5 Easy Steps to Clear /var/lib/amavis/virusemails (Free Up Disk Space!)

Clearing virusemails directory Clearing Virus Emails in Amavis

Dealing with quarantined emails in Amavis, specifically within the /var/lib/amavis/virusemails directory, can be a critical aspect of maintaining a healthy email server. A bloated virus email quarantine can consume valuable disk space and potentially impact server performance. Furthermore, neglecting this directory might lead to overlooked legitimate emails mistakenly flagged as malicious. Therefore, understanding how to effectively manage and clear this directory is essential for any system administrator. This article will provide a comprehensive guide to safely and efficiently clearing out the /var/lib/amavis/virusemails directory, covering various methods and best practices to ensure a clean and optimized email system. Moreover, we will explore precautionary measures to avoid accidental data loss and maintain email security.

Before embarking on the process of clearing the /var/lib/amavis/virusemails directory, it’s crucial to understand the implications and potential risks. Firstly, this directory typically contains emails identified as potentially containing viruses or malware. Consequently, directly deleting these emails without review could pose a security risk if legitimate emails were incorrectly flagged. Secondly, simply deleting the files might not be sufficient to reclaim disk space immediately. Amavis, depending on its configuration, might retain database entries related to the quarantined emails, even after the files themselves are removed. Therefore, it’s imperative to adopt a methodical approach. One such approach involves utilizing the amavisd-new-delete command, which is designed specifically for managing the Amavis quarantine. This command not only deletes the email files but also removes the corresponding database entries, ensuring complete removal and proper disk space reclamation. Alternatively, some administrators prefer using a combination of command-line tools like find and rm for more granular control, but this requires greater caution and a thorough understanding of the file structure and potential consequences.

In addition to the technical aspects of clearing the /var/lib/amavis/virusemails directory, establishing a regular maintenance routine is equally important. Consistent monitoring of disk space usage and implementing automated cleanup procedures can prevent future issues and ensure optimal server performance. For instance, scheduling a cron job to execute the amavisd-new-delete command on a regular basis can automate the process of removing older quarantined emails. Furthermore, configuring Amavis to automatically delete emails after a specific retention period can streamline the process and minimize manual intervention. Ultimately, a proactive approach to managing the Amavis quarantine is paramount to maintaining a secure and efficient email system. This includes regularly reviewing Amavis logs for any anomalies or false positives, fine-tuning Amavis settings to minimize incorrect quarantines, and educating users about best practices for avoiding phishing attempts and malware. By combining technical expertise with proactive management, administrators can effectively mitigate risks and ensure the long-term health of their email infrastructure.

Understanding the /var/lib/amavis/virusemails Directory

The /var/lib/amavis/virusemails directory is where Amavis, a popular open-source email virus and spam scanner, quarantines emails identified as potentially containing viruses. Think of it as a holding pen for suspicious emails. Amavis intercepts incoming mail before it reaches your mailbox and scans it for malicious content. If a virus is detected, the infected email is typically moved to this directory to prevent it from infecting your system or spreading further. This is a critical function as it acts as a first line of defense against email-borne threats.

The directory itself usually contains subdirectories organized by date. This helps manage quarantined emails and makes it easier to find specific messages if needed. Within these date-based subdirectories, you’ll find the actual quarantined email files. These files often maintain the original email structure, including headers and attachments, which can be useful for analysis or recovery if a legitimate email is flagged incorrectly. It’s important to note that the precise structure and naming conventions might vary slightly depending on your specific Amavis configuration. However, the core principle of isolating potentially harmful emails remains consistent.

Understanding the contents of this directory is important for managing quarantined emails. You might need to access this directory if a legitimate email is mistakenly marked as infected (a false positive). In such cases, you can retrieve the email from quarantine. Alternatively, you may need to review the quarantined emails to understand the nature of the threats targeting your system. By examining the headers and content of quarantined emails, you can gain valuable insights into the types of malware being circulated and potentially improve your email security measures.

Here’s a breakdown of what you might find within the /var/lib/amavis/virusemails directory:

Item Description
Date-based subdirectories (e.g., 20240328) Organize quarantined emails by the date they were quarantined.
Email files (within date subdirectories) Contain the full content of the quarantined emails, including headers and attachments. Filenames often include unique identifiers.
.log files (potentially) May contain logs related to the quarantining process, although logging configuration varies.

