the Postfix mail server on messages if the filter works
incorrectly:
POSTFIX_INTEGRATION_TYPE= milter
START_MILTER=1
7. Specify the IP address and port number or UNIX socket that the filter will use to listen for incoming connections
in the following string of the [milter] section:
socket=<IP address and port number> or <UNIX socket>, defined in step 1 for $milter_socket
using the format inet:<port>@<IP address> (for network sockets) or unix:<path to UNIX socket>
(for UNIX sockets).
Example:
socket=inet:10025@127.0.0.1
8. In the [global] section set the false value for theheader-guard setting.
1. Add the kluser user to the amavis group (or to the group specified via the $daemon_group parameter of
/etc/amavisd.conf) with the following command:
2. Add the account of the amavis user (or user specified in the $daemon_user setting of the amavisd.conf
configuration file (hereinafter /etc/amavis.conf)) to the klusers user group using the following command:
64
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
@spam_scanners = (
#['SpamdClient', 'Amavis::SpamControl::SpamdClient' ],
5. Under the SUSE Linux 11 SP2 operating system, add the kluser account to the vscan user group. The vscan
user group should be the primary group for the kluser account.
6. Under the SUSE Linux 11 SP2 operating system, add the vscan account to the klusers user group. The klusers
user group should be the primary group for the vscan account.
7. Specify the rds_asp socket, where the KLRDS task is listening for incoming messages, in the following lines of
the /usr/local/sbin/amavisd file for SpamdClient Perl module:
my($spamd_handle) = Amavis::IO::RW->new(
9. Make the following changes to the @av_scanners and @spam_scanners sections of the opened file:
@av_scanners = (
qr/\bOK$/m, qr/\bFOUND$/m,
@spam_scanners = (
['SpamdClient', 'Amavis::SpamControl::SpamdClient' ], );
10. We recommend setting a 1500 KB limit on the maximum message size when using the Anti-Spam scan. To do
so, set the following value in this string:
$sa_mail_body_size_limit = 1500000;
/etc/init.d/amavisd restart
During integration with the Amavis interface, you can specify the settings of Kaspersky Security only using the command
line. Settings specified using the web interface of Kaspersky Security (such as the response timeout when attempting to
connect to KSN) will not apply.
User scripts should be run only after logon under the kluser account.
65
ADMINISTRATOR'S GUIDE
IN THIS SECTION
searchemail – used for determining the IDs of a message, list of user groups, sender, and recipient;
searchusers – used for searching a user in an external directory service and for searching a user in custom
allow and block lists of senders and recipients;
getuseraccount – used for substituting user accounts with names while viewing a rule. If the script has
failed, the rule will show user IDs only;
checkconnection – used to check the availability of an external directory service. The results of script
execution appear in the Monitoring screen.
Data sent to a script and retrieved as a result of script execution should end with a line that does not contain
characters, but contains ".\n".
If data requested during script execution has not been located, the script should return an empty line with a
period ".\n".
Data should be sent to the script looking the way the user entered it. Data input should be screened to avoid the
injection of code.
Error messages during user script execution should be returned to the console as messages with the "+++
ERROR " start line containing a blank. For example, "+++ ERROR cannot connect to DB\n".
All IDs are line values, which is why they can appear as both words and numerals.
Each script can be executed in parallel. For example, searchemail can be run several times (task Auth,
setting processPool -> processNumber), in which case data will be retrieved from the external directory
service in parallel. This works only when the setting processPool -> processNumber of the task Auth is
greater than "1".
It is recommended to execute the searchemail script once. As soon as the script has transmitted data, it
awaits the next request. This means that the script keeps working until the application itself stops it.
66
MANUAL INTEGRATION OF KASPERSKY SECURITY WITH MAIL SERVERS AND AMAVIS INTERFACE
SEARCHEMAIL SCRIPT
The following table contains the characteristics of the searchemail script:
SEARCHUSERS SCRIPT
The following table contains the characteristics of the searchusers script:
nameOfField1 email
valueOfField1\n presents@example.com
userIDN\n
…
.\n
67
ADMINISTRATOR'S GUIDE
GETUSERACCOUNT SCRIPT
The following table contains the characteristics of the getuseraccount script:
LOGIN SCRIPT
The following table contains the characteristics of the login script:
68
APPLICATION LICENSING
This section provides information about general terms related to the application activation. Read this section to learn
more about the purpose of the License Agreement, ways of activating the application, and license renewal.
IN THIS SECTION
Read through the terms of the License Agreement carefully before you start using the application.
It is deemed that you accept the terms of the License Agreement by confirming that you agree with the License
Agreement when installing the application. If you do not accept the terms of the License Agreement, you must abort the
application installation or renounce the use of the application.
The file with the text of the End User License Agreement is located at the following path:
for the application installed on a computer running under Linux: /opt/kaspersky/klms/share/doc/LICENSE, for the
web interface: /opt/kaspersky/klmsui/share/doc/LICENSE;
for the application installed on a computer running under FreeBSD: /usr/local/share/doc/klms/LICENSE, for the
web interface: /opt/kaspersky/klmsui/share/doc/LICENSE.
The scope of services and application usage term depend on the type of license under which the application is activated.
69
ADMINISTRATOR'S GUIDE
A trial license is of limited duration. As soon as the license expires, all Kaspersky Security features are disabled.
To continue using the application, you need to purchase a commercial license.
You can activate the application under a trial license only once.
When the commercial license expires, the application continues running though with a limited functionality (for
example, Kaspersky Security database updates and use of Kaspersky Security Network are not available). To
continue using Kaspersky Security in fully functional mode, you must renew your commercial license.
We recommend renewing the license before its expiration to ensure maximum protection of your computer against
security threats.
The key file is included in the application distribution kit if you purchase it from resellers of Kaspersky Lab, or is sent to
you by email if you purchase the application from eStore.
License term.
License restrictions (such as the maximum number of computers protected by the application or the maximum
volume of protected mail traffic).
Key file expiration. You can activate the application with the key file only before this validity period has expired.
The application works only with a valid key. Kaspersky Lab can black-list a key over violations of the License Agreement.
If the key has been black-listed, you have to add a different valid key to continue using the application.
Active key
Active key is a key that is currently used by the application. A trial or commercial license key can be added as the active
key. The application cannot have more than one active key.
70
APPLICATION LICENSING
Additional key
Additional key is a key that certifies the right to use the application but is not currently being used. An additional key
becomes active automatically when the current active key stops working, for example due to license expiry. An additional
key can be added only if the active key is available. A trial license key cannot be added as an additional key.
Anti-Virus component.
Anti-Spam component.
When a key for the Anti-Virus and Anti-Spam components is added, the application works in full-functionality mode,
performing scans for spam, viruses and other types of malware.
When you add a key for the Anti-Spam component alone, the application performs anti-spam scanning but does not
detect viruses and other threats. The status label assigned by the application to a message following a scan for viruses
and other threats contains information about limited functionality.
When you add a key for the Anti-Virus component alone, the application performs scanning for viruses and other threats
but does not perform anti-spam scanning. The status label assigned by the application to a message following a spam
scan contains information about limited functionality.
When the additional key becomes active, other application components may become available.
# /opt/kaspersky/klms/bin/klms-control \
--licenser --query-status
To view information about all added keys, enter the following at the command line:
# /opt/kaspersky/klms/bin/klms-control \
--licenser --get-installed-keys
If you agree to participate in Kaspersky Security Network, information collected during the operation of Kaspersky Linux
Mail Security on the computer is automatically forwarded to Kaspersky Lab. The list of data that is transmitted is provided
in the Kaspersky Security Network Statement (see section "Step 3. Participating in Kaspersky Security Network" on
page 28).
71
ADMINISTRATOR'S GUIDE
Information retrieved is protected by Kaspersky Lab pursuant to the requirements stipulated by the existing legislation.
Kaspersky Lab uses any retrieved information as general statistics only. General statistics are automatically generated
using original collected information and do not contain any private data or other confidential information. Kaspersky Lab
uses the latest methods for protecting the privacy of data it collects. Original collected data is stored in encrypted form
and deleted as new data is accumulated. General statistics are stored indefinitely.
ADDING A KEY
You can add keys with two statuses: active and supplementary. You can use the application as soon as you add an
active key. After adding an active key, you can add a supplementary key. The supplementary key automatically becomes
active on expiration of the license. This ensures that protection is maintained in the period between expiration and
renewal of the license.
If you add an active key when one has already been added for Kaspersky Security, the new key replaces the previously
installed one. The key installed earlier is removed.
If you add a supplementary key when one has already been added for Kaspersky Security, the new key replaces the
previously installed one. The supplementary key installed earlier is removed.
# /opt/kaspersky/klms/bin/klms-control \
--licenser --install-active-key <key file name>
# /opt/kaspersky/klms/bin/klms-control \
--licenser --install-suppl-key <key file name>
REMOVING A KEY
If you remove the active key and a supplementary key has been added for Kaspersky Security, the supplementary key
automatically becomes active.
# /opt/kaspersky/klms/bin/klms-control \
--licenser --revoke-active-key
# /opt/kaspersky/klms/bin/klms-control \
--licenser --revoke-suppl-key
If you remove the active and supplementary keys, you cannot use the full functionality of the application.
72
STARTING AND STOPPING THE
APPLICATION
By default, Kaspersky Security starts automatically when the operating system is booted (at the default level of execution
for each operating system).
When the product starts for the first time and when it further restarts, it automatically creates directories in /var/log
and /tmp. These directories are required for correct functioning of the product. Changing these directories manually may
result in malfunction of the product.
If required, you can stop the application. To stop the application, first stop the klms service and then the database.
To stop the klms service under a Linux operating system, execute the following command:
# /etc/init.d/klms stop
To stop the database under a Linux operating system, execute the following command:
# /etc/init.d/klmsdb stop
To stop the klms service under a FreeBSD operating system, execute the following command:
# /usr/local/etc/rc.d/klms stop
To stop the database under a FreeBSD operating system, execute the following command:
# /usr/local/etc/rc.d/klmsdb stop
73
SERVER PROTECTION STATUS
The protection status of the mail server indicates whether or not there are currently any security issues affecting the level
of security.
Not only detected malicious programs and spam are classified as security issues in this instance, but also:
using outdated databases (see section "About database updates" on page 110);
disabling the Anti-Spam engine (see section "Enabling and disabling the Anti-Spam engine" on page 85);
disabling the Anti-Virus engine (see section "Enabling and disabling the Anti-Virus engine" on page 93);
disabling the Anti-Phishing engine (see section "Enabling and disabling the Anti-Phishing engine" on page 101).
check the state of databases (see section "Checking database state" on page 111);
if you have configured integration with an external user service (LDAP, Active Directory ®), check the
connection between the application and the user service (see section "Checking the server connection using
LDAP" on page 123).
# /opt/kaspersky/klms/bin/klms-control --is-program-started
# echo $?
74
BASIC PRINCIPLES
This section contains a description of the basic concepts and principles of using the application, and information about
how to configure it.
IN THIS SECTION
Blacklisted – the sender's email address or IP address is contained in the black list of addresses.
Based on the results of scanning for viruses, the Anti-Virus engine assigns one of the following Anti-Virus scan statuses
to messages:
Infected – the object is infected; either it cannot be disinfected, or disinfection has not been attempted.
Probably infected – the object is probably infected with an unknown virus or a new modification of a known virus.
