- About the Kaspersky Secure Mail Gateway
- Application licensing
- About the End User License Agreement
- About the license
- About the license certificate
- About the key
- About the key file
- About the activation code
- About the subscription
- About data provision
- KSMG modes based on the license
- Adding an activation code
- Adding a key file
- Removing a key
- Monitoring license key status
- Configuring warnings about upcoming license key expiration
- Purchasing a license
- Renewing a license
- Scaling KSMG
- Application installation and setup
- Creating a virtual machine
- Starting the Setup Wizard
- Step 1. Selecting the language to display the End User License Agreement and the Privacy Policy in
- Step 2. Reviewing the License Agreement
- Step 3. Viewing the Privacy Policy
- Step 4. Transferring data to the hard drive
- Step 5. Configuring the domain name of the virtual machine
- Step 6. Beginning the configuration of network adapters
- Step 7. Configuring the receipt of network settings via DHCP
- Step 8. Configuring static network settings
- Step 9. Completing the configuration of network adapters
- Step 10. Editing the network settings of a cluster node
- Step 11. Setting the administrator password
- Step 12. Finishing the Setup Wizard
- Removing the application
- KSMG interface
- Getting started with the application
- Integration of KSMG into the corporate mail infrastructure
- Monitoring of application operation
- General protection settings
- About computer protection against certain legitimate applications
- Configuring the Anti-Virus module
- Configuring link scanning
- Configuring the Anti-Spam module
- Configuring the Anti-Phishing module
- Configuring Content Filtering
- Configuring external services
- Preparing to configure SPF and DMARC Mail Sender Authentication for outgoing messages
- Configuring the addition of X-headers to messages
- Using message processing rules
- Viewing the rule table
- Configuring rule table display
- Message processing rule configuration scenario
- Creating message processing rules
- Configuring Anti-Virus protection
- Configuring link scanning
- Configuring Anti-Spam protection
- Configuring Anti-Phishing protection
- Configuring Content Filtering
- Enabling or disabling Content Filtering in rule settings
- Configuring Content Filtering
- Creating a Content Filtering expression
- Creating a Content Filtering condition
- Enabling, disabling, or deleting expressions
- Enabling, disabling, or deleting conditions
- Configuring the final action to take on a message
- Mail Sender Authentication
- Notification settings for message scan events
- Adding a Warning about insecure message
- Adding email disclaimers
- Configuring KATA protection
- Examples of message processing rule configuration
- Dictionaries
- Viewing rule information
- Enabling and disabling a message processing rule
- Changing rule settings
- Deleting message processing rules
- Allowlists and denylists
- Managing the cluster
- Creating a new cluster
- Viewing the cluster node table
- Configuring the display of the cluster node table
- Viewing information about a cluster node
- Adding a node to the cluster
- Modifying node settings
- Removing a node from a cluster
- Changing the role of a node in a cluster
- Deleting the cluster
- Restarting a cluster node
- Managing the SSL certificate of the cluster node
- Checking data integrity
- Modifying the network settings of a cluster node
- Managing user accounts and roles
- Backup
- Configuring Backup settings
- Configuring personal Backup
- Viewing the table of objects in Backup
- Configuring the display of the table of objects in Backup
- Filtering and finding messages in Backup
- Viewing information about a message in Backup
- Viewing a message in Backup
- Viewing a message in personal Backup
- Viewing the sending history of a message in Backup
- Sending messages from Backup
- Sending messages from personal Backup
- Deleting a message from Backup
- Sending or deleting a group of messages in Backup
- Downloading a message from Backup
- Backup digest
- Event log
- Viewing the event log
- Configuring event table display
- Filtering email traffic processing events
- Filtering application events
- Viewing information about email traffic processing events
- Viewing information about an application event
- Application event types
- Exporting the event log
- Configuring the event log
- Message queue
- Reports
- Configuring date and time
- Configuring the proxy server connection settings
- Updating KSMG
- Upgrading KSMG to version 2.1
- Installing the ksmg_upgrade_2.1.0.7854_openssh_cve_2024_6387
- Updating KSMG databases
- Exporting and importing settings
- Participating in Kaspersky Security Network and using Kaspersky Private Security Network
- Integration with an external directory service
- Creating a keytab file
- Adding a LDAP server connection
- Deleting a LDAP server connection
- Modifying LDAP server connection settings
- Configuring the schedule of synchronization with the Active Directory domain controller
- Manually starting synchronization with the Active Directory domain controller
- Enhancing the security of a LDAP server connection
- KATA protection
- Integration with a single KATA server
- Integration with multiple KATA servers
- Creating a configuration file for the local balancer
- Configuring and running the local balancer on a cluster node
- Adding a KATA server
- Configuring KATA protection settings
- KATA integration dashboard
- Adding, modifying, and deleting IP addresses of KATA servers
- Disabling KATA integration
- Managing the application over SNMP
- Email notifications of the application
- Configuring notifications about application events
- Configuring notifications about bounce messages
- Configuring notifications about message processing rules triggering
- Configuring notification templates
