- About the Kaspersky Secure Mail Gateway
- Application licensing
- About the End User License Agreement
- About the license
- About the license certificate
- About the key
- About the key file
- About the activation code
- About the subscription
- About data provision
- KSMG modes based on the license
- Adding an activation code
- Adding a key file
- Removing a key
- Monitoring license key status
- Configuring warnings about upcoming license key expiration
- Purchasing a license
- Renewing a license
- Scaling KSMG
- Application installation and setup
- Creating a virtual machine
- Starting the Setup Wizard
- Step 1. Selecting the language to display the End User License Agreement and the Privacy Policy in
- Step 2. Reviewing the License Agreement
- Step 3. Viewing the Privacy Policy
- Step 4. Transferring data to the hard drive
- Step 5. Configuring the domain name of the virtual machine
- Step 6. Beginning the configuration of network adapters
- Step 7. Configuring the receipt of network settings via DHCP
- Step 8. Configuring static network settings
- Step 9. Completing the configuration of network adapters
- Step 10. Editing the network settings of a cluster node
- Step 11. Setting the administrator password
- Step 12. Finishing the Setup Wizard
- Removing the application
- KSMG interface
- Getting started with the application
- Integration of KSMG into the corporate mail infrastructure
- Monitoring of application operation
- General protection settings
- About computer protection against certain legitimate applications
- Configuring the Anti-Virus module
- Configuring link scanning
- Configuring the Anti-Spam module
- Configuring the Anti-Phishing module
- Configuring Content Filtering
- Configuring external services
- Preparing to configure SPF and DMARC Mail Sender Authentication for outgoing messages
- Configuring the addition of X-headers to messages
- Using message processing rules
- Viewing the rule table
- Configuring rule table display
- Message processing rule configuration scenario
- Creating message processing rules
- Configuring Anti-Virus protection
- Configuring link scanning
- Configuring Anti-Spam protection
- Configuring Anti-Phishing protection
- Configuring Content Filtering
- Enabling or disabling Content Filtering in rule settings
- Configuring Content Filtering
- Creating a Content Filtering expression
- Creating a Content Filtering condition
- Enabling, disabling, or deleting expressions
- Enabling, disabling, or deleting conditions
- Configuring the final action to take on a message
- Mail Sender Authentication
- Notification settings for message scan events
- Adding a Warning about insecure message
- Adding email disclaimers
- Configuring KATA protection
- Examples of message processing rule configuration
- Dictionaries
- Viewing rule information
- Enabling and disabling a message processing rule
- Changing rule settings
- Deleting message processing rules
- Allowlists and denylists
- Managing the cluster
- Creating a new cluster
- Viewing the cluster node table
- Configuring the display of the cluster node table
- Viewing information about a cluster node
- Adding a node to the cluster
- Modifying node settings
- Removing a node from a cluster
- Changing the role of a node in a cluster
- Deleting the cluster
- Restarting a cluster node
- Managing the SSL certificate of the cluster node
- Checking data integrity
- Modifying the network settings of a cluster node
- Managing user accounts and roles
- Backup
- Configuring Backup settings
- Configuring personal Backup
- Viewing the table of objects in Backup
- Configuring the display of the table of objects in Backup
- Filtering and finding messages in Backup
- Viewing information about a message in Backup
- Viewing a message in Backup
- Viewing a message in personal Backup
- Viewing the sending history of a message in Backup
- Sending messages from Backup
- Sending messages from personal Backup
- Deleting a message from Backup
- Sending or deleting a group of messages in Backup
- Downloading a message from Backup
- Backup digest
- Event log
- Viewing the event log
- Configuring event table display
- Filtering email traffic processing events
- Filtering application events
- Viewing information about email traffic processing events
- Viewing information about an application event
- Application event types
- Exporting the event log
- Configuring the event log
- Message queue
- Reports
- Configuring date and time
- Configuring the proxy server connection settings
- Updating KSMG
- Upgrading KSMG to version 2.1
- Installing the ksmg_upgrade_2.1.0.7854_openssh_cve_2024_6387
- Updating KSMG databases
- Exporting and importing settings
- Participating in Kaspersky Security Network and using Kaspersky Private Security Network
- Integration with an external directory service
- Creating a keytab file
- Adding a LDAP server connection
- Deleting a LDAP server connection
- Modifying LDAP server connection settings
- Configuring the schedule of synchronization with the Active Directory domain controller
- Manually starting synchronization with the Active Directory domain controller
- Enhancing the security of a LDAP server connection
- KATA protection
- Integration with a single KATA server
- Integration with multiple KATA servers
- Creating a configuration file for the local balancer
- Configuring and running the local balancer on a cluster node
- Adding a KATA server
- Configuring KATA protection settings
- KATA integration dashboard
- Adding, modifying, and deleting IP addresses of KATA servers
- Disabling KATA integration
- Managing the application over SNMP
- Email notifications of the application
- Configuring notifications about application events
- Configuring notifications about bounce messages
- Configuring notifications about message processing rules triggering
- Configuring notification templates
- Using macros in notification templates
- Adding a unique message ID to the notification
- Configuring the address for messages sent by the application
- Authentication using the single sign-on technology
- Connecting to cluster nodes over the SSH protocol
- Configuring MTA settings
- DKIM signature for outgoing messages
- Configuring TLS for KSMG
- Domains and configuration of email routing
- Publishing application events to a SIEM system
- Contacting Technical Support
- Glossary
- Advanced persistent threat (APT)
- Anti-Phishing
- Anti-Spam
- Anti-Spam Quarantine
- Anti-Virus
- Backup
- Backup digest
- BEC attack
- Certificate fingerprint
- Cluster
- Content Filtering
- Content Filtering condition
- Content Filtering dictionary
- Content Filtering expression
- Control node
- Directory service
- DKIM Mail Sender Authentication
- DMARC Mail Sender Authentication
- Email notification
- Heuristic analysis
- Kaspersky Anti Targeted Attack Platform
- Kaspersky Private Security Network
- Kaspersky Security Network (KSN)
- Kerberos authentication
- Key file
- Keytab file
- LDAP
- Malicious links
- Moebius service
- MTA
- NTLM authentication
- Personal user
- Phishing
- Privileged user
- PTR record
- Reputation filtering
- SCL rating
- Secondary node
- Service Principal Name (SPN)
- SIEM system
- SMTP verification
- SNMP agent
- SNMP trap
- Spam
- SPF Mail Sender Authentication
- Spoofing
- TLS encryption
- Update source
- Virtual machine
- Information about third-party code
- Trademark notices
Configuring Content Filtering
To configure Content Filtering settings in the message processing rule:
- In the application web interface window, select the Rules section.
