Email protection

Email protection provides control of email communications received through the POP3 and IMAP protocols. When examining incoming messages, ESET Cyber Security uses all of the advanced scanning methods included in the ThreatSense scanning engine. POP3 and IMAP protocol communications scanning is independent of the email client used.

ThreatSense Engine: Setup – advanced scanner setup enables you to configure scan targets, detection methods, etc. Click Setup to display the detailed scanner setup window.

Append tag message to email footnote – after an email has been scanned, a notification containing the scan results can be appended to the message. Tag messages are a useful tool, but should not be used as the final determination of message safety, since they may be omitted in problematic HTML messages and can be forged by certain threats. The following options are available:

Never – no tag messages will be added to any email

To infected email only – only email containing malware will be tagged as checked

To all scanned email – all scanned email will be appended with tag messages

Append note to the subject of received and read infected email – select this check box if you want email protection to include a threat warning in the infected email. This feature allows for simple filtering of infected emails. It also increases the level of credibility for the recipient and, if an infiltration is detected, it provides valuable information about the threat level of a given email or sender.

Template added to the subject of infected email – edit this template to modify the subject prefix format of an infected email.

%avstatus% - Adds the email infection status (for example: clean, infected...)

%virus% - Adds the name of the threat

%aspmstatus% - Changes the subject based on the outcome on the antispam scan

%product% - Adds the name of your ESET product (in this case - ESET Cyber Security)

%product_url% - Addsthe  ESET website link (

In the lower part of this window, you can also enable/disable checking of email communication received through the POP3 and IMAP protocols. To learn more about this, see the following topics:

POP3 protocol checking

IMAP protocol checking