In this section you can change advanced settings for the transport agent:
Scan also messages received from authenticated or internal connections - You can choose what type of scan should be performed on messages received from authenticated sources or local servers. Scanning of such messages is recommended as it increases protection, but necessary if you are using the built-in Microsoft SBS POP3 Connector to fetch email messages from external POP3 servers or mail services (for example Gmail.com, Outlook.com, Yahoo.com, gmx.dem, etc.). For more information see POP3 Connector and antispam.
Search for sender's originating IP address in headers - If enabled, ESET Mail Security looks for the originating IP address in message headers so that different protection modules (Antispam and others) can use it. If your Exchange Organization is separated from the internet by a Proxy, Gateway or Edge Transport Server, email messages appear to arrive from a single IP address (usually an internal one). It is common that on the outside server (for example Edge Transport in DMZ) where senders IP address is known, this IP address is written into the message headers of the email message that is being received. The value specified in the Header with the originating IP field below is the header that ESET Mail Security looks for in message headers.
Header with the originating IP - Is the header that ESET Mail Security looks for in message headers. It is usually X-Originating-IP, but you can enter additional industry-standard headers such as X-Forwarded-For or Forwarded (see the list of HTTP header fields).
Enable quarantining of internal messages to mailbox quarantine - When enabled, internal messages will be quarantined. There is usually no need to quarantine internal messages.
Remove existing SCL header before the scan - This option is enabled by default. You can disable it if required to keep Spam Confidence Level (SCL) header.