Summary of Contents for ESET MAIL SECURITY 4 - V4.2 FOR MICROSOFT EXCHANGE SERVER
Page 1
ESET Mail Security 4 for Microsoft Exchange Server Version 4.2 Installation Manual and User Guide Microsoft® Windows® Server 2000 / 2003 / 2008...
................45 recording, scanning, or otherwise without permission in writing from the author.................46 ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
You can remotely manage ESET Mail Security in larger networks with the help of ESET Remote Administrator. As far as functionality is concerned, ESET Mail Security is very similar to ESET NOD32 Antivirus 4.0. It has all the tools necessary to ensure protection of the server-as-client (resident protection, web-access protection, email client protection and antispam), while providing Microsoft Exchange Server protection.
The antispam scanning engine’s output is the spam probability value of the given email message expressed as a percentage (0 to 100). Values of 90 and above are considered sufficient for ESET Mail Security to classify an email as spam.
2. Installation After purchase, the ESET Mail Security installer can be downloaded from ESET’s website as an .msi package. Once you launch the installer, the installation wizard will guide you through the basic setup. There are two types of installation available with different levels of setup details: 1.
Page 6
System helps ensure that ESET is immediately and continuously informed about new infiltrations in order to quickly protect its customers. The system allows for submission of new threats to ESET‘s Threat Lab, where they are analyzed, processed and added to the virus signature database.
Select the Enable detection of potentially unwanted applications option to allow ESET Mail Security to detect this type of threat (recommended). The final step in Typical installation mode is to confirm installation by clicking the Install button. 2.2 Custom Installation Custom installation is designed for users who have experience with fine-tuning programs and who wish to modify advanced settings during installation.
Page 8
Next, Enter your Username and Password. This step is the same as in Typical installation (see “Typical installation” In the next step - License Manager - add the license file delivered via email after product purchase. After entering your username and password, click Next to proceed to Configure your Internet connection.
Page 9
If you use a proxy server, it must be correctly configured for virus signature updates to work correctly. If you do not know whether you use a proxy server to connect to the Internet, select the default setting I am unsure if my Internet connection uses a proxy server.
Page 10
Click Next to proceed to Configure automatic update settings. This step allows you to designate how automatic program component updates will be handled on your system. Click Change... to access the advanced settings. If you do not want program components to be updated, select the Never update program components option. Select the Ask before downloading program components option to display a confirmation window before downloading program components.
2.3 Upgrading to a newer version Newer versions of ESET Mail Security are issued to bring improvements or fix issues that cannot be remedied by automatic update of the program modules. Upgrade to a newer version can be accomplished in several ways: 1.
Page 12
4) Now that the installation package is ready, you can initiate the remote installation on the nodes within a cluster. In the ERA > Remote Install tab > Computers, select the nodes on which you want to install ESET Mail Security (Ctrl + Left-click or Shift + Left-click).
2.5 License A very important step is to enter the license file for ESET Mail Security for Microsoft Exchange Server. Without it, email protection on the Microsoft Exchange Server will not work properly. If you do not add the license file during installation, you can do so later in the advanced settings, under Miscellaneous >...
1. Deleting spam The criteria for a message to be marked as SPAM by ESET Mail Security are set reasonably high, decreasing the chances of deleting legitimate email. The more specific the Antispam settings, the less likely it is to delete legitimate email.
Page 15
settings will be optimized in regard to the catch rate. Clicking Custom > Open configuration file allows a user to edit the spamcatcher.conf file. This option is recommended for advanced users only. Before starting full operation, we recommend that you manually configure the lists of restricted and allowed IP addresses.
Username and Password setup... displays a dialog box where the username and password received at the time of purchase should be entered. If the username and password were entered during installation of ESET Mail Security you will not be prompted for them at this point.
3.1 Proxy server setup If you use a proxy server to control Internet connections on a system using ESET Mail Security, it must be specified in Advanced Setup. To access the Proxy server configuration window, press F5 to open the Advanced Setup window and click Miscellaneous >...
Page 18
profiles in Advanced Setup by clicking Update from the Advanced Setup tree.
