查看添加、更改和修复的内容
ESET 产品的变更日志
此页面显示最新 ESET 产品版本的更改日志和发行说明,从最新到最早列出(仅提供英文版)。单击产品名称以查看其更改日志。每个产品都包含最近 20 个更改日志。发行周期可能因地区或国家而异。
ESET Mail Security for Microsoft Exchange Server 最近的变更日志
Version 12.1.10007.0
- New: Support for reboot-less update in standalone (.msi) installation
- New: Support for reboot-less installation parameter in ESET PROTECT software install task
- New: Optional switch to run Auto-updates in test-network/pilot-group first, before production deployment
- New: Support for mandatory ESET HUB account subscription campaign
- New: Rule engine now supports "except" expression
- Improved: Anti-spam now reports also false positive detections
- Improved: Quarantine reports can be now sent to members of security groups
- Improved: Identity of currently logged-in user added to detection logs
- Improved: Extended Vulnerability & Patch Management maintenance window scheduler, allowing monthly and more recurrence options
- Improved: Vulnerability & Patch Management logs extended with more detail about patching result
- Fixed: Spoofed emails were not correctly blocked in cases where the SPF validation does not pass
Version 12.0.10004.0
- Fixed: Security vulnerability CVE-2025-2425 (record reservation, responsible disclosure policy)
Version 12.0.10003.0
- New: SIEM exports now support TLS
- New: Microsoft 365 on-demand scan can be run on cloud mailboxes outside of hybrid environments
- New: ESET Shell now supports commands to extract username and password from PowerShell PSCredential object or from Windows Credential manager
- New: Support for Vulnerability patching logging and reports in ESET PROTECT
- New: Support for Vulnerability scan reports in ESET PROTECT
- New: ESET Shell now supports V&PM scan scheduler task
- New: Exclusions from network isolation
- New: Support for Microsoft Windows Server 2025
- New: Support for Microsoft Exchange Server CU15
- Improved: Notification mails triggered by rules will now contain all information about rule hits in one notification, instead of generating a notification for each rule
- Improved: Extented automatic exclusions to cover also %SystemRoot%\Cluster and %SystemRoot%\Temp\OICE_
- Improved: SMTP protection log extended to include logs about SPF passes and technology which accepted it e.g. ARC
- Improved: SPF fail can be overridden by the valid ARC signature, preventing unnecessary trigger of certain SPF rules
- Improved: Event log now contains information about SPF result override on the basis of valid ARC signature
- Improved: Security of interaction between UI components and password settings
- Improved: Search in advanced setup, search and highlighting of matching items
- Improved: Outlook mail plugin improvements and various issues fixed
- Improved: Auto-exclusion logging mechanism that records only the first instance of an error to prevent log overflow, now resets upon auto-exclusion setting change
- Changed: Advanced settings and component installation tree were consolidated and adapted to match the structure used in other ESET security products
- Changed: ESET Shell commands were adapted to the changes and consolidation of advanced settings
- Changed: ESET Shell status commands are now organized in one context and its sub-contexts
- Fixed: A problem, where rules with message body condition with diacritics were not being evaluated correctly
Version 11.1.10013.0
- Fixed: Security vulnerability CVE-2025-2425 (record reservation, responsible disclosure policy)
Version 11.1.10011.0
- Fixed: Security vulnerability CVE-2024-11859
- Fixed: A problem where the modification of Base64 encoded mail body in html format resulted into corrupted mail message
- Fixed: A problem where every 256th email was missing in the quarantine report
Version 11.1.10008.0
- New: Mail quarantine integration with ESET PROTECT On-Prem
- New: Quarantine reports can now be set up for administrators outside of the domain
- New: Support for On-demand Vulnerability scan for Vulnerability and Patch Management
- New: Vulnerability and Patch Management logging capability both locally and reporting to ESET
- New: Authenticated received chain verification support
- New: New macros available to use with rule "Send mail notification"
- New: RDP Access restriction feature
- Improved: Modification of body of Base64 encoded emails
- Improved: Brute force attack protection was extended to cover MS SQL and MySQL protocols
- Improved: Various Override mode modifications for better security and user experience
- Improved: Support for URL analysis in document-reference headers
- Improved: Macros available for rules are now more unified and with better explanation
- Improved: Performance improvements of agent priority setting both in GUI and ESET Shell
- Improved: Local mailbox counting in domains with multiple sub-domains
- Changed: ESET Mail Security now uses the Replay directory instead of Pickup directory on the Exchange Server to send internal notifications and reports
- Changed: Emails sent to journaling mailboxes will not be quarantined
- Changed: "Report a phishing site" was moved to setup/server for improved usability
- Fixed: Incorrect display of sender's IP address in SMTP protection logs
- Fixed: Modification of subject of phishing messages now works when detected during the on-demand scan
Version 11.0.10010.0
- Fixed: Security vulnerability CVE-2024-11859
Version 11.0.10008.0
- Improved: Added fallback to default on-demand scan account for error handling and compatibility with public folders.
