Solved

EFA spam filter

Posted on 2014-07-31
4
1,068 Views
Last Modified: 2014-08-12
Recently I've been working with EFA spam filter. Open source so support is limited.

For the last two days during the night I've been having a problem where HUGE amounts of mail is being queued up. This box feeds and Exchange 2013 server.

From what I can determine from the logs is I'm running out of memory.

Thanks, I hope somebody is familiar with this product.
Richard
0
Comment
Question by:RichardPWolf
  • 3
4 Comments
 
LVL 13

Accepted Solution

by:
Sandy earned 500 total points
Comment Utility
if i got you correctly do you want to know the number of messages limiting your connections further ?

Please clarify and let us know what exactly you want to ask...

TY/SA
0
 

Author Comment

by:RichardPWolf
Comment Utility
It wasn't the number of messages but the fact that the box crashed twice on me. Unfortunately since this caused loss of important emails we've had to scape efa and go with a commercial product. I only hope that the efa project continues to improve it's product as I really do like it but it just isn't ready for enterprise use "unless" there's someone on site who is a Linux guru to tweak the software. I do appreciate your time on this and will give you the points as you were the only one to respond.

Thank you. Richard.
0
 
LVL 13

Expert Comment

by:Sandy
Comment Utility
For spam filtering i would suggest to configure (Mailscanner + spamassassin +Razor + Pyzor + DCC ) this is what i am currently using for my setup on which my corp mails are getting scanned over the Linux box (Opensource solution) and mailboxes are hosted in exchange 2010.

In case wanna try.. you can refer below link

http://www.howtoforge.com/postfix_antispam_mailscanner_clamav_ubuntu_p4

To be very frank.. this solution is working for me since past 2 years although 2-3 issues i have faced over the time but those were fixed with basic SA fundamentals.

TY/SA
0
 
LVL 13

Expert Comment

by:Sandy
Comment Utility
Thanks for the points :)
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
Operating system developers such as Microsoft (https://www.microsoft.com) and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a f…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now