FAQs & Knowledge Base

Welcome to our Knowledge Base. Search or browse through the topics below to find answers to your questions.

Categories: Exchange Server Toolbox | Show all categories

During your maintenance period, you will find them at Downloads/Updates -> Older versions in your customer account. There are the installation files and keys of the two last major versions.

The following folders should be excluded in any external security program to prevent problems with the Exchange Server Toolbox:

  • C:\Program Files (x86)\JAM Software\Exchange Server Toolbox\bin
  • C:\Program Files (x86)\Common Files\JAM Software\ClamAVInABox
  • C:\Program Files (x86)\Common Files\JAM Software\Redis-EST
  • C:\Program Files (x86)\Common Files\JAM Software\SpamAssassin
  • C:\ProgramData\JAM Software\ClamAVInABox
  • C:\ProgramData\JAM Software\Exchange Server Toolbox
  • C:\ProgramData\JAM Software\spamdService
  • And your configured Filesystem archive folder (if applicable)

This is important so that the Exchange Server Toolbox can check mails for viruses without interference. Since the Exchange Server Toolbox receives emails via TCP and temporarily stores them locally for virus scanning, the processes in the listed folders must be undisturbed during these operations. If security software interferes with the process, errors may occur during email processing.

In addition, it can happen that virus signatures used by ClamAV are detected as viruses. If something deletes or blocks the signatures, the Exchange Server Toolbox cannot provide virus protection.

For more information about using Exchange Server Toolbox and an external virus scanner at the same time, see the chapter Anti Virus in the help.

To check if the Exchange Server Toolbox is the reason for emails not arriving, you can search for the email in the Event Viewer. To do this, you can filter by the email addresses or search for emails that were not delivered in the "Delivered" column. If the email is not listed or is marked as "Delivered", then Exchange Server Toolbox is not the reason the email was not delivered.

For more information relevant to the topic, see the articles linked below:

Here you can find instructions on how to remove Exchange Server Toolbox from the e-mail processing chain.

Here you can find information about checking if your Exchange Server is causing problems.

You can check for errors with your Exchange Server using these programs:

https://microsoft.github.io/CSS-Exchange/Diagnostics/HealthChecker/

This tool helps detect common configuration issues know for causing performance issues. It also collects useful information.

https://www.frankysweb.de/message-tracking-gui/

This tool provides an easy-to-use UI that makes it easy to track email history. To do this, it requires the Exchange Management Tool.

https://www.frankysweb.de/exchange-reporter-2013/

This tool collects various information and statistics about the email processing process and displays them graphically.

 

Here you can find instructions to check if the Exchange Server Toolbox might be the cause of the problem.

If you want to completely rule out the possibility that the Exchange Server Toolbox is responsible for problems, you can completely remove it from the email processing chain.

You have two options to remove Exchange Server Toolbox from the email processing chain. Either uninstall the Exchange Server Toolbox or use these two commands in the Exchange Management Shell:

  • Disable-TransportAgent "Exchange Server Toolbox Processing Smtp Agent".
  • Disable-TransportAgent "Exchange Server Toolbox Processing Routing Agent

After that restart the MSExchangeTransport service. To enable processing again, use the same commands and swap the beginning with "Enable-TransportAgent [...] ". With "Get-TransportAgent [...]" you can check the current status.

Here you can find more information to check if your Exchange Server is responsible for problems.

None of our applications depend on Java Spring or any other Java library and are thus not affected by this vulnerability.

All of our products are being developed in Delphi or C#. Although we use Spring4D(elphi) with some of the components, they are safe to use, because the reported vulnerability applies to Java Spring framework only.

This applies to all versions and editions of our applications (TreeSize, SpaceObServer, SpaceObServer WebAccess, HeavyLoad, SmartPOP2Exchange, Exchange Server Toolbox, SpamAssassin in a Box, SpamAssassin for Windows, SmartCallMonitor, SEPA-Transfer, ServerSentinel, and ShellBrowser). It is recommended to always use the latest available versions though to benefit from the latest patches, improvements, and features.

In this case you will need two Exchange Server Toolbox installations, one for the DMZ mail server and one for the regular mail server.