75
ADMINISTRATOR'S GUIDE
Based on the Anti-Phishing scan results, the Anti-Phishing engine assigns one of the following status labels to the
message:
Clean – the message does not contain phishing URLs, images or text that could trick users into disclosing
confidential data to fraudsters, or links to websites with malware.
Phishing – the application has found the message to contain images or text that could trick users into disclosing
confidential data to fraudsters.
Malicious link – the application has found the message to contain links to websites with malware.
As a result of content filtering, the Scan Logic message scanning control module assigns one of the following content
filtering statuses to messages:
Clean – the message does not violate the content filter settings.
By default, the application contains the following preset message processing rules:
When processing an email, the application checks each rule for the "sender - recipient" pair of addresses beginning with
the highest-priority rule (1). If no match is found, the application checks the pair of addresses of the rule with the next
highest priority (2). As soon as it finds the "sender - recipient" pair of addresses in any rule, the application applies the
processing settings configured in that rule to the message.
If none of the rules contains the "sender - recipient" pair of addresses, the message is processed according to the preset
settings of the Default rule.
1. Scan Logic message scanning control module determines which message processing rules (see section "About
message processing rules" on page 76) apply to a message, judging by the combination of the sender and
recipient addresses, and chooses the rule with the highest priority. If no rule is found for the address pair, the
application processes the message in accordance with the Default rule.
2. If the message is addressed to several recipients whose addresses belong to different rules, several virtual
copies of the message are created in accordance with the number of rules. Each copy of the message is
processed as per the rule assigned to the address of the recipient.
76
BASIC PRINCIPLES
3. The further actions taken by the application depend on the settings of the selected message processing rule.
If the rule specifies that messages are to be scanned for spam, the Scan Logic module forwards the mail
message to Anti-Spam engine for scanning.
Anti-Spam engine scans the message and assigns it one of the spam scan statuses (see section "About
scan and content filtering statuses" on page 75). Information about the status assigned is contained in the
special information X-header X-KLMS-AntiSpam-Status (see section "About information X-headers" on
page 83), which Scan Logic adds to the message after it is processed. Based on the results of message
scanning, the Scan Logic module also adds a status tag at the beginning of the message subject (Subject
field).
If the rule specifies that messages are to be scanned for phishing threats, the Scan Logic module forwards
the mail message to the Anti-Phishing engine for scanning.
The Anti-Phishing engine scans the message and assigns it one of the spam scan statuses (see section
"About scan and content filtering statuses" on page 75). Information about the status assigned is contained
in the special information X-header X-KLMS-AntiPhishing (see section "About information X-headers" on
page 83), which Scan Logic adds to the message after it is processed. Based on the results of message
scanning, the Scan Logic module also adds a status tag at the beginning of the message subject (Subject
field).
If the rule specifies that messages are to be filtered for content, the Scan Logic module performs content
filtering of the message by size, name, and format of attachments.
Based on the results of content filtering, the Scan Logic module assigns one of the content filtering statuses
to the message (see section "About scan and content filtering statuses" on page 75).
If the rule specifies that messages are to be scanned for viruses, the Scan Logic module forwards the mail
message to the Anti-Virus engine for scanning.
The mail format analyzer (MIME, RFC2822, UUE) built into the Anti-Virus engine parses the individual
objects of the message: body, attachments, and others. Every object received is sent to Anti-Virus engine
for scanning.
Anti-Virus scans the message first as a whole object and then by its constituent parts, before assigning it
one of the anti-virus scan statuses (see section "About scan and content filtering statuses" on page 75).
Based on the results of message scanning, the Scan Logic module adds a status tag at the beginning of
the message subject (Subject field).
4. Depending on the status assigned, the application performs actions (see section "About actions on objects" on
page 80) on messages in accordance with the message processing rule.
Personal. Contain the addresses of senders for a single recipient (see section "Adding personal black and white
lists of addresses" on page 124). A personal white list of addresses allows messages to pass through without
anti-spam scanning. However, the messages are still scanned for viruses and phishing threats, and content
filtering is also performed.
Global. Contain the addresses of senders and recipients. You can specify such lists in the preset BlackList and
WhiteList message processing rules (see section "About message processing rules" on page 76). You can also
create rules (see section "Configuring global black and white lists of addresses" on page 118), specifying the
addresses of senders and recipients whose messages should be rejected without scanning or allowed to pass
without scanning. A global white list of addresses allows messages to pass through without scanning for spam,
viruses, and phishing threats.
77
ADMINISTRATOR'S GUIDE
Messages whose sender and recipients have their addresses on a global black or white list of addresses are processed
as follows:
If the addresses of the sender and recipients of a message are on a global black list of addresses, the
application rejects the message. The message does not reach the mail server of Kaspersky Security.
If the addresses of the sender and recipients of a message are on a global white list of addresses, the
application refers the message for further scanning, bypassing scanning by the Anti-Spam, Anti-Virus, and Anti-
Phishing components.
If the addresses of the sender and recipients of a message are both on the global white list and the global black
list of addresses, the application processes the message according to a rule with a higher priority.
A message is processed according to the rule of a personal white list or personal black list of addresses if the rules of the
global black list and global white list of addresses do not apply to it.
A message whose sender has his address on a personal black or white list of addresses is processed as follows:
If the message sender's address is on a personal black list of addresses and one of the addresses of the
message recipients belongs to the owner of the personal black list of addresses, the message is not delivered to
the recipient who owns the personal black list. Depending on the action configured for messages from senders
on a personal black list, the message is either deleted or quarantined.
If the sender's address is on a personal white list of addresses, the message is delivered to the recipient
depending on the results of scanning for viruses, phishing threats, and content filtering.
If the sender's address is both on a personal white list and black list of addresses, the message is processed
according to the rules of the personal white list of addresses.
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
5. In the <belongingCriteria> section, specify the addresses of the sender and recipient in the <sender>
and <recipient> settings, respectively.
If you need to add several sender and recipient email addresses, each new email address must be in a
separate <item> section, typed in a new string of the settings file.
78
BASIC PRINCIPLES
Example:
<belongingCriteria>
<sender>
<item>
<type>EMailMask</type>
<value>*</value>
</item>
<item>
<type>CIDR</type>
<value>172.16.10.145</value>
</item>
</sender>
<recipient>
<item>
<type>ExternalAccount</type>
<value>CN=test10,OU=SBSUsers,OU=Users,OU=MyBusiness,DC=sbs2k8,DC=local</value>
</item>
</recipient>
</belongingCriteria>
At least one of the sender, recipient values must be specified. If the description of the rule does not
contain a sender or recipient value, the application applies the rule with the next highest priority.
You can use the symbols "*" and "?" to create a an address mask, and regular expressions beginning with the
prefix "re:"
6. In the <ScanSettings> section, specify 1 as the value of the <active> setting to activate the rule.
7. Specify the rule mode. To do so, in the <ScanSettings> section use one of the following values for the
<ruleAction> setting:
Scan, if you want the application to process messages according to the configured scan settings;
Skip (skip without scanning), if you want the application to process messages according to this rule in the
same way as it does according to the rule of the global white list of addresses (see section "Configuring
global black and white lists of addresses" on page 118);
Reject (reject without scanning), if you want the application to process messages according to this rule in
the same way it does according to the rule of the global black list of addresses.
79
ADMINISTRATOR'S GUIDE
8. If necessary, configure the settings of Anti-Spam scanning (see section "Configuring Anti-Spam scan settings
for a rule" on page 87), Anti-Virus scanning (see section "Configuring Anti-Virus scan settings for a rule" on
page 97), and content filtering (see section "Configuring content filtering by message size" on page 107).
If the values of these settings have not been configured for a rule, the default settings are used.
10. To import rule settings from an XML file, use the command:
# /opt/kaspersky/klms/bin/klms-control \
You can later view the list of created rules (see section "Viewing the list of message processing rules" on page 80).
# /opt/kaspersky/klms/bin/klms-control --get-rule-list
rule name;
rule ID;
rule priority;
In the rule settings, you can specify actions to be performed by the application on messages with a certain status.
The settings that define the actions can take the following values:
Reject – do not deliver message to recipient. If you select this operation, the sending mail server receives a
return code in response, indicating the occurrence of an error during delivery. The message is not delivered to
the recipient.
80
BASIC PRINCIPLES
DeleteMessage – delete message. If you select this operation, the sending mail server receives a notification
that the message has been received; however, the message is not delivered to the recipient.
Cure – cure infected object (applied only after an anti-virus scan). When this action is selected, the application
attempts to cure the infected object. If disinfection fails, the application performs a Reject, DeleteMessage,
or DeleteAttachment on the message, as configured in the rule settings (see section "Configuring Anti-Virus
scan settings for a rule" on page 97). If the administrator has not specified the action in the rule settings, the
application performs the DeleteAttachment action.
Auth (ID=1).
Backup (ID=2).
ScanLogic (ID=3).
Facade (ID=4).
AvServer (ID=5).
AspServer (ID=6).
EventManager (ID=7).
Licenser (ID=8).
Notifier (ID=9).
Statistics (ID=10).
Updater (ID=11).
AspMoebius (ID=13).
AspQuarantine (ID=14).
SmtpSender (ID=15).
Snmp (ID=16).
DailyReport (ID=17).
WeeklyReport (ID=18).
MonthlyReport (ID=19).
81
ADMINISTRATOR'S GUIDE
EventLogger (ID=20).
ScanServer (ID=21).
KLRDS (ID=22).
Ksn (ID=23).
# /opt/kaspersky/klms/bin/klms-control --get-task-list
number of tasks;
task names;
task IDs;
task performance state (see section "About Kaspersky Security tasks" on page 81).
The following example shows how task details are displayed (task name, task ID, task state, and task run ID):
Example:
Name: Notifier
ID: 9
State: Started
Runtime ID: 7
82
BASIC PRINCIPLES
X-KLMS-Message-Action: attachment removed, AntiVirus – action taken by the application on the message.
X-KLMS-AntiVirus: Kaspersky Security 8.0 for Linux Mail Server, version 8.0.1.517, bases: 2013/11/19
06:41:00 – Anti-Virus database release date.
X-KLMS-AntiSpam-Status: not_detected – status assigned to the message by the Anti-Spam engine based on
the Anti-Spam scan results.
X-KLMS-AntiPhishing: Clean, 2013/11/13 18:22:56 – a general header for messages processed by the Anti-
Phishing engine.
83
ANTI-SPAM PROTECTION
This section contains information about Anti-Spam protection of messages and how to configure it.
IN THIS SECTION
Enforced Anti-Spam Updates Service – instant update system for anti-spam signatures.
Messages are scanned for spam by the Anti-Spam engine. Anti-Spam engine scans each message for signs of spam.
First, Anti-Spam engine scans the attributes of the message, such as sender and recipient addresses, size, and headers
(including the From and To fields). Second, Anti-Spam engine analyzes the message content (including the Subject
header) and attached files. Anti-Spam engine is enabled by default. If required, you can disable the Anti-Spam engine or
disable Anti-Spam scanning for any rule. You also can limit the size of messages (see section "Limiting the size of
messages to be scanned for spam" on page 91) to be scanned for spam.
Depending on the sensitivity level, the application assigns messages in which spam or probable spam has been detected
the specific statuses in accordance with the spam rating calculated by Anti-Spam. Spam rating is a whole number from 0
to 100 that reflects the number of times Anti-Spam engine was actuated in processing the message. The application also
takes into account the responses from the DNSBL, SURBL and UDS servers and SPF technology to assign the spam
rating.
