Description
ESET Mail Security Microsoft Exchange Server
ESET Mail Security
Spam Filter
The spam filter works with our excellent analysis engine, which we are constantly improving and adapting. This way, ESET Mail Security ensures that spam and other unwanted emails don’t reach company mailboxes in the first place.
Phishing Protection
Prevents employees from accessing websites known to be phishing sites. Emails containing URLs to such sites are also automatically blocked.
Hybrid Office 365 Analysis
Protects companies that operate in hybrid mode with Microsoft Exchange.
Convenient Quarantine Management
If an item is moved to quarantine, the recipient receives a message and can—along with the responsible administrator—delete or release the corresponding email. Administrators also have the option to receive regular reports summarizing events that occurred in the quarantine area.
Unrivaled Speed
To avoid disrupting business processes, an email security product must operate reliably and quickly while also being exceptionally efficient. ESET Mail Security is based on a 64-bit engine, enabling even in-depth analysis of large amounts of data in the shortest possible time.
Malware protection:
ESET Mail Security offers the highest level of protection against suspicious or dangerous attachments thanks to its robust malware protection.
Rules system
: With a wide range of possible rules, administrators can specify exactly which emails are automatically filtered and what should be done with them.
Browser-based quarantine management:
If an item is moved to quarantine, the recipient receives a notification and can easily delete or release the corresponding email via their browser.
Cluster support:
ESET solutions can be interconnected to exchange configurations, notifications, graylist databases, and much more. Furthermore, Windows Failover Clusters and NLB are supported for convenient management of enterprise networks.
Flexible and scalable:
ESET Mail Security components can also be installed individually if needed. For daily work, certain objects or processes may be excluded from the analyses being accessed in order not to harm the speed and stability of the processes (for example, backups).
| Operating System: | |
| Included Applications: |





Reviews
There are no reviews yet.