![]() Note: The file /var/tmp/nd will not be rotated automatically. # mv /usr/sbin/sendmail.postfix-bin /usr/sbin/sendmail.postfix # mv /usr/sbin/sendmail.postfix /root/backup_sendmail.postfix Rename the Sendmail postfix-bin back to /usr/sbin/sendmail.postfix It may take around 30 to 60 minutes for the script to collect data. # ln -s /usr/sbin/sendmail.postfix-wrapper /usr/sbin/sendmail.postfix # mv /usr/sbin/sendmail.postfix /usr/sbin/sendmail.postfix-bin # chmod a+x /usr/sbin/sendmail.postfix-wrapper (echo X-Additional-Header: $PWD cat) | tee -a /var/tmp/nd|/usr/sbin/sendmail.postfix-bin Create An Additional LogfileĬreate an additional log file /var/tmp/nd with a+rw permissions, make the wrapper script executable and follow steps below: For this, we need to create a postfix wrapper script.Ĭreate a file named /usr/sbin/sendmail.postfix-wrapper with the following content. Now we need to find the directory from which the PHP spam script is executed. The result will be like the following if it uses Postfix. ![]() #plesk sbin mailmng-server –features | grep SMTP_Server Use ‘mailmang’ utilityįirst, use the ‘mailmang’ utility to confirm the current MTA. If your Plesk server sends many spam messages and you are not able to find the culprit, this article will help to find domains that contain spamming scripts. By default, newer versions of Plesk use Postfix as the MTA. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |