ESET Mail Security Microsoft Exchange Server
Mail Security
Spam filter
- The spam filter works with our excellent scanning engine, which we are constantly improving and adapting. In this way, ESET Mail Security ensures that spam and other unwanted mail do not reach company mailboxes in the first place.
Phishing Protection
- Prevents employees from accessing websites known to be phishing sites. Emails containing URLs to such sites are also automatically blocked.
Hybrid Office 365 Scan
- Protects organizations that are hybrid with Microsoft Exchange.
Convenient quarantine management
- If an item is moved to quarantine, the recipient receives a message and can – as well as the responsible administrator – delete or release the corresponding email. Administrators also have the option of receiving regular reports summarizing what has happened in the quarantine area.
Unmatched speed
- In order not to hinder business processes, a mail security product must work stably and quickly and at the same time be particularly powerful. ESET Mail Security is based on a 64-bit engine that enables even deep scans of large amounts of data to be completed in the shortest possible time.
Malware protection
- ESET Mail Security offers the highest level of security against dubious or dangerous mail attachments thanks to powerful malware protection.
Rule system
- Thanks to a wide range of possible rules, administrators can specify exactly which e-mails are automatically filtered and what should be done with them.
Quarantine management via browser
- If an item is moved to quarantine, the recipient receives a message and can easily delete or release the corresponding e-mail via the browser.
Cluster support
- ESET solutions can be interconnected to share configurations, notifications, greylist databases, and more. In addition, Windows Failover Clusters and NLB clusters are supported to conveniently manage enterprise-sized networks.
Flexible and scalable
- The components of ESET Mail Security can be installed individually if required. For daily work, certain objects or processes can be excluded from on-access scans so as not to impair the speed and stability of processes (e.g., backups.)