- Using macros in notification templates
- Adding a unique message ID to the notification
- Configuring the address for messages sent by the application
- Authentication using the single sign-on technology
- Connecting to cluster nodes over the SSH protocol
- Configuring MTA settings
- DKIM signature for outgoing messages
- Configuring TLS for KSMG
- Domains and configuration of email routing
- Publishing application events to a SIEM system
- Contacting Technical Support
- Glossary
- Advanced persistent threat (APT)
- Anti-Phishing
- Anti-Spam
- Anti-Spam Quarantine
- Anti-Virus
- Backup
- Backup digest
- BEC attack
- Certificate fingerprint
- Cluster
- Content Filtering
- Content Filtering condition
- Content Filtering dictionary
- Content Filtering expression
- Control node
- Directory service
- DKIM Mail Sender Authentication
- DMARC Mail Sender Authentication
- Email notification
- Heuristic analysis
- Kaspersky Anti Targeted Attack Platform
- Kaspersky Private Security Network
- Kaspersky Security Network (KSN)
- Kerberos authentication
- Key file
- Keytab file
- LDAP
- Malicious links
- Moebius service
- MTA
- NTLM authentication
- Personal user
- Phishing
- Privileged user
- PTR record
- Reputation filtering
- SCL rating
- Secondary node
- Service Principal Name (SPN)
- SIEM system
- SMTP verification
- SNMP agent
- SNMP trap
- Spam
- SPF Mail Sender Authentication
- Spoofing
- TLS encryption
- Update source
- Virtual machine
- Information about third-party code
- Trademark notices
Configuring Anti-Spam protection
Before configuring Anti-Spam protection in the message processing rule, make sure that the Anti-Spam module is enabled in general protection settings.
To configure Anti-Spam protection in the message processing rule:
- In the application web interface window, select the Rules section.
- In the rule table, select the rule for which you want to configure Anti-Spam protection.
This opens the View rule window.
- Click Edit.
Rule settings become editable.
- In the left pane, select the Anti-Spam section.
- Use the toggle switch to the right of the section title to enable or disable Anti-Spam scanning of messages that match rule criteria.
By default, Anti-Spam protection of messages is enabled.
- If you have disabled Anti-Spam protection at the previous step, configure Anti-Spam module settings applied to the following objects based on the results of the scan:
- Spam.
- Under If spam is detected, in the Action group of settings, select one of the following actions to take on messages containing spam:
- Delete message.
- Reject.
- Skip.
The Skip action is selected by default.
- If you want to automatically place in Backup the messages that are recognized as spam, turn on the Put original message to Backup toggle switch.
This toggle switch is off by default.
- If you want tags to be added automatically to the beginning of the subject of messages that contain spam, in the Text to add to message subject field, enter the text of the tags.
By default, the [Spam] tag is added.
- Under If spam is detected, in the Action group of settings, select one of the following actions to take on messages containing spam:
- Probable spam.
- Under If probable spam is detected, in the Action group of settings, select one of the following actions to take on messages containing probable spam:
- Delete message.
- Reject.
- Skip.
The Skip action is selected by default.
- If you want to automatically place in Backup the messages that contain suspected spam, turn on the Put original message to Backup toggle switch.
This toggle switch is off by default.
- If you want tags to be added automatically to the beginning of the subject of messages containing suspected spam, in the Text to add to message subject field, specify the label text.
By default, the [Probable spam] tag is added.
- Under If probable spam is detected, in the Action group of settings, select one of the following actions to take on messages containing probable spam:
- Mass mail.
- Under If mass mailing is detected, in the Action group of settings, select one of the following actions to take on mass mail:
- Delete message.
- Reject.
- Skip.
The Skip action is selected by default.
- If you want to automatically place in Backup the messages that are recognized as mass mail, turn on the Put original message to Backup toggle switch.
This toggle switch is off by default.
- If you want tags to be added automatically to the beginning of the subject of messages containing suspected spam, in the Text to add to message subject field, enter the text of the tag.
By default, the [MASSMAIL] tag is added.
- Under If mass mailing is detected, in the Action group of settings, select one of the following actions to take on mass mail:
- Spam.
- Under Additional settings, turn on the relevant toggle switches:
- Use graphical image processing technologies if you want to use the GSG technology that identifies images containing text to analyze such text for being spam. The text is recognized regardless of whether it has been modified, rotated in the image, hidden in "noise" or otherwise modified to conceal the purpose of the image.
- Unicode spoofing protection if you want to enable Unicode spoofing protection. If Unicode spoofing is detected, the message is considered to be spam. The application adds the
unicode_spoof
tag to theX-KSMG-AntiSpam-Method
message header.The application scans for Unicode spoofing only in the values of the
MAIL FROM
command from the SMTP session, as well as in theFrom
,Sender
,Reply-To
MIME headers of the message.
- Click Save.
Anti-Spam protection is configured. The specified settings are applied to messages that match the rule criteria.
To ensure that the configured settings are applied by KSMG, make sure that Anti-Spam protection is enabled for the rule and the configured rule is enabled.