Contents
1. Antivirus software Clamav installed
Install Clam AntiVirus, a free anti-virus software for Linux, as an anti-virus measure.
By installing this anti-virus software, you can not only scan the entire server for viruses, but also scan incoming and outgoing mail for viruses if you build and configure a mail server.
1.1 Install
1 |
# apt -y install clamav clamav-daemon |
The clamav-related configuration files are installed in the /etc/clamav/ folder.
1.2 Virus Definition Update
1 |
# sed -i -e "s/^NotifyClamd/#NotifyClamd/g" /etc/clamav/freshclam.conf |
1 2 3 4 5 6 7 |
# systemctl stop clamav-freshclam # freshclam Tue Aug 19 10:04:56 2025 -> ClamAV update process started at Tue Aug 19 10:04:56 2025 Tue Aug 19 10:04:56 2025 -> daily.cvd database is up-to-date (version: 27736, sigs: 2076439, f-level: 90, builder: raynman) Tue Aug 19 10:04:56 2025 -> main.cvd database is up-to-date (version: 62, sigs: 6647427, f-level: 90, builder: sigmgr) Tue Aug 19 10:04:56 2025 -> bytecode.cvd database is up-to-date (version: 336, sigs: 83, f-level: 90, builder: nrandolp) |
1 |
# systemctl start clamav-freshclam |
Edit configuration file
1 2 3 4 |
# vi /etc/logrotate.d/clamav-freshclam create 640 clamav adm ↓ create 640 clamav clamav |
Automatic virus definition update confirmation
Ensure that the service is registered for automatic virus definition updates.
1 |
# service clamav-freshclam status |
It appears as follows
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
● clamav-freshclam.service - ClamAV virus database updater Loaded: loaded (/usr/lib/systemd/system/clamav-freshclam.service; disabled; preset: enabled) Active: active (running) since Tue 2025-08-19 10:05:24 JST; 1min 17s ago Invocation: 25b94ea12ac84559964565f20e5e2a95 Docs: man:freshclam(1) man:freshclam.conf(5) https://docs.clamav.net/ Main PID: 15522 (freshclam) Tasks: 1 (limit: 4595) Memory: 3M (peak: 3.3M) CPU: 15ms CGroup: /system.slice/clamav-freshclam.service mq15522 /usr/bin/freshclam -d --foreground=true Aug 19 10:05:24 Lepard systemd[1]: Started clamav-freshclam.service - ClamAV virus database updater. Aug 19 10:05:24 Lepard freshclam[15522]: Tue Aug 19 10:05:24 2025 -> ClamAV update process started at Tue Aug 19 10:05:24 2025 Aug 19 10:05:24 Lepard freshclam[15522]: Tue Aug 19 10:05:24 2025 -> daily.cvd database is up-to-date (version: 27736, sigs: 2076439, f-level: 90, builder: raynman) Aug 19 10:05:24 Lepard freshclam[15522]: Tue Aug 19 10:05:24 2025 -> main.cvd database is up-to-date (version: 62, sigs: 6647427, f-level: 90, builder: sigmgr) Aug 19 10:05:24 Lepard freshclam[15522]: Tue Aug 19 10:05:24 2025 -> bytecode.cvd database is up-to-date (version: 336, sigs: 83, f-level: 90, builder: nrandolp) |
Logs are recorded in the file /var/log/clamav/freshclam.log.