Configuration for the DMZ Exchange Server Toolbox:

  1. Install the Exchange Server Toolbox
  2. Go to Settings | Installations and copy the fingerprint

Configuration for the regular Exchange Server Toolbox:

  1. Install the Exchange Server Toolbox
  2. Go to Settings | Installations and press "Configure as master installation"
  3. In the new window, enter the host IP for the master installation. The DMZ installation needs to be able to reach the master installation using this IP
  4. In the new table, add the DMZ installation as a client. You need to provide the fingerprint that you copied from the DMZ installation as well as an IP with which the master installation can reach the client installation
  5. If you want client installation to use its own settings check the "Only share AD information" box. If you keep it unchecked, the master installation will share all of its (antivirus, rules, spam, etc) settings with the client installation

The client installation will now recieve AD information which it can use for processing. The master installation will always be the one responsible for maintaining the archive.

Yes, SmartPOP2Exchange and Exchange Server Toolbox can be installed together on the same server. When doing so, you should take this into account:

Problems with direction detection

In older versions there were problems with direction detection when SmartPOP2Exchange and the Exchange Server Toolbox were installed on the same server. To fix this, a rule is now created when SmartPOP2Exchange is installed that automatically assigns a new header field (X-JamMailSource) with a value (MailGateway) to all emails. In the Exchange Server Toolbox, this header is queried under Settings | Advanced | Mail Direction, and emails with this header field and header field value are always considered Incoming.

You can adjust these values if you want, but please make sure that they are the same in both programs.

Always keep versions up to date

Please note that you must always have the latest versions of both programs installed. Otherwise it is possible that SpamAssassin or ClamAV will be updated to a version that the other program cannot use.

Spam and virus scanning in one program only

To avoid wasting time and resources unnecessarily, you should run the spam and virus scans in only one of the programs. Since SmartPOP2Exchange and Exchange Server Toolbox share an installation of ClamAV and SpamAssassin, the scanning results are identical.

You should consider the following things when deciding which of the programs to use for scans:

Advantages of scans in the Exchange Server Toolbox

The Exchange Server Toolbox offers more configuration options and more rule actions for both scans. Therefore, the scans and especially the reaction to different results can be customized in much more detail.

Advantages of scans in SmartPOP2Exchange

Since in this configuration the Exchange Server Toolbox receives the emails directly from SmartPOP2Exchange, rejecting emails in the Exchange Server Toolbox should be avoided (otherwise this will lead to errors in SmartPOP2Exchange). So it is only possible to reject emails (based on scan results) with SmartPOP2Exchange. However, you should keep in mind that the emails have already been delivered to an account, so SmartPOP2Exchange not picking them up can be legally problematic.

This error is caused by new Windows security settings. To fix it, open the Exploit protection Settings. Here, switch to the program settings and specify all EXE files listed in the error message under Add program. You must overwrite the ALSR settings in each case.

To create a manual backup of the settings, back up the following files:

C:\ProgramData\JamSoftware

  • \ClamAVInABox
    • ClamAvSettings.config
  • \Exchange Server Toolbox
    • DistributedInstallationSettings.config
    • ESTSettings.config
    • GlobalSettings.config
    • hMailServerSettings.config
    • IncomingReceiveRules.config
    • IncomingRules.config
    • InternalRules.config
    • LicensingSettings.config
    • MailServerInformationSettings.config
    • OutgoingRules.config
    • TenantSettings.config
    • UserTextTemplates.config
  • \spamdService
    • \sa-bayes
      • bayes_toks
    • \sa-config
      • JAMAutoWL.cf
      • alle Dateien nach dem Muster X*.cf (z.B. xCustomRules.cf)

C:\Windows\system32\config\systemprofile\.spamassassin\user_prefs

To restore the settings, you can copy the files back to the appropriate locations one by one (to do this, you need to stop the ExchangeServerToolboxService and SpamdServiceControl services).

Alternatively, you can create a ZIP file and select it in the Exchange Server Toolbox under Settings | Advanced | Import settings. The ZIP file must contain the entire folder structure mentioned above. The two folders ProgramData and WINDOWS must be in the top level:

  • ManualBackup.zip
    • \ProgramData
      • \JamSoftware...
    • \WINDOWS
      • \system32...

All entries (Page 1 / 7)