Award-winning mail security

 

ESET® MAIL SECURITY FOR MICROSOFT EXCHANGE SERVER

Your company’s email server is a vital hub for productivity – and also an appealing attack surface for malware, phishing scams and spam. Protecting your email is one of the most important aspects of computer security. As cybercriminals’ methods become increasingly sophisticated, safeguarding your mail server becomes a crucial component to your companywide security protocals.

ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed – so slowdowns will be a thing of the past.

Using the intelligent ThreatSense® scanning engine to identify both familiar and emerging threats, your ESET security solution protects you from trojans, viruses, worms, adware and spyware – while keeping your company inboxes free of unwanted email.

By scanning incoming and stored emails, ESET Mail Security for Microsoft Exchange has the ability to learn and adapt to malicious threats. The ThreatSense scanning engine has the ability to scan multiple emails and is able to identify threats based on behaviour, not only on signature. The scanner operates at two levels: scanning all email traffic to guarantee maximum security.

Antispam technology uses several discreet processes (RBL, DNSBL, fingerprinting, reputation checking, content analysis, Bayesian filtering and manual white listing and blacklisting) to ensure total email threat protection, configurable for either global rules or specific mailboxes.

Small, automatic updates of the signature database and program components keep your network safe without slowing it down.

  • Antivirus & Antispam eliminates all types of threats, including viruses, rootkits, worms and spyware and stops spam and phishing attempts with high interception rates.
  • Local Quarantine of spam and undelivered messages accessible and manageable by mailbox owner via a standalone browser.
  • Meets the needs of complex network infrastructure. Optimized for virtual environments, with snapshot independence and native clustering support.
  • Remote Management. Fully manageable via the new ESET Remote Administrator web-console.

Benefits of ESET Mail Security for Microsoft Exchange Server

Anti-malware and spam protection

Anti-spam and Anti-Phishing

Stops spam and phishing attempts, and delivers high interception rates without the need to manually set a Spam Confidence Level (SCL) Threshold. After installation, the antispam module is ready to run without the need to manually tune settings or thresholds.

Message Processing Rules

Message processing rules offer a wide range of combinations by which every single message can be handled. The evaluated parameters include standard fields like subject, sender, body and specific message header, but also allow further conditional processing depending on previous anti-spam filtering or antivirus scanner results. Corrupted or password-protected archives are detected and attachments are screened internally to determine real file type, not only purported extension. Rules can be changed according to the desired actions.

Antivirus and Antispyware

Eliminates all types of threats, including viruses, rootkits, worms and spyware with optional cloud-powered scanning for even better detection performance.

Device Control

Blocks unauthorised portable devices from connecting to the server. Enables you to create rules for user groups to comply with your company policies. Allows soft blocking, which notifies the end user that his device is blocked and gives him the option to access it, with activity logged.

Local Quarantine Management

Each mailbox owner can directly interact, via a standalone browser, with spam or suspected-malware messages that have been denied delivery to the mailbox. Based on privileges set by the admin, the user can sort quarantined messages, search among them and execute allowed actions – messageby-message, or by group – all via web browser.

Database On-Demand Scan

Administrators can choose which databases and, in particular, which mailboxes will be scanned. These scans can be further limited by using the modification time-stamp of each message to choose which should be inspected, thereby reducing to a minimum the server resources devoted to the task.

Infrastructure Protection

Snapshot Independence

SET updates and program modules can be stored outside of the default location – so updates and modules don’t have to be downloaded every time a virtual machine is reverted to an earlier snapshot.

Windows Management Instrumentation (WMI) Provider

Monitors key functionalities of ESET Mail Security via WMI framework. This allows integration of ESET Mail Security into third-party management and SIEM software.

Native Clustering Support

Allows you to configure the solution to automatically replicate settings when installed in a cluster environment. Our intuitive wizard makes it easy to interconnect several installed nodes of ESET Mail Security within a cluster and manage them as one, eliminating the need to replicate changes in configuration manually to other nodes in the cluster.

ESET Shared Local Cache

ESET Shared Local Cache stores the metadata of scanned files so replica files on one machine are not scanned again on other virtual machines.

Ease of use

Process Exclusions

Allows you to define processes which are ignored by the real-time protection module – especially useful for backup or live virtual machine migration.

Remote Management

ESET Mail Security comes fully manageable via ESET Remote Administrator, delivering a perfect “look & see” overview of the network security status.

Incremental Micro-Definitions

Updates and actualisations are downloaded and applied incrementally in small packages, conserving system resources and internet bandwidth without any noticeable impact.

ESET Log Collector

Collects all logs relevant for troubleshooting into one archive, which can be emailed or uploaded to a shared network drive to speed up the troubleshooting process.

Component-Based Installation

Install on the components you need, including Real-Time File System Protection, Web and Email Protection, Device Control, and more.

ESET License Administrator

Handle all licenses via web browser, transparently from one place, merging, delegating and managing them in real-time.

Product Gallery

Menu