1.3 Virus Check Confirmation
①Running manual virus checks
1 2 3 4 5 6 7 8 9 10 11 12 13 |
# clamscan --infected --remove --recursive /home ----------- SCAN SUMMARY ----------- Known viruses: 8708204 Engine version: 1.4.3 Scanned directories: 22 Scanned files: 60 Infected files: 0 Data scanned: 0.06 MB Data read: 0.03 MB (ratio 2.00:1) Time: 17.620 sec (0 m 17 s) Start Date: 2025:08:19 10:08:11 End Date: 2025:08:19 10:08:28 |
Infected files: 0, so no virus
②Virus detection by downloading test viruses
Download a harmless virus and test it for detection.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 |
# wget https://secure.eicar.org/eicar.com.txt # clamscan --infected --remove --recursive /root/eicar.com.txt: Win.Test.EICAR_HDB-1 FOUND /root/eicar.com.txt: Removed. ----------- SCAN SUMMARY ----------- Known viruses: 8708204 Engine version: 1.4.3 Scanned directories: 2 Scanned files: 7 Infected files: 1 Data scanned: 0.02 MB Data read: 0.01 MB (ratio 2.00:1) Time: 13.535 sec (0 m 13 s) Start Date: 2025:08:19 10:09:12 End Date: 2025:08:19 10:09:26 |
As you can see, it notifies me of the virus by displaying “FOUND” and “Removed.” and “Infected files: 1”. The “--remove” option was added, so the test virus was removed.
1.4 Create a script file to do a full scan
①Create a script file storage directory (/opt/script) in advance.
1 |
# mkdir /opt/script |
②Create script file
1 |
# vi /opt/script/clam-full.sh |
Contents of clam-full.sh (new)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
#!/bin/sh echo ========================================= date hostname clamscan / \ --infected \ --recursive \ --log=/var/log/clamav/clamscan.log \ --move=/var/log/clamav/virus \ --exclude-dir=^/boot \ --exclude-dir=^/sys \ --exclude-dir=^/proc \ --exclude-dir=^/dev \ --exclude-dir=^/var/log/clamav/virus if [ $? = 0 ]; then echo “virus undetected.” else echo “virus detection!!” fi |
③execute authorization
1 |
# chmod +x /opt/script/clam-full.sh |
④Create a folder for virus quarantine
If not, a runtime error will occur because the above script specifies it as an excluded directory.
1 |
# mkdir /var/log/clamav/virus |
⑤Script Execution
1 |
# /opt/script/clam-full.sh |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
========================================= Tue Aug 19 10:11:48 AM JST 2025 Lepard ----------- SCAN SUMMARY ----------- Known viruses: 8708204 Engine version: 1.4.3 Scanned directories: 5095 Scanned files: 37462 Infected files: 0 Data scanned: 3215.90 MB Data read: 1449.82 MB (ratio 2.22:1) Time: 425.390 sec (7 m 5 s) Start Date: 2025:08:19 10:11:48 End Date: 2025:08:19 10:18:53 “virus undetected.” |
akes quite a long time to complete.
Logs are recorded in the /var/log/clamav/clamscan.log file.
⑤Scheduled virus scan execution with cron
1 2 |
# crontab -e 0 2 * * mon /opt/script/clam-full.sh >> /var/log/clamav/clamascan.log |
In the above example, it runs regularly every Monday at 2:00 AM.
2. Mail server installation
Postfix was developed as a Mail Transport Agent (MTA) to replace sendmail, and is a mail server that is highly compatible with sendmail, secure, easy to maintain, and fast.
In addition, since Postfix only functions as an SMTP server for sending mail, the POP server Dovecot for receiving mail will be installed separately in the latter half.
2.1 Postfix : Installation Configuration
①Install Postfix
Install Postfix and build an SMTP server; SMTP uses 25/TCP.
To prevent unauthorized mail relay, use the SASL function of Dovecot, described below, and configure Postfix so that authentication is also required for sending.
