Forum
  1. Forums
  2. Imunify360
  3. Imunify360 and Imunify Sensor
  1. Christos Panagiotakis
  2. Thursday, March 30, 2017
  3.  Subscribe via email
I asked in a thread about CSF and Imunify because it some-kinda relevant but I got no answer.
I hope it's OK to ask again,

Do you plan features like this (mail / spam relevant) ?

Usually when an account gets infected/hacked bots or malicious users are uploading mail scripts. And the usual Top #1 problem for us (My personal opinion of course) is dealing with outgoing mail spam.

CSF/LFD notifies us when someone / some script is sending mass mails, localrelay, authrelay, and when the queue is above x limit.

When I get the warning I know something is wrong and start investigation.

The usual outcome is server IP blacklisted in multiple RBLs -and other users can't send mails-, IP block, or whole server block (for one account) from the data center.

So I believe it's crucial to know what's happening with outgoing mails and queues.
Rate this post:
  1. 30.03.2017 16:03:25
  2. # 1
Ryan Smith Accepted Answer
Posts: 31
Joined: 27.04.2016
0
Votes
Undo
Having outgoing spam monitoring (authrelay, localrelay, localhostrelay) with email alerts is such an important feature of CSF that I would strongly urge you to consider implementing this in Imunify.

Having to run CSF in conjunction with Imunify seems to unnecessarily complicate and devalue the product. If Imunify added outgoing spam monitoring we would be more inclined to remove CSF altogether once Imunify is stable.
  1. 30.03.2017 17:03:44
  2. # 2
Igor Seletskiy Accepted Answer
Posts: 1184
Joined: 09.02.2010
0
Votes
Undo
There are a lot of things that CSF does that we want to automate in long term -- and after some time period we will have basic spam protection similar to CSF in Imunify360.
Yet, for now, we wanted to move forward with where we are strong together -- so we added complete CSF integration for Imunify360 -- so you can have the best of both worlds.
  1. 16.04.2017 09:04:19
  2. # 3
Jeppe Accepted Answer
Posts: 1
Joined: 15.04.2017
0
Votes
Undo
I would just like to make a vote for this, since this is also one of our regular issues.
  1. 20.04.2017 11:04:18
  2. # 4
Eric Accepted Answer
Posts: 1
Joined: 20.04.2017
0
Votes
Undo
Another vote
  1. 14.05.2017 14:05:08
  2. # 5
Steven Accepted Answer
Posts: 4
Joined: 31.10.2013
0
Votes
Undo
We dont use CSF, but need this as well. There are lots of possibilities for this such as monitor/block/alert when a script is calling the php mail function a lot, but I think seeing how a malicious file behaves and stopping it is the best, then it wont be able to run in the first place (such as the sandboxing feature), including blocking the IPs that are trying to access such script.
  1. 24.05.2017 00:05:14
  2. # 6
Hector Accepted Answer
Posts: 0
Joined: 18.08.2017
0
Votes
Undo
I agree.

In my experience, when someone gains access for example by penetrating Wordpress, the end goal is to install back doors, phishing pages (that look exactly like Hotmail, for example) and base64-encoded scripts that send thousands of emails per hour. That is a constant problem as it gets the server's IP address blacklisted and usually by the time we're notified and investigate, a lot of damage has already been done.
  • Page :
  • 1


There are no replies made for this post yet.
Be one of the first to reply to this post!
Guest
Submit Your Response
Upload files or images for this discussion by clicking on the upload button below. Supports gif,jpg,png,zip,rar,pdf
• Remove Upload Files (Maximum File Size: 2 MB)
You may insert polls into your post. The poll would then appear in the post.
Vote Options
Captcha
To protect the site from bots and unauthorized scripts, we require that you enter the captcha codes below before posting your question.