ESET Online Help

Search English
Select the topic

Key Features

The following table provides a list of features that are available in the ESET Mail Security.

True 64-bit product core

Adding higher performance and stability to the product core components.

Anti-Malware

An award-winning and innovative defense against malware. This leading-edge technology prevents from attacks and eliminates all types of threats, including viruses, ransomware, rootkits, worms and spyware with cloud-powered scanning for even better detection rates. With a small footprint, it is light on the system resources not compromising its performance. It uses layered security model. Each layer, or a phase, has a number of core technologies. Pre-execution phase has technologies such as UEFI Scanner, Network Attack Protection, Reputation & Cache, In-product Sandbox, DNA Detections. Execution phase technologies are Exploit Blocker, Ransomware Shield, Advanced Memory Scanner and Script Scanner (AMSI), and Post-execution phase uses Botnet Protection, Cloud Malware Protection System and Sandboxing. This feature-rich set of core technologies provides an unrivaled level of protection.

Antispam

Antispam is an essential component for any mail server. ESET Mail Security uses state-of-the-art Antispam engine that prevents from spam and phishing attempts with very high catch rates. ESET Mail Security has won consecutively spam filtering test by Virus Bulletin, a leading security testing authority, and received the VBSpam+ certification for a number years. Antispam engine have achieved a result of 99.99% spam catch rate with zero false positives making it industry-leading technology in spam protection. ESET Mail Security Antispam incorporates multiple technologies (RBL and DNSBL, Fingerprinting, Reputation checking, Content analysis, Rules, manual whitelisting/blacklisting, Backscatter protection and message validation using SPF and DKIM) to maximize detection. ESET Mail Security Antispam is cloud based and most of the cloud databases are located in ESET data centers. Antispam cloud services allow for prompt data updates which provides quicker reaction time in case of an emergence of new spam.

Anti-Phishing protection

A feature which prevents users from accessing web pages known for phishing. Email messages may contain links which lead to phishing web pages and ESET Mail Security uses sophisticated parser that searches message body and subject of incoming email messages to identify such links (URL's). The links are compared against phishing database.

Mail quarantine manager

Administrator can inspect objects in this storage section and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.

On-demand database scan

On-demand database scanner is now using parallel scanning to improve the performance.

Mail Quarantine

One of the basic steps in setting up protection in ESET Mail Security is creating the quarantine that safely stores infected notes. Only the administrator of the IBM Domino mail server has access to the quarantine. This quarantine is excluded from additional scanning.

ESET Cluster

Similar to ESET File Security 6 for Microsoft Windows Server, joining workstations to nodes will offer additional automation of management due to the ability to distribute one configuration policy across all cluster members. The creation of clusters themselves is possible using the node installed, which can then install and initiates all nodes remotely. ESET server products are able to communicate with each other and exchange data such as configuration and notifications, and can Synchronize greylisting databases as well as synchronize data necessary for proper operation of a group of product instances. This allows for the same configuration of the product for all members of a cluster. Windows Failover Clusters and Network Load Balancing (NLB) Clusters are supported by ESET Mail Security. Additionally, you can add ESET Cluster members manually without the need for a specific Windows Cluster. ESET Clusters work in both domain and workgroup environments.

Component-based installation

Installation can be customized to contain only selected parts of the product.

Storage scan

Scans all shared files on a local server. This makes it easy to selectively scan only user data that is stored on the file server.

Processes exclusions

Excludes specific processes from Antivirus on-access scanning. Due to the critical role of dedicated servers (application server, storage server, etc.) regular backups are mandatory to guarantee timely recovery from fatal incidents of any kind. To improve backup speed, process integrity and service availability, some techniques that are known to conflict with file-level antivirus protection are used during backup. Similar problems can occur when attempting live migrations of virtual machines. The only effective way to avoid both situations is to deactivate antivirus software. By excluding specific process (for example those of the backup solution) all file operations attributed to such excluded process are ignored and considered safe, thus minimizing interference with the backup process. We recommend that you use caution when creating exclusions – a backup tool that has been excluded can access infected files without triggering an alert which is why extended permissions are only allowed in the real-time protection module.

eShell (ESET Shell)

eShell 2.0 is now available in ESET Mail Security. eShell is a command line interface that offers advanced users and administrators more comprehensive options to manage ESET server products.

ESET remote management tools

ESET Mail Security can be managed remotely from one central location using ESET PROTECT or ESET PROTECT On-Prem. You may consider using one of the ESET remote management tools to deploy ESET solutions, manage tasks, enforce security policies, monitor system status and quickly respond to problems or threats on remote servers.

Hyper-V scan

Is a new technology that allows for scanning of Virtual Machine (VM) disks on Microsoft Hyper-V Server without the need of any "Agent" on the specific VM.

Sender Spoofing protection

A new feature that protects from a common practice of faking sender information of an email called sender spoofing. The email recipient is unlikely to distinguish a valid sender from a faked one, as the email usually appears as if it was sent from a legitimate source. You can enable and configure Sender Spoofing protection in Advanced setup or create custom rules.

DKIM Signing

ESET Mail Security provides a DKIM signing feature to further enhance security for outgoing email messages. Select client certificate and specify which email headers are signed with DKIM signature. You can configure DKIM signing for each domain separately for multiple domains.