Information and notes Fast Channel version
13.2.21327.1706 first before updating to version 14. Updating from a different version may cause problems.
WARNING: Make sure you have installed versionSystem requirements
General requirements
Hardware
- Dedicated email server (cloud-based or on-premises)
- 4GB RAM Main memory
- 2 CPU cores (virtualized or physical)
- Sufficient storage space. The size required depends on the number of emails received and on the modules used. Contact our support team for assistance with planning.
Communication
- Communication via the SMTP protocol for inbound and outbound emails. NoSpamProxy Encryption also supports the receipt of messages via the POP3 protocol.
- Port redirection or relay system. NoSpamProxy accepts the emails on port 25 instead of your previous email server. If the email server and NoSpamProxy are installed on the same system, the previous email server port must be redirected.
- Port 6060/6061 TCP (internal communication between the NoSpamProxy roles)
- Port 25 (SMTP, also used by Exchange)
- Port 443 (SSL, is required for the Web Portal, but can be changed)
- Port 110 TCP (POP3, no support for NoSpamProxy Server Protection)
Troubleshooting
NoSpamProxy
- Windows Server 2012 R2 (discontinued as of 12/31/2023)
- Microsoft SQL Server Standard/Enterprise 2012 Service Pack 4 (discontinued as of 12/31/2023) or Microsoft SQL Express 2019 (on Windows Server 2016 or later) or Microsoft SQL Express 2017 (on Windows Server up to and including 2012 R2), respectively
- How to update SQL Server can be found on the Microsoft Website.
- Microsoft .NET Framework 4.8
- Microsoft Visual Studio 2010 Tools for Office Runtime
Gatewayrolle
- Working DNS resolution. This is used by NoSpamProxy Protection for resolving Realtime Blocklists and Spam URL Blocklists. NoSpamProxy Encryption requires DNS resolution for certificate verification (access to ‘Certificate Revocation Lists’ and ‘OCSP’).
- HTTP, HTTPS and LDAP access to the Internet. NoSpamProxy Protection requires access for one of the real-time blocklists, the Core Antispam Engine and the Integrated Malware Scanner. NoSpamProxy Encryption uses HTTP and HTTPS as well as LDAP for certificate checking (access to ‘Certificate Revocation Lists’ and ‘OCSP’ ).
- If a firewall is used, appropriate port releases for all ports intended for NoSpamProxy (usually this is port 25).
- TCP connection via port 6060 and HTTPS connection via port 6061 from the interface to the Gateway Role. These ports are needed for the initial connection setup between Gateway roles and the Intranet role. After all Gateway Roles are connected, communication to them is done only via the Intranet Role.
- Optional: Any file-based on-access virus scanner.
Intranet Role
- TCP connection via port 6060 and HTTPS connection via port 6061 from interface to the Intranet Role
- TCP connection via port 6060 and HTTPS connection via port 6061 from intranet role to the Gateway Role
- Optional: TCP connection to a Domain Controller via LDAP or Global Catalog
- Optional: TCP connection to the Web Portal via HTTPS.
NoSpamProxy Command Center
- TCP connection via port 6060 and HTTPS connection via port 6061 from interface to Intranet Role
Outlook Add-In
- Outlook 2010 mit Service Pack 2
- Microsoft Visual Studio 2010 Tools for Office Runtime
- Microsoft .NET Framework 4.8
Web Portal
- Windows Server 2012 R2 (discontinued as of 12/31/2023)
- Microsoft .NET Framework 4.8
- Microsoft SQL Server Standard/Enterprise 2012 Service Pack 4 (discontinued as of 12/31/2023) or Microsoft SQL Express 2019 (on Windows Server 2016 or later) or Microsoft SQL Express 2017 (on Windows Server up to and including 2012 R2), respectively.
Preparations
Depending on the planned installation environment, different preparations are necessary.
- If you use a firewall, the port intended for the NoSpamProxy Web Portal must be open. Usually this is port 443.
- If the IIS are installed on the same system as one of the Gateway Roles, disable SSL loopback checking. The procedure is described in the Microsoft Knowledge Base.
- Use method 1 to set up an exception for the connection to this address.
