Jump to content

filips

ESET Staff
  • Content Count

    138
  • Joined

  • Last visited

  • Days Won

    3

filips last won the day on July 10

filips had the most liked content!

Profile Information

  • Gender
    Not Telling
  • Location
    Slovakia

Recent Profile Visitors

1,487 profile views
  1. filips

    eset mail security

    Hi, you can create transport rules to block messages by subject or by message body, but you have to specify the blocked words manually
  2. I'm trying to see the advantages of installing ESET using the extension... When deploying infrastructure using Resource Manager templates, you can reference extensions to be deployed to a VM as part of the whole process. If you want to install to one machine, manual install may be easier. Extension management interface is not very fancy, e.g. when the extension needs to reboot after upgrade/uninstall, there is no way to indicate that. It will either wait or force reboot – what can be a surprising action for admin. Also the Azure Advisor says that there is no Endpoint Protection on the VM (said before upgraded to v7).. Detection of Endpoint protection is unrelated to whether the product was installed as extension or not. Currently, MS does not recognize ESET as Endpoint protection. Don't know why, we are trying to reach them. Now v7 is here and there is no way (that I can see) to use the Azure interface to upgrade Eset file security on the VM. Upgrade: Extension management system does not do major version upgrades. No way to do that automatically. Install: Currently, clean install of v7 can be done only via PowerShell, because we need to update the portal UI to reference new major version (it references v6 now). We are working on this with MS right now, but as it is handled via emails, it takes time.
  3. Hi Dean, We will add import/export options to lists in rules (just like in antispam filtering lists) - these options will be available after ERA configuration module update. In the meantime - what is your use case? It's also possible to export the configuration directly in product - this will give you an XML file. This file can be modified - e.g. you can remove everything except rules, modify the list and then import the rules on other machine etc. It looks like you are trying to do some antispam filtering - if you have problems with antispam detection rate, you can submit samples to ESET (https://support.eset.com/kb141/#spam) or contact customer care
  4. Hi, We managed to reproduce the issue - the problem is that Database scan task scheduled in policy is not created correctly. A workaround exists: When you create a scheduled Database scan task in ESMC, click edit and go through the wizard again. When you click finish the task should be saved correctly. The issue will be fixed in configuration module for ESMC
  5. Hi davidenco, thank you for your suggestion. We added this improvement to our backlog.
  6. Please ignore that sentence, of course you don't need Hyper-V
  7. There seems to be a problem when the database scan is scheduled in ESMC policy - we will investigate it I didn't know you were using ESMC - to schedule a scan from ESMC, you can use Client tasks/Server scan (https://help.eset.com/esmc_admin/70/en-US/dashboard.html?client_task_server_scan.html). But you have to enable sending of scan targets to ESMC first: https://help.eset.com/emsx/7.0/en-US/idh_config_era_targets.html This is the most up to date option and it gives you the ability to select mailboxes/public folders just like in EMSX.
  8. Hi davidenco, you can try enabling Diagnostic logging (Menu->Setup->Tools) for a minute and run the Database scan. Then check "Events" log to get more information.
  9. This issue should be fixed in ESET Mail Security for Microsoft Exchange Server version 7.0.10020.0
  10. I updated the answer - there was a problem with encoding of some characters...
  11. filips

    Mail security Office file with macro

    Hi Guillaume, [apart from using EDTD] to disable the rule for certain users, you can update the default rule with new condition. You could add "Sender is not one of {list of whitelisted senders}" or "Sender's IP address is not one of {list of whitelisted IPs}" etc. This shouldn't happen, but we need some diagnostic data to examine the issue - you could contact customer care for further assistance.
  12. Hi Richard, EMSX v7 has a "From header - display name" condition in transport rules so you can create a rule like this: Conditions: From header - display name contains one of {My User1, My User2..} Sender's IP address is not {list of my IPs} (or Internal message is false) Actions: log/reject/delete/quarantine
  13. Hi davidenco, The error in logs is caused by an exception while parsing "Received:" headers. We will address the issue in next hotfix of EMSX. Could you PM me a procdump file(s) capturing the exception? It would help us to track it down: procdump -ma -e 1 -f "nullreferenceexception" edgetransport.exe
  14. Hi, it looks like the mail server had limited connectivity to ESET antispam cloud services (already discussed here).
  15. Hi, unfortunately, this is not supported. Quarantine web access rights support only administration of whole quarantine and delegated access to one mailbox. Though you can assign the access rights to user group as well, you would still have to create one access right record for each mailing list. I filed an improvement to add delegation to domain/multiple mailboxes (e.g. wildcard support).
×