Just set up a gateway mailserver, and I realized that if a virus comes
through the gateway, the notification that gets sent out sees the gateway
mailservers IP address. Is there a way to hook the IPBypass functionality
into Declude Virus?
Thanks,
Russ
---
Russ Uhte, CCNA, MCP, A+
Network
That shouldn't make any difference, since virus notifications do not get
sent to IP address, they get sent to the sender's e-mail address or the
[EMAIL PROTECTED]
Bill
- Original Message -
From: Russ Uhte (Lists) [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, March 01, 2004 6:30
Thank you. Now that I've had to block ZIP files, this has become a larger
issue. After years of telling my users just ZIP up anything you need to
send that would otherwise get blocked I'm ready to scream.
I'm guessing I won't be screaming alone though.
-Original Message-
From: [EMAIL
I m curious what kind of server load people have experienced with
declude. Like anyone else using this product we re on MS, I/O is quite an
issue for us and I d like to know what to expect prior to purchasing declude.
We typically find that each GHz of CPU power allows for about 100,000
Looks like some bagle.f are slipping thru on
declude with mcafee. Defs are at 4330.
Ones that have been forwarded to me are password
protected zip archives.
As much as I would love to block all zip files, we
cannot because too many customers complained when we did this a while
back.
How
If indeed these password protected zips are not
being picked up by virus scanners, Scott can you add a feature to declude
antivirus or junkmail that could check for passwords on zip files and if they
exist block them. Is this doable?
Jim Matuska Jr.Computer Tech IICCNANez
Perce
Following NAI's website they detect Bagle.F in passworded
zip files with 4330 defs.
The saem website states also that any Bagle-F message with
passworded zip attachment contains "archive
password", "password:" or "pass:" in the
body.
Unfortunately I can't find any message with this
I am running the latest beta 1.78.
I have the following in my virus.cfg file:
BANEXT scr
BANEXT pif
BANEXT bat
BANEXT exe
DELETEVIRUSES ON
Yet I am still seeing e-mails with .PIF extensions being held in the virus
subfolder. I'm concerned that these are
We've also blocked zip attachments and inform the sender in
the bannotify.eml that this is a temporary issue and if he want to send a zip
archive he can rename it to something like "filename.zix"
Markus
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mailing
And then what happens when the senders
start putting this in the message body:
To open the attached file, save it,
then rename the extension to .zip, and then open it with the following password.
IMHO: Youre just backing the
problem up one step. If the users
will open the .zip
I am running the latest beta 1.78.
I have the following in my virus.cfg file:
BANEXT scr
BANEXT pif
BANEXT bat
BANEXT exe
DELETEVIRUSES ON
Yet I am still seeing e-mails with .PIF extensions being held in the virus
subfolder. I'm concerned that these are
11 matches
Mail list logo