- About Kaspersky Security 9.0 for Microsoft Exchange Servers
- Application architecture
- Common application deployment procedures and scenarios
- Installing, configuring, restoring, and removing the application
- Installing the application using the Setup Wizard
- Step 1. Checking for required software
- Step 2. Viewing information about the start of installation. Reading the End User License Agreement and the Privacy Policy
- Step 3. Selecting the installation type
- Step 4. Selecting application components and modules
- Step 5. Creating a database and configuring the application connection to the SQL server
- Step 6. Selecting an account for launching the Kaspersky Security service
- Step 7. Completing installation
- Installing the application using the command line
- Initial setup of the application
- Step 1. Activating the application
- Step 2. Configuring the Microsoft Exchange server protection
- Step 3. Enabling the KSN service
- Step 4. Configuring the proxy server settings
- Step 5. Completing the configuration
- Application Activation window
- Protection settings window
- Use Kaspersky Security Network services window
- Proxy server settings window
- Configuration node
- Restoring the application
- Removing the application
- Installing the application using the Setup Wizard
- Kerberos protocol support
- Upgrading the application to version 9.0 Maintenance Release 7
- To administrator
- Role-based user access control for the application features and services
- Working with personal data of users
- Application licensing
- Licensing models. License restrictions
- About the End User License Agreement
- About the license certificate
- About the license
- About the key
- About the key file
- About the activation code
- About the subscription
- Special considerations of activating the application when using profiles
- Activating the application with a key for a Security Server
- Activating the application using an activation code
- About notifications related to the license
- Configuring the license expiry term notification
- Viewing information about installed keys
- Replacing a key
- Removing a key
- Licensing node
- Add License window
- Viewing the number of mailboxes
- Starting and stopping the application
- Default Microsoft Exchange Server protection
- <Microsoft Exchange Server name> node
- Viewing Microsoft Exchange Server protection status details
- Viewing information about the protection status of Microsoft Exchange servers of a single profile
- Server protection node
- Protection for the Mailbox role tab
- Protection for the Hub Transport role tab
- Advanced Anti-Virus settings tab
- About Kaspersky Security Network
- Participating in Kaspersky Security Network
- About Kaspersky Private Security Network
- Configuring the settings for connecting to Kaspersky Private Security Network
- Enabling and disabling the use of Kaspersky Security Network and Kaspersky Private Security Network in Anti-Spam
- Enabling and disabling the use of Kaspersky Security Network and Kaspersky Private Security Network in Anti-Virus
- Anti-virus protection
- Enabling and disabling anti-virus server protection
- Configuring anti-virus object processing: Anti-Virus for the Hub Transport role
- Configuring anti-virus processing of objects: Anti-Virus for the Mailbox role
- Configuring anti-virus scan exclusions
- Editing of the message regarding removal of an attachment by the Anti-Virus module
- How to prevent detainment when sending messages through the Anti-Virus module
- Types of attachment files window
- Names of attachment files window
- Protection against spam and phishing
- Enabling and disabling anti-spam protection of a server
- About anti-phishing scans
- Enabling and disabling message scanning for phishing
- Configuring spam and phishing scan settings
- Configuring additional settings of spam and phishing scans
- Configuring an increase in the spam rating of messages
- About additional services, features, and anti-spam technologies
- Using external anti-spam message scanning services
- About lists of allowed and denied email addresses
- Creating an Anti-Spam address allowlist
- Creating an Anti-Spam address denylist
- Address Allowlist Record Parameters window
- Address Denylist Record Parameters window
- Informing Kaspersky of false alerts returned by Anti-Spam
- Improving the accuracy of spam detection on Microsoft Exchange 2013 servers
- About scanning outgoing mail for spam and phishing content
- Enabling and disabling the scanning of outgoing messages for spam and phishing content
- Configuring mailbox and public folder protection settings
- Background scan and on-demand scan
- Attachment and content filtering
- Enabling attachment filtering
- Managing attachment and content filtering rules
- Creating an attachment and content filtering rule
- Configuring the general settings and conditions of an attachment and content filtering rule
