ESET MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER 2000-2003-2008 Instrukcja Instalacji

Przeglądaj online lub pobierz Instrukcja Instalacji dla Oprogramowanie antywirusowe ESET MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER 2000-2003-2008. ESET MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER 2000-2003-2008 Installation manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - ESET MAIL SECURITY

ESET MAIL SECURITY FOR MICROSOFT EXCHANGE SERVER Installation Manual and User Guide Microsoft® Windows® Server 2000 / 2003 / 2008 / 2008 R2 / 2012C

Strona 2

10After entering your Username and Password, click Next to proceed to Configure your Internet connection.If you use a proxy server, it must be correct

Strona 3 - Contents

1004.6.2 User Interface and application usageFor clarity the Main window is divided into four major sections – Program Controls located on the top o

Strona 4 - Glossary5

101DetailThis setting influences the information displayed in the Main window to make the information easier to work with.In "Basic" mode, y

Strona 5 - 1. Introduction

102Network connectionsThe Description window contains a list of processes and applications communicating over the network using theprotocol selected i

Strona 6 - 1.4 Types of protection

1036unknown, risk level 6-9 items are displayed7, Brisky, risk level 7-9 items are displayed8risky, risk level 8-9 items are displayed9risky, risk lev

Strona 7 - 1.5 User interface

1044.6.2.3 CompareThe Compare feature allows the user to compare two existing logs. The outcome of this feature is a set of items notcommon to both

Strona 8 - 2. Installation

1054.6.3 Command line parametersESET SysInspector supports generating reports from the command line using these parameters:/gengenerate a log direct

Strona 9 - 2.2 Custom Installation

1064.6.4.2 Structure of the Service scriptIn the first line of the script’s header, you can find information about the Engine version (ev), GUI vers

Strona 10

10705) DNS server entriesThis section contains information about the current DNS server configuration.Example:05) DNS server entries:+ 204.74.105.85-

Strona 11 - 2.3 Terminal Server

108Example:09) Critical files:* File: win.ini- [fonts]- [extensions]- [files]- MAPI=1[...]* File: system.ini- [386Enh]- woafont=dosapp.fon- EGA80WOA.F

Strona 12

109How does ESET SysInspector evaluate the risk posed by a particular object ?In most cases, ESET SysInspector assigns risk levels to objects (files,

Strona 13

11NOTE: After a program component update, a restart is usually required. We recommend selecting the Neverrestart computer option. The latest component

Strona 14

110Below is a detailed description of the available options:Compare – Allows you to compare two existing logs. It is suitable if you want to track cha

Strona 15 - 2.8 License

1114.7.3 Target selectionIn addition to CD/DVD/USB, you can choose to save ESET SysRescue in an ISO file. Later on, you can burn the ISOimage on CD/

Strona 16

112Security solution installed on the computer on which the ESET SysRescue CD is run.4.7.4.3 Advanced settingsThe Advanced tab lets you optimize the

Strona 17

1134.7.5 Working with ESET SysRescueFor the rescue CD/DVD/USB to work effectively, you must start your computer from the ESET SysRescue bootmedia. B

Strona 18

114The User interface features also include the option to password-protect the ESET Mail Security setup parameters.This option is located in the Setti

Strona 19 - 3.1 General settings

1154.8.1 Alerts and notificationsThe Alerts and notifications setup section under User interface allows you to configure how threat alerts andsystem

Strona 20

1164.8.2 Disable GUI on Terminal ServerThis chapter describes how to disable GUI of ESET Mail Security running on Windows Terminal Server for userse

Strona 21

117It shows you some basic examples how to use eShell with Syntax, Prefix, Command path, Abbreviated forms,Aliases, etc. This is basically a quick gui

Strona 22

118These are the prefixes that eShell lets you use. A command may or may not support any of the prefixes: GET - returns current setting/status

Strona 23

119ArgumentAn argument an action which is performed for a particular command. For example, command CLEANLEVEL can beused with following arguments:

Strona 24

12installed).To perform a manual upgrade:1. In-place upgrade: Install the latest version over your existing version of ESET Mail Security by following

Strona 25

120will display SYNTAX, OPERATIONS, ARGUMENTS and ALIASES for the command with a short description for each.Command historyeShell keeps history of pre

