ESET Online Help

Search English
Select the topic

What's new

New features and enhancements in ESET Mail Security:

ESET Mail Security no longer uses the Pickup directory on the Exchange Server to send internal notifications and reports. The Replay directory is used for this purpose.

The Authenticated Received Chain (ARC) addresses the challenge of intermediary mail servers breaking traditional authentication methods like SPF or DKIM by modifying the email message. Antispam protection evaluates ARC headers as part of defined rules for SPF, DKIM and DMARC.

Vulnerability & Patch Management—You can use ESET PROTECT to run a routine scan on your server with ESET Mail Security to detect any installed software vulnerable to security risks. Patch management helps you ensure systems and applications are secured against known vulnerabilities and exploits. The actual patching is manual, giving you full control of when the patching takes place. Vulnerability & Patch Management is not available in ESET PROTECT On-Prem. Vulnerability & Patch management v1.2 (on-demand scan, maintenance window).

Mail quarantine integration with ESET PROTECT On-Prem.

Mail Quarantine reports can also be sent to external users outside the domain.

Modification of body of Base64 encoded emails.

Brute force attack protection was extended to cover MS SQL and MySQL protocols.

Other minor improvements and bug fixes.

Limit incoming RDP connections—RDP access restriction feature for ESET Mail Security without a firewall component.


note

If you perform an attended fresh installation locally on the server, the Limit incoming RDP connections to is set to Trusted zone by default. If you perform an installation remotely over RDP, the Limit incoming RDP connections to is set to All networks by default. This setting is meant to be temporary and to prevent your RDP connection from being cut off until you configure the Trusted zone.

In both cases, we recommend configuring the Trusted zone to include networks, IP addresses, or IP address ranges from which you specifically allow RDP connections to the server. Go to Network access protection > IP sets and edit Trusted zone IP set. After configuring the Trusted zone IP set to your needs, change the Limit incoming RDP connections to use the Trusted zone from the previous All networks setting to secure your server and take advantage of the RDP access restriction feature while having the RDP fully functioning within your company networks.

If you are using the firewall component, Limit incoming RDP connections to setting is not present. Configure the firewall to secure RDP according to your requirements.

Refer to detailed changelogs for ESET Mail Security.