Contents
.......................................................5Preface1.
....................................................................................................6Overview1.1
....................................................................................................7Key Features1.2
....................................................................................................8What's new1.3
....................................................................................................8Methods used1.4
..............................................................................9Ma il transport protection
1.4.1
..............................................................................9Da tabase protection
1.4.2
..............................................................................10On-demand da taba se scan
1.4.3
....................................................................................................11Core modules1.5
.......................................................12Preparing for installation2.
....................................................................................................13System requirements2.1
....................................................................................................13SHA-2 required compatibility2.2
....................................................................................................14ESET Mail Security installation steps2.3
..............................................................................18Modifying an existing installation
2.3.1
....................................................................................................19Silent / Unattended installation2.4
..............................................................................20Command line ins tallation
2.4.1
....................................................................................................24Product activation2.5
..............................................................................25ESET Business Account
2.5.1
..............................................................................25Activation successful
2.5.2
..............................................................................25Activation failure
2.5.3
..............................................................................25License
2.5.4
....................................................................................................26Upgrading to a newer version2.6
..............................................................................27Upgrading via ESMC
2.6.1
..............................................................................29Upgrading via ESET Cluster
2.6.2
....................................................................................................32Installation in cluster environment2.7
....................................................................................................32Terminal Server2.8
....................................................................................................33Mailbox count2.9
..............................................................................34Ma ilbox count tool
2.9.1
.......................................................38Getting started3.
....................................................................................................38
Managed via ESET Security Management
Center
3.1
....................................................................................................39Monitoring3.2
..............................................................................40Status
3.2.1
..............................................................................41Windows upda te availa ble
3.2.2
.......................................................42Using ESET Mail Security4.
....................................................................................................42Scan4.1
..............................................................................44Sca n window and sca n log
4.1.1
....................................................................................................46Log files4.2
..............................................................................49Log filtering
4.2.1
....................................................................................................50Update4.3
....................................................................................................53Setup4.4
..............................................................................54Server
4.4.1
..............................................................................54Computer
4.4.2
..............................................................................55Network
4.4.3
..................................................................................55Network troubles hooting wizard
4.4.3.1
..............................................................................55Web and email
4.4.4
..............................................................................56Tools - Dia gnos tic logging
4.4.5
..............................................................................57Import and export settings
4.4.6
....................................................................................................57Tools4.5
..............................................................................59Running proces ses
4.5.1
..............................................................................60Watch activity
4.5.2
..............................................................................62Protection s tatistics
4.5.3
..............................................................................63Cluster
4.5.4
..................................................................................65Cluster wizard - Select nodes
4.5.4.1
..................................................................................66Cluster wizard - Cluster settings
4.5.4.2
..................................................................................67Cluster wizard - Cluster setup settings
4.5.4.3
..................................................................................67Cluster wizard - Nodes check
4.5.4.4
..................................................................................70Cluster wizard - Nodes install
4.5.4.5
..............................................................................72ESET Shell
4.5.5
..................................................................................74Usage
4.5.5.1
..................................................................................79Commands
4.5.5.2
..................................................................................81Batch files / Scripting
4.5.5.3
..............................................................................82ESET Sys Inspector
4.5.6
..............................................................................83ESET Sys Rescue Live
4.5.7
..............................................................................83Scheduler
4.5.8
..................................................................................85Scheduler - Add ta sk
4.5.8.1
........................................................................87Task type
4.5.8.1.1
........................................................................87Task timing
4.5.8.1.2
........................................................................88Event triggered
4.5.8.1.3
........................................................................88Run application
4.5.8.1.4
........................................................................88Skipped task
4.5.8.1.5
........................................................................88Scheduled task overview
4.5.8.1.6
..............................................................................89Submit samples for analysis
4.5.9
..................................................................................89Sus picious file
4.5.9.1
..................................................................................90Sus picious site
4.5.9.2
..................................................................................90False positive file
4.5.9.3
..................................................................................90False positive s ite
4.5.9.4
..................................................................................91Other
4.5.9.5
..............................................................................91Quarantine
4.5.10
.......................................................93Server protection settings5.
....................................................................................................94Protected tasks5.1
....................................................................................................95Protected partitions5.2
....................................................................................................95Antivirus and antispyware5.3
....................................................................................................97Antispam protection5.4
..............................................................................98Filtering and verification
5.4.1
..............................................................................99Adva nced settings
5.4.2
..............................................................................102Greylisting settings
5.4.3
..............................................................................103SPF and DKIM
5.4.4
....................................................................................................105Anti-Phishing protection5.5
....................................................................................................106Rules5.6
..............................................................................109Rule condition
5.6.1
..............................................................................111Rule action
5.6.2
....................................................................................................112Rule examples5.7
....................................................................................................114Mail transport protection5.8
..............................................................................116Mail transport advanced settings
5.8.1
....................................................................................................116Database protection5.9
..............................................................................117Da tabase protection adva nced settings
5.9.1