Strona 26

121PASSWORDNormally, to execute password-protected commands, you are prompted to type in a password for security reasons.This applies to commands such

Strona 27

122 get - Show antivirus protection status set - Disable/Enable antivirus protection restore - Restores default settingsARGUMENTS

Strona 28

123newly-detected threats. This information may include a sample or copy of the file in which the threat appeared, thepath to that file, the filename,

Strona 29

1244.11.1 Suspicious filesThe Suspicious files tab allows you to configure the manner in which threats are submitted to ESET‘s Threat Lab foranalysi

Strona 30

1254.11.2 StatisticsThe ThreatSense.Net Early Warning System collects anonymous information about your computer related to newlydetected threats. Th

Strona 31

1264.11.3 SubmissionYou can select how files and statistical information will be submitted to ESET. Select the By means of RemoteAdministrator or di

Strona 32

1274.12 Remote administrationESET Remote Administrator (ERA) is a powerful tool to manage security policy and to obtain an overview of theoverall se

Strona 33 - 3.2.2 Actions

1284.13 LicensesThe Licenses branch allows you to manage the license keys for ESET Mail Security and other ESET products such asESET Mail Security,

Strona 34

1295. Glossary5.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.5.1.1 Viru

Strona 35 - 3.3 Antispam protection

132.6 Exchange Server 2013 RolesThe architecture of Exchange Server 2013 is different from previous versions of Microsoft Exchange. In Exchange2013

Strona 36

130Backdoor – An application which communicates with remote attackers, allowing them to gain access to asystem and to take control of itKeylogger – (k

Strona 37

131If a file is detected as spyware on your computer, it is advisable to delete it, since there is a high probability that itcontains malicious code.5

Strona 38

1325.2.1 AdvertisementsInternet advertising is one of the most rapidly growing forms of advertising. Its main marketing advantages areminimal costs

Strona 39

1335.2.4.1 RulesIn the context of Antispam solutions and email clients, rules are tools for manipulating email functions. Theyconsist of two logical

Strona 40

1345.2.4.5 Server-side controlServer-side control is a technique for identifying mass spam based on the number of received messages and thereactions

Strona 41

14products within a cluster. You can avoid this by using a policy in ERA. A policy is very similar to a standardConfiguration Task – it sends the con

Strona 42

152.8 LicenseA very important step is to enter the license file for ESET Mail Security for Microsoft Exchange Server. Without it,email protection on

Strona 43

16If the number of mailboxes in your active directory exceeds your license count a message will be entered into yourMicrosoft Exchange Server log read

Strona 44

172.9 Post-Installation ConfigurationThere are several options that have to be configured after the product installation.Antispam protection setupTh

Strona 45

18When evaluating the message source, the method takes into account the configurations of the Approved IPaddresses list, the Ignored IP addresses list

Strona 46

193. ESET Mail Security - Microsoft Exchange Server protectionESET Mail Security provides significant protection for your Microsoft Exchange Server. T

Strona 47

ESET MAIL SECURITYCopyright ©2013 by ESET, spol. s r.o.ESET Mail Security was developed by ESET, spol. s r.o.For more information visit www.eset.com.A

Strona 48

20normalized value assigned to a message that indicates the likelihood of the message being spam (based on thecharacteristics of the message header, i

Strona 49

21Add... - adds a new ruleEdit... - modifies an existing ruleRemove - removes selected ruleClear - clears the rule counter (the Hits column)Move up -

Strona 50

22Examples of entering conditions:By target mailbox:smithBy email sender: [email protected] email recipient:“J.Smith” or “[email protected]”By email subje

Strona 51

23The last step in the new rule creation wizard is to name each created rule. You can also add a Rule comment. Thisinformation will be stored in the M

Strona 52

243.1.4 Message quarantineThe Message quarantine is a special mailbox defined by the system administrator to store potentially infectedmessages and

Strona 53 - 3.4 FAQ

25Message quarantine by recipient - by using this option, you can define message quarantine mailboxes formultiple recipients. Every quarantine rule ca

Strona 54

263.2 Antivirus and antispyware settingsYou can enable antivirus and antispyware mail server protection by selecting the Enable antivirus andantispy

Strona 55

273.2.1.1 Virus-Scanning Application Programming Interface (VSAPI)Microsoft Exchange Server provides a mechanism to make sure that every message com

Strona 56

28Server decides whether a background scan will run or not, based on various factors, such as the current systemload, the number of active users, etc.