- Configuring lists of users for an attachment and content filtering rule
- Configuring exclusions from an attachment and content filtering rule
- Deleting an attachment and content filtering rule
- About regular expressions
- Editing of the message regarding removal of an attachment during filtering
- Filtering messages of the same type
- Managing profiles
- Creating a profile
- Configuring Security Servers in a profile
- Specifics of managing profiles in a Microsoft Exchange database availability group
- Adding Security Servers to a profile
- Managing access to a profile
- Removing a Security Server from a profile
- Removing a profile
- Profiles node
- <Profile name> node
- Servers node
- <DAG name> node
- Create new profile window
- Add server to <Profile name> profile window (Step 1)
- Add server to <Profile name> profile window (Step 2)
- Rename existing profile window
- Updates
- About update centers
- About database updates in configurations with a DAG of Microsoft Exchange servers
- Updating databases manually
- Configuring scheduled application database updates
- Select update source
- Configuring the proxy server settings
- Designating a server as an update center and configuring its settings
- Updates node
- Notifications
- Backup
- Viewing Backup objects
- Viewing the properties of objects in Backup
- Filtering the list of Backup objects
- Saving objects from Backup to disk
- Forwarding objects from Backup to their original recipients
- Forwarding of objects from Backup to other email addresses
- Deleting objects from Backup
- Configuring Backup settings
- Selecting Backup database for viewing its contents from the profile
- Database window
- Send object to Kaspersky window
- Backup node
- Reports
- Anti-Virus activity report for the Mailbox role
- Anti-Virus activity report for the Hub Transport role
- Report of Anti-Spam activity
- Generating a report manually
- Creating a report generation task
- Viewing the list of report generation tasks
- Editing the settings of a report generation task
- Starting a report generation task
- Deleting a report generation task
- Viewing a report
- Saving a report to disk
- Deleting a report
- Report generation settings window
- Task settings window
- Reports node
- Application logs
- Using Kaspersky Security in Windows PowerShell
- About Windows PowerShell commands
- Connecting the Kse.Powershell library
- Viewing the protection status of a Microsoft Exchange server
- Viewing the statistics of the Anti-Virus and Attachment and Content Filtering modules
- Viewing the statistics of the Anti-Spam module
- Viewing the Anti-Spam address allowlist
- Viewing the Anti-Spam address denylist
- Adding addresses to the Anti-Spam address allowlist
- Adding addresses to the Anti-Spam address denylist
- Deleting addresses from the Anti-Spam address allowlist
- Deleting addresses from the Anti-Spam address denylist
- Synchronizing the Anti-Spam address allowlists and denylists
- Working with a message signature decryption key
- Exporting and importing the application configuration
- Managing the application using the Kaspersky Security Center
- Installing the Kaspersky Security administration plug-in
- About application activation via Kaspersky Security Center
- Updating application databases via Kaspersky Security Center
- Kaspersky Security events in Kaspersky Security Center
- Viewing Microsoft Exchange Server protection status details
- Application operation statistics in Kaspersky Security Center
- Monitor the application's operation via System Center - Operations Manager
- Appendix. Script for sending spam for analysis
- Appendix. Scalability and Sizing Guide
- Contacting the Technical Support Service
- Sources of information about the application
- Glossary
- Active key
- Anti-virus databases
- Background scan
- Backup
- Container object
- Disinfection
- Domain Name System Block List (DNSBL).
- Enforced Anti-Spam Updates Service
- File mask
- Formal message
- Infected object
- Kaspersky CompanyAccount
- Kaspersky Private Security Network
- Kaspersky Security Network (KSN).
- Kaspersky update servers
- Key denylist
- License certificate
- License term
- Malicious URLs
- Managed device
- Management Console
- Mass mail
- Message deletion
- Object removal
- PCL rating
- Personal data
- Phishing
- Potential spam
- Probably infected object
- Profile
- Proxy server
- Reserve key
- SCL rating
- Security Server
- Simple object
- Spam
- Spam URI Realtime Block Lists (SURBL)
- Storage scan
- Unknown virus
- Update
- Virus
- Information about third-party code
- Trademark notice
Configuring the general settings and conditions of an attachment and content filtering rule
To configure the general settings and conditions of an attachment and content filtering rule:
- In the Management Console tree, select the node of the relevant Security Server.
