]> git.proxmox.com Git - pmg-docs.git/blame - pmg-intro.adoc
pmg-intro: minor grammar and structure fixes
[pmg-docs.git] / pmg-intro.adoc
CommitLineData
410dc2c9
DM
1Introduction
2============
3
6cb534d7
DM
4What is {pmg}?
5--------------
6
7E-mail security begins at the gateway by controlling all incoming and
8outgoing e-mail messages. {pmg} addresses the full spectrum of
9unwanted e-mail traffic, focusing spam and virus detection. {pmg}
10provides a powerful and affordable server solution to eliminate spam,
11viruses and blocking undesirable content from your e-mail system. All
12products are self-installing and can be used without deep knowledge of
13Linux.
14
95f2ea5b 15image::images/Proxmox_Mail_Gateway_Mailprocessing_final_1024.png[]
b8c7b823 16
fc9071c3
DM
17Features
18--------
19
20Spam detection
21~~~~~~~~~~~~~~
22
23{pmg} uses a wide variety of local and network tests to identify spam
24mail. Here is a short list of used filtering methods:
25
26Receiver Verification::
27
28Many of the junk messages reaching your network are emails to
ed0c5b1b 29non-existent users. {pmg} detects these emails on SMTP
fc9071c3
DM
30level, which means before they are transferred to your networks. This
31reduces the traffic to be analyzed for spam and viruses up to 90% and
32reduces the working load on your mail servers and scanners.
33
34Sender policy framework (SPF)::
35
36Sender Policy Framework (SPF) is an open standard for validating
37emails and to prevent sender IP address forgery. SPF allows the
38administrator of an Internet domain to specify which computers are
39authorized to send emails with a given domain by creating a specific
40SPF record in the Domain Name System (DNS).
41
42DNS-based Blackhole List::
43
44A DNS-based Blackhole List (DNSBL) is a means by which an Internet
45site may publish a list of IP addresses, in a format which can be
46easily queried by computer programs on the internet. The technology is
47built on top of the Domain Name System. DNSBLs are used to publish
48lists of addresses linked to spamming.
49
50SMTP Whitelist::
51
52Exclude senders from SMTP blocking. To prevent all SMTP checks
53(Greylisting, Receiver Verification, SPF and RBL) and accept all
54e-mails for the analysis in the filter rule system, you can add the
55following to this list: Domains (Sender/Receiver), Mail address
56(Sender/Receiver), Regular Expression (Sender/Receiver), IP address
57(Sender), IP network (Sender)
58
59Bayesian Filter - Automatically trained statistical filters::
60
61Some particular words have a higher probability of occurring in spam
ed0c5b1b 62emails rather than in legitimate emails. By being trained to
fc9071c3 63recognize those words, the Bayesian checks every email and adjusts the
ed0c5b1b 64probabilities of it being a spam word or not in its database. This is
fc9071c3
DM
65done automatically.
66
67Black- and Whitelists::
68
69Black- and Whitelists are an access control mechanism to accept,
70block, or quarantine emails to recipients. This allows you to tune the
71rule-system by applying different objects like domains, email address,
72regular expression, IP Network, LDAP Group, and others.
73
74Autolearning algorithm::
75
ed0c5b1b 76{pmg} gathers statistical information about spam
fc9071c3
DM
77emails. This information is used by an autolearning algorithm, so the
78system becomes smarter over time.
79
80Spam Uri Realtime BlockList (SURBL)::
81
82SURBLs are used to detect spam based on message body URIs (usually web
83sites). This makes them different from most other Real-time
84Blocklists, because SURBLs are not used to block spam senders. SURBLs
85allow you to block messages that have spam hosts which are mentioned
86in message bodies.
87
88Greylisting::
89
90Greylisting an email from a sender your system does not recognize,
91means, that it will be temporarily rejected. Since temporary failures
92are built into the RFC specifications for mail delivery, a legitimate
93server will try to resend the email later on. This is an effective
94method because spammers do not queue and reattempt mail delivery as is
95normal for a regular Mail Transport Agent.
96+
97Greylisting can reduce e-mail traffic up to 50%. A greylisted email
98never reaches your mail server and thus your mail server will not send
99useless "Non Delivery Reports" to spammers.
100
78b3ca71
DM
101SMTP Protocol Tests::
102
103{postfix} is able to do some sophisticated SMTP protocol tests (see
104`man postscreen`). Most spam is sent out by zombies (malware on
105compromised end-user computers), and those zombies often try to
106maximize the amount of mails delivered. In order to do that, many of
d9aff9ab 107them violate the SMTP protocol specification and thus can get detected
78b3ca71
DM
108by these tests.
109
89028579
SI
110Before and After Queue Filtering::
111
112{pmg} can be configured to either accept the mail, by sending a response
113of '250 OK', and scan it afterwards, or alternatively inspect the mail
114directly after it has the content and respond with a reject '554' if the
115mail is blocked by the rule system. These options are known as After Queue
116and Before Queue filtering respectively (see
117xref:pmgconfig_mailproxy_before_after_queue[Before and After Queue Scanning]).