Regularly monitoring and managing the /var/lib/amavis/virusemails directory is a crucial aspect of maintaining a secure email environment. While Amavis automatically quarantines suspicious emails, it’s essential to review and clear this directory periodically. Leaving a large number of quarantined emails can consume disk space unnecessarily. Moreover, regular review allows you to identify potential false positives and ensure that legitimate emails aren’t trapped indefinitely. Understanding how Amavis utilizes this directory empowers you to manage potential threats effectively and maintain a clean and efficient email system.

Using the find Command for Efficient Removal

The find command is a powerful tool on Linux systems, perfect for locating and managing files based on various criteria like name, size, modification time, and more. When dealing with a full /var/lib/amavis/virusemails directory, find offers a much more efficient and controlled way to clear out old or unwanted emails compared to manually deleting them or using less precise methods. Its flexibility allows you to target specific files, ensuring you only remove what you intend to.

Before you start using find to remove files, it’s highly recommended to first test your command to make sure it selects the correct files. This prevents accidental deletion of important data. You can do this by replacing the -delete action (which we’ll cover later) with -print, which simply prints the paths of the files that would be deleted. This allows you to review the files that will be affected before proceeding with the actual deletion.

Here are some examples demonstrating how to use find effectively to clear out your /var/lib/amavis/virusemails directory:

Removing Files Older Than a Specific Number of Days

One common scenario is removing emails older than a certain number of days. This helps keep the directory size manageable and prevents it from filling up your disk space. The -mtime option is your friend here. It allows you to specify the number of days since a file was last modified. For example, to remove files older than 7 days:

find /var/lib/amavis/virusemails -type f -mtime +7 -print  # Test first!
find /var/lib/amavis/virusemails -type f -mtime +7 -delete # Actual deletion

In this command, -type f ensures that only files (and not directories) are selected. -mtime +7 selects files modified more than 7 days ago. Remember to run the command with -print first to verify the selection before using -delete.

Removing Files Based on Size

Sometimes, you might want to remove very large emails clogging up your /var/lib/amavis/virusemails directory. The -size option allows you to specify a size threshold. For instance, to remove files larger than 10 megabytes:

find /var/lib/amavis/virusemails -type f -size +10M -print # Test first!
find /var/lib/amavis/virusemails -type f -size +10M -delete # Actual deletion

Here, -size +10M selects files larger than 10 megabytes. You can use other size units like k (kilobytes), G (gigabytes), etc.

Combining Criteria with Logical Operators

You can combine different criteria using logical operators like -and (represented by -a), -or (represented by -o), and -not (represented by !). For example, to remove files older than 30 days *and* larger than 5 megabytes:

find /var/lib/amavis/virusemails -type f -mtime +30 -a -size +5M -print # Test first!
find /var/lib/amavis/virusemails -type f -mtime +30 -a -size +5M -delete # Actual deletion

This provides a granular way to target specific files based on multiple attributes.

Understanding find Options

Let’s break down some commonly used find options:

Option Description
-type f Matches only files (not directories).
-mtime +n Matches files modified more than n days ago.
-mtime -n Matches files modified less than n days ago.
-mtime n Matches files modified exactly n days ago.
-size +n[c] Matches files larger than n units (b: 512-byte blocks, c: bytes, k: kilobytes, M: megabytes, G: gigabytes).
-size -n[c] Matches files smaller than n units.
-size n[c] Matches files exactly n units in size.
-name "pattern" Matches files with names matching the specified pattern. Use wildcards like * and ?.
-print Prints the paths of the matched files (useful for testing).
-delete Deletes the matched files. Use with extreme caution!

Remember, practice and careful testing are key to mastering the find command. Always double-check your command with -print before using -delete to avoid accidental data loss.

Deleting Files Directly with rm

Sometimes, the most straightforward approach is the best. If you’re comfortable working directly in the terminal, you can use the rm command to delete files within the /var/lib/amavis/virusemails directory. This offers a quick and efficient way to clear out quarantined emails, but it also requires caution. Remember, deleted files are gone for good, so make absolutely sure you don’t need them before proceeding.

