ESET Mail Security has a intuitive graphical user interface (GUI) that gives users easy access to main program functions. The main program window of ESET Mail Security is divided into two main sections. The primary window on the right displays the information that corresponds to the option selected from the main menu on the left.
The different sections of the main menu are described below:
•Monitoring - Provides information about the protection status of ESET Mail Security, license validity, virus signature database updates, basic statistics and system information.
•Log files - Accesses log files that contain information about all important program events that have occurred. These files provide an overview of detected threats as well as other security related events.
•Scan - Allows you to configure and launch a Storage scan, Smart scan, Custom scan or Removable media scan. You can also repeat the last scan performed.
•Update - Provides information about the virus signature database and notifies you about available updates. Product activation can also be performed from this section.
•Setup - Adjust your server and computer security settings.
•Tools - Provides additional information about your system protection. Additional tools to help you manage your security. The Tools section contains the following items: Running processes, Watch activity, Protection statistics, Cluster, ESET Shell, ESET SysInspector, ESET SysRescue Live to create a rescue CD or USB and Scheduler. You can also Submit sample for analysis and check your Quarantine.
•Help and support - Provides access to help pages, the ESET Knowledgebase and other Support tools. Also available are links to open a Customer Care support request and information about product activation.
In addition to the main GUI, the Advanced setup window is accessible from anywhere in the program by pressing the F5 key.
From the Advanced setup window, you can configure settings and options based on your needs. The menu on the left includes the following categories:
•Server - Allows you to configure Mail transport protection, Database protection, On-Demand database scan, Rules, etc.
•Computer - Enable or disable detection of potentially unwanted, unsafe, suspicious application, specify exclusions, Real-time file system protection, On-demand computer scan and Hyper-V scan, etc.
•Update - Configure a list of profiles, create a snapshots of update file, update source information like the update servers being used and authentication data for these servers.
•Web and email - Allows you to configure Email client protection,Protocol filtering, Web access protection, etc.
•Device control - Configure Device control Rules and Groups.
•Tools - Allows you to customize tools, such as ESET LiveGrid®, Log files, Proxy server, Cluster, etc.
•User interface - Configure the behavior of the program's Graphical user interface (GUI), Statuses, License information, etc.
When you click an item (category or subcategory) in the menu on the left, the respective settings for that item are shown on the right pane.