- Improved: An error record is now available in the Events log indicating the user provided invalid credentials for the elevated permissions account.
- Fixed: A known issue with Vulnerability and Patch Management, where the vulnerability scan was unable to list Server OS vulnerabilities.
- Fixed: A problem where a not supported restart-related setting was displayed in the policy for the Vulnerability and Patch Management for ESET Mail Security.
- Fixed: A problem where the policy-locked settings were displayed as inactive in the GUI.
- Fixed: A problem where the header of the network protection log was not displayed.
- Fixed: An issue where Windows Updates were not being displayed in the GUI or in ESET PROTECT on systems older than Windows 10 RS4.
- Fixed: Security vulnerability CVE-2024-3779
Version 11.0.10005.0
- New: Microsoft 365 On-demand scan refactored to use Graph API to prepare for discontinuation of EWS
- New: Protection statistics reports now contain information about detected file types and file extensions
- New: Protection statistics reports can now be sent in .csv
- New: Administrator can now release the quarantined mail to the desired mailboxes only
- New: Homoglyphs are now being evaluated for phishing detection
- New: Notifications for triggered email rules can now be sent to the original recipients
- New: Vulnerability & Patch Management support
- New: ESET PROTECT Hub Support
- New: In-product support state informing according to End-of-life policy
- New: Extended generation of Automatic Exclusions with the use of arbitrary credentials
- New: ESET Shell can now export data to .csv
- Improved: Rules now contain separate filters for .vsd and .vsdx
- Improved: Various improvements on DKIM signing workflow design
- Improved: ESET Shell now supports creation of scheduler tasks for protection statistics reports
- Improved: Quarantine report can be now password protected
- Improved: Optimized loading of mailboxes and public folders for on-demand scan in environments with large AD
- Improved: IPs and URLs in Quarantine reports are now obfuscated to avoid further detection
- Improved: Document-Reference headers checked by anti-phishing protection
- Improved: ESET Cluster wizard now informs about the result of product activation on individual nodes
- Improved: Imported configuration from cluster node (within synchronization) will have the cluster as source in the audit log
- Changed: Documents are now sent for analysis by default after enabling of ESET LiveGuard Advanced
- Changed: Cluster menu option has been moved from “Tools” to "Setup/Server" section
- Fixed: A problem with DKIM signing due to case-sensitive comparison of domains
- Fixed: A problem where an expired session of web quarantine returned error 403 instead of the login screen
- Fixed: Support for the new structure of anti-spam lists in ESET Shell
- Fixed A problem where a status message “Updates are available” could not be dismissed
- Fixed: A problem where execution of signed batch file through ESET Shell was not working properly
- Removed: Support of Microsoft Windows Server 2012-based operating systems (NT 6.2)
Verzia 10.1.10018.0
- Fixed: Problems with signature verification on specific configurations with active Device control on systems with Microsoft Windows Server 2012R2
Version 10.1.10017.0
- Fixed: Security vulnerability CVE-2024-11859
- Fixed: Security vulnerability CVE-2024-3779
- Fixed: Fixed detection of available Windows updates on Windows10 RS4 and older
- Fixed: A problem where the policy-locked settings were displayed as inactive in the GUI
Version 10.1.10014.0
- Updated: DKIM signing agent is now installed also on Edge server
- Fixed: EEI error "Events cannot be received. HIPS is disabled"
- Fixed: Crash of ESET Service after upgrade to 10.1 due to the Local Mail Quarantine DB update
- Fixed: Crash of EdgeTransport when disabling Mail transport protection while DKIM signing is enabled
- Fixed: *.vsdx, *.vsdm files are no longer detected as archives
- Fixed: Crash of ESET Service when diagnostic logging is turned on while there is a large number of Accepted Domains in Exchange Server
