On the command line, you can manage Mail Threat Protection using the Mail Threat Protection predefined task (Mail_Monitoring).
The Mail Threat Protection task is started by default. You can start and stop this task manually.
Administrator role privileges are required to start and stop the Mail Threat Protection task from the command line.
You can manage Mail Threat Protection settings by editing the settings of the Mail Threat Protection predefined task.
The following table describes available values and default values of settings that you can specify for the Mail Threat Protection task.
Mail Threat Protection task settings
|
Setting |
Description |
Values |
|---|---|---|
|
|
The protection scope specifies which objects the component must scan: incoming and outgoing messages or only incoming messages. |
|
|
|
Enables or disables scanning of attached archives. This includes the scanning of ZIP, GZIP, BZIP, RAR, TAR, ARJ, CAB, LHA, JAR, ICE and other types of archives. The application identifies archives not just by extension, but also by format. When scanning archives, the application performs recursive unpacking. This makes it possible to detect threats in nested archives (archive inside an archive). |
|
|
|
Enables or disables the scanning of attached files in office formats. |
|
|
|
Limits the size of scanned archives. |
|
|
|
Sets the maximum size of archives that can be scanned. |
1 to 9999 (MB). |
|
|
Limits the maximum scan duration for attached archives. |
|
|
|
Sets the maximum scan duration for attached archives. |
1 to 9999 (seconds). |
|
|
Configures email attachment filtering. |
|
|
|
Specifies extensions for the types of attachments that you want to rename or remove from email messages. |
A list of multiple extensions can be specified as follows:
By default, files with the TXT, RUN, EXE, JS, JSE, MSI, SCR, VBE, VBS, SH extensions are processed. To change the list of extensions, you need to export the task settings to an INI file, then edit the list in the file and import the INI file into the application. |
|
|
Enables or disables the heuristic analyzer. |
|
|
|
When scanning files for malicious code, the heuristic analyzer executes instructions in executable files. How many instructions the heuristic analyzer executes depends on the specified heuristic analysis level. The heuristic analysis level sets the balance between the thoroughness of searches for novel threats, the load on the operating system's resources, and the duration of heuristic analysis. |
|
|
|
The action that Mail Threat Protection performs when a threat is detected in incoming email messages. The |
|