Configuring additional settings of spam and phishing scans

You can configure additional Anti-Spam and Anti-Phishing analysis settings, such as time- or size-based scanning restrictions, and spam analysis of Microsoft Office files attached to messages.

To configure time- or size-based Anti-Spam and Anti-Phishing scanning restrictions:

  1. Perform the following steps in the Management Console tree:
    • To configure Anti-Spam and Anti-Phishing scanning restrictions for an unassigned Security Server, maximize the node of the relevant Security Server;
    • To configure Anti-Spam and Anti-Phishing scanning restrictions for Security Servers belonging to a profile, maximize the Profiles node and inside it maximize the node of the profile for whose Security Servers you want to configure Anti-Spam and Anti-Phishing scanning restrictions.
  2. Select the Server protection node.
  3. In the workspace, on the Protection for the Transport Hub role tab, expand the Advanced settings of Anti-Spam configuration section.
  4. In the Restrictions section, use the Maximum time for scanning a message spin box to specify the necessary value in seconds.

    If the message scan duration exceeds the specified time, the Anti-Spam or Anti-Phishing scan of the message stops. The default value is 60 sec. If the application is configured to add service headers to the message, they will contain information to the effect that the maximum scan time has been exceeded.

  5. In the Restrictions configuration section, use the Maximum object size to scan spin box to specify the necessary value in kilobytes.

    If the message with all attachments exceeds the specified size, Anti-Spam and Anti-Phishing scanning is not performed, and the message is delivered to the recipient. The default value is 1536 KB (1.5 MB). The maximum value is 2096128 KB (2047 MB), and the minimum value is 1 KB. If the application is configured to add service headers to the message, they will contain information to the effect that the maximum object size has been exceeded.

  6. Click Save to save the changes.

To define the settings for Microsoft Office file scan for spam:

  1. Perform the following steps in the Management Console tree:
    • To configure the settings of Anti-Spam and Anti-Phishing scanning of Microsoft Office files for an unassigned Security Server, maximize the node of the relevant Security Server;
    • To configure the settings of Anti-Spam and Anti-Phishing scanning of Microsoft Office files for Security Servers belonging to a profile, maximize the Profiles node and inside it maximize the node of the profile for whose Security Servers you want to configure the settings of Anti-Spam and Anti-Phishing scanning of Microsoft Office files.
  2. Select the Server protection node.
  3. In the workspace, on the Protection for the Transport Hub role tab, expand the Advanced settings of Anti-Spam configuration section.
  4. In the Scan settings for Microsoft Office files configuration section, perform the following actions:
    • If you want the application to scan Microsoft Word documents for spam, select the Scan DOC files check box.
    • If you want the application to scan RTF documents for spam, select the Scan RTF files check box.

      These settings have no impact on document scan for phishing.

  5. Click Save to save the changes.

To configure additional Anti-Spam and Anti-Phishing scan settings:

  1. Perform the following steps in the Management Console tree:
    • To configure additional Anti-Spam and Anti-Phishing scan settings for an unassigned Security Server, maximize the node of the relevant Security Server;
    • To configure additional Anti-Spam and Anti-Phishing scan settings for Security Servers belonging to a profile, maximize the Profiles node and inside it maximize the node of the profile for whose Security Servers you want to configure additional Anti-Spam and Anti-Phishing scan settings.
  2. Select the Server protection node.
  3. In the workspace, on the Protection for the Transport Hub role tab, expand the Advanced settings of Anti-Spam configuration section.
  4. If you want the application to analyze images in mail attachments using image analysis technology (GSG), select the Use image analysis check box.

    It is used to analyze images by checking them against the samples in the Anti-Spam database. If a match is found, the spam rating of such messages will be increased.

  5. Select the Scan messages arriving over trusted connections for spam check box to enable scanning of mail received via a trusted connection for spam.

    Scanning of messages received via a trusted connection for malicious links (phishing) is enabled permanently.

  6. Select the Skip messages for the Postmaster address check box to disable scanning of messages arriving for the Postmaster address for spam and phishing.
  7. Click Save to save the changes.
Page top