User manual ESET MAIL SECURITY 4

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ESET MAIL SECURITY 4. We hope that this ESET MAIL SECURITY 4 user guide will be useful to you.


ESET MAIL SECURITY 4 : Download the complete user guide (2281 Ko)

You may also download the following manuals related to this product:

   ESET MAIL SECURITY 4 V4.2 FOR MICROSOFT EXCHANGE SERVER (2204 ko)
   ESET MAIL SECURITY 4 FOR MICROSOFT EXCHANGE SERVER 2000-2003-2008 (2093 ko)
   ESET MAIL SECURITY 4 FOR MICROSOFT EXCHANGE SERVER FOR WINDOWS SERVER 2000-2003-2008 (2093 ko)

Manual abstract: user guide ESET MAIL SECURITY 4

Detailed instructions for use are in the User's Guide.

[. . . ] ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft® Windows® Server 2000 / 2003 / 2008 ESET Mail Security Copyright © 2010 by ESET, spol. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without permission in writing from the author. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www. eset. eu/support Customer Care North America: www. eset. com/support REV. [. . . ] We strongly recommend that you avoid assigning the Temporary folder to removable media such as floppy disk, USB, DVD, etc. NOTE: You can use system variables (e. g. , %SystemRoot% \TEMP) when configuring Performance settings. 4. 1. 5 Transport Agent Enter the desired Recipient's email address and the desired Quarantine email address in the appropriate fields. If you want to delete an email message addressed to a recipient who does not have a quarantine rule applied, you can select the Delete message option in the Message intended for non-existing message quarantine pull-down menu. In this section, you can set up automatic startup of the transport agent as well as the agent loading priority. On Microsoft Exchange Server 2007 and later, it is only possible to install a transport agent if the server is in one of two roles: Edge Transport or Hub Transport. NOTE: Transport agent is not available in Microsoft Exchange Server 5. 5 (VSAPI 1. 0). In the Agent priority setup menu, you can set the priority of ESET Mail Security agents. The agent priority number range depends on the version of Microsoft Exchange Server (the lower the number, the higher the priority). Write spam confidence level (SCL) to the header of 15 scanned messages based on spam score ­ SCL is a normalized value assigned to a message that indicates the likelihood of the message being spam (based on the characteristics of the message header, its subject, content, etc. ). A rating of 0 indicates that the message is highly unlikely to be spam, while a rating of 9 indicates that the message is very likely spam. SCL values can be processed further by the Microsoft Exchange Server's Intelligent Message Filter (or Content Filter Agent). For additional information please refer to the Microsoft Exchange Server documentation. The When deleting messages, send SMTP reject response option: If unchecked, the server sends an OK SMTP response to the sender's Mail Transfer Agent (MTA) in the format `250 2. 5. 0 ­ Requested mail action okay, completed' and then performs a silent drop. If checked, an SMTP reject response is sent back to the sender's MTA. You can type a response message in the following format: Primary Compleme response ntary code status code 250 2. 5. 0 451 550 4. 5. 1 5. 5. 0 Description 4. 2. 1 Actions In this section you can choose to append a scan task ID and/or scan result information to the header of scanned messages. 4. 2. 2 Alerts and notifications ESET Mail Security allows you to append text to the original subject or body of infected messages. Requested mail action okay, completed Requested action aborted: local error in processing Requested action not taken: mailbox unavailable Warning: Incorrect syntax of the SMTP response codes can lead to malfunctioning of program components and decrease effectiveness. NOTE: You can also use system variables when configuring SMTP Reject Responses. 4. 2 Antivirus and antispyware settings You can enable antivirus and antispyware mail server protection by selecting the Enable antivirus and antispyware mail server protection option. Note that antivirus and antispyware protection is turned on automatically after every service/computer restart. By enabling Add to the subject of infected messages, ESET Mail Security will append a notification tag to the email subject with the value defined in the Template added to the subject of infected messages text field (by default [virus %VIRUSNAME%]). The above-mentioned modifications can automate infected-email filtering by filtering email with a specific subject (if supported in your email client) to a separate folder. NOTE: You can also use system variables when adding a template to the message subject. 16 4. 2. 3 Performance In this section, you can set the number of ThreatSense scan engines that should be used for virus scanning. More ThreatSense scan engines on multiprocessor machines can increase the scan rate. (scanning is performed after each virus signature database update), we recommend using scheduled scanning outside working hours. Scheduled background scanning can be configured via a special task in the Scheduler/Planner. When you schedule a Background scanning task you can set the launch time, the number of repetitions and other parameters available in the Scheduler/Planner. After the task has been scheduled, it will appear in the list of scheduled tasks and, as with the other tasks, you can modify its parameters, delete it or temporarily deactivate the task. [. . . ] A: The decision to scan all messages immediately or at the user's attempt to access a message depends on several factors, including server load, CPU time required to scan all messages in bulk and the total number of messages. The Microsoft Exchange Server will scan every message before it reaches the client's inbox. Q: Why did the rule counter increase by more than one after receiving a single message?A:The rules are checked against a message when it is processed by transport agent (TA) or VSAPI. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ESET MAIL SECURITY 4




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ESET MAIL SECURITY 4 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.