Based on the scan results, Anti-Spam assigns one of the Anti-Spam scan statuses to the message (see section "About
scan and content filtering statuses" on page 75) and adds a status tag at the beginning of the message subject
(Subject field).
Depending on the status assigned to the message, the application performs an action (see section "About actions on
objects" on page 80) on the message in accordance with the message processing rule. You can specify actions to be
performed by the application on messages with a certain status. The default action performed on messages is Skip.
84
ANTI-SPAM PROTECTION
On detecting a potential spam message, Kaspersky Security temporarily places it in Anti-Spam Quarantine. The
message remains in Anti-Spam Quarantine for the specified period of time, such as 30 minutes. When the Anti-Spam
Quarantine period elapses, Kaspersky Security rescans the message. After re-scanning the message, the application
can change its status to one of the following: Spam / Massmail / Probable Spam / Clean.
You can specify the period for keeping a message in Anti-Spam Quarantine and the maximum size of Anti-Spam
Quarantine by configuring the relevant values of Anti-Spam Quarantine settings.
To ensure more thorough Anti-Spam filtering of email messages, Kaspersky Security supports external services:
DNSBL. Servers that host public lists of IP addresses identified in the distribution of spam.
During spam rating calculation, the application considers the weight assigned to each responding DNSBL and
SURBL server.
Reputation filtering. A technology used by KSN to increase the accuracy of spam detection.
SPF. SPF (Sender Policy Framework) allows validation of the sender's domain to make sure it is not forged.
Domains use SPF to authorize certain computers to send mail on their behalf. If the sender of a message is not
included in the list of authorized senders, the spam rating of the message is increased.
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. In the <asSettings> section, specify one of the following values for the <enableAsScan> setting:
85
ADMINISTRATOR'S GUIDE
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. In the <engineSettings> subsection of the <asScanSettings> section, specify one of the following values
of the <enableScan> setting:
# /opt/kaspersky/klms/bin/klms-control \
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
86
ANTI-SPAM PROTECTION
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <asSettings> section, specify the values of the relevant Anti-Spam scan settings:
In the <scanTimeLimit> subsection, specify the maximum duration of Anti-Spam scanning of a message
in seconds. If the message scan is not completed during this time, the message is assigned a scan error
verdict.
In the <useKsnStatus> subsection, specify the value 1 if you want the application to use information from
Kaspersky Security Network when issuing a verdict on the message, or 0 if you do not want the application
to use information from Kaspersky Security Network.
In the <externalServices> subsection, specify the relevant values for the following nodes:
<dnsTimeout> – the maximum time during which the application waits for a response from DNS
servers (in seconds). The default value is 10 seconds.
<dnsblList> – the list of DNSBL servers from which the application will request information about
the message being scanned. Each server must be specified in the following format: <item>Server
name or IP address</item>.
<surblList> – the list of SURBL servers from which the application will request information about
the message being scanned. Each server must be specified in the following format: <item>Server
name or IP address</item>.
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
87
ADMINISTRATOR'S GUIDE
3. Specify the preferred action to be taken by the application (see section "About actions on objects" on page 80)
on messages. To do so, in the <asScanSettings>section, specify the value Skip, DeleteMessage or
Reject for the following settings:
4. If you selected the DeleteMessage action at the previous step of the sequence, you can configure the
application to move a message copy to Backup before deleting the message (see section "About Backup" on
page 133). To do so, in the <asScanSettings> section, specify the value 1 for the following settings:
The default value for all statuses is set to 0 – do not move a message copy to Backup.
5. If you selected Skip at Step 3 of the sequence, you can edit the text of the tag added to the Subject field of the
message. To do so, in the <asScanSettings> section, specify the text of the stamp as the value for the
following settings:
6. In the <maxSizeLimit> subsection, specify the maximum size of messages (in bytes) to be scanned by Anti-
Spam. The value 0 is interpreted as the absence of a limit on the maximum message size.
7. In the <externalServices> subsection, specify the external services (see section "About external Anti-Spam
message scanning services" on page 85) to be used by the application when scanning messages:
<useDns> – enables / disables the use of external services when scanning messages. When the value is
set to 0, the use of all external services is disabled.
88
ANTI-SPAM PROTECTION
<useSurbl> – enables / disables the use of a custom list of SURBL servers when scanning messages.
You can specify the list of SURBL servers when configuring general Anti-Spam scan settings (see section
"Configuring general Anti-Spam scan settings" on page 86).
<useSurblDefaultList> – enables / disables message scanning with use of SURBL servers whose list
is provided with application database updates.
<useDnsbl> – enables / disables the use of a custom list of DNSBL servers when scanning messages.
You can specify the list of DNSBL servers when configuring the general Anti-Spam scanning settings.
<useDnsblDefaultList> – enables / disables message scanning with use of DNSBL servers whose list
is provided with application database updates.
<dnsHostInDns> – enables / disables the scanning of DNS for the address of the message sender.
The scanning of DNS for the address of the message sender is enabled by default.
<dnsDynamicResolvedFrom> – enables / disables the scanning of the message sender against the
database of bot nets. The scan uses a reverse DNS lookup of the sender's IP address.
If your mail server has users connected via a dial-up link, enabling this scan is not recommended.
The scanning of the message sender against the database of bot nets is disabled by default.
8. In the <advancedOptions> subsection, specify the values of additional Anti-Spam scan settings:
<disableLangChinese> – enables / disables a higher spam rating for messages written in Chinese.
<disableLangKorean> – enables / disables a higher spam rating for messages written in Korean.
<disableLangThai> – enables / disables a higher spam rating for messages written in Thai.
89
ADMINISTRATOR'S GUIDE
<disableLangJapanese> – enables / disables a higher spam rating for messages written in Japanese.
<disableLangCyrillic> – enables / disables a higher spam rating for messages written in Cyrillic font.
A higher spam rating for messages written in Cyrillic font is disabled by default.
10. To import rule settings from an XML file, use the command:
# /opt/kaspersky/klms/bin/klms-control \
On detecting a potential spam message, Kaspersky Security temporarily places it in Anti-Spam Quarantine. The
message remains in Anti-Spam Quarantine for the specified period of time, such as 30 minutes. When the Anti-Spam
Quarantine period elapses, Kaspersky Security rescans the message. When the message is rescanned, a different
verdict is possible: Spam / Massmail / Probable Spam / Clean.
The period for keeping a message in Anti-Spam Quarantine and the maximum size of Anti-Spam Quarantine can be
specified by configuring the relevant values of Anti-Spam Quarantine settings.
3. Specify the period of time for keeping messages in Anti-Spam Quarantine in the <MaxObjectTimeout>
section. Time period is specified in seconds.
5. Import Anti-Spam quarantine settings from an XML file using the command:
90
ANTI-SPAM PROTECTION
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
3. Specify the maximum size of a message that should be scanned (0 – no size restriction). To this end, in the
<engineSettings> subsection of the <asScanSettings> section, specify a value not exceeding 1572864
for the <maxSizeLimit> setting.
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
91
ANTI-VIRUS PROTECTION
This section contains information about Anti-Virus protection of messages and how to configure it.
IN THIS SECTION
Messages are scanned for viruses and other threats by Anti-Virus engine. Anti-Virus engine scans the body of the
message and all attached files in any format (attachments) using the Anti-Virus databases. Based on the scan results,
AV-engine assigns one of the Anti-Virus scan statuses to the message (see section "About scan and content filtering
statuses" on page 75) and adds a status tag at the beginning of the message subject (Subject field).
Depending on the status assigned to the message, the application performs an action (see section "About actions on
objects" on page 80) configured in the settings of the rule applied to the message. You can specify actions to be
performed by the application on messages with a certain status. Before processing a message, the application saves its
copy in Backup (see section "About Backup" on page 133).
You can specify the maximum size of attachments to be scanned (see section "Limiting the size of objects to be scanned
for viruses" on page 100) and specify objects to be excluded from Anti-Virus scanning. The application can exclude from
scanning attachments of particular formats (see section "Excluding messages from Anti-Virus scanning by attachment
format" on page 98) or attachments with specific names (see section "Excluding messages from Anti-Virus scanning by
attachment name" on page 99).
The Anti-Virus engine is enabled by default. If required, you can disable Anti-Virus module or disable Anti-Virus scanning
for any rule.
92
ANTI-VIRUS PROTECTION
On detecting a targeted attack, the application adds the [Intrusion Threat] tag at the beginning of the message
subject (Subject field).
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <avSettings> section, specify one of the following values for the <enableAvScan> setting:
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
93
ADMINISTRATOR'S GUIDE
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <avSettings> section, specify the value 1 for the <useZetaShield> setting.
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <avSettings> section, specify the value 0 for the <useZetaShield> setting.
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
94
ANTI-VIRUS PROTECTION
3. In the <engineSettings> subsection of the <avScanSettings> section, specify one of the following values
of the <enableScan> setting:
# /opt/kaspersky/klms/bin/klms-control \
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <avSettings> section, specify the values of the relevant Anti-Virus scan settings:
In the <scanTimeLimit> subsection, specify the maximum duration of Anti-Virus scanning of a message
in seconds. If the message has not been scanned during the specified time, the application labels it as
Corrupted – the object is damaged or an error occurred while scanning the object.
The maximum Anti-Virus scan duration also includes the maximum duration of message scanning using
Zeta Shield technology. The maximum duration of a message scan using Zeta Shield technology may not
exceed more than one half of the maximum Anti-Virus scan duration specified in the <scanTimeLimit>
subsection.
In the <maxNestingLevel> subsection, specify the maximum nesting level of objects during Anti-Virus
scanning. Nested objects include message attachments and archives packed inside other archives. For
example, if the maximum object nesting level is set to 1, the application scans the message and its
attachments of the first nesting level during an Anti-Virus scan. If these objects are found to contain threats,
the application scans all attachments and objects of the first nesting level contained in them.
95
ADMINISTRATOR'S GUIDE
In the <useAnalyzer> subsection, specify the value 1 to enable the use of Heuristic Analyzer during Anti-
Virus scanning, or 0 to disable Heuristic Analyzer.
In the <heuristicLevel> subsection, specify the level of heuristic analysis to be used during Anti-Virus
scanning of messages. The following levels are available: Light, Medium, and Deep.
4. If necessary, specify the maximum volume of memory that Zeta Shield technology is allowed to use in the
<avSettings> section. To do so, type the maximum memory volume in megabytes in the
<zetaShieldMemoryLimit> subsection.
If the allocated memory proves insufficient for Zeta Shield technology to scan a message, the scanning is
interrupted and the message receives the Zeta Shield scan error verdict.
The default maximum volume of memory used by Zeta Shield is set to 100 MB.
6. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
To configure the settings for processing messages with objects that cannot be disinfected:
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <avSettings> section, specify the action to be taken by the application on objects that could not be
disinfected (the <InfectedFirstAction> setting) or from which an attachment could not be removed (see
section "Configuring Anti-Virus scan settings for a rule" on page 97) (<InfectedSecondAction> setting):
In the <emergencyAction> subsection, specify the action to be taken by the application on messages
with objects that could not be disinfected: RejectMessage (the message will be rejected) or
DeleteMessage (the message will be deleted).
96
ANTI-VIRUS PROTECTION
In the <backupEmergency> subsection, specify the value 1 to save a copy of the deleted message in
Backup, or 0 to delete the message without saving its copy.