- In the rule table, select the rule for which you want to configure Content Filtering.
This opens the View rule window.
- In the left pane, select the Content Filtering section.
- Click Edit.
Content Filtering settings become editable.
- On the Main tab, select the message processing mode when multiple expressions are triggered:
- Apply the action of the expression with the highest priority, ignore other expressions
- Apply the strictest of the actions of all matched expressions
If multiple expressions with different actions are triggered, the expressions with the strictest action is selected (in descending order of strictness: Delete message → Reject → Delete attachment → Skip).
- In the Expressions table, click Create and create Content Filtering expressions.
- On the Actions on scan error tab, configure the actions the application applies in case the Content Filtering module returns an error.
- Select the action to apply to the message:
- Skip.
- Reject.
- Delete message.
The Skip action is selected by default.
- If you want to automatically place in Backup those messages that were not processed by the Content Filtering module because of an error, turn on the Put original message to Backup toggle switch.
- If you want to add some text to the subject of messages that could not be processed by the Content Filtering module because of an error, in the Text to add to message subject field, enter the text you want to add.
- If you want to remove message headers in case of a Content Filtering module error, in the Delete headers field, specify the headers that you want to remove.
Modifying or deleting headers may lead to DKIM authentication failure or non-delivery of the message
Headers are removed if a Skip, Delete attachment, or Disinfect action is taken on the message.
You can specify headers to be removed on the following tabs:
- Text
To add a header, click Add, enter a header name, then click
or press Enter. If necessary, repeat this step to add more headers.
The name of the header must contain only Latin letters (case-insensitive). The maximum length is 512 characters.
To paste a header name from the clipboard, click Import, type or paste headers separated by semicolons or new lines, then click Import.
If you want to edit a previously added header, click the header in the text box, make the necessary changes in edit mode and click
. If necessary, use search.
If you want to remove a header from the list, point to the header in the list and click the
icon. To clear the list, click Delete all.
You can copy all headers in the list to the clipboard. To do so, click Copy all.
If not all headers are displayed in the area, you can select the number of items you want to display in the drop-down list in the lower part of the area.
- Wildcard
To add a search mask, click Add, enter your text, then click
or press Enter. If necessary, repeat this step to add more masks.
We do not recommend entering a mask longer than 1000 characters.
To paste masks from the clipboard, click Import, type or paste search masks separated by semicolons or new lines, then click Import.
If you want to edit a previously added mask, click the mask in the text box, make the necessary changes in edit mode, and click
. If necessary, use search.
If you want to remove a mask from the list, point to the mask in the list and click the
icon. To clear the list, click Delete all.
You can copy all masks added to the list. To do so, click Copy all.
If not all items are displayed in the area, you can select the number of items you want to display in the drop-down list in the lower part of the area.
- Regexp
To add a regular expression, click Add, enter your regular expression, then click
or press Enter.
Regular expressions of the PCRE format are supported. We do not recommend entering a regular expression longer than 1000 characters.
You do not need to prefix the string with "re:".
If necessary, repeat this step to add more regular expressions.
To paste regular expressions from the clipboard, click Import, type or paste regular expressions separated by semicolons or new lines, then click Import.
If you want to edit a previously added regular expression, click the regular expression in the text box, make the necessary changes in edit mode and click
. If necessary, use search.
If you want to remove a regular expression from the list, point to the regular expression in the list and click the
icon. To clear the list, click Delete all.
You can copy all regular expressions in the list. To do so, click Copy all.
If not all items are displayed in the area, you can select the number of items you want to display in the drop-down list in the lower part of the area.
- Text
- If you want to modify message headers in case of a Content Filtering module error, in the Modify headers field, specify the headers that you want to modify.
Headers are modified if a Skip, Delete attachment, or Disinfect action is taken on the message.
If the header is found in the message, it is removed, and a similar header with the specified value is added to the end of the list of headers. If the header is not present in the message, it is added to the end of the list of message headers.
To add headers for editing, click Add, and in the displayed window, specify the name and value of the header that you want to modify, then click OK. If necessary, repeat these steps for other headers.
The name and value of the header must contain only Latin letters (case-insensitive). The maximum length is 450 characters.
You can remove headers from Modify headers. To do so, select the check boxes next to one or more headers that you want to remove, click Delete, and confirm the action.
- Select the action to apply to the message:
- Click Save.
General configuration of Content Filtering is complete.