4. ESET Mail Security - Microsoft Exchange Server protection 4.1 General settings This section describes how to administer rules, log files, message quarantine and performance parameters. 4.1.1 Rules The Rules menu item allows administrators to manually define email filtering conditions and actions to take with filtered emails.
4.1.1.1 Adding new rules This wizard guides you through adding user-specified rules with combined conditions. Note, that not all of the conditions are applicable when the message is scanned by transport agent. By target mailbox applies to the name of a mailbox (VSAPI) By message recipient applies to a message sent to a specified recipient (VSAPI + TA) By message sender applies to a message sent by a specified sender (VSAPI + TA) By message subject applies to a message with a specified subject line (VSAPI + TA)
Page 21
Mark as unsolicited email - the message will be marked as if it were a spam (regardless of whether it is spam or not). This option is not available if you are using ESET Mail Security without Antispam module. Delete message – removes the entire message with content that meets the conditions...
If Synchronized writing without using cache is enabled, all the log entries will be immediately written in the log file without being stored in the log cache. By default, ESET Mail Security components running in Microsoft Exchange Server store log messages in their internal cache and send them to the application log at periodic time intervals to preserve performance.
4.1.3 Message quarantine The Message quarantine mailbox is a special mailbox defined by the system administrator to store potentially infected messages and SPAM. Messages stored in quarantine can be analyzed or cleaned later using a newer virus signature database. You can specify the message quarantine address in the Common message quarantine field (e.g. main_quarantine@company.com).
In this section, you can define a folder in which to store temporary files to improve program performance. If no folder is specified, ESET Mail Security will create temporary files in the system’s temporary folder. NOTE: In order to reduce the potential I/O and fragmentation impact, we recommend placing the Temporary folder on a different hard drive than the one on which Microsoft Exchange Server is installed.
NOTE: Transport agent is not available in Microsoft Exchange Server 5.5 (VSAPI 1.0). In the Agent priority setup menu, you can set the priority of ESET Mail Security agents. The agent priority number range depends on the version of Microsoft Exchange Server (the lower the number, the higher the priority).
4.2 Antivirus and antispyware settings You can enable antivirus and antispyware mail server protection by selecting the Enable antivirus and antispyware mail server protection option. Note that antivirus and antispyware protection is turned on automatically after every service/computer restart. 4.2.1 Actions In this section you can choose to append a scan task ID and/or scan result information to the header of scanned messages.
ESET Mail Security allows you to append text to the original subject or body of infected messages. By enabling Add to the subject of infected messages, ESET Mail Security will append a notification tag to the email subject with the value defined in the Template added to the subject of infected messages text field (by default [virus %VIRUSNAME%]).
4.2.3 Performance In this section, you can set the number of ThreatSense scan engines that should be used for virus scanning. More ThreatSense scan engines on multiprocessor machines can increase the scan rate. 4.2.4 Virus-Scanning Application Programming Interface (VSAPI) Microsoft Exchange Server provides a mechanism to make sure that every message component is scanned against the current virus signature database.
If you are opening a message that has not been scanned by the most current virus signature database, Microsoft Exchange Server sends the message to ESET Mail Security to be scanned before opening the message in your e-mail client.
4.2.4.1.1 Actions In this section you can specify the actions to be performed when a message and/or attachment is evaluated as infected. The Actions to take if cleaning not possible field allows you to block infected content or delete the message. This action will be applied only if the automatic cleaning (defined in ThreatSense engine parameter setup >...
4.2.4.1.2 Performance During a scan, Microsoft Exchange Server allows you to limit a time for opening message attachments. This time is set in the Response time limit (ms) field and represents the period after which the client will retry accessing the file that had previously been inaccessible due to scanning.
If you are opening a message that has not been scanned by the most current virus signature database, Microsoft Exchange Server sends the message to ESET Mail Security to be scanned before opening the message in your e-mail client.
4.2.4.2.2 Performance In this section you can set the number of independent scan threads used at a single time. More threads on multiprocessor machines can increase the scan rate. For the best program performance we advise using an equal number of ThreatSense scan engines and scan threads. The Response time limit (sec.) allows you to set the maximum amount of time a thread waits for a message scan to complete.