Basic Removal

The simplest way to delete everything in the virusemails directory is using the following command:

sudo rm -rf /var/lib/amavis/virusemails/*

Let’s break this down:

Command Part Explanation
sudo Executes the command with root privileges. This is necessary because the virusemails directory is typically owned by root.
rm The remove command.
-r This option tells rm to recursively delete directories and their contents. The virusemails directory often contains subdirectories organized by date, so this option is crucial for clearing everything.
-f This option forces the removal without prompting for confirmation. This makes the process faster, especially if you have a large number of files, but also increases the risk of accidental deletion. Use with care!
/var/lib/amavis/virusemails/* Specifies the location and files to delete. The asterisk (*) acts as a wildcard, selecting all files and directories within the virusemails folder.

Selective Removal

Instead of deleting everything, you might want to remove only specific files. This is where being cautious is paramount. You can delete individual files by specifying their full path:

sudo rm /var/lib/amavis/virusemails/specific_file.eml

You can also use wildcards to target specific types of files. For example, to delete only files ending in .zip, you could use:

sudo rm /var/lib/amavis/virusemails/*.zip

Precautionary Measures

Before wielding the power of rm -rf, strongly consider these precautions. Mistakes with this command can be disastrous if used incorrectly. Double-check the directory path you’re targeting. A simple typo could lead to unintended data loss. If you’re unsure, it’s better to start by moving the files to a temporary location using the mv command. This acts as a sort of “soft delete,” allowing you to recover the files if needed. For example:

sudo mv /var/lib/amavis/virusemails/* /tmp/virusemails_backup/

After verifying you no longer need the backed-up files, you can then delete the temporary directory with sudo rm -rf /tmp/virusemails\_backup/. Remember, disk space is a valuable resource. Regularly clearing out old, unneeded quarantined emails is a good practice for maintaining a healthy system. Using these techniques, you can effectively manage the virusemails directory and keep your server running smoothly.

Automating the Cleanup Process with a Cron Job

Manually deleting virus emails from /var/lib/amavis/virusemails can be a real drag, especially if you’re dealing with a high volume of infected messages. Thankfully, we can automate this process using a cron job. Cron is a time-based job scheduler in Unix-like operating systems. It lets you schedule tasks to run automatically at specific intervals. This is perfect for regularly cleaning up that pesky virus email directory.

Before you set up your cron job, it’s good practice to understand where your Amavis configuration files are located. Typically, you’ll find the main configuration file at /etc/amavis/conf.d/15-content\_filter\_mode. This file defines how Amavis handles spam and viruses. You might want to take a peek inside to understand your current settings and customize them as needed.

Understanding Cron Jobs

Cron jobs are controlled by crontab files. Each user can have their own crontab file, and there are also system-wide crontab files. We’ll be focusing on setting up a user-specific cron job.

Creating a Cron Job

To create or edit your user crontab file, open a terminal and type crontab -e. This will open the file in a text editor. If it’s your first time, you might be asked to choose an editor.

Defining the Cleanup Command

Now, let’s add the command to delete the virus emails. Add the following line to your crontab file:

0 3 * * * find /var/lib/amavis/virusemails -type f -mtime +7 -delete
Field Value Description
0 0 Minute (0-59)
3 3 Hour (0-23)
* * Day of the month (1-31)
* * Month (1-12)
* * Day of the week (0-6, Sunday=0)

This line tells cron to run the command at 3:00 AM every day. The find command searches for files within /var/lib/amavis/virusemails that are older than 7 days (-mtime +7) and deletes them (-delete). This keeps the directory from getting too cluttered while ensuring you have a short window to review any quarantined messages if needed.

Customization Options

You can customize the find command to suit your needs. For example, if you only want to delete files older than 30 days, change -mtime +7 to -mtime +30. You can also adjust the time the cron job runs. If you want to run the job at 6 PM every Sunday, the cron expression would be 0 18 \* \* 0.

Fine-Tuning for Your System

While the provided command is a good starting point, consider these factors for optimal configuration:

  • Disk Space: If disk space is a major concern, shorten the retention period (e.g., -mtime +1 to delete files older than one day). Conversely, if you need longer retention for auditing or investigation purposes, increase the value.
  • Email Volume: For very high-volume servers, consider running the cleanup more frequently. For example, running it twice a day at 3 AM and 3 PM could be achieved with 0 3,15 \* \* \* find /var/lib/amavis/virusemails -type f -mtime +7 -delete.
  • Testing: Before setting the final cron job, test your find command directly in the terminal to ensure it’s working as expected. This prevents accidental data loss.
  • Alternatives to -delete: Instead of directly deleting, you could archive the files to a different location for longer-term storage using -exec with a command like tar. This adds a layer of safety in case of accidental deletion.
  • Error Handling: For added robustness, redirect any output (including errors) from the find command to a log file. This helps in troubleshooting. For instance: 0 3 \* \* \* find /var/lib/amavis/virusemails -type f -mtime +7 -delete \>\> /var/log/amavis\_cleanup.log 2\>&1

