Well,
Server side scanning is the preferred method. But I can still get viruses into your database since the virus is not contained in the virus scanners database, there are a lot of reasons to this, including the human factor(=administrator error). I do remember Melissa and others. These viruses contamined the mail server on several companies. I therefore have a strong need to be able to delete messages in the virus database based on virus content.




Richard Barrington wrote:

I think the way to approach it is to write a dedicated script/program to iterate
over the messages, read the data into a scanner, then react accordingly - 
quarantine?/delete/pass.
It shouldn't be too difficult, but you may want to add a "scanned" flag to the
table so you know what's been checked (set it false when the message is created
/ written to, true after scanning) in order to speed things up on later runs.
Actually, I would have much more use for a timestamp on the records.
This way, I can select message blocks that are younger than the virus and only scan them.

Well, this is a request for enhancement, add timestamp at a convenient position in the database.




Potentially, you could interface the AV app into the message insertion/retrieval
database functions if it has a shared library version available (eg sophos),
which would be a whole lot quicker, and would alleviate the need to scan the
sendmail queue separately.
The database virus scan is an offline transaction, needed only in emergency for washing out viruses that sneeked into my system.


/Magnus



Reply via email to