Strona 57

293.2.1.1.3 Microsoft Exchange Server 2003 (VSAPI 2.5)This version of Microsoft Exchange Server includes VSAPI version 2.5.If you uncheck the Enable

Strona 58

Contents...5Introduction1...5What

Strona 59

30You can set Attachment deletion method to:Truncate file to zero length – ESET Mail Security truncates the attachment to zero size and lets the recip

Strona 60

31Enabling the Scan RTF message bodies option activates scanning of RTF message bodies. RTF message bodiesmay contain macro viruses.NOTE: Plain text e

Strona 61

323.2.1.1.5 Transport AgentIn this section you can enable or disable antivirus and antispyware protection by the transport agent. For MicrosoftExcha

Strona 62

333.2.2 ActionsIn this section you can choose to append a scan task ID and/or scan result information to the header of scannedmessages.3.2.3 Alert

Strona 63

34Add to the body of scanned messages: offers three options:Do not append to messagesAppend to infected messages onlyAppend to all scanned messages (t

Strona 64

353.3 Antispam protectionIn the Antispam protection section, you can enable or disable spam protection for the installed mail server,configure antis

Strona 65

363.3.1 Microsoft Exchange Server3.3.1.1 Transport AgentIn this section you can set up options for spam protection using the transport agent.NOTE:

Strona 66

37that is not from a recognized sender. A legitimate server will try to resend the message after a delay. Spam serverswill typically not attempt to re

Strona 67

383.3.2 Antispam engineIn here, you can configure Antispam engine parameters. You can do so by clicking on Setup... button. A windowwill open where

Strona 68

393.3.2.1.1.1 SamplesUse cache memory - Enables usage of a fingerprint cache (Enabled by default).Turn on MSF - Allows for use of an alternate finge

Strona 69

...66On-demand computer scan4.1.4...

Strona 70

40Number of scanned messages before writing them to disk: - While training, the antispam engine will process aconfigurable amount of messages before w

Strona 71

41Specify Index: and Weight: values.3.3.2.1.3.2 List of downloaded rule filesSet rule file indexes which should be downloaded to disk. Use Add, Edit

Strona 72

423.3.2.1.4.1 Allowed sendersWhitelisted senders and domains can contain an email address or a domain. Addresses are entered in the format"mail

Strona 73

433.3.2.1.4.7 Ignored domainsThis option allows you to specify body domains which should always be excluded from the DNSBL checks andignored.3.3.2.1

Strona 74

443.3.2.1.5.2 LBL (Last Blackhole List)LBL servers: - The Last Connecting IP is queried against the LBL server. You can specify a different DNS look

Strona 75

453.3.2.1.7 ScoreTurn on score history - Enables tracking of historical scores for repeat senders.Stop analysis when SPAM score threshold has been r

Strona 76

46engine's internal LiveFeed cache. The option is specified in seconds. For those LiveFeed responses whose TTL valueis less than specified minimu

Strona 77

47ArabicarByelorussianbeBulgarianbgCatalancaCzechcsWelshcyDanishdaGermandeGreekelEnglishenEsperantoeoSpanishesEstonianetBasqueeuPersianfaFinnishfiFren

Strona 78 - 4.2 Updating the program

483.3.2.1.11.2 List of home countriesSet countries which you consider as home countries and from which you prefer to receive messages. To add a home

Strona 79

49CÔTE D’IVOIRECICROATIAHRCUBACUCYPRUSCYCZECH REPUBLICCZDENMARKDKDJIBOUTIDJDOMINICADMDOMINICAN REPUBLICDOECUADORECEGYPTEGEL SALVADORSVEQUATORIAL GUINE

Strona 80

51. IntroductionESET Mail Security 4 for Microsoft Exchange Server is an integrated solution that protects mailboxes from varioustypes of malware cont

