You will see a list of components that you can enable/disable using the slider bar MODULE_ENABLED. To configure settings for a specific item, click the gear icon gear.

Guards against malicious system attacks by controlling file, email and Internet communication.

Integrates several technologies (RBL, DNSBL, Fingerprinting, Reputation checking, Content analysis, Rules, Manual whitelisting/blacklisting, etc.) to achieve maximum detection of email threats.

Parses message body of incoming emails for phishing links (URL's).

Identifies critical server applications and server operating system files and automatically adds them to the list of exclusions. This functionality will minimize the risk of potential conflicts and increase the overall performance of the server when running threat detection software.

To configure and activate the ESET Cluster.


To temporarily disable individual modules, next to the appropriate module, click the green slider bar MODULE_ENABLED. This may decrease the protection level of your server.

To re-enable the protection of a disabled security component, next to the appropriate module, click the red slider bar MODULE_DISABLED. The component is returned to an enabled state.

To access detailed settings of a specific security component, click the gear icon gear.

Load setup parameters using an .xml configuration file or save the current setup parameters to a configuration file.

Configure advanced settings and options based on your needs. To access the Advanced setup screen from anywhere in the program, press F5.