- Fixed: Error when running signed batch file in eShell
- Fixed: Excel file getting blocked with rule "Forbidden archive data attachments"
- Fixed: Misleading errors about failed updating of transport agent in Event log
Version 10.1.10012.0
- New: Availability of Mail Quarantine in ESET Cluster
- New: Availability of Mail Protection Reports in ESET Cluster
- New: Getting ready for SHA-256 file hashing method
- New: On-premise mode for LiveGuard and LiveGrid
- New: Ability to tweak auto-updates from cloud management console and override the official global release rollout window
- New: Ability to copy rules
- New: Installer hard block for Operating Systems without Azure Code Signing support
- Improved: Enabling ESET LiveGuard Advanced now automatically submits documents
- Improved: Rules: Processing of archives
- Improved: Rules: Logging of blocked attachment types and triggered rules
- Improved: Quarantine: Access rights management
- Improved: Quarantine storage space can be limited
- Improved: Quarantine audit logs
- Improved: Quarantine web interface now supports shared mailboxes
- Improved: Quarantine report is now customizable
- Improved: Antispam lists now have a comment column
- Improved: Scheduler dialogs
- Improved: IDS blacklist timeout is now configurable
- Fixed: Processing of large Antispam IP/Domain list data
- Fixed: DKIM signing for empty domain
- Various other improvement and fixes
Version 10.0.10018.1
- Fixed: Security vulnerability CVE-2024-0353 [CVSS 7.8]
Version 10.0.10017.0
- New: Installer hard block for Operating Systems without Azure Code Signing support
- Fixed: Quarantine Web Interface: It's now possible to show message details by clicking on the row
- Various minor bugfixes
Version 10.0.10016.0
- New: Reports – new scheduler task for periodic Mail Server Protection statistics
- New: New method for Microsoft365 authentication
- New: Support for linked mailboxes and hidden mailboxes
- New: New access rights role for quarantine management
- New: Rules: targeted notifications after rule hit
- New: Rules: condition for antispam result category
- New: Rules: macro placeholders for existing antispam whitelists
- New: Scheduled on-demand scan with login credentials
- New: Dark mode added
- New: ESET Bridge support
- New: New product installer with minimal modules
- New: Ukrainian localization and documentation available
- Improved: GUI redesign
- Improved: New concept of communication of pending product updates, and end user license agreement
- Improved: Optimization and performance improvements of Email client protection module
- Improved: SysInspector GUI redesign
- Improved: Device control improvement
- Fixed: Attachment name rule incorrectly blocking .msg attachments
- Removed: ESET Shared local cache removed due to the EOL status
- Removed: Compatibility with Microsoft Windows Server 2008 R2, and Small Business Server 2011
- Removed: Compatibility with Microsoft Exchange 2007
- Removed: Repair and modify options removed from product installer
Version 9.0.10012.0
- FIXED: Security vulnerability CVE-2024-0353 [CVSS 7.8]
Version 9.0.10011.0
- New: Installer hard block for Operating Systems without Azure Code Signing support
- Fixed: Quarantine Web Interface: It's now possible to show message details by clicking on the row
- Various minor bugfixes
Version 9.0.10010.0
- FIXED: Protected antimalware service will not time out any longer during boot when Windows updates keep the file-system busy
Version 9.0.10009.0
- Added: Additional variables for "Format of the text used to replace deleted attachments"
- Fixed: Issue with excessive memory allocation during Antiphishing scan
- Fixed: Issue with incorrect blocking of attachments based on the dangerous attachment rule
- Fixed: Issue with wrong value of enveloper sender in MS Exchange quarantine
- Fixed: Issue with removing of multiline headers in Rules
- Fixed: Issue with a redundant log for infected attachment. When the blocked attachment is moved to quarantine and contains an infection, redundant entry with "unable to clean" action created in the virlog was fixed