Strona 81

50KUWAITKWKYRGYZSTANKGLAO PEOPLE’S DEMOCRATIC REPUBLICLALATVIALVLEBANONLBLESOTHOLSLIBERIALRLIBYAN ARAB JAMAHIRIYALYLIECHTENSTEINLILITHUANIALTLUXEMBOUR

Strona 82

51RÉUNIONREROMANIARORUSSIAN FEDERATIONRURWANDARWSAINT HELENASHSAINT KITTS AND NEVISKNSAINT LUCIALCSAINT PIERRE AND MIQUELONPMSAINT VINCENT AND THE GRE

Strona 83

52VIRGIN ISLANDS, USVIWALLIS AND FUTUNAWFWESTERN SAHARAEHYEMENYEZAIRE (CONGO, THE DEMOCRATICREPUBLIC OF THE)CDZAMBIAZMZIMBABWEZW3.3.2.1.11.3 List of

Strona 84

533.3.3 Alerts and notificationsEach email scanned by ESET Mail Security and marked as spam can be flagged by appending a notification tag tothe ema

Strona 85

54Q: Is it possible to add a notification tag text via VSAPI to each scanned message, in the same manner as theTransport agent?A: Adding text to messa

Strona 86

55- deselect the check box Write spam score to the header of scanned messages- navigate to Alerts and notifications under Antispam protection- define

Strona 87

564. ESET Mail Security - Server protectionWhile providing Microsoft Exchange Server protection, ESET Mail Security has all of the necessary tools to

Strona 88 - 4.3 Scheduler

574.1.1.1.1 Media to scanBy default, all types of media are scanned for potential threats.Local drives – Controls all system hard drivesRemovable me

Strona 89

584.1.1.3 When to modify real-time protection configurationReal-time protection is the most essential component of maintaining a secure system. Ther

Strona 90 - 4.4 Quarantine

59If Real-time protection does not detect and clean infiltrationsMake sure that no other antivirus programs are installed on your computer. If two rea

Strona 91

61.3 Methods usedTwo independent methods are used to scan email messages:Mailbox scanning via VSAPIMessage filtering on the SMTP server level1.3.1

Strona 92 - 4.5 Log files

604.1.2.1.1 CompatibilityCertain email programs may experience problems with POP3 filtering (e.g., if receiving messages with a slowInternet connect

Strona 93

614.1.2.2 Integration with email clientsIntegration of ESET Mail Security with email clients increases the level of active protection against malici

Strona 94

624.1.2.2.1 Appending tag messages to email bodyEach email scanned by ESET Mail Security can be marked by appending a tag message to the subject or

Strona 95

634.1.3 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the mainmedium fo

Strona 96

644.1.3.1.1 Address managementThis section enables you to specify HTTP addresses to block, allow or exclude from checking. The buttons Add...,Edit..

Strona 97

654.1.3.1.2 Active modeESET Mail Security also contains the Web browsers feature, which allows you to define whether the givenapplication is a brows

Strona 98

66Active mode is useful because it examines transferred data as a whole. If it is not enabled, communication ofapplications is monitored gradually in

Strona 99 - 4.6 ESET SysInspector

674.1.4.1 Type of scanTwo types of On-demand computer scan are available. Smart scan quickly scans the system with no need forfurther configuration

Strona 100

684.1.4.2 Scan targetsThe Scan targets drop-down menu allows you to select files, folders and devices (disks) to be scanned for viruses.By profile s

Strona 101

694.1.4.4 Command LineESET Mail Security’s antivirus module can be launched via the command line – manually (with the “ecls” command)or with a batch

Strona 102

71.4.3 Application of user-defined rulesProtection based on user-defined rules is available for scanning with both the VSAPI and the transport agent

Strona 103

70Methods:– adwarescan for Adware/Spyware/Riskware– no-adwaredo not scan for Adware/Spyware/Riskware– unsafescan for potentially unsafe applications–

Strona 104

714.1.5 PerformanceIn this section, you can set the number of ThreatSense scan engines that will be used for virus scanning. MoreThreatSense scan en

Strona 105

72Block communication that uses the certificate – Terminates connection to the site that uses the certificate.4.1.6.1.1 Trusted certificatesIn addit