1 |
# apt -y install postfix sasl2-bin |
You will be asked to select general configuration settings, select "No configuration " to set them manually later


②Edit configuration file (main.cf)
1 2 |
# cp /usr/share/postfix/main.cf.dist /etc/postfix/main.cf # vi /etc/postfix/main.cf |
editorial content
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 |
# Line 82:Comments Unsubscribe mail_owner = postfix # Line 108:Add hostname specification myhostname = mail.<domain name> # Per Line 115:Add domain name specification mydomain = <domain name> # Per Line 133 : Comment #myorigin = /etc/mailname # Per Line 135:Uncomment myorigin = $mydomain # Per Line 149:Uncomment inet_interfaces = all # Per Line 197:Uncomment mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain # Per Line 240:Uncomment local_recipient_maps = unix:passwd.byname $alias_maps # Per Line 285:Uncomment mynetworks_style = subnet # Per Line 299:Uncomment and Change to own network mynetworks = 127.0.0.0/8, 192.168.11.0/24 # Per Line 423:Uncomment alias_maps = hash:/etc/aliases # Per Line 434:Uncomment alias_database = hash:/etc/aliases # Per Line 456:Uncomment home_mailbox = Maildir/ # Per Line 592:Make it a comment and add below it #smtpd_banner = $myhostname ESMTP $mail_name (Debian) smtpd_banner = $myhostname ESMTP # Per Line 666:Uncomment sendmail_path = /usr/sbin/postfix # Per Line 670:Uncomment newaliases_path = /usr/bin/newaliases # Per Line 675:Uncomment mailq_path = /usr/bin/mailq # Per Line 681:Uncomment setgid_group = postdrop # Add to last line # SMTP VRFY command is disabled disable_vrfy_command = yes # Requests a HELO command from the client smtpd_helo_required = yes # Limit sent/received mail size to 10M message_size_limit = 10485760 # Limit mailbox size to 1G mailbox_size_limit = 1073741824 # SMTP-Auth Settings smtpd_sasl_type = dovecot smtpd_sasl_path = private/auth smtpd_sasl_auth_enable = yes smtpd_sasl_security_options = noanonymous smtpd_sasl_local_domain = $myhostname smtpd_recipient_restrictions = permit_mynetworks, permit_auth_destination, permit_sasl_authenticated, reject |
③Edit configuration file (master.cf)
1 |
# vi /etc/postfix/master.cf |
Editorial content
1 2 3 4 5 6 |
Line 19,23 : Uncomment submission inet n - y - - smtpd # -o syslog_name=postfix/submission # -o smtpd_tls_security_level=encrypt -o smtpd_sasl_auth_enable=yes # -o smtpd_tls_auth_only=yes |
Reflect settings, restart
In Debian 12.x, /etc/aliases was created, but not in Debian 13, so I created it manually.
1 2 3 4 5 |
# touch /etc/aliases # vi /etc/aliases postmaster: root huong: huong |
1 2 |
# newaliases # systemctl restart postfix |
2.2 Dovecot : Installation Configuration
①Install Dovecot
Install Dovecot and build a POP/IMAP server, using 110/TCP for POP and 143/TCP for IMAP.
1 |
# apt -y install dovecot-core dovecot-pop3d dovecot-imapd |
②Configure Dovecot to provide SASL functionality for Postfix
Please note that the way to write the configuration file has changed drastically in dovecot 2.4.x, and I did it by mistake, so I may be wrong.
1 2 3 4 5 6 |
# vi /etc/dovecot/dovecot.conf Line 24 : Add protocols = imap pop3 Line 31:Uncomment listen = *, :: |
1 2 3 4 5 6 |
# vi /etc/dovecot/conf.d/10-auth.conf Line 12 : Uncomment auth_allow_cleartext = yes Line 95 : Uncomment auth_mechanisms = plain login |
1 2 3 4 5 6 7 8 9 10 11 |
# vi /etc/dovecot/conf.d/10-mail.conf Change lines 26-28 as follows mail_driver = maildir mail_path = /home/%{user}/Maildir mail_inbox_path = /home/%{user}/Maildir/ Line 35-38 : Comment #mail_driver = mbox #mail_home = /home/%{user|username} #mail_path = %{home}/mail #mail_inbox_path = /var/mail/%{user} |
1 2 3 4 5 6 7 8 |
# vi /etc/dovecot/conf.d/10-master.conf Line 110-112:Uncomment and Add # Postfix smtp-authi unix_listener /var/spool/postfix/private/auth { mode = 0666 user = postfix group = postfix } |
③Reflect settings, reboot
1 |
# systemctl restart dovecot |
2.3 Email User Account Registration
Register a user account for e-mail.
This setting is for when a user account on the OS is also used for e-mail.