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. Specify the preferred action to be taken by the application (see section "About actions on objects" on page 80)
on messages found to contain intrusion threats. To do so, in the <avScanSettings> section, specify the value
Skip, DeleteMessage or Reject for the <intrusionThreatAction> setting.
4. Specify the preferred action to be taken by the application on infected messages (messages with Infected status
and messages with Probably Infected status that contain potentially malicious objects). To do so, in the
<avScanSettings> section, specify the value Skip, Cure, DeleteMessage, DeleteAttachment or
Reject for the <infectedFirstAction> setting.
5. Specify the preferred action to be performed on infected messages (with Infected status) that cannot be
disinfected. To do so, in the <avScanSettings> section, specify the value DeleteMessage,
DeleteAttachment or Reject for the <infectedSecondAction> setting.
6. Specify the preferred action to be taken on messages with Corrupted and Encrypted status. To do so, in the
<avScanSettings> section, specify the value Skip, DeleteMessage, DeleteAttachment or Reject
for the following settings:
97
ADMINISTRATOR'S GUIDE
7. If you selected the Delete and DeleteMessage actions at the previous steps of the sequence, you can
configure the application to move a message copy to Backup before deleting the message (see section "About
Backup" on page 133). To do so, in the <asScanSettings> section, specify the value 1 for the following
settings:
8. The default setting for messages with Corrupted and Encrypted status is 0 – do not save message copy in Backup.
9. If you selected Skip, Cure, or DeleteAttachment, at Steps 3-6 of the sequence, you can edit the text of the
tag added to the Subject field of the message. To do so, in the <avScanSettings> section, specify the text of
the stamp as the value for the following settings:
11. To import rule settings from an XML file, use the command:
# /opt/kaspersky/klms/bin/klms-control \
If the attachment contains an archive with objects having different scan statuses, all objects of the message or the entire
attachment are subject to one (most severe) action depending on all scan statuses assigned to objects in the archive.
# /opt/kaspersky/klms/bin/klms-control \
98
ANTI-VIRUS PROTECTION
3. In the <engineSettings> subsection of the <avScanSettings> section, specify 1 as the value of each
relevant setting corresponding to the file format inside the <excludedFormats> subsection:
If executable files need to be excluded from scanning, in the <executableCategory> subsection specify
the value 1 for the settings corresponding to the executable file formats that you want to exclude from
scanning.
If document files need to be excluded from scanning, in the <officeCategory> subsection specify the
value 1 for the settings corresponding to the document file formats that you want to exclude from scanning.
If image attachments need to be excluded from scanning, in the <imageCategory> subsection specify the
value 1 for the settings corresponding to the file formats that you want to exclude from scanning.
If archived objects need to be excluded from scanning, in the <archiveCategory> subsection specify the
value 1 for the settings corresponding to the file formats that you want to exclude from scanning.
If database files need to be excluded from the scan, in the <databaseCategory> subsection specify the
value 1 for the settings corresponding to the file formats that you want to exclude from scanning.
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
99
ADMINISTRATOR'S GUIDE
3. Specify the names of attachments to be excluded from scanning. To do so, in the <engineSettings> subsection of
the <avScanSettings> section, specify the file name masks as the values of the <excludedNames> setting.
You can use the "*" and "?" symbols to create a name mask.
If you need to add several file names, each file name must be in a separate <item> section, typed in a new
string of the settings file.
Example:
<excludedNames>
<item>*.iso</item>
</excludedNames>
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. Specify the maximum size that should be scanned (0 - no size restriction). To this end, in the
<engineSettings> subsection of the <avScanSettings> section, specify a value not exceeding 10485760
for the <maxSizeLimit> setting.
# /opt/kaspersky/klms/bin/klms-control \
100
ANTI-PHISHING PROTECTION
This section contains information about Anti-Phishing protection of messages and how to configure it.
IN THIS SECTION
Enabling and disabling Anti-Phishing scanning of messages for a rule ........................................................................ 102
The Anti-Phishing engine scans messages for phishing threats and links to websites with malware. The Anti-Phishing
engine analyzes the message content (including the Subject header) and attached files.
Based on the Anti-Phishing scan results, the application assigns one of the Anti-Phishing scan statuses to the message
(see section "About scan and content filtering statuses" on page 75) and adds a status tag at the beginning of the
message subject. The message status tag (Subject field) can be configured in the rule settings (see section "Configuring
Anti-Phishing scan message processing settings" on page 103).
Depending on the status assigned to the message, the application performs an action (see section "Configuring Anti-
Phishing scan message processing settings" on page 103) on the message in accordance with the message processing
rule. You can specify actions to be performed by the application on messages with a certain status. The default action
taken by the application on messages is Skip, with messages delivered to users unchanged.
The Anti-Phishing engine is enabled by default. If required, you can disable the Anti-Phishing engine or disable Anti-
Phishing scanning for any rule.
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
101
ADMINISTRATOR'S GUIDE
3. In the <apSettings> section, specify one of the following values for the <enableApScan> setting:
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. In the <engineSettings> subsection of the <apScanSettings> section, specify one of the following values
of the <enableScan> setting:
# /opt/kaspersky/klms/bin/klms-control \
102
ANTI-PHISHING PROTECTION
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <apSettings> section, specify the values of the relevant Anti-Phishing scan settings:
In the <enableHeuristic> subsection, specify the value 1 to enable Heuristic Analyzer during Anti-
Phishing scanning, or 0 to disable Heuristic Analyzer.
In the <useKsnStatus> subsection, specify the value 1 if you want the application to use information from
Kaspersky Security Network when issuing a phishing verdict on the message, or 0 if you do not want the
application to use information from Kaspersky Security Network.
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
103
ADMINISTRATOR'S GUIDE
3. Specify the preferred action to be taken by the application (see section "About actions on objects" on page 80)
on messages. To do so, in the <apScanSettings> section specify the value Skip, DeleteMessage or
Reject for the <phishingAction> setting if the message has status as Phishing or Malicious link.
4. If you selected the DeleteMessage action at the previous step of the sequence, you can configure the
application to move a copy of the message found to contain a phishing threat to Backup before deleting the
message (see section "About Backup" on page 133). To do so, in the <apScanSettings> section, specify the
value 1 for the <backupPhishing> setting.
5. If you selected Skip at Step 3 of the sequence, you can edit the text of the tag added to the Subject field of the
message. To do so, in the <apScanSettings> section, specify the text of the stamp as the value for the
following settings:
# /opt/kaspersky/klms/bin/klms-control \
104
CONTENT FILTERING
This section contains information about content filtering of messages and how to configure it.
IN THIS SECTION
by message size (see section "Configuring content filtering by message size" on page 107);
by mask of attachment names (see section "Configuring content filtering by attachment name" on page 108);
by attachment format (see section "Configuring content filtering by attachment format" on page 109).
You can specify the maximum size of messages, mask undesirable file names, and specify undesirable file formats.
As a result of content filtering, the message scanning control module assigns one of the content filtering statuses to the
message.
Depending on the status assigned to the message, the application performs an action (see section "About actions on
objects" on page 80) configured in the settings of the rule applied to the message. You can specify actions to be
performed by the application on messages with a certain status. The program rejects messages by default.
By default, content filtering of messages is disabled. You can enable content filtering of messages by the application (see
section "Enabling and disabling content filtering of messages" on page 105) or enable content filtering of messages for
any rule (see section "Enabling and disabling content filtering of messages for a rule" on page 106).
105
ADMINISTRATOR'S GUIDE
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <cfSettings> section, specify one of the following values for the <enableCfScan> setting:
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. In the <engineSettings> subsection of the <cfScanSettings> section, specify one of the following values
of the <enableScan> setting:
106
CONTENT FILTERING
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
4. Specify the maximum allowed size for messages, for example, 10 MB. To do so, in the <engineSettings>
subsection of the <cfScanSettings> section, specify the value 10485760 for the <maxAllowedSize>
setting.
5. Specify the preferred action to be taken by the application (see section "About actions on objects" on page 80)
on messages exceeding the specified size. To do so, in the <cfScanSettings> section, specify the value
Skip, DeleteMessage or Reject for the <sizeExceededAction> setting.
6. If necessary, you can configure the application to move messages exceeding the specified size to Backup (see
section "About Backup" on page 133). To do so, in the <cfScanSettings> section, specify the value 1 for
the <backupSizeExceeded> setting.
# /opt/kaspersky/klms/bin/klms-control \
107
ADMINISTRATOR'S GUIDE
# /opt/kaspersky/klms/bin/klms-control \
4. Specify the names of attached files that are banned. To do so, in the <engineSettings> subsection of the
<cfScanSettings> section, specify the file name masks as the values of the <bannedFileNames> setting.
You can use the "*" and "?" symbols to create a name mask.
If you need to add several file names, each file name must be in a separate <item> section, typed in a new
string of the settings file.
Example:
<bannedFileNames>
<item>*.exe</item>
</bannedFileNames>
5. Specify the preferred action to be taken by the application (see section "About actions on objects" on page 80)
on messages with attachments that have banned names. To do so, in the <cfScanSettings> section,
specify the value Skip, DeleteMessage or Reject for the <bannedFileNameAction> setting.
6. If necessary, you can configure the application to move copies of messages with attachments that have banned
names to Backup (see section "About Backup" on page 133). To do so, in the <cfScanSettings> section,
specify the value 1 for the <backupBannedFileName> setting.
# /opt/kaspersky/klms/bin/klms-control \
108
CONTENT FILTERING
# /opt/kaspersky/klms/bin/klms-control \
4. Specify the formats of attached files that are banned. To do so, in the <engineSettings> subsection of the
<cfScanSettings> section, specify the value 1 for each setting corresponding to file formats inside the
<bannedFileFormats> subsection:
To block the sending of executable files, in the <executableCategory> subsection specify the value 1
for the settings corresponding to the executable file formats that you want to block.
To block the sending of document files, in the <officeCategory> subsection specify the value 1 for the
settings corresponding to the file formats that you want to block.
To block the sending of multimedia files, in the <multimediaSubcategory> subsection specify the value
1 for the settings corresponding to the file formats that you want to block.
To block the sending of image attachments, in the <imageCategory> subsection specify the value 1 for
the settings corresponding to the file formats that you want to block.
To block the sending of archived objects, in the <archiveCategory> subsection specify the value 1 for
the settings corresponding to the file formats that you want to block.
To block the sending of database files, in the <databaseCategory> subsection specify the value 1 for the
settings corresponding to the file formats that you want to block.
5. Specify the preferred action to be taken by the application (see section "About actions on objects" on page 80)
on messages with attachments of banned formats. To do so, in the <cfScanSettings> section, specify the
value Skip, DeleteMessage or Reject for the <bannedFileFormatAction> setting.
6. If necessary, you can configure the application to move copies of messages with attachments of banned
formats to Backup (see section "About Backup" on page 133). To do so, in the <cfScanSettings> section,
specify the value 1 for the <backupBannedFileFormat> setting.
# /opt/kaspersky/klms/bin/klms-control \
109
UPDATING KASPERSKY SECURITY
DATABASES
This section contains information about updating Anti-Virus, Anti-Spam, and Anti-Phishing databases.
