ESET Mail Security
 
ESET Mail Security – Table of Contents

What's new

New features and enhancements in ESET Mail Security:

Support for Microsoft Windows Server 2025 has been added.

Microsoft 365 mailbox scan can now also be performed on cloud mailboxes outside of a hybrid environment (no need for connection to the local Active Directory).

Vulnerability patching logging and reports in ESET PROTECT is supported.

Vulnerability scan reports in ESET PROTECT are now available.

The eShell supports the Vulnerability & Patch Management computer scan scheduled task.

Exclusions from network isolation are supported.

Improved security of interaction between UI components and password settings.

The Advanced setup now features a search function that highlights matching items.

The settings for configuring Rules are organized into separate sections, one for each feature:

oMail transport protection (Press F5 to open Advanced setup, then go to Mail transport protection > Mail transport protection rules).

oMailbox database scan (Press F5 to open Advanced setup, then go to Scans > Mailbox database scan > Mailbox scan rules).

oMailbox database protection (Press F5 to open Advanced setup, then go to Mailbox database protection > Mailbox database protection rules).

Improvements to the Outlook mail plugin have resolved various issues.

The Automatic exclusions logging mechanism now records only the first instance of an error, helping to prevent log overflow. It resets when settings change, or an error is resolved.

Advanced settings and component installation tree have been streamlined to align with the structures used in other ESET security products.

eShell commands have been modified to reflect the updates and consolidation of advanced settings.

eShell status commands are now organized within a single context and sub-context.

Limit incoming RDP connections—RDP access restriction feature for ESET Mail Security without a firewall component.


Note

If you perform an attended fresh installation locally on the server, the Limit incoming RDP connections to is set to Trusted zone by default. If you perform an installation remotely over RDP, the Limit incoming RDP connections to is set to All networks by default. This setting is meant to be temporary and to prevent your RDP connection from being cut off until you configure the Trusted zone.

In both cases, we recommend configuring the Trusted zone to include networks, IP addresses, or IP address ranges from which you specifically allow RDP connections to the server. Go to Network access protection > IP sets and edit Trusted zone IP set. After configuring the Trusted zone IP set to your needs, change the Limit incoming RDP connections to use the Trusted zone from the previous All networks setting to secure your server and take advantage of the RDP access restriction feature while having the RDP fully functioning within your company networks.

Refer to detailed changelogs for ESET Mail Security.