so with the following MTA takes you got AV blade support INSIDE MTA for R80.10 and R80.20:
The following are available in R80.20 Gateway & Management:
Make sure you have installed latest take via CPUSE:
So with these takes you get AV feature inside MTA.
This means you configure AV as usual in your profile and this will be enforced on email inside MTA (no stream blocking issues anymore):
The action that is taken by AV is shared also with TE in this section of the TP profile:
After enabling you will see malicious AV events in MTA:
AV file type blocking
You can also leverage AV´s file blocking capabilities including Magic Byte detection.
Here is a sample configuration to block all Executables directly attached to email messages:
And the related log: