Title: | ALL-IN-1 (tm) Support Conference |
Notice: | Please spell ALL-IN-1 correctly - all CAPITALS! |
Moderator: | IOSG::PYE CE |
Created: | Fri Jul 01 1994 |
Last Modified: | Fri Jun 06 1997 |
Last Successful Update: | Fri Jun 06 1997 |
Number of topics: | 2716 |
Total number of notes: | 12169 |
Our main source of MS Word and Excel virus infections is incoming email. The TeamLinks checks catch some of this, but I was wondering if we could automate the checking of incoming email from off node by using the VMS VSWEEP program, and if we find an infected email then bounce the email back to the sender rather than deliver it. I am not an ALL-IN-1, Mailbus, MR support person -- just a part time VMS system manager with the local ALL-IN-1 services on the VMS cluster here. Is it possible to do what I want? I guess that it means: a. being able to put some DCL (or script?) into either the process delivering email onto our nodes, or else into the Fetcher process that picks the email up and puts it into the ALL-IN-1 file cabinet (am I right that this is what Fetcher does?). Is there a place to insert DCL in the delivery mechanism? b. That DCL would run VSWEEP.EXE against the directory/directories with the as yet undelivered email in it. Filespecs of email with virus would be placed into a file, VSWEEP can do that. Is incoming undelivered email stored in one place or is it spread over all the OA$SHARE* areas or what else instead? c. Is it possible that given a filespec of an undelivered email, to determine who sent it and bounce it back to them undelivered? d. VSWEEP is supposed to be able to disinfect files with macro viruses but it is new functionality and it seems to let a lot of infected files through on our cluster. I'd rather bounce than rely on VSWEEP cleaning up, at this time.
T.R | Title | User | Personal Name | Date | Lines |
---|---|---|---|---|---|
2482.1 | See 1709 for discussion and roll-your-own suggestions | IOSG::PYE | Graham - ALL-IN-1 Sorcerer's Apprentice | Fri Jan 24 1997 07:54 | 17 |
You are not the first person to ask this - See note 1709 and numerous replies. There isn't any point in the fetcher code where you can get your own code run to check incoming messages. Actually, you might be able to do it in Message Router, but it would probably need some programming changes. Incoming mail messages are, as you so accurately describe it, "spread all over the shared areas". So your only strategy is to run batch jobs that scan all the .DOC messages in the shared areas and look for viruses. If you find one, you can simply replace the file with a empty Word document saying that there was a virus. Then you can look the filename up in the SDAF and, assuming you can decode the format, work out the sender and addressees. In 1709, you'll see how the IOSG System Manager does it. |