If you want to use mail with a user account on the OS, no additional configuration is required, just register the OS user
①Mail client installed
1 |
# apt -y install mailutils |
②Mailboxes are set to refer to Maildir
1 |
# echo 'export MAIL=$HOME/Maildir/' >> /etc/profile.d/mail.sh |
2.4 Opening Ports
1 2 3 4 |
# ufw allow pop3 # ufw allow imap # ufw allow smtp # ufw reload |
2.5 operation check ①
①Send test mail to yourself [mail (user name)@(host name)].
user name : huong
1 2 3 4 5 6 7 8 |
# su - huong $ mail huong@localhost # Cc Cc: # Subject: Test Mail # This is the first mail. |
Ctrl + D key to exit the main text
Check incoming mail
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 |
$ mail "/home/huong/Maildir/": 1 message 1 new >N 1 huong Sun Jul 20 06:07 13/436 Subject: Test Mail ? 1 Return-Path: <huong@Lepard> X-Original-To: huong@localhost Delivered-To: huong@localhost Received: by mail.korodes.com (Postfix, from userid 1000) id B2203A0013; Sun, 20 Jul 2025 15:07:20 +0900 (JST) To: <huong@localhost> Subject: Subject: Test Mail User-Agent: mail (GNU Mailutils 3.15) Date: Sun, 20 Jul 2025 15:07:20 +0900 Message-Id: <20250720060720.B2203A0013@mail.korodes.com> From: huong <huong@Lepard> This is the first mail. ? q Saved 1 message in /home/huong/mbox Held 0 messages in /home/huong/Maildir/ |
2.6operation check ②
Set up and confirm your account in Mozilla Thunderbird (for OS user huong as mail user)
Start Thunderbird and click [New Account][Email] in the [Three] button-menu in the upper right corner.



Full name : any name
Email address : huong@<domain-name>
Enter the information and click "Continue".

Incoming Server Settings
Set [Connection security] to [None] and click [Continue].

Outgoing Server Settings
Set [Connection security] to [None] and click [Test].

Click [Continue]
Enter the [user's password] in the "Password" field and click "Continue"

Click [Continue]
Click "Finish" when the email account has been successfully created.

3 Applied ClamAV to mail server Postfix
Set up Postfix and Clamav to work together to scan incoming and outgoing mail in real time.
①Install Amavisd and Clamav Daemon and start Clamav Daemon
1 |
# apt -y install clamav-daemon amavisd-new |
If the server is not using a fully qualified domain name (FQDN) as the hostname, Amavis may fail to start. Also, since the OS hostname may change, set a valid hostname directly in the Amavis configuration file
1 2 3 4 5 6 7 8 9 10 |
# vi /etc/amavis/conf.d/05-node_id use strict; # $myhostname is used by amavisd-new for node identification, and it is # important to get it right (e.g. for ESMTP EHLO, loop detection, and so on) . chomp($myhostname = `hostname --fqdn`); # To manually set $myhostname, edit the following line with the correct Full y # Qualified Domain Name (FQDN) and remove the # at the beginning of the line . # $myhostname = "mail.<domain name>"; 1; # ensure a defined return |
②Virus Scan Enable
1 2 3 4 5 |
# vi /etc/amavis/conf.d/15-content_filter_mode #Line 13-14 : Uncomment and enable virus scan @bypass_virus_checks_maps = ( \%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re); |
③Register your own domain name
1 |
# echo '<yourDomain>' > /etc/mailname |
④Edit configuration file (Main.cf)
1 2 3 |
# vi /etc/postfix/main.cf Add to last line content_filter=smtp-amavis:[127.0.0.1]:10024 |
⑤Edit configuration file (master.cf)
1 |
# vi /etc/postfix/master.cf |
Editorial content
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
# Add all the following lines to the last line smtp-amavis unix - - n - 2 smtp -o smtp_data_done_timeout=1200 -o smtp_send_xforward_command=yes -o disable_dns_lookups=yes 127.0.0.1:10025 inet n - n - - smtpd -o content_filter= -o local_recipient_maps= -o relay_recipient_maps= -o smtpd_restriction_classes= -o smtpd_client_restrictions= -o smtpd_helo_restrictions= -o smtpd_sender_restrictions= -o smtpd_recipient_restrictions=permit_mynetworks,reject -o mynetworks=127.0.0.0/8 -o strict_rfc821_envelopes=yes -o smtpd_error_sleep_time=0 -o smtpd_soft_error_limit=1001 -o smtpd_hard_error_limit=1000 |
⑥Settings reflect
1 2 3 |
# usermod -G clamav amavis # usermod -G amavis clamav # systemctl restart clamav-daemon amavis postfix |
When you send an e-mail to yourself on Thuderbird, etc., it is successful if you see the following message in the header of the incoming e-mail.
