Mail transport advanced settings
You can customize mail transport protection settings.
Scan also messages received from authenticated or internal connections by
You can choose what scan should be performed on messages from authenticated sources or local servers. Scanning these messages is recommended because it increases protection, and is necessary if you are using the built-in Microsoft SBS POP3 Connector to fetch email messages from external POP3 servers or mail services (for example, Gmail.com, Outlook.com, Yahoo.com, gmx.dem, etc.).
Choose a protection level from the drop-down menu. We recommend that you use Antivirus protection (default setting), especially for internal connections, as it is unlikely that phishing or spam messages will be distributed via your local servers. However, you can increase the protection for Microsoft SBS POP3 Connector by choosing Antivirus and anti-phishing protection or even Antivirus, anti-phishing and antispam protection.
This setting turns Antispam protection on/off for authenticated users and internal connections. Emails from non-authenticated connections are always scanned, even when you select Do not scan. |
Internal messages from Outlook inside the organization are sent in TNEF (Transport Neutral Encapsulation Format). Antispam does not support TNEF. Therefore, internal TNEF emails will not be scanned for spam regardless of the setting Scan also messages received from authenticated or internal connections by. |
Scan messages received from authenticated or internal connections by ESET LiveGuard Advanced
When enabled, messages received by ESET LiveGuard Advanced from authenticated or internal connections are also scanned. This setting is only available if you are eligible for ESET LiveGuard Advanced with the appropriate license. The ESET LiveGuard Advanced license is managed by ESET PROTECT and the activation itself must be performed from ESET PROTECT using a policy.
Remove existing SCL header before the scan
This option is enabled by default. You can disable it if you are required to use the Spam Confidence Level (SCL) header.
Write scan results to message headers
When enabled, scan results are written into message headers. These message headers start with X_ESET, making them easy to recognize (for example, X_EsetResult or X_ESET_Antispam).
SMTP Reject Response
You can specify a Response code, Status code and Response message that define the SMTP temporary denial response sent to the SMTP server if a message is refused. You can enter a response message in the following format:
Response code |
Status code |
Response message |
---|---|---|
250 |
2.5.0 |
Requested mail action okay, completed |
451 |
4.5.1 |
Requested action aborted:local error in processing |
550 |
5.5.0 |
Requested action not taken:mailbox unavailable |
554 |
5.6.0 |
Invalid content |
You can also use system variables when configuring SMTP Reject Responses. |