ESET MAIL SECURITY 4 User Manual

For microsoft exchange server
Hide thumbs Also See for MAIL SECURITY 4:

Advertisement

ESET
Mail Security 4
for Microsoft Exchange Server

User Guide

Microsoft® Windows® Server 2000 / 2003 / 2008

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MAIL SECURITY 4 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ESET MAIL SECURITY 4

  • Page 1: User Guide

    ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft® Windows® Server 2000 / 2003 / 2008...
  • Page 2 ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
  • Page 3: Table Of Contents

    ..........12 Update 4.2.4.4.2 Performance ................21 Proxy server setup ................12 4.2.5 Transport Agent ................21 Antispam settings ................21 ESET Mail Security - Microsoft 4.3.1 Antispam engine parameter setup ................21 ..........13 Exchange Server protection 4.3.2 Alerts and notifications ................22 General settings ................13 4.3.3 Transport Agent ................22...
  • Page 4: Introduction

    1.2.1 Mailbox scanning via VSAPI The mailbox scanning process is triggered and controlled ESET Mail Security 4 for Microsoft Exchange Server is an by the Microsoft Exchange Server. Emails in the Microsoft integrated solution protecting user mailboxes from Exchange Server store database are scanned various types of malware content (most often they are continuously.
  • Page 5: Application Of User-Defined Rules

    Protection based on user-defined rules is available for scanning with both the VSAPI and the transport agent. You can use the ESET Mail Security user interface to create individual rules that may also be combined. If one rule uses multiple conditions, the conditions will be linked using the logical operator AND.
  • Page 6: Installation

    After purchase, the ESET Mail Security installer can be If you do not currently have your username and downloaded from ESET’s website as an .msi package.
  • Page 7: Custom Installation

    In the next step - License Manager - Add the license file delivered via email after the product purchase. Select the Enable detection of potentially unwanted applications option to allow ESET Mail Security to detect this type of threat (recommended). The final step in Typical installation mode is to confirm installation by clicking the Install button.
  • Page 8 Select the Ask before downloading program If you use a proxy server, it must be correctly configured components option to display a confirmation window for virus signature updates to work correctly. If you do before downloading program components. To download not know whether you use a proxy server to connect to program component upgrades automatically, select the the Internet, select the default setting I am unsure if my...
  • Page 9: License

    2.3 License your Microsoft Exchange Server log reading, "Protection A very important step is to enter the license file for ESET status changed due to exceeded number of mailboxes Mail Security for Microsoft Exchange Server. Without it, (count) covered by your license (count)."...
  • Page 10 Spam will be forwarded along to its recipient. on resending. However, ESET Mail Security will fill in the relevant MIME header with the SCL value into each message. When evaluating the message source, the method takes...
  • Page 11 settings window under Antivirus and antispyware > Performance. NOTE: We recommend that you set the number of ThreatSense scan engines equal to the number of scan threads used.
  • Page 12: Update

    If you use a proxy server to control Internet connections Updating the virus signature database and updating on a system using ESET Mail Security, it must be specified program components are an important part of providing in Advanced Setup. To access the Proxy server complete protection against malicious code.
  • Page 13: Eset Mail Security - Microsoft Exchange Server Protection

    4. ESET Mail Security - Microsoft 4.1.1.1 Adding new rules Exchange Server protection This wizard guides you through adding user-specified rules with combined conditions. 4.1 General settings This section describes how to administer rules, log files, message quarantine and performance parameters.
  • Page 14: Actions

    By default, ESET Mail Security components running in Microsoft Exchange Server store log messages in their internal cache and send them to the application log at periodic time intervals to preserve performance.
  • Page 15: Adding A New Quarantine Rule

    Exchange Server 5.5 (VSAPI 1.0). In the Agent priority setup menu, you can set the priority of ESET Mail Security agents. The agent priority number range depends on the version of Microsoft Exchange Server (the lower the number, the higher the priority).
  • Page 16: Antivirus And Antispyware Settings

    If checked, an SMTP reject response is sent back to the 4.2.2 Alerts and notifications sender’s MTA. You can type a response message in the following format: ESET Mail Security allows you to append text to the original subject or body of infected messages. Primary Compleme Description...
  • Page 17: Performance

    Microsoft Exchange Server sends the message to ESET Mail Security to be scanned before opening the message in your e-mail client. Since background scanning can affect system load...
  • Page 18: Microsoft Exchange Server 2000 (Vsapi 2.0)

    ThreatSense scan engines and scan threads. virus signature database, Microsoft Exchange Server sends the message to ESET Mail Security to be scanned The Response time limit (sec.) allows you to set the before opening the message in your e-mail client.
  • Page 19: Microsoft Exchange Server 2003 (Vsapi 2.5)

    Microsoft Exchange Server replace the infected file with action information. sends the message to ESET Mail Security to be scanned before opening the message in your e-mail client. By activating Rescan, you can scan the messages and Since background scanning can affect system load files that have already been scanned again.
  • Page 20: Performance

    ThreatSense scan engines and scan threads. virus signature database, Microsoft Exchange Server sends the message to ESET Mail Security to be scanned The Response time limit (sec.) allows you to set the before opening the message in your e-mail client. You can...
  • Page 21: Performance

    messages will be stored in the email server quarantine. it to the quarantine mailbox or retain it. Please note that this is the server's managed quarantine (not the client's quarantine or the quarantine mailbox). If a threat is found, you can choose to write a spam score Infected messages stored in mail server quarantine are to the scanned message and specify the value (in %).
  • Page 22: Alerts And Notifications

    4.3.2 Alerts and notifications Each email scanned by ESET Mail Security and marked as spam can be flagged by appending a notification tag to the email subject. By default, the tag is [SPAM], although it can be a user-defined string.
  • Page 23: Faq

    will typically not attempt to resend the message, as they usually go through thousands of email addresses and do 4.4 FAQ not waste time resending. Greylisting is an additional layer of antispam protection and does not have any effect Q: After installing EMSX with Antispam, emails stopped on the spam evaluation capabilities of the antispam being delivered into mailboxes.
  • Page 24 Microsoft Exchange Server only for the presence of viruses (via VSAPI). Antispam Q: Is ESET Mail Security 4 for Microsoft Exchange Server scanning will not be realized as this requires an SMTP compatible with Intelligent Message Filter? server.

Table of Contents