Exchange Server and are delivered to other e-mail servers through the local Microsoft Exchange Server. If scanning for transported messages is enabled, ESET Mail Security also scans these messages. This option is only available when the transport agent is disabled.
4.2.4.3.1 Actions In this section you can specify the actions to be performed if a message and/or attachment is evaluated as infected. The Actions to take if cleaning not possible field allows you to block infected content or delete the message. This action will be applied only if the automatic cleaning (in ThreatSense engine parameter setup >...
TIP: To determine the Number of scan threads the Microsoft Exchange Server provider recommends, use the following formula: [number of physical processors] x 2 + 1. NOTE: Performance is not improved significantly if there are more ThreatSense scanning engines than scanning threads.
If you are opening a message that has not been scanned by the most current virus signature database, Microsoft Exchange Server sends the message to ESET Mail Security to be scanned before opening the message in your e-mail client. You can choose to Scan only messages with attachment and filter based on time received.
4.2.4.4.2 Performance In this section you can set the number of independent scan threads used at a single time. More threads on multiprocessor machines can increase the scan rate. For the best program performance we advise using an equal number of ThreatSense scan engines and scan threads. TIp: To determine the Number of scan threads the Microsoft Exchange Server provider recommends, use the following formula: [number of physical processors] x 2 + 1.
4.2.5 Transport Agent In this section you can enable or disable antivirus and antispyware protection by the transport agent. For Microsoft Exchange Server 2007 and higher it is only possible to install a transport agent if the server is in one of two roles: Edge Transport or Hub Transport.
4.3 Antispam settings In the Mail server protection section you can enable spam protection for the installed mail server, configure antispam engine parameters and set other levels of protection. 4.3.1 Antispam engine parameter setup You can select a profile from a set of preconfigured profiles (such the Recommended, Most accurate or Fastest profiles).
Configuration file The spamcatcher.conf configuration file allows you to modify several additional settings, that are not available in the ESET Mail Security GUI. The settings in spamcatcher.conf are transparently structured and described. Each setting contains these items: Name - parameter name...
Page 42
RBL servers set in the rbl_list. The value of 0 means there is no limit to the maximum number of IP addresses that can be checked. IP addresses on the ignored_ip_list (i.e. the Ignored IP addresses list in the ESET Mail Security settings).
Page 43
Meaning parameters used: 1) server - DNSBL server name 2) response - DNSBL server response if IP address/domain was found (standard responses are 127.0.0.2, 127.0.0.3, 127.0.0.4., etc.). This parameter is optional, and if not set, all answers will be considered. 3) offset - value from 0 to 100.
Page 44
Further options for blacklisting/whitelisting are offered by files approvedsenders and blockedsenders, that can be found under C:\Documents and Settings\All Users\Application Data\ESET\ESET Mail Security\MailServer. You can add sender addresses or domains to these lists, while the approvedsenders file represents the list of allowed addresses/domains, the blockedsenders file represents the list of blocked addresses/domains.
4.3.2 Alerts and notifications Each email scanned by ESET Mail Security and marked as spam can be flagged by appending a notification tag to the email subject. By default, the tag is [SPAM], although it can be a user-defined string.
You can take any of the following actions with spam messages: Retain the message even if it is marked as spam Send the message to the quarantine mailbox Delete the message If you want to include information about a message’s spam score in its header, enable the Write spam score to scanned messages option.
Page 47
Microsoft Exchange IMF. - If ESET Mail Security Antispam has the No action set, the Microsoft Exchange IMF settings will be used and the relevant action executed (e.g. Delete, Reject, Archive...). Write spam confidence level (SCL) to scanned messages based on spam score option (in Mail server protection >...
Page 48
Security ? A: In this type of configuration ESET Mail Security will scan the emails stored on the Microsoft Exchange Server only for the presence of viruses (via VSAPI). Antispam scanning will not be realized as this requires an SMTP server.
Need help?
Do you have a question about the MAIL SECURITY 4 - V4.2 FOR MICROSOFT EXCHANGE SERVER and is the answer not in the manual?
Questions and answers