IN THIS SECTION
Virus analysts at Kaspersky Lab detect hundreds of new threats daily, create records to identify them, and include them
in database updates packages (or update packages). Update packages consist of one or several files containing records
to identify threats that were detected since the previous update package was released. In order to minimize the risk of
infecting the protected server, we recommend that you receive database update packages regularly.
As long as the license is in effect, you can receive database update packages from Kaspersky Lab's website
automatically on schedule, or download and install them manually.
During installation, Kaspersky Linux Mail Security downloads the latest databases from one of Kaspersky Lab's update
servers. If you have configured automatic database updates, Kaspersky Security runs updates according to schedule
(with a frequency of once per 5 minutes).
Kaspersky Linux Mail Security periodically and automatically checks for new update packages on Kaspersky Lab's
update servers. By default, if the Kaspersky Linux Mail Security databases have not been updated for a week since
Kaspersky Lab released the last updates, Kaspersky Linux Mail Security logs the event Databases are out of date. If the
databases have not been updated for two weeks, Kaspersky Security logs the event Databases are obsolete. You can
configure administrator notifications about these events.
110
UPDATING KASPERSKY SECURITY DATABASES
up to date (UpToDate);
outdated (Outdated);
obsolete (Obsoleted).
# /opt/kaspersky/klms/bin/klms-control --get-avs-bases-info
number of records;
Example:
<root>
<status>UpToDate</status>
<recordCount>8095519</recordCount>
</root>
# /opt/kaspersky/klms/bin/klms-control --get-asp-bases-info
Example:
<root>
<status>UpToDate</status>
</root>
111
ADMINISTRATOR'S GUIDE
# /opt/kaspersky/klms/bin/klms-control --get-aph-bases-info
Example:
<root>
<status>UpToDate</status>
</root>
The main update source is Kaspersky Lab's update servers. These are special Internet sites which contain updates for
databases and application modules for all Kaspersky Lab products. If you use a proxy server to connect to the Internet,
you should configure its settings.
To reduce the amount of Internet traffic, you can configure Kaspersky Security databases from a custom update source.
In addition, HTTP/FTP servers or local directories on the user's computer can act as user updates sources.
If Kaspersky Security is managed using Kaspersky Security Center, you can specify Kaspersky Security Center as the
update source.
Kaspersky Security does not support updates from HTTP and FTP servers with authentication.
# /opt/kaspersky/klms/bin/klms-control \
112
UPDATING KASPERSKY SECURITY DATABASES
3. In the <updateCommonSettings> section, specify Custom as the value of the sourceType setting:
<sourceType>Custom</sourceType>
4. In the <customSources> subsection, specify the custom update source (a local folder on the computer or
HTTP/FTP server).
If you need to add several custom update sources, each new custom update source must be in a separate
<item> section, typed in a new string of the settings file.
Example:
<updateCommonSettings>
<sourceType>Custom</sourceType>
<customSources>
<item>
ftp://172.16.10.145/xz6
</item>
<item>
http://172.16.10.145/xz6
</item>
</customSources>
6. To import settings from an XML file to an update task, use the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. In the <updateCommonSettings> section, specify KLServers as the value of the sourceType setting:
<sourceType>KLServers</sourceType>
113
ADMINISTRATOR'S GUIDE
5. To import settings from an XML file to an update task, use the command:
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. In the <updateCommonSettings> section, specify SCServer as the value of the sourceType setting:
<sourceType>SCServer</sourceType>
5. To import settings from an XML file to an update task, use the command:
# /opt/kaspersky/klms/bin/klms-control \
To enable configure the settings of a proxy server for accessing update sources:
1. Export the Kaspersky Security general settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
3. Enable the use of a proxy server for accessing update sources. To do so, specify the values in the following
subsections of the <proxySettings> section:
a. In the <enable> subsection, specify the value 1 to enable the use of a proxy server.
b. In the <serverAddress> subsection, specify the name or IP address of the proxy server.
c. In the <port> subsection, specify the port number for connecting to the proxy server.
114
UPDATING KASPERSKY SECURITY DATABASES
e. If the connection to the proxy server requires authentication, specify the user name and password in the
<user> and <password> subsections.
f. In the <proxyBypassLocalAddresses> subsection, specify the value 1 to disable the use of a proxy
server for local company addresses, or 0 to enable the use of a proxy server for local company addresses.
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. In the <schedule> section, specified the preferred settings (see section "Update task schedule settings" on
page 115).
5. To import settings from an XML file to an update task, use the command:
# /opt/kaspersky/klms/bin/klms-control \
<schedule>
<ruleType>Once|Monthly|Weekly|Daily|Hourly|Minutely|Manual</ruleType>
<startByTime>
115
ADMINISTRATOR'S GUIDE
<year>year</year>
<month>month</month>
<hour>hours</hour>
<min>minutes</min>
<sec>seconds</sec>
<dayOfMonth>day of month</dayOfMonth>
<dayOfWeek>day of week</dayOfWeek>
<timePeriod>1</timePeriod>
</startByTime>
<randInterval><minutes></randInterval>
<execTimeLimit><minutes></execTimeLimit>
<runMissed>0|1</runMissed>
</schedule>
Once – once.
Monthly – monthly.
Weekly – weekly.
Manual – manually.
startByTime Start time. If you do not specify a start time, the current system date and / or time is set by
default (see table below).
randInterval Randomize the task launch within a time interval (in minutes) to equalize the load on the
mail server while multiple scheduled tasks are running simultaneously. Format – [0;999].
execTimeLimit Limit the duration of the task interval (in minutes). Format – [0;999].
runMissed Run missed tasks.
Possible values include:
116
UPDATING KASPERSKY SECURITY DATABASES
117
ADVANCED CONFIGURATION OF
KASPERSKY SECURITY
IN THIS SECTION
In addition, when creating a new rule (see section "Creating message processing rules" on page 78), you can specify
one of the rule modes: reject messages without scanning (in which case the application processes messages according
to this rule in the same way as it does according to the BlackList rule) or skip messages without scanning (in which case
the application processes messages according to this rule in the same way as it does according to the WhiteList rule).
# /opt/kaspersky/klms/bin/klms-control \
# /opt/kaspersky/klms/bin/klms-control \
3. Make the required changes in the <belongingCriteria> section, specifying the addresses of the sender and
recipient in the <sender> and <recipient> settings, respectively.
If you need to add several sender and recipient email addresses, each new email address must be in a
separate <item> section, typed in a new string of the settings file.
118
ADVANCED CONFIGURATION OF KASPERSKY SECURITY
Example:
<belongingCriteria>
<sender>
<item>
<type>EMailMask</type>
<value>*</value>
</item>
<item>
<type>CIDR</type>
<value>172.16.10.145</value>
</item>
</sender>
<recipient>
<item>
<type>ExternalAccount</type>
<value>CN=test10,OU=SBSUsers,OU=Users,OU=MyBusiness,DC=sbs2k8,DC=local</value>
</item>
</recipient>
</belongingCriteria>
You can use the symbols "*" and "?" to create a an address mask, and regular expressions beginning with the
prefix "re:".
4. In the <ScanSettings> section, specify 1 as the value of the <active> setting to activate the rule.
# /opt/kaspersky/klms/bin/klms-control \
119
ADMINISTRATOR'S GUIDE
1. Export the ScanLogic task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
2. Open the XML file of the ScanLogic task to edit the task settings.
3. In the <scanThreads> section, change the number of scan threads. The default number of scan threads is
eight.
5. Import the ScanLogic task settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
To export Kaspersky Security task settings to a file, execute the following command:
To import Kaspersky Security task settings from a file, execute the following command:
To export Kaspersky Security rule settings to a file, execute the following command:
To import Kaspersky Security rule settings from a file, execute the following command:
120
INTEGRATING THE APPLICATION WITH AN
EXTERNAL USER SERVICE USING THE
LDAP PROTOCOL
This section contains information about how to integrate Kaspersky Security with an external user service using the
LDAP protocol.
IN THIS SECTION
About integration with an external user service via LDAP ............................................................................................. 121
Configuring the application connection to an external user service using LDAP ........................................................... 121
Adding senders / recipients from an external user service to rules ............................................................................... 123
Integration with an external user service is required to perform the following tasks:
Add senders / recipients from an external user service to message processing rules.
1. Export the Auth process settings to an XML file using the command:
121
ADMINISTRATOR'S GUIDE
3. Specify the preferred type of integration between the application and the external user service via LDAP in the
<integrationType>: section <LDAPGeneric> (for integration with LDAP) or <AD> (for integration with Active
Directory).
4. Depending on the type of integration, specify the values of the following settings in the <LDAPGeneric> or
<AD> sections:
<host> – address of the server with the openLDAP or Active Directory service, depending on the type of
integration selected in the <integrationType> section,
<connectionType> – the type of connection to Active Directory or server with the openLDAP service:
TLS, LDAP via SSL or without encryption,
<port> – port of the server with the openLDAP or Active Directory service, depending on the type of
connection selected in the <connectionType> section,
<host><IP address></host>
<port>389</port>
<bindDn>user@companyname.com</bindDn>
<password>123456</password>
<searchBase>dc=companyname,dc=com</searchBase>
<host>IP address</host>
<port>389</port>
<bindDn>cn=admin,dc=site</bindDn>
<password>123456</password>
<searchBase>dc=site</searchBase>
5. Specify the timeout for establishing a connection to the openLDAP or Active Directory service in the
<netTimeoutInSeconds> section. If the server does not respond during the specified time, the "Can not
contact LDAP server" result is returned.
7. Import the Auth process settings from an XML file using the command:
We recommend using an unprivileged user account when configuring the application connection to an external user
service using LDAP.
122
INTEGRATING THE APPLICATION WITH AN EXTERNAL USER SERVICE USING THE LDAP PROTOCOL
# /opt/kaspersky/klms/bin/klms-control --test-ldap-settings-connection
# /opt/kaspersky/klms/bin/klms-control \
3. Create new <item> section in the <sender> subsection (to add a sender) or <recipient> subsection (to
add a recipient) of the <belongingCriteria> section.
If you need to add several sender and recipient email addresses, each new email address must be in a
separate <item> section, typed in a new string of the settings file.
Both the message sender and recipient must be specified in the rule.
Example:
<belongingCriteria>
<sender>
<item>
<type>EMailMask</type>
<value>*</value>
</item>
</sender>
<recipient>
<item>
<type>ExternalAccount</type>
123
ADMINISTRATOR'S GUIDE
<value>CN=test10,OU=SBSUsers,OU=Users,OU=MyBusiness,DC=sbs2k8,DC=local</value>
</item>
</recipient>
</belongingCriteria>
7. Import the rule settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
1. Get a sample rule settings file and save it to an XML file, for example personal_user1.xml, with the
following command:
Example:
<root>
<blackList>
<item></item>
</blackList>
<whiteList>
<item></item>
</whiteList>
</root>
2. Use the <item> subsection of the <blackList> section to add senders' addresses to the black list of
addresses, and the <item> subsection of the <whiteList> section to add senders' addresses to the white list
of addresses.
If you need to add several senders' addresses, each new email address must be specified in a separate
<item> section in a new line of the settings file.
124
INTEGRATING THE APPLICATION WITH AN EX TERNAL USER SERVICE USING THE LDAP PROTOCOL
Example:
<root>
<blackList>
<item>
user1@mycompany.com
</item>
<item>
user2@mycompany.com
</item>
</blackList>
<whiteList>
<item>
administrator@mycompany.com
</item>
</whiteList>
</root>
3. Save this personal black or white list of addresses for the relevant external service user account (for example,
for the account cn=user1001,ou=users,dc=site user account) using the command:
# /opt/kaspersky/klms/bin/klms-control --personal \
You can specify the e-mail address of a user instead of the user’s account.
