Installation manual

Contents
..................................................5
Introduction1.
........................................................................5What's new in version 4.5 ?1.1
........................................................................5System requirements1.2
........................................................................6Methods used1.3
.........................................................................6Mailbox scanning via VSAPI1.3.1
.........................................................................6Message filtering on the SMTP server level1.3.2
........................................................................6Types of protection1.4
.........................................................................6Antivirus protection1.4.1
.........................................................................6Antispam protection1.4.2
.........................................................................7Application of user-defined rules1.4.3
........................................................................7User interface1.5
..................................................8
Installation2.
........................................................................8Typical Installation2.1
........................................................................9Custom Installation2.2
........................................................................11Terminal Server2.3
........................................................................11Upgrading to a newer version2.4
........................................................................12Exchange Server Roles - Edge vs Hub2.5
........................................................................13Exchange Server 2013 Roles2.6
........................................................................13Installation in a clustered environment2.7
........................................................................15License2.8
........................................................................17Post-Installation Configuration2.9
..................................................19
ESET Mail Security - Microsoft Exchange
Server protection
3.
........................................................................19General settings3.1
.........................................................................19Microsoft Exchange Server3.1.1
........................................................................19
VSAPI (Virus-Scanning Application Programming
Interface)
3.1.1.1
........................................................................19Transport Agent3.1.1.2
.........................................................................20Rules3.1.2
........................................................................21Adding new rules3.1.2.1
........................................................................22Actions taken when applying rules3.1.2.2
.........................................................................23Log files3.1.3
.........................................................................24Message quarantine3.1.4
........................................................................25Adding a new quarantine rule3.1.4.1
.........................................................................25Performance3.1.5
........................................................................26Antivirus and antispyware settings3.2
.........................................................................26Microsoft Exchange Server3.2.1
........................................................................27
Virus-Scanning Application Programming
Interface (VSAPI)
3.2.1.1
..........................................................................27Microsoft Exchange Server 5.5 (VSAPI 1.0)3.2.1.1.1
.........................................................................27Actions3.2.1.1.1.1
.........................................................................27Performance3.2.1.1.1.2
..........................................................................27Microsoft Exchange Server 2000 (VSAPI 2.0)3.2.1.1.2
.........................................................................28Actions3.2.1.1.2.1
.........................................................................28Performance3.2.1.1.2.2
..........................................................................29Microsoft Exchange Server 2003 (VSAPI 2.5)3.2.1.1.3
.........................................................................29Actions3.2.1.1.3.1
.........................................................................30Performance3.2.1.1.3.2
..........................................................................30Microsoft Exchange Server 2007/2010 (VSAPI 2.6)3.2.1.1.4
.........................................................................31Actions3.2.1.1.4.1
.........................................................................31Performance3.2.1.1.4.2
..........................................................................32Transport Agent3.2.1.1.5
.........................................................................33Actions3.2.2
.........................................................................33Alerts and notifications3.2.3
.........................................................................34Automatic exclusions3.2.4
........................................................................35Antispam protection3.3
.........................................................................36Microsoft Exchange Server3.3.1
........................................................................36Transport Agent3.3.1.1
........................................................................37POP3 Connector and antispam3.3.1.2
.........................................................................38Antispam engine3.3.2
........................................................................38Antispam engine parameter setup3.3.2.1
..........................................................................38Analysis3.3.2.1.1
.........................................................................39Samples3.3.2.1.1.1
.........................................................................39SpamCompiler3.3.2.1.1.2
.........................................................................39List of cache memory files3.3.2.1.1.1
..........................................................................39Training3.3.2.1.2
..........................................................................40Rules3.3.2.1.3
.........................................................................40Rule weight3.3.2.1.3.1
.........................................................................41Add rule weight3.3.2.1.3.1
.........................................................................41List of downloaded rule files3.3.2.1.3.2
.........................................................................41Category weight3.3.2.1.3.3
.........................................................................41Add category weight3.3.2.1.3.1
.........................................................................41Custom rules list3.3.2.1.3.4
..........................................................................41Filtering3.3.2.1.4
.........................................................................42Allowed senders3.3.2.1.4.1
.........................................................................42Blocked senders3.3.2.1.4.2
.........................................................................42Allowed IP addresses3.3.2.1.4.3
.........................................................................42Ignored IP addresses3.3.2.1.4.4
.........................................................................42Blocked IP addresses3.3.2.1.4.5
.........................................................................42Allowed domains3.3.2.1.4.6
.........................................................................43Ignored domains3.3.2.1.4.7
.........................................................................43Blocked domains3.3.2.1.4.8
.........................................................................43Spoofed senders3.3.2.1.4.9
..........................................................................43Verification3.3.2.1.5
.........................................................................43RBL (Realtime Blackhole List)3.3.2.1.5.1
.........................................................................43List of RBL servers3.3.2.1.5.1
.........................................................................44LBL (Last Blackhole List)3.3.2.1.5.2
.........................................................................44List of LBL servers3.3.2.1.5.1
.........................................................................44List of skipped IP addresses3.3.2.1.5.2
.........................................................................44DNSBL (DNS Block List)3.3.2.1.5.3
.........................................................................44List of DNSBL servers3.3.2.1.5.1
..........................................................................44DNS3.3.2.1.6
..........................................................................45Score3.3.2.1.7
..........................................................................45Spambait3.3.2.1.8
.........................................................................45Spambait addresses3.3.2.1.8.1
.........................................................................45Addresses regarded as nonexistent3.3.2.1.8.2
..........................................................................45Communication3.3.2.1.9
..........................................................................46Performance3.3.2.1.10
..........................................................................46Regional settings3.3.2.1.11
.........................................................................46List of home languages3.3.2.1.11.1
.........................................................................48List of home countries3.3.2.1.11.2
.........................................................................52List of blocked countries3.3.2.1.11.3
.........................................................................52List of blocked charsets3.3.2.1.11.4
..........................................................................52Log files3.3.2.1.12
..........................................................................52Statistics3.3.2.1.13
..........................................................................52Options3.3.2.1.14
.........................................................................53Alerts and notifications3.3.3
........................................................................53FAQ3.4
..................................................56
ESET Mail Security - Server protection4.
........................................................................56Antivirus and antispyware protection4.1
.........................................................................56Real-time file system protection4.1.1
........................................................................56Control setup4.1.1.1
..........................................................................57Media to scan4.1.1.1.1
..........................................................................57Scan on (Event-triggered scanning)4.1.1.1.2
..........................................................................57Advanced scan options4.1.1.1.3
........................................................................57Cleaning levels4.1.1.2
........................................................................58
When to modify real-time protection
configuration
4.1.1.3
........................................................................58Checking real-time protection4.1.1.4
........................................................................58What to do if real-time protection does not work4.1.1.5
.........................................................................59Email client protection4.1.2
........................................................................59POP3 checking4.1.2.1
..........................................................................60Compatibility4.1.2.1.1
........................................................................61Integration with email clients4.1.2.2
..........................................................................62Appending tag messages to email body4.1.2.2.1
........................................................................62Removing infiltrations4.1.2.3
.........................................................................63Web access protection4.1.3
........................................................................63HTTP, HTTPs4.1.3.1
..........................................................................64Address management4.1.3.1.1
..........................................................................65Active mode4.1.3.1.2