This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
how_to:ignoring_specific_detected_viruses [2016/02/12 14:58] – paul | how_to:ignoring_specific_detected_viruses [2018/11/14 10:45] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ======Ignoring specific detected viruses====== | + | [[https://helpdesk.pscs.co.uk/ |
- | + | ||
- | In some cases a virus scanner may incorrectly detect files as being viruses. If this happens with a VPOP3-integrated virus scanner it will prevent the incoming attachment from being received. This can especially happen if you have the virus scanner configured to detect PUAs (potentially unwanted applications). | + | |
- | + | ||
- | Starting with VPOP3 v6.17 there are a couple of ways around this problem | + | |
- | + | ||
- | - Use [[reference: | + | |
- | - Use [[http://www.pscs.co.uk/ | + | |
- | + | ||
- | If the advanced attachment filter rules set variables **virusfilterregexp** or **virusfilter** then VPOP3 will compare the detected virus name (not the attachment name) with the value of those variables. **virusfilterregexp** will be treated as a regular expression and **virusfilter** will be treated as a wildcard string | + | |
- | + | ||
- | An example of an advanced attachment filter could be: | + | |
- | + | ||
- | { | + | |
- | | + | |
- | | + | |
- | | + | |
- | } | + | |
- | + | ||
- | or | + | |
- | + | ||
- | { | + | |
- | | + | |
- | | + | |
- | | + | |
- | } | + |