License; Post-Installation Configuration - ESET MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER FOR WINDOWS SERVER 2000-2003-2008 User Manual

For microsoft exchange server
Table of Contents

Advertisement

2.3 License

A very important step is to enter the license file for ESET
Mail Security for Microsoft Exchange Server. Without it,
email protection on the Microsoft Exchange Server will
not work properly. If you do not add the license file
during installation, you can do so later in the advanced
settings, under Miscellaneous > Licenses.
There are two types of licence available for ESET Mail
Security. One unlocks all ESET Mail Security-related
features except Antispam, the second one unlocks
everything without restriction. If the first one is used, all
antispam-related features will be unavailable within ESET
Mail Security.

2.4 Post-Installation Configuration

There are several options that have to be configured after
the product installation.
Antispam protection setup
This section describes the settings, methods and
techniques you can use to protect your network from
spam. We recommend reading the following instructions
carefully before choosing the most suitable combination
of settings for your network.
Spam management
To ensure a high level of Antispam protection you must
set actions to be performed on messages already marked
as SPAM.
There are three options available:
1. Deleting spam
The criteria for a message to be marked as SPAM by
ESET Mail Security are set reasonably high, decreasing
the chances of deleting legitimate email. The more
specific the Antispam settings, the less likely it is to
delete legitimate email. Advantages of this method
include very low consumption of system resources and
less administration. The drawback to this method is
that if a legitimate email is deleted it cannot be
restored locally.
2. Quarantine
This option excludes the risk of deleting legitimate
email. Messages can be restored and resent to the
original recipients immediately. The drawbacks of this
method are higher consumption of system resources
and additional time required for email quarantine
maintenance. You can use two methods to quarantine
email:
A. Internal Exchange Server quarantine:
- If you want to use the internal server quarantine
make sure the Common message quarantine
field on the right pane in the advanced settings
menu (under Mail server protection > Message
quarantine) is left blank.
B. Custom quarantine mailbox:
- If you type the desired mailbox in the Common
message quarantine field ESET Mail Security will
move all new spam messages into your custom
mailbox.
3. Forwarding spam
Spam will be forwarded along to its recipient.
However, ESET Mail Security will fill in the relevant
MIME header with the SCL value into each message.
Based on the SCL value the relevant action will be
executed by the Exchange server IMF (Intelligent
Message Filtering).
Spam filtering
Antispam Engine
The Antispam engine offers the three following
configurations - Recommended, Most accurate,
Fastest.
If there is no need to optimize your configuration to allow
maximum throughput (e.g. high server load), we
recommend you select the Most accurate option. When
the Recommended configuration is set, the server will
automatically adjust its settings based on scanned
messages to balance the load. When Most accurate is
enabled, the settings will be optimized in regard to the
catch rate. Clicking Custom > Open configuration file
allows a user to edit the spamcatcher.conf file. This
option is recommended for advanced users only.
Before starting full operation, we recommend that you
manually configure the lists of restricted and allowed IP
addresses. To do so:
1) Open the Advanced settings window and navigate to
the section Antispam protection > Mail server
protection.
2) Make sure to check the Enable mail server antispam
protection field.
3) Click the Setup... button to set Allowed, Ignored and
Blocked IP addresses lists.
The Blocked IP addresses tab contains the list of
restricted IP addresses, i.e., if any non-ignored IP
in Received headers matches the address on this list,
9

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mail security 4

Table of Contents