# /opt/kaspersky/klms/bin/klms-control --personal \
2. Export the Auth task settings to an XML file using the command:
125
ADMINISTRATOR'S GUIDE
3. Set the integration type to Custom in the Auth task settings file with the following command:
sed -i 's|<integrationType>.*</integrationType>|<integrationType>Custom
</integrationType>|g' auth_settings.xml
4. Change the path to the custom scripts in the task settings file with the following command:
sed -i 's|<binPath>.*</binPath>|<binPath>/opt/usr/sbin</binPath>|g'
auth_settings.xml
5. Import Auth ask settings from the XML-file to the program with the following command:
The response of Kaspersky Security to a missing certificate or an untrusted certificate is configured using the
TLS_REQCERT <level> setting. This setting is located in the configuration file:
/etc/opt/kaspersky/klms/ldap.conf. The format of the ldap.conf file depends on the LDAP library used.
never. Kaspersky Security does not request a certificate from Active Directory or the server with the openLDAP
service.
allow. Kaspersky Security requests a certificate from Active Directory or the server with the openLDAP
service. If the certificate has not been sent or an untrusted certificate has been sent, the TLS session continues.
This is the default value.
try. Kaspersky Security requests a certificate from Active Directory or the server with the openLDAP service. If
the certificate is not sent, the TLS session continues. If an untrusted certificate is sent, the TLS session is
interrupted.
demand / hard. The demand and hard values are equivalent. Kaspersky Security requests a certificate from
Active Directory or the server with the openLDAP service. If the certificate is missing or an untrusted certificate
has been sent, the TLS session is interrupted.
After changing the value of the TLS_REQCERT parameter and saving the ldap.conf file, restart Kaspersky Security to
apply changes.
126
USING THE APPLICATION VIA THE SNMP
PROTOCOL
This section contains information about how to use Kaspersky Linux Mail Security via the SNMP protocol and configure
runtime trap events.
IN THIS SECTION
About receiving runtime information via the SNMP protocol ......................................................................................... 127
Configuring interaction with the application via the SNMP protocol .............................................................................. 127
general information;
The application uses an SNMP agent to interact via the SNMP protocol. The SNMP agent supports the AgentX protocol
(version 1). Any SNMP agent that supports AgentX can be used as an SNMP manager. Kaspersky Security works with
SNMP managers that support SNMP v2, v2c, v3.
If you plan to take meter readings with utilities from the Net-SNMP package, you need to upgrade the Net-SNMP
package to the latest version.
127
ADMINISTRATOR'S GUIDE
IN THIS SECTION
Viewing the MIB structure using the snmpwalk command ............................................................................................ 129
# /opt/kaspersky/klms/bin/klms-control --get-task-list
1. Configure the address of the SNMP master agent by specifying the following value in the snmpd.conf file:
master agentx
AgentXSocket tcp:0.0.0.0:705
2. Export the SNMP task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
4. Specify the address of the SNMP master agent in the following section:
<masterAgentAddress>tcp:127.0.0.1:705</masterAgentAddress>
5. Enable the use of the SNMP protocol by specifying the value 1 in the <enableSNMP> section.
7. Import the settings from the XML file to the SNMP task using the command:
# /opt/kaspersky/klms/bin/klms-control \
After importing the settings, restart Kaspersky Security to apply the changes.
You can now call MIB objects in Kaspersky Security and receive information via the SNMP protocol using OID objects.
Kaspersky Security is distributed with MIB files containing the symbol names of MIB objects, events, and their settings.
When Kaspersky Security is installed, the MIB files are located in the directory: /opt/kaspersky/klms/share/snmp-mibs.
128
USING THE APPLICATION VIA THE SNMP PROTOCOL
1. Export the SNMP task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
5. Import the settings from the XML file to the SNMP task using the command:
# /opt/kaspersky/klms/bin/klms-control \
129
MANAGING COMPANY EMPLOYEE
ACCOUNTS
This section describes how you can manage accounts of company employees and configure their settings.
IN THIS SECTION
Configuring the transmission of infected messages placed in Backup to users ............................................................ 131
1. Export the application's general settings to an XML file using the command:
3. In the <helpdesk> section, specify one of the following values for the <enable> parameter:
5. Import the application's general settings from an XML file using the command:
130
MANAGING COMPANY EMPLOYEE ACCOUNTS
1. Export the application's general settings to an XML file using the command:
3. To allow or block employees working under the account being configured to access personal white and black
lists of addresses, specify one of the following values for the <accessBlackWhiteList> parameter in the
<helpdesk> section:
5. Import the application's general settings from an XML file using the command:
6. To specify the name for a company employee account, run the following command:
7. To specify the password for a company employee account, run the following command:
The names and passwords of all accounts for using the application are located at the following path:
/var/opt/kaspersky/klms/db/passwd.
131
ADMINISTRATOR'S GUIDE
3. In the <root> section, specify one of the following values for the <allowAvThreatsRestoration>
parameter:
1, to allow users working under the company employee account to send infected messages placed in
Backup to users;
0, to block users working under the company employee account from sending infected messages placed in
Backup to users.
5. Import the Backup settings from an XML file using the command:
132
BACKUP
This section contains information about Backup and how to use it.
IN THIS SECTION
ABOUT BACKUP
Kaspersky Security places copies of messages in Backup. Copies of messages are stored in Backup in unreadable
format and therefore do not compromise your computer's security.
Copies of messages after Anti-Virus engine scanning, before attempting to cure or delete the messages, or
deleting an attachment using the Cure, DeleteMessage or DeleteAttachment actions (see section
"Configuring Anti-Virus scan settings for a rule" on page 97).
After scanning by the Anti-Spam engine: copies of messages assigned Spam / Probable spam / Blacklisted
status, before attempting to delete them using the DeleteMessage action, provided that the application is
configured to move messages to Backup when processing them according to a rule (see section "Configuring
Anti-Spam scan settings for a rule" on page 87).
After scanning by the Anti-Phishing engine: copies of messages assigned Phishing / Malicious link status,
before attempting to delete them using the DeleteMessage action, provided that the application is configured
to move messages to Backup when processing them according to a rule (see section "Configuring Anti-Phishing
scan message processing settings" on page 103).
After content filtering: copies of messages that violate the content filtering criteria, provided that the processing
rule is configured to place copies of such messages in Backup when content filter criteria are violated by size
(see section "Configuring content filtering by message size" on page 107) / attachment name (see section
"Configuring content filtering by attachment name" on page 108) / attachment format (see section "Configuring
content filtering by attachment format" on page 109).
The default maximum Backup space is 1 GB. As soon as this threshold value is exceeded, the application starts to
delete the oldest messages from Backup. When the amount of occupied space is again below the threshold value, the
application stops deleting messages from Backup.
133
ADMINISTRATOR'S GUIDE
View the statistics of message copies in Backup (see section "Viewing statistics of message copies in Backup"
on page 134).
Filter the details of message copies in Backup (see section "Filtering the details of message copies in Backup"
on page 134).
Delete message copies from Backup (see section "Deleting message copies from Backup" on page 135).
Deliver messages from Backup to recipients (see section "Delivering messages from Backup to recipients" on
page 135). Any email address, including one that is not present in the "To" field of the message, can be
specified as the recipient's email address.
Save messages from Backup to file (see section "Saving messages from Backup to file" on page 135).
The local area network administrator can be held liable for unauthorized access to information transmitted in messages
stored in Backup.
The application shows information about message copies in Backup, such as:
message subject;
attachments;
134
BACKUP
delete all copies of messages matching the specified filtration criteria (see section "Filtering the details of
message copies in Backup" on page 134).
To delete one message copy from Backup, execute the following command:
To delete copies of all messages processed according to one rule, execute the following command:
To delete all copies of messages matching the specified filtration criteria, execute the following command:
Saving infected and probably infected messages poses a security threat to your computer.
# /opt/kaspersky/klms/bin/klms-control --backup \
--save –message-id <message ID> --rule-id <rule ID> -file <file name>
Delivering infected and probably infected messages from Backup could pose a security threat to computers.
135
ADMINISTRATOR'S GUIDE
To deliver a message from Backup to its recipients, execute the following command:
# /opt/kaspersky/klms/bin/klms-control --backup \
--deliver –message-id <message ID> --rule-id <rule ID> --recipients <recipient email
address> <recipient email address>
1. Export the Backup task settings to an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
3. In the <maxSize> section, specify the maximum size (in bytes) that can be taken up by Backup.
When this limit is exceeded, the application tries to delete the oldest messages from Backup.
5. Import the rule settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control \
136
EMAIL NOTIFICATIONS
This section contains information about mail notifications and how to configure them.
IN THIS SECTION
Specifying additional email addresses for delivery of email notifications about objects ................................................ 139
You can configure the delivery of email notifications (see section "Enabling delivery of email notifications about objects"
on page 138) about infected or corrupted objects, object scanning errors, or violations of content filtering criteria, to the
administrator or the message sender or recipient, and to email addresses you specify (see section "Specifying additional
email addresses for delivery of email notifications about objects" on page 139).
Various events occur during the operation of Kaspersky Security. They reflect changes in the status of Kaspersky
Security. You can configure the delivery of event notifications to the administrator by email (see section "Configuring
delivery of email event notifications to the administrator" on page 140).
137
ADMINISTRATOR'S GUIDE
Kaspersky Security contains templates of notifications for the mail server administrator, or for the sender or recipient of a
message. You can edit these notification templates (see section "Editing templates of email event notifications" on
page 141).
# /opt/kaspersky/klms/bin/klms-control \
<additional> for delivery of notifications to the additional email addresses you specified (see section
"Specifying additional email addresses for delivery of email notifications about objects" on page 139).
<enableCorrupted> for notifications about corrupted objects or errors during scanning of an object;
# /opt/kaspersky/klms/bin/klms-control \
138
EMAIL NOTIFICATIONS
# /opt/kaspersky/klms/bin/klms-control \
3. In the <additional> subsection of the <notificationSettings> section, specify the list of email
addresses for delivery of notifications with the following settings:
<emailListCorrupted> for notifications about corrupted objects or errors during scanning of an object;
If you need to add several email addresses for sending notifications, each new address must be in a separate
<item> section in a new line of the settings file.
Example:
<additional>
<options>
<enableInfected>0</enableInfected>
<enableCorrupted>1</enableCorrupted>
<enableEncrypted>0</enableEncrypted>
<enableCFFail>0</enableCFFail>
<enablePhishing>0</enablePhishing>
</options>
<emailListInfected />
<emailListCorrupted>
<item>
139
ADMINISTRATOR'S GUIDE
administrator@mycompany.com
</item>
</emailListCorrupted>
<emailListEncrypted />
<emailListCFFail />
<emailListPhishing />
</additional>
# /opt/kaspersky/klms/bin/klms-control \
1. Export the application's general settings to an XML file using the command:
3. In the <adminEmailAddresses> section, specify the email addresses of the administrator to which
notifications are to be sent.