Verifying the Cron Job

After saving the crontab file, you can check if the cron job is scheduled correctly by running crontab -l. This lists all your scheduled cron jobs. You can also check your system’s cron logs (often located at /var/log/syslog or /var/log/cron) to monitor the execution of the cron job and identify any potential issues.

Implementing Log Rotation for Enhanced Management

Managing the disk space consumed by Amavis, particularly the /var/lib/amavis/virusemails directory, is crucial for maintaining a healthy mail server. This directory stores emails identified as potentially containing viruses. Without proper management, it can quickly fill up, potentially disrupting mail flow and impacting server performance. Implementing a robust log rotation strategy is a key element in this management process.

Log rotation helps control the size and number of log files, ensuring they don’t consume excessive disk space. It also makes it easier to manage and analyze logs by breaking them into smaller, more manageable chunks. This is especially beneficial for troubleshooting and security audits.

Understanding Log Rotation

Log rotation works by periodically renaming or compressing old log files and creating new ones. This cycle helps prevent a single log file from growing indefinitely. Common tools like logrotate provide a flexible and automated way to manage this process.

Configuring Logrotate for Amavis

The /etc/logrotate.d directory typically houses configuration files for different services. You can create a dedicated configuration file for Amavis, for example, amavis, to manage the rotation of the virusemails contents. Here’s an example configuration you can adapt:

Directive Description
daily Rotates the logs daily.
rotate 7 Keeps 7 rotated logs.
missingok Doesn’t report an error if the log file is missing.
notifempty Doesn’t rotate if the log file is empty.
compress Compresses rotated log files using gzip.
delaycompress Compresses the previous log file, not the current one. This allows Amavis to continue writing to the current log without interruption.
postrotate/endscript Defines commands to run after rotation. This is crucial for Amavis.

Here’s a more detailed breakdown of the postrotate/endscript section, particularly important for Amavis:

postrotate
    # Find files older than X days (e.g., 7 days)
    find /var/lib/amavis/virusemails -type f -mtime +7 -delete
endscript

This script, executed after the log rotation, utilizes the find command to locate files within the virusemails directory older than 7 days (specified by -mtime +7) and then deletes them (specified by -delete). Adjusting the -mtime value allows you to control how long quarantined emails are retained before being purged.

Choosing the right retention period depends on your specific needs and regulations. Shorter periods conserve disk space, while longer periods allow more time for reviewing potentially misclassified emails. Carefully consider the balance between storage constraints and the need to retain emails for potential investigation or recovery.

Regularly reviewing and adjusting the log rotation configuration ensures it aligns with your evolving storage and security needs. Factors to consider include the volume of email traffic, the frequency of virus detections, and disk space availability. By fine-tuning the rotate and -mtime parameters, you can maintain a balance between efficient storage management and data retention requirements. You can also incorporate other commands within the postrotate/endscript section to perform additional tasks, such as sending notifications upon completion of the rotation process. This added layer of control empowers you to tailor the log rotation process to your specific needs and preferences.

Considering Alternative Anti-Virus Solutions and Configurations

The default setup of Amavis often stores infected emails in /var/lib/amavis/virusemails. While this provides a quarantine for review, it can consume considerable disk space over time. Before simply clearing out this directory, it’s worth considering alternative anti-virus solutions and configurations that might offer better performance, reduced storage needs, or improved workflow.

ClamAV Alternatives

ClamAV is the default antivirus engine used by Amavis. It’s a good option, but there are other robust antivirus engines that could be integrated with Amavis. These alternatives often offer better detection rates, faster scanning, and more efficient resource utilization.

Exploring Different Engines

Consider exploring alternatives like Sophos, Kaspersky, or ESET. These commercial options usually provide more frequent updates and advanced heuristic scanning, leading to improved protection against zero-day threats. Integrating these with Amavis might require some configuration adjustments but can offer significant benefits in the long run. Check your Linux distribution’s documentation for specific instructions on integrating different antivirus engines.