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: xxxxx@xxxxxxx.com
X-Original-To: xxxxx@xxxxxxx.com
Delivered-To: xxxxx@xxxxxxx.com
Received: from localhost (localhost [127.0.0.1])
by mail.xxxxxxx.com (Postfix) with ESMTP id 4D2072093E
for xxxxx@xxxxxxx.com; Tue, 19 Aug 2025 12:37:32 +0900 (JST)
X-Virus-Scanned: Debian amavis at xxxxxxx.com
Received: from mail.xxxxxxx.com ([127.0.0.1])
by localhost (mail.xxxxxx.com [127.0.0.1]) (amavis, port 10024) with ESMTP
id nEt0BMBC_2rV for xxxxx@xxxxxxx.com;
Tue, 19 Aug 2025 12:37:32 +0900 (JST)
Received: from [192.168.11.6] (buffalo.setup [192.168.11.1])
by mail.xxxxxxx.com (Postfix) with ESMTPA id 34DB420928
for xxxxx@xxxxxxx.com; Tue, 19 Aug 2025 12:37:32 +0900 (JST)
Message-ID: 124a8db5-660c-45ca-8533-453d48efac28@xxxxxxx.com
Date: Tue, 19 Aug 2025 12:37:31 +0900
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
From: xxxxx xxxxx@xxxxxxx.com
Content-Language: en-US
To: xxxxx xxxxx@xxxxxxx.com
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
4 Apply spam checks to the mail server
4.1 Spam checking using spamassassin and procmail
①spamassassin and procmail installation
1 |
# apt -y install procmail spamassassin |
➁Configure procmail
If you want to apply the settings to all users
Create /etc/procmailrc
To configure for each individual, create a ~/.procmailrc in each user's home directory.
Create /etc/procmailrc this time
1 |
# vi /etc/procmailrc |
Contents of procmailrc
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
SHELL=/bin/bash PATH=/usr/bin:/bin:/usr/local/bin DROPPRIVS=yes MAILDIR=$HOME/Maildir DEFAULT=$MAILDIR/ SPAM=$MAILDIR/.Spam/ LOGFILE=$HOME/.procmail.log # Log output destination VERBOSE=ON # Detailed log output # If there is no "X-Spam-***" in the mail header, spamassassassin will be started. :0fw *!^X-Spam.* |spamassassin # If there is an "X-Spam-Status: Yes" in the mail header, the mail is stored in the ". .Spam" directory. :0 * ^X-Spam-Status: Yes $SPAM |
➂Create a .Spam directory in each user's ~/Maildir directory
1 2 |
# su - <user> $ mkdir Maildir/.Spam |
④Edit postfix configuration file
Do it as root user
1 2 3 4 |
# vi /etc/postfix/main.cf Per Line 486 : Uncomment mailbox_command = /usr/bin/procmail -a "$EXTENSION" |
⑤Restart postfix and spamassassin
1 2 |
# systemctl restart postfix spamd # systemctl enable spamassassin-maintenance.timer |
⑥Confirmed by Thudrtbird
If you send an e-mail to yourself and the header displays the following, it is normal.
