ESET® MAIL SECURITY FOR MICROSOFT EXCHANGE SERVER

Protect your users’ most exploited threat vector—their email

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mail Security for Microsoft Exchange Server

Provides an additional layer of security to organizations that want to prevent threats from ever reaching their users. Ensures multilayered security of the host itself with:

Checkmark icon

Antimalware

Checkmark icon

Antispam

Checkmark icon

Anti-phishing

Checkmark icon

Optional cloud sandbox analysis


Multilayered protection

The first layer works with our proprietary antispam technology, which filters spam messages with close to 100% accuracy as confirmed by third party testing. The second layer is our antimalware scanner, which detects suspicious attachments. An additional layer can be implemented in the form of a cloud sandbox with ESET Dynamic Threat Defense.

Scan found malware image

Robust quarantine management

When an email has been quarantined by ESET, the user generally receives a notification. The user can then either delete the email or release it.

However, administrators also receive frequent summary reports of all the emails that have been quarantined, and which users have released or deleted emails. The admin can change notification rules so that users do not receive notifications, thus giving the admin decision-making power over releasing or deleting suspicious emails. If a user is expecting an email that has been quarantined, he or she can request that the admin release it.

 

 

Proprietary technology

ESET Mail Security solutions use in-house developed antispam, anti-phishing and host server protection, combining machine learning, big data and human expertise into one award-winning mail security platform.

Use cases

PROBLEM

Ransomware tends to enter unsuspecting users’ mailboxes through email.

SOLUTION

  • ESET Mail Security evaluates the attachment to determine whether it is malicious, unknown or safe.
  • ESET Mail Security evaluates whether specific email rules were entered by an administrator to prevent certain attachment types or sizes from being sent to users.
  • If ESET Mail Security is unsure of the potential threat, it can forward the attachment to the additional solution, ESET Dynamic Threat Defense, for analysis.
  • Dynamic Threat Defense analyzes the sample in a cloud sandbox, then submits the result back to Mail Security within minutes.
  • If the file was found to be malicious, ESET Mail Security automatically destroys the email that contained the malicious content.

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

Antispam

ESET's proprietary award-winning engine prevents spam from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.

Antimalware

Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

Anti-phishing protection

Prevents users from accessing web pages known for phishing by parsing email subject lines and content to identify URLs. URLs are then compared against phishing database and rules to determine whether they're safe or malicious.

Hybrid Office 365 scanning

Supports businesses who utilize Microsoft Exchange in a hybrid setup.

Rules

ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.

Web-based quarantine

Emails are automatically provided to users about spam emails that were quarantined. Users then have the ability to log in and manage their own spam emails, rather than this task being the sole responsibility of the administrator.

ESET MAIL SECURITY FOR MICROSOFT EXCHANGE SERVER

Get started

We'll design a personalized offer to fit your requirements.

Or, you can purchase this product online as part of ESET security bundles. Learn more

Try before you buy

Download a free trial license with absolutely no commitment. 

System Requirements

ESET Mail Security is also available for

IBM Domino logo
Linux logo
Kerio logo

Looking for additional solutions?

Related enterprise-grade solutions

ESET Dynamic Endpoint Protection solution icon

ESET Dynamic Endpoint Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis

Related products and services

What IT pros are saying

"Runs better than ANY other AV I have EVER used, blocks the issues before the user can attempt to use the questionable files."

Read full review

"I enjoy the continuous protection, automatic updates, and comparably small size of this program in comparison to other options."

Read full review

"The things I enjoy most about their products is how light they run on my clients systems and how easily they are to manage and configure."

Read full review
ESET Endpoint Security is a leader in Endpoint Protection Suites on G2
Based on customer reviews, through G2 Crowd surveys, that asked ESET business customers to rate their experiences using ESET Endpoint Security.

Read honest reviews on Capterra from more than 300 ESET customers about their experiences using ESET and why they recommend our products.


"ESET is the best small footprint antivirus software out there."

Read full review

"Spend less time removing infections from endpoints by not getting them to begin with."

Read full review

"Strong antivirus defense along with ease of deployment to end users."

Read full review

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

Mitreblog

Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

As the wealth of cybercrime intelligence published by cybersecurity researchers increases every year, there is a parallel risk that this can become potentially unmanageable for IT administrators who...

we live security image

3 ways to browse the web anonymously

As concern about internet privacy grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although,...

Webinars

Internet of fakes: Protecting against a new era of threats and scams

Wednesday, January 29, 2020

Can you spot the differences between fake and real content? What about your employees?

Cybersecurity Trends 2020: What's Coming & How to Prepare

Wednesday, Dec. 18, 2019

Get a head start with expert insights from the ESET research team, based on their upcoming 2020 cyber trends report.

We Live Security blog

Microsoft exposed 250 million customer support records

Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection

Dating apps share personal data with advertisers, study says

Some of the most popular dating services may be violating GDPR or other privacy laws

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Renew or manage license

Log in or retrieve your password to manage your existing licenses.

Need assistance?

All ESET products include free technical support in your language.