- Method 2 is not recommended as it would disable an essential security feature of your server.
- If the Web Portal is installed on a computer in the DMZ or on a computer outside the domain, please disable the UAC remote restrictions. The procedure is described in the Microsoft Knowledge Base.
Starting the update
Video: Preparations for the update to version 14
Sequence for updating
- Update the Intranet Role. This may take some time. A temporary increase in the allocated RAM may be helpful.
- Update the Gateway Role(s). If you are using multiple Gateway Roles, update them one at a time.
- Update the Web Portal.
Before updating
- Check for any unreleased Disclaimer changes and apply or discard them.
- Close all Windows programs.
Click the setup file. The wizard guides you through the update process.
Changes and recommendations
General changes
Altered names of NoSpamProxy services
The NoSpamProxy services have new names. You may need to make adjustments in monitoring. The following names are used from version 14 (the previous names are in brackets):
- NoSpamProxyCoreAntispamEngine
- NoSpamProxyGatewayRole (NetatworkMailGatewayGatewayRole)
- NoSpamProxyIdentityService (-)
- NoSpamProxyIntranetRole (NetatworkMailGatewayIntranetRole)
- NoSpamProxyLargeFileSynchronization (NetatworkMailGatewayFileSynchronizationService)
- NoSpamProxyManagementService (NetatworkMailGatewayManagementService)
- NoSpamProxyMessageTrackingService (-)
- NoSpamProxyPrivilegedService (NetatworkMailGatewayPrivilegedService)
- NoSpamProxyWebApp (NoSpamProxyIntranetRoleWebApp)
Altered names of NoSpamProxy processes
The NoSpamProxy processes have new names. If necessary, make adjustments to monitoring, Windows Firewall and existing local virus scanners. The following names are used from version 14 (the previous names are in brackets):
- NoSpamProxy.CoreAntispamEngine
- NoSpamProxy.IntranetRole (NetatworkMailGatewayIntranetRole)
- NoSpamProxyFileSynchronizationService (NoSpamProxyFileSynchronizationService)
- NoSpamProxy.GatewayRole (NetatworkMailGatewayGatewayRole)
- NoSpamProxy.ManagementService (NetatworkMailGatewayManagementService)
- NoSpamProxy.MimeDetection (Netatwork.NoSpamProxy.Mime.Detection.External)
- NoSpamProxy.PrivilegedService (NetatworkMailGatewayPrivilegedService)
- NoSpamProxy.WebAppHostingService (NoSpamProxy.WebAppHostingService)
Numerous changes regarding the database structure
The changes to the database structure make it necessary to adapt existing PowerShell scripts as well as SIEM systems (Splunk, for example).
Action CSA Whitelist is now action CSA Certified IP List
The action CSA Whitelist is now a filter and is called CSA Certified IP List.
The NoSpamProxy Management Console is now called NoSpamProxy Command Center.
The NoSpamProxy Management Console/NoSpamProxy Management Console has been renamed to NoSpamProxy Command Center and is no longer an MMC snap-in. Any configurations (such as if the MMC was previously installed remotely) will be lost during the upgrade and must be reconfigured in the new application.
New folder for the NoSpamProxy Command Center
The NoSpamProxy Command Center creates a folder and files in the user profile under AppDataRoamingNoSpamProxy. This is where the configuration of the NoSpamProxy Command Center is stored.
New network address for downloading AV patterns
A new network address is used for downloading AV patterns: https://av-patterns.nospamproxy.com/
Changes during new installation
Changed installation path
The installation path is now C:ProgrammeNoSpamProxy (vormals C:Program FilesNet at Work Mail Gateway).
Changed database names
The names of the databases used are now as follows (the previous names are in brackets):
- NoSpamProxyGatewayRole (NoSpamProxyDB)
- NoSpamProxyIntranetRole (NoSpamProxyAddressSynchronization)
- NoSpamProxyWebPortal (enQsigPortal)
NoSpamProxy Web App
During setup, the NoSpamProxy Web App is installed as part of the Intranet Role.
Empfehlungen
- We recommend adding the 32Guards filter to all inbound and outbound rules.
- We recommend adding the 32Guards action to all inbound and outbound rules.
For more information, see the online help.