Custom Installation - ESET MAIL SECURITY 4 User Manual

For microsoft exchange server
Hide thumbs Also See for MAIL SECURITY 4:
Table of Contents

Advertisement

your operating system.
These applications are often bundled with other
programs and may be difficult to notice during the
installation process. Although these applications usually
display a notification during installation, they can easily
be installed without your consent.
Select the Enable detection of potentially unwanted
applications option to allow ESET Mail Security to detect
this type of threat (recommended).
The final step in Typical installation mode is to confirm
installation by clicking the Install button.

2.2 Custom Installation

Custom installation is designed for users who have
experience with fine-tuning programs and who wish to
modify advanced settings during installation.
After selecting the installation mode and clicking Next,
you will be prompted to select a destination location for
the installation. By default, the program installs in
C:\Program Files\ESET\ESET Mail Security\.
Click Browse... to change this location (not
recommended).
Next, Enter your Username and Password. This step is
the same as in Typical installation (see
installation"
).
6
In the next step - License Manager - Add the license file
delivered via email after the product purchase.
After entering your username and password, click Next
to proceed to Configure your Internet connection.
"Typical
7

Advertisement

Table of Contents
loading

Table of Contents