Performance Considerations

Switching to a different antivirus engine can positively impact the performance of your mail server. Commercial engines are often optimized for speed and resource efficiency, leading to faster email processing and less strain on your server hardware. This is particularly beneficial for high-volume mail servers.

On-Access Scanning

Instead of relying solely on Amavis for virus scanning, think about implementing on-access scanning directly on your mail server. This approach scans incoming emails before they even reach Amavis, potentially catching infected messages earlier and preventing them from being stored in the /var/lib/amavis/virusemails directory in the first place.

Real-time Protection

On-access scanning offers real-time protection against incoming threats. By integrating a solution like ClamAV (or an alternative) directly into your mail transfer agent (MTA) like Postfix or Sendmail, you can scan emails immediately upon arrival. This proactive approach can significantly improve your security posture and minimize the accumulation of infected emails.

Cloud-Based Anti-Virus Solutions

Cloud-based antivirus solutions provide another compelling alternative. These services scan emails in the cloud before they reach your server, significantly reducing the load on your local resources and offering scalability benefits.

Offloading Scanning Tasks

By offloading the scanning task to a cloud provider, your mail server can focus on its primary function of delivering mail efficiently. This is particularly advantageous for organizations with limited on-premises resources. Cloud-based solutions often leverage advanced threat intelligence and machine learning to detect sophisticated malware, offering an extra layer of security.

Reduced Storage Footprint

Since the scanning and quarantine happen in the cloud, you avoid storing infected emails locally, thus eliminating the need to frequently clear /var/lib/amavis/virusemails. Most cloud services automatically handle the purging of quarantined emails based on predefined retention policies, further simplifying administration.

Comparing Configurations

Choosing the right configuration depends on your specific needs and resources. Here’s a quick comparison to help you decide:

Feature ClamAV (Default) Alternative Engines On-Access Scanning Cloud-Based Solutions
Cost Free Variable (Often Commercial) Free (if using open-source engine) Subscription-based
Performance Good Generally Better Can impact mail server performance Minimal local resource impact
Detection Rate Good Potentially Higher Depends on the engine used Generally High, leverages threat intelligence
Maintenance Moderate Moderate Moderate Low

Evaluating these factors will help you choose the optimal antivirus solution for your mail server and reduce the reliance on manually clearing the /var/lib/amavis/virusemails directory.

Preventing Future Accumulation in the virusemails Directory

The /var/lib/amavis/virusemails directory is where Amavis, a popular email virus and spam scanner, stores emails identified as potentially harmful. While cleaning out this directory is a necessary maintenance task, preventing excessive accumulation in the first place is a much better approach. This proactive strategy saves disk space and reduces the administrative overhead of regular cleanups.

Adjusting Amavis Configuration for Automatic Deletion

Amavis offers several configuration options to manage infected emails. Instead of storing them indefinitely, you can configure Amavis to automatically delete messages after a specified period or based on specific criteria. This eliminates the need for manual intervention.

final\_virus\_destiny and final\_spam\_destiny

The final\_virus\_destiny and final\_spam\_destiny directives in your Amavis configuration file (/etc/amavis/conf.d/50-user) determine the fate of infected and spam messages. By default, they are often set to ‘D’ for delete, but you can fine-tune this behavior.

Setting Action
D Delete the message entirely.
R Reject the message, sending a bounce notification to the sender.
N Do nothing (not recommended, leads to accumulation in virusemails).

Consider using ‘R’ instead of ‘D’. This informs the sender that their email was rejected due to malware or spam, allowing them to take corrective action. It also prevents potentially malicious emails from reaching your users’ inboxes.

max\_virusmail\_size\_limit

Another useful setting is max\_virusmail\_size\_limit. This parameter defines the maximum size (in bytes) of a virus-infected email that Amavis will store. Any infected email exceeding this limit is immediately deleted, preventing exceptionally large malicious emails from consuming excessive disk space. Setting a reasonable limit, for instance, 10MB (10485760 bytes), can help manage storage effectively.

virus\_quarantine\_period

Even if you opt to store infected emails temporarily, you can configure Amavis to automatically delete them after a certain period. The virus\_quarantine\_period directive controls this. You can specify the number of days to retain infected emails before automatic deletion. Setting this to a reasonable value, like 7 days, prevents long-term accumulation in the virusemails directory.

bypass\_virus\_checks (Use with Extreme Caution)

For testing purposes, you can temporarily bypass virus checks entirely using the bypass\_virus\_checks directive. However, **only use this in controlled testing environments.** Enabling this in a production environment leaves your system vulnerable to malware. Remember to disable it immediately after testing is complete.

