Jump to content

jadorwin

Members
  • Posts

    21
  • Joined

  • Last visited

About jadorwin

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    Belgium

Recent Profile Visitors

822 profile views
  1. This is an Eset problem. I have configured correctly Firefox and If I uninstall ESET everything is working perfectly and secure SNI is enabled (you can see that in the first screen capture). When ESET is installed and acting as an SSL proxy, then it's not working anymore.
  2. Description: Support Encrypted Client Hello (ECH) with SSL Detail: I would like that when "analyze SSL/TLS connection" is enabled and that the browser support ECH like Firefox, then ESET use ECH to connect to websites. Check https://www.cloudflare.com/ssl/encrypted-sni/ with and without ESET analyzing SSL/TLS connection.
  3. Description: Eset Mail Quarantine Report include all email from "additional access rights" in the web interface config section Detail: In the web interface, we can add additional access rights to a user. Can you add the possibility to take into account these rights for the email quarantine report (so that what's on the email is the same as what’s on the quarantine web interface).
  4. It's not easy to create a rule that always hit... If it was possible, I would have done it to reject the messages.... I will think about it.
  5. Hi, That’s strange. I have a rule in place like in the snapshot attached to this message but I still receive email in outlook with these headers: But you are right, in exchange log, the email address is in the RCPT TO: So why eset is not rejecting the email with the rule attached to this post ? To be clear, it's always when the email is in BCC in outlook that the rule is not working. Br,
  6. Description: Eset Mail Security recipient rule condition for bcc recipient Detail: When I create a "recipient rule condition" for a rule, it did not check in the bcc field. Can you add an option so that the "rule recipient condition" also applies to the content of the bcc header field ?
  7. Hi, When I create a "recipient rule condition" for a rule, it did not check in the bcc field. Is it normal ? If yes, can you add an option so that the "rule recipient condition" also applies to the content of the bcc header field ? Br,
  8. Hello, I confirm that I have the same problem. I never understood why a soft fail was interpreted by a fail at the level of ESET. I think there should be way to nuance the treatment of an SPF result (main configuration + rules) following a soft or hard fail.
  9. Hi, Is there a way to include in the user's quarantine report email all recipients for which the user has "delegate access" in the access rights of the web interface? Br,
  10. Hi, "Recommended settings" link is not working indeed. I confirm the answer from Marcos. I opened (firewall) communication to the spécific IPs (port 53535) in the antispam section for version 5 and higher (https://support.eset.com/kb332/#antispam) and the message have disapear shortly after (but not immediately). Br,
  11. Thanks for your quick answer. Could be great to have an improvement in this area for future release :)
  12. Hi, We are using ESET Mail Security v7 for Exchange. Is there a way to allow a user to manage the quarantine for a whole domain name (*@domain.com) ? We have a lot of mail domains with a lot of mailing lists and we can't create a "delegated access" for each mailing lists (and maintain efficiently the access rights). Br,
  13. Hi, All messages from "Humble Bundle <contact@mailer.humblebundle.com>" send from IP 52.40.63.36 are tag with a "SPF Fail" by ESET but if I check the IP with the SPF record (here for example: https://mxtoolbox.com/SuperTool.aspx?action=spf%3amailer.humblebundle.com%3a52.40.63.36&run=toolpage) the IP seems to be good for the SPF check. I have this kind of error for other "legitimate" sender. Br,
  14. Hi, When I reboot the server (Windows server 2016 + Exchange 2016) I have an error in ESET log : I have the last version of ESET Mail Security installed. Is it a problem (ESET seems to work) ? Br,
×
×
  • Create New...