4. In the <replyEmailAddress> section, you can specify the address from which notifications are to be sent.
6. Import the application's general settings from an XML file using the command:
7. Export the settings of the Notifier module to an XML file using the command:
140
EMAIL NOTIFICATIONS
9. In the <notificationFlags> section, specify the value 1 for the following settings:
11. Import the settings from an XML file to the Notifier module using the command:
1. Export the settings of the Notifier module to an XML file using the command:
3. In the <notificationTemplates> section, edit the text of the relevant event notification template. You can
edit the template text using macros (see section "Using macros in templates of email event notifications" on
page 142).
If, while editing a template text, you use line breaks or characters that may cause errors during analysis by the
XML parser, you must use the following format: CDATA: <tag><![CDATA[ ... ]]></tag>.
The text fragment inside <![CDATA[ ... ]]>, is not analyzed by the XML parser, and is perceived as an ordinary
string that contains only character data and no markup.
5. Import the settings from an XML file to the Notifier module using the command:
141
ADMINISTRATOR'S GUIDE
The following macros can be used in notification texts (see table below).
142
EMAIL NOTIFICATIONS
143
RUNTIME REPORTS AND STATISTICS
This section contains information about reports and statistics on the operation of the application.
IN THIS SECTION
# /opt/kaspersky/klms/bin/klms-control --dashboard
You can view monthly (option --month), weekly (option --week), daily (option --day), or hourly (option --hour)
statistics.
Monthly and weekly statistics are given per day; daily statistics per hour; hourly statistics every 5 minutes.
NAME VALUE
threat Total number of infected, probably infected, corrupted, or encrypted messages, and
messages for which Anti-Virus scanning returned an error.
phishing The total number of messages containing phishing threats or links to websites with malware.
spam Total number of messages containing spam or potential spam, and messages from
undesirable senders.
content Total number of messages that triggered the application during content filtering by message
size, attachment name or format.
notScanned Total number of messages that have not been processed for some reason (for example,
messages have been excluded from scanning by the administrator, the license has expired,
the Anti-Virus engine, Anti-Spam engine, Anti-Phishing engine, or content filtering has been
disabled).
clean Total number of messages scanned by the application and identified as not infected, not
containing spam or phishing, and not violating the content filter settings.
total Total number of messages processed by the application.
CREATING REPORTS
Kaspersky Security can generate reports and statistics on the operation of the application.
144
RUNTIME REPORTS AND STATISTICS
today;
this month;
this year;
last month;
last year;
exact time.
IN THIS SECTION
# /opt/kaspersky/klms/bin/klms-control --report
last few days (option --last-days <ndays>, where <ndays> is the number of days; 1 by default);
145
ADMINISTRATOR'S GUIDE
exact time (option --exact-time YYYY[.MM[.DD]], where YYYY is the year, MM is the month, DD is the
day). If you use the full date format for an exact-time report, you can specify a report period using the option --
ndays <ndays>, where <ndays> is the number of days from the date specified for which you want to get a
report.
The following example illustrates how to create a report for the previous month:
Example:
The current month is May 2012. You need a report for April 2012.
The following example illustrates how to create a report for an exact time:
Example:
The following example illustrates how to create a report for an exact period:
Example:
The application creates a report for the period from 4 May through 9 May.
Different language options are available for all reports (option --lang). The list of languages depends on the application
localization packages installed. The default language is English.
Example:
146
RUNTIME REPORTS AND STATISTICS
In addition, you can configure the delivery of on-demand reports by email. To do so, use the option --deliver.
The following example illustrates how to configure the delivery of a report for the current month.
Example:
The application creates a report for this month and delivers it to the email addresses of the recipients that you specified.
1. Export DailyReport (ID=17), WeeklyReport (ID=18), or MonthlyReport (ID=19) task settings to an XML file using
the command:
# /opt/kaspersky/klms/bin/klms-control \
3. Specify 1 as the value of the <enableReport> setting to enable the generation of scheduled reports.
<dayOfWeek> – day of week [MON | TUE | WED | THU | FRI | SAT | SUN] (for WeeklyReport task);
in the <sendOptions> section, specify the value 1 for the <enableSend> setting;
in the <recipientsAddresses> section, specify the email addresses to which scheduled reports are to
be sent.
6. Specify the language of the scheduled reports using the <lang> setting. The list of languages depends on the
application localization packages installed.
8. Import the settings from an XML file to a DailyReport, WeeklyReport, or MonthlyReport task using the command:
# /opt/kaspersky/klms/bin/klms-control \
147
EVENT LOG
This section contains information about the Event log and how to configure it.
IN THIS SECTION
Changing the system log category for storing events .................................................................................................... 149
EVENT LOG
Various events occur during the operation of Kaspersky Security. They reflect changes in the status of Kaspersky
Security. Information about these events is stored in the Event log.
The application keeps the Event log in the system log of the operating system (syslog) in the Mail category. If necessary,
you can change the category of the system log in which the application should log events. The application designates
Kaspersky Security events with the abbreviation KLMS to distinguish them from other events stored in the Mail category.
Info – informational events. At this level, the log stores email addresses of senders and receivers, the IP
address of the computer transmitting the message, as well as detailed information on message scan results.
By default, the application logs only error events (i.e., events with the Error level of importance) in the event log (see
table below). You can configure all application events to be recorded in the log.
148
EVENT LOG
In PostgreSQL, the Log level is higher than the Error level. For details, see
http://www.postgresql.org/docs/9.1/static/runtime-config-logging.html#RUNTIME-CONFIG-SEVERITY-LEVELS.
1. Export the Event log settings to an XML file using the command:
3. Specify the value of the <facility> setting to indicate the syslog category where the application is to log
events.
149
ADMINISTRATOR'S GUIDE
5. Import the Event log settings from an XML file using the command:
1. Export the Event log settings to an XML file using the command:
-f <file name>
3. Specify the level of importance of events that the application is to record in the Event log. To do so, specify one
of the following values for the <logLevel> setting:
Info – informational events. In this case the program writes to event log informational events and error
events.
5. Import the Event log settings from an XML file using the command:
# /opt/kaspersky/klms/bin/klms-control --set-settings \
Kaspersky Security installed on a computer running the FreeBSD operating system cannot record symbols that have
encoding other than ASCII in the event log. For this reason, any text having encoding other than ASCII is displayed
incorrectly when recorded in the event log.
For text having encoding other than ASCII to be displayed correctly in the event log, execute the following
commands:
2. /etc/rc.d/syslogd restart.
150
TRACE LOG
This section contains information about the Trace log and how to configure it.
IN THIS SECTION
By default, trace log files are stored in the directory /var/log/kaspersky/klms. You can specify the location of the trace log
on the hard drive (see section "Configuring the location of the trace log" on page 153).
You can specify the level of detail of the trace log (see section "Configuring the level of detail of the trace log" on
page 152).
The following levels of detail of the trace log are available for selection:
Warning – important events. The value of the smtp header that could not be decoded is recorded in the trace log.
Debug – debugging information. The trace log records the message subjects and addresses of senders and
recipients, attachment names, and other information about processed messages, as well as the full details of
message search queries. The log also records data from external sources and all links to web resources
contained in the messages. When milter is used, the trace log records all message headers.
The highest level of detail is Debug, at which all events are recorded in the trace log; the lowest level of detail is Fatal,
at which only critical events are recorded in the trace log. The default level of detail is set to Error.
At the Debug level, the trace log takes up a large amount of disk space and main contain confidential user information.
151
ADMINISTRATOR'S GUIDE
1. Export the application's general settings to an XML file using the command:
3. In the <tracerSettings> section, specify one of the following values for the <Enable> setting:
5. Import the application's general settings from an XML file using the command:
# /etc/init.d/klms restart
1. Export the application's general settings to an XML file using the command:
3. Specify the level of detail of the trace log. In the <Editing Task Settings> section, specify one of the following
values for the <level> setting:
5. Import the application's general settings from an XML file using the command:
# /etc/init.d/klms restart
152
TRACE LOG
1. Export the application's general settings to an XML file using the command:
3. You can specify the location of the trace log on the hard drive. To do so, specify one of the following values as a
<destination> value for the <tracerSettings> setting:
Files, if you want the application to keep the trace log in a separate file in the directory
/var/log/kaspersky/klms (this is the default value).
Syslog, if you want the application to record all events in the system log of the operation system.
5. Import the application's general settings from an XML file using the command:
# /etc/init.d/klms restart
1. Export the application's general settings to an XML file using the command:
3. Specify the trace file rotation settings. To do so, specify the values of the following settings in the
<tracerSettings> section:
NoRotation. Old trace files are overwritten with new trace files when the values of the
<rotationFileSize> setting or the <maxFileCount> setting are exceeded.
Monthly. Old trace files are overwritten with new trace files monthly when the values of the
<rotationFileSize> setting or the <maxFileCount> setting are exceeded.
Weekly. Old trace files are overwritten with new trace files weekly when the values of the
<rotationFileSize> setting or the <maxFileCount> setting are exceeded.
153
ADMINISTRATOR'S GUIDE
Daily. Old trace files are overwritten with new trace files daily when the values of the
<rotationFileSize> setting or the <maxFileCount> setting are exceeded.
Hourly. Old trace files are overwritten with new trace files hourly when the values of the
<rotationFileSize> setting or the <maxFileCount> setting are exceeded.
b. In the <rotationFileSize> subsection, specify the maximum size of the trace file (in bytes). When this
limit is exceeded, the old trace file is overwritten with a new trace file.
c. In the <maxFileSize> subsection, specify the maximum number of trace files that can be stored at any
one time. When the number of trace files exceeds this limit, the trace files are overwritten with new files.
5. Import the application's general settings from an XML file using the command:
154
TESTING THE APPLICATION OPERATION
This section provides information about how to ensure that the application detects viruses and their modifications and
performs the correct actions on them.
IN THIS SECTION
The EICAR test file is not a virus. The EICAR test file does not contain any program code that could damage your
computer. However, a major part of anti-virus applications identify the EICAR test file as a virus.
The EICAR test file is not intended for testing the functionality of the heuristic analyzer or searching for malware at the
system level (rootkits).
Do not use real viruses to test the functionality of anti-virus applications! This may damage your computer.
Do not forget to resume the anti-virus protection of Internet traffic and files after you have finished with the EICAR test file.
The first column of the table (see the table below) contains prefixes that you can use when creating modifications of the
EICAR test file. The second column lists all possible statuses assigned to the file, based on the results of the scan by the
application. The third column indicates how the application processes files with the specified status.
155
ADMINISTRATOR'S GUIDE
Do not forget to resume the anti-virus protection of messages after you have finished using the EICAR test file.
To test anti-virus protection of messages using one of the EICAR test files:
1. Download am EICAR test file from the official EICAR website at http://www.eicar.org/anti_virus_test_file.htm.
156
TESTING THE APPLICATION OPERATION
3. Send an email message with the EICAR test file to a computer with Kaspersky Security installed.
Kaspersky Security informs you that a threat has been detected and blocks the attempt to save the object.
4. If necessary, you can use various types of the EICAR test file (see section "About the types of the EICAR test
file" on page 155).
To test anti-virus protection of messages using one of the EICAR test files:
1. Download am EICAR test file from the official EICAR website at http://www.eicar.org/anti_virus_test_file.htm.
3. Add one of the prefixes to the head of the EICAR test file (see section "About the types of the EICAR test file"
on page 155).
4. Save the resulting file under a name corresponding to the type of the EICAR file. For example, by adding the
DELE- prefix, save the resulting file under the name eicar_dele.com.