Regularly Review Log Files

Monitoring Amavis log files (typically found in /var/log/amavis) is crucial for understanding how the system handles malicious emails. Regularly reviewing these logs helps you identify potential issues with your configuration, spot emerging threats, and ensure that your automated cleanup processes are functioning correctly. Look for patterns or errors that indicate problems and adjust your configuration accordingly.

Employing a Multi-Layered Security Approach

Amavis is a powerful tool, but it’s most effective as part of a multi-layered security strategy. Combining Amavis with other security measures, such as a strong firewall, robust spam filters at the mail gateway level, and regular security updates, provides a more comprehensive defense against email-borne threats.

Educating Users about Best Practices

User education plays a vital role in reducing the influx of malicious emails. Encourage users to be cautious about opening attachments from unknown senders, avoid clicking on suspicious links in emails, and report any phishing attempts or suspicious emails to the IT department. Regular security awareness training can significantly reduce the risk of infections and the subsequent accumulation of quarantined emails.

Keeping Amavis Updated

Finally, keeping Amavis and its virus definitions up-to-date is paramount. Regular updates ensure that Amavis can detect and handle the latest malware threats effectively. Configure automatic updates whenever possible to maintain optimal protection and minimize the number of infected emails that reach your system.

Clearing /var/lib/amavis/virusemails

The directory /var/lib/amavis/virusemails typically holds emails flagged by Amavis as potentially containing viruses. Regularly clearing this directory is essential for maintaining disk space and preventing performance degradation. However, simply deleting the contents without understanding the implications can lead to problems. It’s crucial to verify your mail server’s configuration to ensure quarantined messages are handled appropriately before purging this directory.

First, confirm that Amavis is configured to move infected emails into this quarantine instead of deleting them outright. This setting provides a safety net, allowing administrators to review potentially false positives. Reviewing quarantined emails can also offer valuable insights into the types of threats targeting your system. Once you’ve confirmed the configuration, the safest approach to clearing the directory is to use the find command with specific criteria, such as age or file size, to selectively delete files. For example, the following command deletes files older than 7 days:

find /var/lib/amavis/virusemails -type f -mtime +7 -delete

Regularly scheduled automated cleanup, perhaps via a cron job, is highly recommended. This prevents the directory from accumulating excessive data over time. However, before implementing any automated process, thoroughly test it in a non-production environment to ensure it operates as expected and avoids accidental data loss.

Finally, always back up your system before making any significant changes, including cleaning up critical directories like this one. This allows you to recover in case of unintended consequences.

People Also Ask

How can I configure Amavis to automatically delete viruses instead of quarantining them?

While technically possible, directly deleting suspected viruses isn’t recommended. This increases the risk of losing legitimate emails due to false positives. Quarantining allows for review and recovery if needed. If you still choose to delete them, consult the Amavis documentation for configuration specifics, as it varies depending on your setup.

What are the potential risks of not clearing the virusemails directory regularly?

Disk Space Exhaustion

As the directory fills with quarantined emails, it consumes disk space. This can eventually lead to server instability and service disruptions if the disk becomes full. Critical services might fail, and the server might become unresponsive.

Performance Degradation

Managing a large number of files in a directory impacts performance. Amavis and other system processes might slow down as they attempt to access and process the growing number of quarantined emails.

Security Risks

While Amavis quarantines these emails, they might still contain malicious code. A vulnerability in Amavis or the underlying system could potentially allow this code to be executed, even though the emails are quarantined. Regular cleanup reduces this risk by minimizing the number of potentially harmful files.

The ideal frequency depends on the volume of email your server processes and your storage capacity. A good starting point is daily or weekly. Monitor disk usage and adjust the frequency as needed. Automating the process ensures regular cleanup.

How can I view the quarantined emails before deleting them?

Amavis typically provides a web interface or integrates with your mail server’s existing webmail client to allow viewing and managing quarantined messages. Consult your Amavis and mail server documentation for specific instructions.

Contents