Strona 106

734.1.7.1 Objects setupThe Objects section allows you to define which computer components and files will be scanned for infiltrations.Operating memo

Strona 107

74consent for installation. If they are present on your computer, your system behaves differently (compared to thestate before their installation). Th

Strona 108

75to select the correct action automatically, the program will offer a choice of follow up actions. The choice offollow-up actions will also be displa

Strona 109

764.1.7.5 LimitsThe Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned:Maximum object size

Strona 110 - 4.7 ESET SysRescue

774.1.8 An infiltration is detectedInfiltrations can reach the system from various entry points; webpages, shared folders, via email or from removab

Strona 111

784.2 Updating the programRegular updating of ESET Mail Security is the basic premise for obtaining the maximum level of security. TheUpdate module

Strona 112

794.2.1 Update setupThe update setup section specifies update source information such as the update servers and authentication datafor these servers

Strona 113 - 4.8 User interface options

82. InstallationAfter purchasing ESET Mail Security, the installer can be downloaded from ESET’s website (www.eset.com) as an .msi package.Please note

Strona 114

804.2.1.1 Update profilesUpdate profiles can be created for various update configurations and tasks. Creating update profiles is especiallyuseful fo

Strona 115

814.2.1.2.1 Update modeThe Update mode tab contains options related to the program component update.In the Program component update section, three o

Strona 116 - 4.9 eShell

824.2.1.2.2 Proxy serverIn ESET Mail Security, proxy server setup is available in two different sections within the Advanced Setup tree.First, proxy

Strona 117

83Select the Do not use proxy server option to specify that no proxy server will be used to update ESET Mail Security.The Connection through a proxy s

Strona 118

844.2.1.2.3 Connecting to the LANWhen updating from a local server with an NT-based operating system, authentication for each networkconnection is r

Strona 119

854.2.1.2.4 Creating update copies - MirrorESET Mail Security allows you to create copies of update files which can be used to update other workstat

Strona 120

864.2.1.2.4.1 Updating from the MirrorThere are two basic methods of configuring the Mirror – the folder with update files can be presented as a sha

Strona 121

87the other computer. To specify authentication data, open ESET Mail Security Advanced Setup (F5) and click the Update branch. Click the Setup... butt

Strona 122 - 4.11 ThreatSense.Net

884.3 SchedulerScheduler is available if Advanced mode in ESET Mail Security is activated. Scheduler can be found in the ESET MailSecurity main menu

Strona 123

894.3.2 Creating new tasksTo create a new task in Scheduler, click the Add... button or right-click and select Add... from the context menu.Five typ

Strona 124

9Enter the Username and Password, which you received after the purchase or registration of the product, into thecorresponding fields. If you do not cu

Strona 125

904.4 QuarantineThe main task of quarantine is to safely store infected files. Files should be quarantined if they cannot be cleaned, ifit is not sa

Strona 126

914.4.3 Submitting file from QuarantineIf you have quarantined a suspicious file that was not detected by the program, or if a file was incorrectly

Strona 127 - 4.12 Remote administration

924.5 Log filesLogs store information about important events: detected infiltrations, logs from the on-demand scanner, logs fromthe resident scanner

Strona 128 - 4.13 Licenses

93AntispamAll messages categorized by the ESET Mail Security as spam or probable spam are recorded here.Columns description:Time – time of entry into

Strona 129 - 5. Glossary

94PhishMessage contains text that is typical to phishing messages.ReplicaMessage contains text that is typical for a category of spam oriented atoffer

Strona 130

95GreylistingAll messages that have been evaluated using the greylisting method are recorded in this log.Columns description:Time – time of entry into

Strona 131 - 5.2 Email

96On-demand computer scanThe scanner log stores information about manual or planned scan results. Each line corresponds to a singlecomputer control. I

Strona 132

97Record types: - Lets you choose what type of records to show. You can choose one particular record type, multipletypes at the same time, or have all

Strona 133

98records will be omitted.Look in columns: - Select what columns will be taken into account when searching. You can check one or morecolumns to be use

Strona 134

994.6 ESET SysInspector4.6.1 Introduction to ESET SysInspectorESET SysInspector is an application that thoroughly inspects your computer and displ

Komentarze do niniejszej Instrukcji

Brak uwag