5. Send an email message with the eicar_dele.com file in the attachment to a computer with Kaspersky Security
installed.
Kaspersky Security informs you that a threat has been detected and performs the action configured in the scan
settings.
157
ADMINISTRATION OF THE APPLICATION
THROUGH KASPERSKY SECURITY CENTER
This section describes how you can manage Kaspersky Security 8.0 for Linux Mail Server through Kaspersky Security
Center.
IN THIS SECTION
Viewing general information on the operation of Kaspersky Security in a computer cluster ......................................... 161
2. In the Managed computers folder of the console tree, open the folder with the name of the administration
group to which the relevant client computer belongs.
4. In the list of client computers, select the computer on which you want to start or stop Kaspersky Security.
Right-click to display the context menu of the client computer. Select Properties.
A list of Kaspersky Lab applications that are installed on the client computer appears in the right part of the
client computer properties window.
7. Select the application Kaspersky Security 8.0 for Linux Mail Server.
8. Do the following:
To start Kaspersky Security, click the button on the right of the list of Kaspersky Lab applications or do
the following:
a. Right-click to display the context menu of Kaspersky Security 8.0 for Linux Mail Server and select
Properties, or click the Properties button under the list of Kaspersky Lab applications.
The Kaspersky Security 8.0 for Linux Mail Server application settings window opens on the
General tab.
158
ADMINISTRATION OF THE APPLICATION THROUGH KASPERSKY SECURITY CENTER
To stop Kaspersky Security, click the button on the right of the list of Kaspersky Lab applications or do
the following:
a. Right-click to display the context menu of Kaspersky Security 8.0 for Linux Mail Server and select
Properties, or click the Properties button under the list of applications.
The Kaspersky Security 8.0 for Linux Mail Server application settings window opens on the
General tab.
MANAGING TASKS
This section describes how you can manage tasks for Kaspersky Security 8.0 for Linux Mail Server. View the Kaspersky
Security Center Administrator Guide for details on the concept of task management through Kaspersky Security Center.
IN THIS SECTION
About tasks for Kaspersky Security 8.0 for Linux Mail Server ....................................................................................... 159
You can create the following types of tasks to administer Kaspersky Security 8.0 for Linux Mail Server through Kaspersky
Security Center:
group tasks that are configured for client computers within one or more administration groups;
Tasks for sets of computers outside administration groups apply only to client computers that are specified in
the task settings. If new client computers are added to a set of computers for which a task is configured, this
task does not apply to these new computers. To apply the task to these computers, create a new task or edit
the settings of the existing task.
As part of remote administration of Kaspersky Security 8.0 for Linux Mail Server, you can create a key addition task:
while performing this task, the application adds a key for application activation, including an additional key.
start a task;
159
ADMINISTRATOR'S GUIDE
2. In the Managed computers folder of the console tree, open the folder with the name of the administration
group to which the relevant client computer belongs.
4. In the list of client computers, select a computer for which you want to create a local task.
Right-click to display the context menu of the client computer. Select Properties.
2. In the console tree, open the Tasks for sets of computers folder.
160
ADMINISTRATION OF THE APPLICATION THROUGH KASPERSKY SECURITY CENTER
STARTING A TASK
If Kaspersky Security 8.0 for Linux Mail Server is running (see section "Starting and stopping Kaspersky Security on a
client computer" on page 158) on a client computer, you can start a task on this client computer through Kaspersky
Security Center. If Kaspersky 8.0 for Linux Mail Server is stopped, the running tasks are aborted, and it is no longer
possible to manage tasks on this client computer through Kaspersky Security Center.
2. In the Managed computers folder of the console tree, open the Kaspersky security for Linux Mail Server
folder.
4. In the details pane, select the cluster for whose computers you want to view information on the operation of
Kaspersky Security 8.0 for Linux Mail Server.
A table with information on the operation of Kaspersky Security 8.0 for Linux Mail Server for each computer in
the cluster appears in the right part of the window.
161
CONTACTING THE TECHNICAL SUPPORT
SERVICE
This section provides information about how to obtain technical support and the requirements for receiving help from
Technical Support.
IN THIS SECTION
Before contacting Technical Support, please read the support rules (http://support.kaspersky.com/support/rules).
By telephone. This method allows you to consult with specialists from our Russian-language or international
Technical Support.
By sending a query from your Kaspersky Account on the Technical Support Service website. This method
allows you to contact Technical Support specialists through a request form.
Technical support is only available to users who purchased a license for the application. No technical support is available
to users of trial versions.
Before contacting Technical Support, please read the support rules http://support.kaspersky.com/support/rules. This will
allow our specialists to help you more quickly.
162
CONTACTING THE TECHNICAL SUPPORT SERVICE
You can send an online request to Technical Support in English, Russian, German, French, or Spanish.
In the fields of the online request form, specify the following data:
request type;
request description;
email address.
Technical Support sends a response to your query to Personal Cabinet and the email address that you specified in the
online request.
Some requests must be sent to the Virus Lab instead of Technical Support.
You can send requests to the Virus Lab in the following cases:
If you suspect that a file or website contains a virus, but Kaspersky Security does not detect any threat. Virus
Lab specialists analyze the file or URL that you send. If they detect a previously unknown virus, they add a
corresponding description to the database, which becomes available whenKaspersky Lab anti-virus applications
are updated.
If Kaspersky Security detects a virus in a file or on a website, but you are certain that this file or website is safe.
You can also send requests to the Virus Lab from the request form page
(http://support.kaspersky.com/virlab/helpdesk.html) without being registered in Personal Cabinet. On this page, you do
not have to specify the application activation code.
163
ADMINISTRATOR'S GUIDE
164
APPENDICES
IN THIS SECTION
/opt/kaspersky/klms/share/ – folder storing font files, files of the Kaspersky Security help system (manual pages),
localization packages, source code of Kaspersky Security modules, MIB files, and files with the text of the End User
License Agreement:
/opt/kaspersky/klms/share/man/ – folder storing files of the Kaspersky Security help system (manual pages);
/opt/kaspersky/klmsui/bin/klmsui-setup.pl – initial configuration script for the web interface of Kaspersky Security.
165
ADMINISTRATOR'S GUIDE
/opt/kaspersky/klmsui/share/htdocs – folder storing all hml resources of the Kaspersky Security web interface.
/opt/kaspersky/klmsui/libexec/ – folder storing service executable files of the Kaspersky Security web interface:
/opt/kaspersky/klmsui/libexec/cleanup.sh – script for cleaning up data remaining after removal of the Kaspersky
Security web interface;
166
APPENDICES
/usr/local/bin/klms-disable_content_reputation.pl – script for disabling content filtering and clearing the quarantine.
/usr/local/man/ – folder storing files of the Kaspersky Security help system (manual pages);
/usr/local/share/doc/klms/ – folder storing font files, images, localization packages, files with the text of the End User
License Agreement, MIB files, source code of modules:
/var/db/kaspersky/klms/cleanup.sh – script for cleaning up data remaining after Kaspersky Security removal;
167
KASPERSKY LAB ZAO
Kaspersky Lab software is internationally renowned for its protection against viruses, malware, spam, network and
hacker attacks, and other threats.
In 2008, Kaspersky Lab was rated among the world’s top four leading vendors of information security software solutions
for end users (IDC Worldwide Endpoint Security Revenue by Vendor). Kaspersky Lab is the preferred developer of
computer protection systems among home users in Russia, according to the COMCON survey "TGI-Russia 2009".
Kaspersky Lab was founded in Russia in 1997. Today, it is an international group of companies headquartered in
Moscow with five regional divisions that manage the company's activity in Russia, Western and Eastern Europe, the
Middle East, Africa, North and South America, Japan, China, and other countries in the Asia-Pacific region. The
company employs more than 2000 qualified specialists.
Products. Kaspersky Lab’s products provide protection for all systems—from home computers to large corporate
networks.
The personal product range includes anti-virus applications for desktop computers, notebooks, Tablet PCs, smartphones
and other mobile devices.
Kaspersky Lab delivers applications and services to protect workstations, file and web servers, mail gateways, and
firewalls. Used in conjunction with Kaspersky Lab’s centralized management system, these solutions ensure effective
automated protection for companies and organizations against computer threats. Kaspersky Lab's products are certified
by the major test laboratories, are compatible with the software of many suppliers of computer applications, and are
optimized to run on many hardware platforms.
Kaspersky Lab’s virus analysts work around the clock. Every day they uncover hundreds of new computer threats, create
tools to detect and disinfect them, and include them in the databases used by Kaspersky Lab applications. Kaspersky
Lab's Anti-Virus database is updated hourly; and the Anti-Spam database every five minutes.
Technologies. Many technologies that are now part and parcel of modern anti-virus tools were originally developed by
Kaspersky Lab. It is no coincidence that many other developers use the Kaspersky Anti-Virus kernel in their products,
including: SafeNet (USA), Alt-N Technologies (USA), Blue Coat Systems (USA), Check Point Software Technologies
(Israel), Clearswift (UK), CommuniGate Systems (USA), Critical Path (Ireland), D-Link (Taiwan), M86 Security (USA),
GFI (Malta), IBM (USA), Juniper Networks (USA), LANDesk (USA), Microsoft (USA), NETASQ (France), NETGEAR
(USA), Parallels (Russia), SonicWALL (USA), WatchGuard Technologies (USA), ZyXEL Communications (Taiwan).
Many of the company’s innovative technologies are patented.
Achievements. Over the years, Kaspersky Lab has won hundreds of awards for its services in combating computer
threats. For example, in 2010 Kaspersky Anti-Virus received several top Advanced+ awards in a test administered by
AV-Comparatives, a respected Austrian anti-virus laboratory. But Kaspersky Lab's main achievement is the loyalty of its
users worldwide. The company’s products and technologies protect more than 300 million users, and its corporate clients
number more than 200,000.
168
INFORMATION ABOUT THIRD-PARTY CODE
Information about third-party code is contained in the file legal_notices.txt, in the application installation folder.
169
TRADEMARK NOTICES
Registered trademarks and service marks are the property of their respective owners.
Apache and Apache feather logo are trademarks of Apache Software Foundation.
Active Directory, Internet Explorer are trademarks of Microsoft Corporation registered in the United States of America
and elsewhere.
Linux is a registered trademark of Linus Torvalds registered in the USA and elsewhere.
Sendmail and other names and product names are trademarks or registered trademarks of Sendmail, Inc.
Intel, Xeon, Core are trademarks of Intel Corporation registered in the United States of America and elsewhere.
Red Hat Enterprise Linux is a trademark of Red Hat Inc. registered in the United States of America and elsewhere.
Novell is a trademark of Novell Inc. registered in the United States of America and elsewhere.
170
INDEX
A
Activating the application.............................................................................................................................................. 72
Anti-Spam .................................................................................................................................................................... 84
Anti-Virus protection ..................................................................................................................................................... 92
B
Backup ....................................................................................................................................................................... 133
C
Content filtering .......................................................................................................................................................... 105
E
EICAR ........................................................................................................................................................................ 155
H
Hardware requirements ................................................................................................................................................ 15
I
Installing the File Anti-Virus component ....................................................................................................................... 24
K
Kaspersky Lab ZAO ................................................................................................................................................... 168
N
Notifications................................................................................................................................................................ 137
P
Preparing...................................................................................................................................................................... 19
U
Update........................................................................................................................................................................ 110
Updates source .......................................................................................................................................................... 112
171