Getting started > Post-installation tasks

Post-installation tasks

The following are recommended tasks that cover initial configuration of your ESET Mail Security.



Product Activation

Make sure your ESET Mail Security is activated. You can perform activation in a number of different ways.


Once the product is activated, module update runs automatically. Check the update status to see if the update was successful.

Mail Quarantine manager

Get to know the Mail Quarantine manager which is accessible from the program GUI. This feature enables you to manage quarantined messages such as spam, infected attachments containing malware, phishing messages and messages filtered out by rules. You can see details of each message and take an action (release or delete).

Mail Quarantine Web interface

Mail Quarantine Web interface is an alternative to the Mail Quarantine manager that enables you to manage quarantined items remotely. Additionally, Mail Quarantine Web interface allows users (email recipients) to manage their own quarantined messages. Users can be notified about newly quarantined content with Mail Quarantine reports sent via email. We recommend that you configure the reports.

Mail Quarantine reports

Create a scheduled task to send Mail Quarantine reports to yourself and to selected users to allow them to release (deliver) certain types of false positive messages and to manage their quarantined content via Mail Quarantine Web interface (online viewer). Users will be able to access the Web interface by a clicking a link provided in the Mail Quarantine reports and logging in using their domain credentials.

Antispam - Filtering and verification

Antispam is a sophisticated cloud based functionality that prevent your users (email recipients) from receiving spam. We recommend that you use filtering and verification and add your local IP addresses to the Ignored IP list. IP addresses within your network infrastructure will then be ignored during classification. You can configure and manage the rest of the Approved, Blocked and Ignored lists to customize filtering and verification. You can also enable Greylisting if you decide to use this feature.


A powerful feature that enables you to filter email messages based on defined conditions and an actions. Use pre-defined rules (modify if required) or create new, customized rules to fit your needs. Rules can be configured for any of the protection layers (Mail transport protection, Mailbox database protection or On-demand mailbox database scan).

Antivirus test

Verify that Antivirus protection works correctly.

Antispam test

Verify that Antispam protection works correctly.

Anti-Phishing test

Verify that Anti-Phishing protection works correctly.