Skip to content

My feedback

1 result found

  1. 1,276 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment commented  · 

    Clamav/amavis is old news. I've started using rspamd on many servers it's way better. Big plus is also rspamd admin interface from where you can monitor a lot of stuff.

    An error occurred while saving the comment commented  · 

    The main problem of society today is they want everything as final product without any manual work.

    Whatever you will say, in every company there must be a system administrator to take care of things like this. I never payed a penny to plesk for some other products, only the licence and I never had problems with stuff like this (I did, before I learned how to do this) - and I'm using plesk since version 9.

    People are paying for jugger firewall, kaspersky antivirus and other solutions provided, which are, don't get me wrong, just fine and they're working, but you can setup everything on your own.

    I setup-ed fail2ban on all of our servers even before plesk announced changes coming in plesk 12 and it was working, even apf firewall solution with IP banning (it's still on forums). People were complaining about incremental backups for years - I've also made a script for that - so it is possible - this one is also on forums.

    Why paying for some spam solution if you can integrate both clamav/amavis into postfix and that is working just fine in REAL TIME? You can also put addition rules to block different hosts, rules and you can even use different RBL there. How do you think people used different PHP versions under plesk before version 12 and option to just add new version in handler list? Manual way, yes, nothing automatically. In addition to that, clamav can scan command line, right? So you can even setup cronjob to scan emails ONLY (not vhosts) and move infected files to some quarantine folder.

    In the end it all comes to this:
    - I didn't come here to tell everyone how cool or uncool I am
    - I came here to tell sys admins outside there to learn and do your job, otherwise switch to windows platform and do the clicky stuff there or change job
    - if you're small company and don't have budget, do it my way and you will learn from this manual setups 500% more then all others, because this is what it takes to be a linux sys administrator (you can always automate things later)
    - if you're lazy and have money - purchase the product and hope everything is fine (in the end, you don't know how this work)
    - if you're lazy and don't have money - change the job, don't complain

    Yes, I gave 3 votes in the end, because, although it is free, it's very powerful tool as already mentioned and if something is free it doesn't essentially means it's worse product/solution then payed option (also widely used, documented, etc.)

    I know it takes time to implement, but just like fail2ban was integrated, clamav should be as well.

    I forgot even what to type more, I want voice recorder here so I can just talk and afterwards I just post new comment. supported this idea  · 
    An error occurred while saving the comment commented  · 

    Like mr. Madalin said, you can simply apt-get install clamav and setup cronjob as follows every night:
    nice -n 19 /usr/bin/clamscan -ir /var/www/vhosts/ -l /var/log/clamscan.log (I'm running it with lowest priority)

    This will scan all subscriptions in /var/www/vhosts and it will log result in /var/log/clamscan.log - you could even schedule it as well to send a report to your mail

Feedback and Knowledge Base