E-mail Scanner for MS Exchange (VSAPI) Settings

Getting here: Main Screen -> Main Menu Tools -> Advanced settings -> Server components -> branch E-mail Scanner for MS Exchange (VSAPI), or

 Main Screen -> Server Components Quick Link -> double-click EMS (VSAPI) icon -> Settings button

 

In this dialog you will find several preset options related to the E-mail Scanner for MS Exchange (VSAPI) e-mail virus scanning performance. This dialog is divided into several sections:

Basic Settings

Enable component – you can enable or disable mail scanning here.

Language roll-down menu – select a language for the E-mail Scanner for MS Exchange (VSAPI) component.

Logging settings

Log file size field – the log file contains record of various E-mail Scanner for MS Exchange (VSAPI) related events, such as program libraries loading notes, virus-found events, troubleshooting warnings, etc. Use the text filed to set the maximum size of this file.

Scan settings

· Background scan – you can enable or disable the background scanning process here. Background scanning is one of the features of the VSAPI application interface. It provides threaded scanning of the Exchange Messaging Databases. Whenever an item that has not been scanned before is encountered in the users’ mailbox folders, it is submitted to E-mail Scanner for MS Exchange to be scanned. Scanning and searching for the not examined objects runs in parallel. Note: A specific low priority thread is used for each database, which guarantees other tasks (e.g. e-mail messages storage in the Microsoft Exchange database) are always carried out preferentially.
· Proactive scan – you can enable or disable the proactive scanning function of VSAPI here. The proactive scanning lies in dynamical priority management of items in scanning queue. The lower priority items are not being scanned unless all the higher priority ones (most frequently supplied on demand in the queue) have been scanned. However, the priority of an item rises if a client tries to use it, so the precedence of the item changes according to users’ activity.
· Scan RTF – here you can specify, whether the RTF file type should be scanned or not.
· Number of scanning threads field – the scanning process is threaded by default to increase the overall scanning performance by a certain level of parallelism. You can change the threads count here.
· Scan timeout field – the maximum continuous interval (in seconds) for one thread to access the message that is being scanned.

Scanning properties

· Use Heuristics – check to use Heuristics detection method when scanning documents. Heuristic analysis is a simulation and evaluation of the scanned object’s instructions in a virtual computer environment. Therefore, it can even detect malicious code not yet described in the virus database.
· Report Potentially Unwanted Programs and Spyware threats – check to use the Anti-Spyware engine, i.e. detect and report suspicious and potentially unwanted programs when scanning e-mail messages and attachments.
· Report enhanced set of Potentially Unwanted Programs – check to detect extended package of spyware: programs that are perfectly ok and harmless when acquired from the manufacturer directly, but can be misused for malicious purposes later, or programs that always harmless but might be unwanted (various toolbars etc.). This is an additional measure that increases your computer security and comfort even mo
re, however it can possibly block legal programs, and is therefore switched off by default.
Note: This detection feature is additional to the previous option, so if you want protection from the basic types of spyware, always keep the previous box checked.
· Scan inside archives – check to scan contents of archives attached to e-mail messages.

E-mail attachments reporting

· Report password protected archives – archives (ZIP, RAR etc.) that are protected by password are not possible to scan for viruses; check the box to report these as potentially dangerous.
· Report password protected documents – documents protected by password are not possible to scan for viruses; check the box to report these as potentially dangerous.
· Report files containing macros – a macro is a predefined sequence of steps aimed to make certain tasks easier for a user (MS Word macros are widely known). As such, a macro can contain potentially dangerous instructions, and you might like to check the box to ensure that files with macros will be reported as suspicious.
· Report hidden extensions – hidden extension can make e.g. a suspicious executable file “something.txt.exe” appear as harmless plain text file “something.txt”; check the box to report these as potentially dangerous.

 

Settings