- Select the Server protection node.
- In the workspace, select the Protection for the Transport Hub role tab.
- In the Attachment and content filtering drop-down section, select the rule that you want to configure.
- On the General settings tab, leave the Enable rule check box selected if you want the rule to become active immediately after its configuration.
If you want to apply the rule immediately after its configuration, clear the check box.
- In the Rule name field, change the name of the rule or leave the default value.
- In the Action drop-down list, select the action to be taken by the application on content and attachments that meet at least one of the filtering criteria:
- Allow. The application allows forwarding of the email message containing prohibited attachments or content. This is the default option. To receive information about objects that have been filtered out, you can configure notifications or logging of events in the Windows event log.
- Delete object. The application removes the object from the attachment or removes the attachment from the email message. The application also adds a file in TXT format to this message; the file contains information about all attachments that have been deleted.
If forbidden content, such as forbidden words in the body or subject, are detected in the email message, the application will permanently delete the message when this action is selected.
- Delete message. The application permanently deletes the email message with the attachment or content that has been filtered out. If you select this option, it is recommended that you save copies of messages in Backup to avoid data losses.
- Select the Add label to message subject check box if you want the application to add additional text (tag) to the subject of a message containing an attachment or content that has been filtered out. The tag text can be edited. Default tag value:
[Blocked attachment or content]
.You can add a tag if you selected the Allow or Delete object action.
- If you want a copy of an object to be saved in Backup before the object is processed, select the Save a copy of the object in Backup check box.
- In the Add a condition drop-down section, select the criteria that must be met by an object for the filtering rule to be applied to it:
- Password protection
Select the Password protection menu item if you want to apply the filtering rule to attached objects that are protected by a password.
- Keywords
Filtering the contents of messages based on regular expressions.
When this menu item is selected, the
button becomes available. Clicking this button opens the Keywords window in which you can manually specify regular expressions. You can also import a list of regular expressions from a file in TXT format. The specified regular expressions are displayed in the List of keywords field.
A keyword search is performed by substring and is not case sensitive. A keyword must be entered in a format such as
\b[Aa]bc\b
.You can also add a Spam Confidence Level (SCL) to messages. To do so, select the Add SCL value check box.
The check box is cleared by default.
- File name mask
Filtering of attached files and archives by file name or extension.
When this menu item is selected, the
button becomes available. Clicking this button opens the File name masks window in which you can manually specify file names and/or file name masks. You can also import a list of names and / or file name masks in TXT format. The specified names and / or file name masks are displayed in the Files with the following masks field.
The application scans attached and archived files. When it detects files that match the filtering criteria, the application applies the action defined by the rule to messages being scanned.
- Availability of macros
Filtering attached Microsoft Office files containing macros.
The application scans Microsoft Office files that may contain macros. The application determines that a file contains a macro based on the file structure. This function lets you filter attachments containing macros even if the extension of an attached file does not match the actual type of file (for example, if the extension was modified).
The application scans files in attachments and files in archives.
- File size limit
Filtering attachments by size of the attachment file.
When this menu item is selected, the scroll box on the right becomes active. In this spin box, you can specify the maximum size of attached files sent in email messages. You can specify an attachment size from 1 to 999 MB. The default value is 20 MB. If the application detects attachments that exceed the specified size, it applies the action that has been configured in the filtering settings.
- File format
Filtering of attached files and archives based on file format.
The application recognizes the format of a file by its structure, that is, by the way it is stored or displayed on the screen. This allows you to filter attachments even if the extension of an attached file does not match the actual type of the file (for example, if the extension has been changed intentionally).
When this menu item is selected, the
button becomes available. Clicking this button opens the File formats window in which you can select the formats of files to which the application will apply the filtering rule. The selected formats are shown in the Files of the following formats field.
The application scans attached and archived files. When the application detects files in the specified formats, it applies the action defined by the filtering rule to messages being scanned.
The application will apply the rule to objects that match at least one of the defined conditions.
- Password protection
- To delete a condition, click the
button next to the relevant criterion.
- Click the Save button.