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: xxxxx@xxxxxxx.com
X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-25) on Lepard
X-Spam-Level: ***
X-Spam-Status: No, score=3.1 required=5.0 tests=ALL_TRUSTED,EMPTY_MESSAGE,
MISSING_SUBJECT autolearn=no autolearn_force=no version=4.0.1
X-Original-To: xxxxx@xxxxxxx.com
Delivered-To: xxxxx@xxxxxxx.com
Received: from localhost (localhost [127.0.0.1])
by mail.xxxxxxx.com (Postfix) with ESMTP id 9D3EF20941
for xxxxx@xxxxxxx.com; Tue, 19 Aug 2025 12:53:17 +0900 (JST)
X-Virus-Scanned: Debian amavis at xxxxxxx.com
Received: from mail.xxxxxxx.com ([127.0.0.1])
by localhost (mail.xxxxxxx.com [127.0.0.1]) (amavis, port 10024) with ESMTP
id l-LONnkdZWgz for xxxxx@xxxxxxx.com;
Tue, 19 Aug 2025 12:53:17 +0900 (JST)
Received: from [192.168.11.6] (buffalo.setup [192.168.11.1])
by mail.xxxxxxx.com (Postfix) with ESMTPA id 86FDD207C4
for xxxxx@xxxxxxx.com; Tue, 19 Aug 2025 12:53:17 +0900 (JST)
Message-ID: 128533c9-ae95-48d6-8fab-7728d1fd029b@xxxxxxx.com
Date: Tue, 19 Aug 2025 12:53:16 +0900
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
From: xxxxx xxxxx@xxxxxxx.com
Content-Language: en-US
To: xxxxx xxxxx@xxxxxxx.com
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
⑦Spam check confirmation
Send yourself an email with the body of the email "XJSC4JDBQADN1.NSBN32IDNENGTUBE-STANDARD-ANTI-UBE-TEST-EMAILC.34X" and make sure the email is not delivered and is sorted into the Spam folder
The header states
X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-25) on Lepard
X-Spam-Flag: YES
X-Spam-Level: *********************************************
X-Spam-Status: Yes, score=999.7 required=5.0 tests=ALL_TRUSTED,GTUBE,
HTML_MESSAGE,MPART_ALT_DIFF autolearn=no autolearn_force=no
version=4.0.1
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----------=_68A3F7A9.4037AD7E"
This is a multi-part message in MIME format.
------------=_68A3F7A9.4037AD7E
Content-Type: text/plain; charset=UTF-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Spam detection software, running on the system "Lepard",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: XJSC4JDBQADN1.NSBN32IDNENGTUBE-STANDARD-ANTI-UBE-TEST-EMAILC.34X
XJSC4JDBQADN1.NSBN32IDNENGTUBE-STANDARD-ANTI-UBE-TEST-EMAILC.34X
4.2 Spam Email Learning
SpamAssassin's email learning functionality improves the accuracy of its judgments
①Learns all contents of ".Spam" directory as spam mail
1 2 |
# /usr/bin/sa-learn --spam /home/*/Maildir/.Spam/cur Learned tokens from 0 message(s) (0 message(s) examined) |
➁Learning of non-spam mail (normal mail)
1 2 |
# /usr/bin/sa-learn --ham /home/*/Maildir/cur Learned tokens from 7 message(s) (7 message(s) examined) |
➂Creating scripts for automatic learning
1 |
# vi /opt/script/spam-learns.sh |
1 2 3 4 5 6 7 8 |
#! /bin/sh # Spam Email Learning /usr/bin/sa-learn --spam /home/*/Maildir/.Spam/cur # Learning normal mail /usr/bin/sa-learn --ham /home/*/Maildir/cur # If you want to force the deletion of the contents of the spam mail storage directory, add the following statement /bin/rm -f /home/*/Maildir/.Spam/cur |
1 |
# chmod 750 /opt/script/spam-learns.sh |
④SpamAssassin automatically starts at system startup
1 2 3 |
# systemctl enable spamd Synchronizing state of spamd.service with SysV service script with /lib/systemd/systemd-sysv-install. Executing: /lib/systemd/systemd-sysv-install enable spamd |