118
119Configurable NDR policy::
120
121In certain environments it can be unacceptable to discard an email, without
122informing the sender about that decision. You can decide whether you want
123to inform the senders of blocked emails or not.
fc9071c3
DM
124
125Virus detection
126~~~~~~~~~~~~~~~
127
128{pmg} integrates {clamav}, which is an open-source (GPL) antivirus
ed0c5b1b 129engine designed for detecting Trojans, viruses, malware and other
fc9071c3
DM
130malicious threats.
131
132It provides a high performance mutli-threaded scanning daemon, command
133line utilities for on demand file scanning, and an intelligent tool
134for automatic signature updates.
135
136
86986abc
DM
137Object-Oriented Rule System
138~~~~~~~~~~~~~~~~~~~~~~~~~~~
139
140The object-oriented rule system enables custom rules for your
141domains. It’s an easy but very powerful way to define filter rules by
142user, domains, time frame, content type and resulting action. {pmg}
143offers a lot of powerful objects to configure your own custom system.
144
86986abc
DM
145WHO - objects::
146
147Who is the sender or receiver of the e-mail?
148
149WHAT - objects::
150
151What is in the e-mail?
152
153WHEN - objects::
154
ed0c5b1b 155When is the e-mail received by {pmg}?
86986abc 156
62e86eb6
DM
157ACTIONS - objects::
158
159Defines the final actions.
160
86986abc
DM
161Every rule has five categories FROM, TO, WHEN, WHAT and ACTION. Every
162of these categories can contain several objects and a direction (in,
163out or both).
164
165Options range from simple spam and virus filter setups to
166sophisticated, highly customized configurations blocking certain types
167of e-mails and generating notifications.
168
169
78b3ca71
DM
170Spam Quarantine
171~~~~~~~~~~~~~~~
172
d9aff9ab
OB
173Identified Spam mails can be stored to the user-accessible Spam
174quarantine. Thus, users can view and manage their Spam mails by
78b3ca71
DM
175themselves.
176
177
fc9071c3
DM
178Tracking and Logging
179~~~~~~~~~~~~~~~~~~~~
180
181The innovative Proxmox Message Tracking Center tracks and summarizes
d9aff9ab
OB
182all available logs. With the web-based and user-friendly management
183interface, IT admins can easily overview and control all
fc9071c3
DM
184functions from a single screen.
185
186The Message Tracking Center is very fast and powerful, tested on {pmg}
187sites processing over a million emails per day. All different log
188files from the last 7 days can be queried and the results are
189summarized by an intelligent algorithm.
190
d9aff9ab
OB
191The logged information includes:
192
fc9071c3
DM
193- Arrival of the email
194- Proxmox filtering processing with results
195- Internal queue to your email server
196- Status of final delivery
197
198
6441fbe9
SI
199DKIM Signing
200~~~~~~~~~~~~
201
202{pmg} offers the possibility to optionally sign outgoing emails with
203xref:pmgconfig_mailproxy_dkim[DKIM].
204
205
2350185a
DM
206High Availability with Proxmox HA Cluster
207~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
208
209To provide a 100% secure email system for your business, we developed
210Proxmox High Availability (HA) Cluster. The Proxmox HA Cluster uses a
211unique application level clustering scheme, which provides extremely
212good performance. Fast set-up within minutes and a simple, intuitive
213management keep resource needs low. After temporary failures, nodes
214automatically reintegrate without any operator interaction.
215
78b3ca71
DM
216LDAP integration
217~~~~~~~~~~~~~~~~
218
219It is possible to query user and group data from LDAP servers. This
220may be used to build special filter rules, or just to provide
221authentication services for the Spam quarantine GUI.
222
223
224Fetchmail integration
225~~~~~~~~~~~~~~~~~~~~~
226
ed0c5b1b 227{pmg} allows you to fetch mail from other IMAP or POP3 servers.
78b3ca71
DM
228
229
230Flexible User Management
231~~~~~~~~~~~~~~~~~~~~~~~~
232
d9aff9ab 233The administration interface uses a role-based access control scheme,
78b3ca71
DM
234using the following roles:
235
236Superuser::
237
238This role is allowed to do everything (reserved for user 'root').
239
ed0c5b1b 240Administrator::
78b3ca71
DM
241
242Full access to mail filter setup, but not allowed to change network setup.
243
244Quarantine Manager::
245
246Is able to view and manage the Spam Quarantine.
247
248Auditor::
249
250Has read-only access to the whole configuration, can access logs and
251view statistics.
252
2350185a 253
b8c7b823
DM
254Your benefit with {pmg}
255-----------------------
256
257* Open source software
258* No vendor lock-in
259* Linux kernel
260* Fast installation and easy-to-use
261* Web-based management interface
262* REST API
263* Huge active community
264* Low administration costs and simple deployment
265
266
267include::getting-help.adoc[]