Email client protection
Email client protection provides control of email communications received through the POP3 and IMAP protocols.
To configure the ESET Endpoint Security remotely:
1.In ESET PROTECT, click Policies > New policy and type a name for the policy.
To adjust the settings in an existing policy for ESET Endpoint for macOS (V7+), click the policy you want to change in the list of policies and click Edit > Settings. |
2.Click Settings and select ESET Endpoint for macOS (V7+) from the drop-down menu.
3.Adjust the desired settings.
4.Click Continue > Assign and select the appropriate group of computers.
5.Click Finish.
To configure the ESET Endpoint Security locally see application preferences. |
In Web and email > Email client protection, you can configure the following settings:
Basic
Integration of ESET Endpoint Security with your email client increases the level of active protection against malicious code in email messages. ESET recommends that you keep Enable email protection enabled.
Email protocols
The IMAP and POP3 protocols are the most widespread protocols used to receive email communication in an email client application. The Internet Message Access Protocol (IMAP) is another Internet protocol for email retrieval. IMAP has some advantages over POP3. For example, multiple clients can simultaneously connect to the same mailbox and maintain message state information such as whether or not the message has been read, replied to or deleted. The protection module providing this control is automatically initiated at system startup and is then active in memory.
ESET Endpoint Security provides protection for these protocols regardless of the email client used and without requiring reconfiguration of the email client. The program will only scan traffic on ports defined in Ports used by IMAP/POP3 protocol. Other communication ports can be added if necessary. Multiple port numbers must be delimited by a comma.
ThreatSense Parameters
ThreatSense parameters enable you to specify configuration options for the email client protection, such as objects to scan, detection methods used, etc. See ThreatSense parameters for detailed information.
Email Tags
After an email has been checked, a notification with the scan result can be appended to the message. You can elect to Append tag messages to received and read email. Be aware that tag messages may be omitted in problematic HTML messages or if messages are forged by malware. The tag messages can be added to received and read emails. The available options are:
•Never – No tag messages will be added at all.
•When a detection occurs – Only messages containing malicious software will be marked as checked (default).
•To all email when scanned – The program will append messages to all scanned emails.
Update subject of received and read email – Disable this if you do not want email protection to include a virus warning in the subject of an infected email. This feature allows for simple, subject-based filtering of infected emails (if supported by your email program). It also increases the level of credibility for the recipient and if infiltration is detected, provides valuable information about the threat level of a given email or sender.
Text to add to subject of detected email – Edit this template if you want to modify the subject prefix format of an infected email. This function will replace the message subject "Hello" with the following format: "[detection %VIRUSNAME%] Hello". The variable %VIRUSNAME% represents the detection.
Protocol Filtering
Protocol filtering allows you to filter the data transmitted through the POP3, IMAP and HTTP application protocols, employing the ThreatSense scanning technology.
Excluded applications – communication of applications in the list will be excluded from protocol content filtering.
Excluded IP addresses – the entries in the list will be excluded from protocol content filtering. Communication from/to selected IP addresses will not be scanned. We recommend that you only use this option for addresses that are known to be trustworthy.
Enable Protocol filtering advanced logging – record all events to allow diagnosing and solving problems.