Overview
Key Features
What's new
Mail flow
Protection modules
Multilayered security
Mailbox database protection
Mail transport protection
On-demand mailbox database scan
Microsoft 365 mailbox database scan
Specifications
System requirements
ESET Mail Security features and Exchange Server Roles
Exchange server roles
Install / Upgrade
Prepare for installation
ESET Mail Security installation steps
Export settings or remove installation
Initial modules update
Silent / Unattended installation
Command line installation
Upgrade to the latest version
Upgrade via ESET Cluster
Upgrade via ESET PROTECT
Installation in cluster environment
Multiserver / DAG environment
Activate ESET Mail Security
Activation successful
ESET PROTECT Hub account
Activation failure
License
Get started
Post-installation tasks
Reports
Manage ESET Mail Security remotely
ESET Vulnerability & Patch Management
Monitoring
Windows update available
Network isolation
Using ESET Mail Security
Log files
Log filtering
Scan
Scan window and scan log
Update
Mail Quarantine
Setup
Server
Cluster
Cluster wizard - Select nodes
Cluster wizard - Cluster settings
Cluster wizard - Cluster setup settings
Cluster wizard - Nodes check
Cluster wizard - Nodes install
Computer
Network
Network connections
Resolve blocked communication
Web and email
Tools - Diagnostic logging
Import and export settings
Tools
Running processes
Protection statistics
ESET Shell
Usage
Commands
Keyboard shortcuts
Batch files / Scripting
ESET LiveGuard Advanced
ESET SysInspector
Scheduler
Scheduler - Add task
Task type
Task execution
Event triggered
Run application
Skipped task
Mail server protection report
Scheduled task overview
Submit samples for analysis
Suspicious file
Suspicious site
False positive file
False positive site
Other
Quarantine
Microsoft 365 mailbox scan wizard
Register ESET Mail Security scanner
Unregister ESET Mail Security scanner
Advanced setup
Server
Agent priority setup
Antivirus and antispyware
Antispam protection
Filtering and verification
Antispam advanced settings
Greylisting settings
SPF and DKIM
Backscatter protection
Sender spoofing protection
Anti-Phishing protection
Rules
Rule condition
Rule action
Rule examples
Mail transport protection
Mail transport advanced settings
Mailbox database protection
Background scan
On-demand mailbox database scan
Mailbox database scan
Microsoft 365 mailbox scan
Additional mailbox items
Proxy server
Database scan account details
Mail Quarantine types
Local quarantine
File storage
Web interface
Send mail quarantine reports - scheduled task
User mail quarantine web interface
Quarantine mailbox and MS Exchange quarantine
Quarantine manager settings
Proxy server
Quarantine manager account details
DKIM Signing
Antivirus test
Antispam test
Anti-Phishing test
Computer
Machine learning protection
Exclusions
Performance exclusions
Detection exlusions
Create exclusion wizard
Advanced options
Automatic exclusions
An infiltration is detected
Real-time file system protection
ThreatSense parameters
Additional ThreatSense parameters
File extenstions excluded from scanning
Processes exclusions
Cloud-based protection
Exclusion filter
Malware scans
Profile manager
Profile targets
Scan targets
Idle-state scan
Startup scan
Automatic startup file check
Removable media
Document protection
Hyper-V scan
HIPS
HIPS rule settings
HIPS advanced settings
Update configuration
Update rollback
Scheduled Task - Update
Update mirror
Network access protection
Network connection profile
Add network
IP sets
Network attack protection
IDS exceptions
Suspected threat blocked
Temporary IP address blacklist
Brute-force attack protection
Brute-force attack protection rules
Brute-force attack protection exclusions
Web and email
Protocol filtering
Web and email clients
SSL/TLS
List of known certificates
Encrypted SSL communication
Email client protection
Email protocols
Email tags
Microsoft Outlook toolbar
Outlook Express and Windows Mail toolbar
Confirmation dialog
Rescan messages
Web access protection
URL address management
Create new list
Anti-Phishing web protection
Device control
Device rules
Device groups
Tools configuration
Time slots
Microsoft Windows update
Command line scanner
ESET CMD
ESET RMM
License
WMI Provider
Provided data
Accessing Provided Data
ESET Management console scan targets
Override mode
Log files
Syslog event mapping
Presentation mode
Diagnostics
Technical support
Cluster
Connectivity
User interface
Access setup
ESET Shell
Icon in the Windows notification area
Notifications
Application statuses
Disabled messages and statuses
Desktop notifications
Customization
Desktop notifications
Interactive alerts
Restart required
Forwarding
Revert to default settings
Help and support
Submit support request
About ESET Mail Security
Glossary
Legal documents
End User License Agreement
Privacy Policy
Last updated: November 19, 2024