Installation manual

Contents
..................................................5
Introduction1.
........................................................................5What's new in version 4.3 ?1.1
........................................................................5System requirements1.2
........................................................................6Methods used1.3
...........................................................................6Mailbox scanning via VSAPI1.3.1
...........................................................................6Message filtering on the SMTP server level1.3.2
........................................................................6Types of protection1.4
...........................................................................6Antivirus protection1.4.1
...........................................................................6Antispam protection1.4.2
...........................................................................7Application of user-defined rules1.4.3
........................................................................7User interface1.5
..................................................8
Installation2.
........................................................................8Typical Installation2.1
........................................................................9Custom Installation2.2
........................................................................11Terminal Server2.3
........................................................................11Upgrading to a newer version2.4
........................................................................12Installation in a clustered environment2.5
........................................................................14License2.6
........................................................................16Post-Installation Configuration2.7
..................................................19
ESET Mail Security - Microsoft Exchange
Server protection
3.
........................................................................19General settings3.1
...........................................................................19Microsoft Exchange Server3.1.1
..........................................................................19
VSAPI (Virus-Scanning Application Programming
Interface)
3.1.1.1
..........................................................................19Transport Agent3.1.1.2
...........................................................................20Rules3.1.2
..........................................................................21Adding new rules3.1.2.1
..........................................................................22Actions taken when applying rules3.1.2.2
...........................................................................23Log files3.1.3
...........................................................................24Message quarantine3.1.4
..........................................................................25Adding a new quarantine rule3.1.4.1
...........................................................................25Performance3.1.5
........................................................................26Antivirus and antispyware settings3.2
...........................................................................26Microsoft Exchange Server3.2.1
..........................................................................27
Virus-Scanning Application Programming Interface
(VSAPI)
3.2.1.1
............................................................................27Microsoft Exchange Server 5.5 (VSAPI 1.0)3.2.1.1.1
.........................................................................27Actions3.2.1.1.1.1
.........................................................................27Performance3.2.1.1.1.2
............................................................................27Microsoft Exchange Server 2000 (VSAPI 2.0)3.2.1.1.2
.........................................................................28Actions3.2.1.1.2.1
.........................................................................28Performance3.2.1.1.2.2
............................................................................29Microsoft Exchange Server 2003 (VSAPI 2.5)3.2.1.1.3
.........................................................................29Actions3.2.1.1.3.1
.........................................................................30Performance3.2.1.1.3.2
............................................................................30Microsoft Exchange Server 2007/2010 (VSAPI 2.6)3.2.1.1.4
.........................................................................31Actions3.2.1.1.4.1
.........................................................................31Performance3.2.1.1.4.2
............................................................................32Transport Agent3.2.1.1.5
...........................................................................33Actions3.2.2
...........................................................................33Alerts and notifications3.2.3
...........................................................................34Automatic exclusions3.2.4
........................................................................35Antispam protection3.3
...........................................................................36Microsoft Exchange Server3.3.1
..........................................................................36Transport Agent3.3.1.1
...........................................................................37Antispam engine3.3.2
..........................................................................38Antispam engine parameter setup3.3.2.1
............................................................................40Configuration file3.3.2.1.1
...........................................................................44Alerts and notifications3.3.3
........................................................................45FAQ3.4
..................................................48
ESET Mail Security - Server protection4.
........................................................................48Antivirus and antispyware protection4.1
...........................................................................48Real-time file system protection4.1.1
..........................................................................48Control setup4.1.1.1
............................................................................49Media to scan4.1.1.1.1
............................................................................49Scan on (Event-triggered scanning)4.1.1.1.2
............................................................................49Advanced scan options4.1.1.1.3
..........................................................................49Cleaning levels4.1.1.2
..........................................................................50When to modify real-time protection configuration4.1.1.3
..........................................................................50Checking real-time protection4.1.1.4
..........................................................................50What to do if real-time protection does not work4.1.1.5
...........................................................................51Email client protection4.1.2
..........................................................................51POP3 checking4.1.2.1
............................................................................52Compatibility4.1.2.1.1
..........................................................................53Integration with email clients4.1.2.2
............................................................................54Appending tag messages to email body4.1.2.2.1
..........................................................................54Removing infiltrations4.1.2.3
...........................................................................55Web access protection4.1.3
..........................................................................55HTTP, HTTPs4.1.3.1
............................................................................56Address management4.1.3.1.1
............................................................................57Active mode4.1.3.1.2
...........................................................................58On-demand computer scan4.1.4
..........................................................................59Type of scan4.1.4.1
............................................................................59Smart scan4.1.4.1.1
............................................................................59Custom scan4.1.4.1.2
..........................................................................60Scan targets4.1.4.2
..........................................................................60Scan profiles4.1.4.3
...........................................................................61Performance4.1.5
...........................................................................61Protocol filtering4.1.6
..........................................................................61SSL4.1.6.1
............................................................................62Trusted certificates4.1.6.1.1
............................................................................62Excluded certificates4.1.6.1.2
...........................................................................62ThreatSense engine parameters setup4.1.7
..........................................................................63Objects setup4.1.7.1
..........................................................................63Options4.1.7.2
..........................................................................64Cleaning4.1.7.3
..........................................................................65Extensions4.1.7.4
..........................................................................65Limits4.1.7.5
..........................................................................66Other4.1.7.6
...........................................................................66An infiltration is detected4.1.8
........................................................................67Updating the program4.2
...........................................................................69Update setup4.2.1
..........................................................................70Update profiles4.2.1.1
..........................................................................70Advanced update setup4.2.1.2
............................................................................71Update mode4.2.1.2.1
............................................................................72Proxy server4.2.1.2.2
............................................................................74Connecting to the LAN4.2.1.2.3
............................................................................75Creating update copies - Mirror4.2.1.2.4
.........................................................................76Updating from the Mirror4.2.1.2.4.1
.........................................................................77Troubleshooting Mirror update problems4.2.1.2.4.2
...........................................................................77How to create update tasks4.2.2
........................................................................78Scheduler4.3
...........................................................................78Purpose of scheduling tasks4.3.1
...........................................................................79Creating new tasks4.3.2
........................................................................80Quarantine4.4
...........................................................................80Quarantining files4.4.1
...........................................................................80Restoring from Quarantine4.4.2
...........................................................................81Submitting file from Quarantine4.4.3
........................................................................82Log files4.5
...........................................................................86Log filtering4.5.1
...........................................................................87Find in log4.5.2
...........................................................................89Log maintenance4.5.3
........................................................................89ESET SysInspector4.6
...........................................................................89Introduction to ESET SysInspector4.6.1
..........................................................................90Starting ESET SysInspector4.6.1.1