ESET MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER FOR WINDOWS SERVER 2000-2003-2008 User Manual

For microsoft exchange server

Advertisement

Quick Links

ESET
Mail Security 4
for Microsoft Exchange Server

User Guide

Microsoft® Windows® Server 2000 / 2003 / 2008

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER FOR WINDOWS SERVER 2000-2003-2008 and is the answer not in the manual?

Questions and answers

Summary of Contents for ESET MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER FOR WINDOWS SERVER 2000-2003-2008

  • Page 1: User Guide

    ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft® Windows® Server 2000 / 2003 / 2008...
  • Page 2 ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
  • Page 3: Table Of Contents

    Update 4.2.4.4.1 Actions ................19 Proxy server setup ................11 4.2.4.4.2 Performance ................20 4.2.5 Transport Agent ................20 ESET Mail Security - Microsoft Antispam settings ................20 ..........12 Exchange Server protection 4.3.1 Antispam engine parameter setup ................20 4.3.2 Alerts and notifications ................21 General settings ................12...
  • Page 4: Introduction

    The VSAPI interface is currently used for antivirus scan and rule-based protection. As far as functionality is concerned, ESET Mail Security is very similar to ESET NOD32 Antivirus 4.0. It has all the 1.2.2 Message filtering on the SMTP server level...
  • Page 5: Application Of User-Defined Rules

    Protection based on user-defined rules is available for scanning with both the VSAPI and the transport agent. You can use the ESET Mail Security user interface to create individual rules that may also be combined. If one rule uses multiple conditions, the conditions will be linked using the logical operator AND.
  • Page 6: Installation

    After purchase, the ESET Mail Security installer can be If you do not currently have your username and downloaded from ESET’s website as an .msi package.
  • Page 7: Custom Installation

    In the next step - License Manager - Add the license file delivered via email after the product purchase. Select the Enable detection of potentially unwanted applications option to allow ESET Mail Security to detect this type of threat (recommended). The final step in Typical installation mode is to confirm installation by clicking the Install button.
  • Page 8 Select the Ask before downloading program If you use a proxy server, it must be correctly configured components option to display a confirmation window for virus signature updates to work correctly. If you do before downloading program components. To download not know whether you use a proxy server to connect to program component upgrades automatically, select the the Internet, select the default setting I am unsure if my...
  • Page 9: License

    This option excludes the risk of deleting legitimate 2.3 License email. Messages can be restored and resent to the A very important step is to enter the license file for ESET original recipients immediately. The drawbacks of this Mail Security for Microsoft Exchange Server. Without it,...
  • Page 10 the message scores 100 and no other checks are section Message quarantine in the Advanced settings made. window. The Allowed IP addresses tab lists all IP addresses Performance that are approved, i.e., if the first non-ignored IP in If there are no other restrictions, our recommendation is Received headers matches any address on this list, to increase the number of ThreatSense scan engines the message scores 0 and no other checks are...
  • Page 11: Update

    If you use a proxy server to control Internet connections Updating the virus signature database and updating on a system using ESET Mail Security, it must be specified program components are an important part of providing in Advanced Setup. To access the Proxy server complete protection against malicious code.
  • Page 12: Eset Mail Security - Microsoft Exchange Server Protection

    4. ESET Mail Security - Microsoft 4.1.1.1 Adding new rules Exchange Server protection This wizard guides you through adding user-specified rules with combined conditions. 4.1 General settings This section describes how to administer rules, log files, message quarantine and performance parameters.
  • Page 13: Actions

    By default, ESET Mail Security components running in Microsoft Exchange Server store log messages in their internal cache and send them to the application log at periodic time intervals to preserve performance.
  • Page 14: Adding A New Quarantine Rule

    Exchange Server 5.5 (VSAPI 1.0). In the Agent priority setup menu, you can set the priority of ESET Mail Security agents. The agent priority number range depends on the version of Microsoft Exchange Server (the lower the number, the higher the priority).
  • Page 15: Antivirus And Antispyware Settings

    If checked, an SMTP reject response is sent back to the 4.2.2 Alerts and notifications sender’s MTA. You can type a response message in the following format: ESET Mail Security allows you to append text to the original subject or body of infected messages. Primary Compleme Description...
  • Page 16: Performance

    Microsoft Exchange Server sends the message to ESET Mail Security to be scanned before opening the message in your e-mail client. Since background scanning can affect system load...
  • Page 17: Microsoft Exchange Server 2000 (Vsapi 2.0)

    ThreatSense scan engines and scan threads. virus signature database, Microsoft Exchange Server sends the message to ESET Mail Security to be scanned The Response time limit (sec.) allows you to set the before opening the message in your e-mail client.
  • Page 18: Microsoft Exchange Server 2003 (Vsapi 2.5)

    Microsoft Exchange Server replace the infected file with action information. sends the message to ESET Mail Security to be scanned before opening the message in your e-mail client. By activating Rescan, you can scan the messages and Since background scanning can affect system load files that have already been scanned again.
  • Page 19: Performance

    ThreatSense scan engines and scan threads. virus signature database, Microsoft Exchange Server sends the message to ESET Mail Security to be scanned The Response time limit (sec.) allows you to set the before opening the message in your e-mail client. You can...
  • Page 20: Performance

    messages will be stored in the email server quarantine. it to the quarantine mailbox or retain it. Please note that this is the server's managed quarantine (not the client's quarantine or the quarantine mailbox). If a threat is found, you can choose to write a spam score Infected messages stored in mail server quarantine are to the scanned message and specify the value (in %).
  • Page 21: Alerts And Notifications

    4.3.2 Alerts and notifications Each email scanned by ESET Mail Security and marked as spam can be flagged by appending a notification tag to the email subject. By default, the tag is [SPAM], although it can be a user-defined string.
  • Page 22: Faq

    A: If Greylisting is enabled, this is normal behavior. In the When evaluating the message source the method takes first hours of full ESET Mail Security operation emails may into account the configurations of the Approved IP arrive with several hours of delay. If the issue continues...
  • Page 23 A: If you have Microsoft Exchange Server 2000 SP2 or later, the value Response time limit represents the maximum time in seconds required to finish the VSAPI scanning of one thread. If the scan is not finished within this time limit, Microsoft Exchange Server will deny the client access to the email.

This manual is also suitable for:

Mail security 4

Table of Contents