M.K.
ESET Staff-
Posts
54 -
Joined
-
Last visited
-
Days Won
4
M.K. last won the day on September 4
M.K. had the most liked content!
About M.K.
-
Rank
Newbie
Profile Information
-
Location
Slovakia
Recent Profile Visitors
The recent visitors block is disabled and is not being shown to other users.
-
StefanoFereri reacted to a post in a topic: Spoofing check exclusions are ignored
-
Spoofing check exclusions are ignored
M.K. replied to StefanoFereri's topic in ESET Products for Windows Servers
Just to be sure - are those emails blocked by the Sender Spoofing protection? If yes, then the IP range should be added either to the Ignored IP list and marked as an infrastructure IP, or added to the List of my own IP addresses under Sender Spoofing protection section. -
ESET Mail Security - to add some more improvements
M.K. replied to SLV's topic in ESET Products for Windows Servers
Hi, #2 and #3 should be already supported in released products. Top level domains (e.g. ".click") are accepted in Blocked Senders list. IPv6 addresses are accepted as parameters in the IP condition in rules. We will update the tooltips and help page accordingly. As for the #1 - we are tracking this requirement in our backlog, but currently there is no target date. -
SLV reacted to a post in a topic: ESET Mail Security - to add new environment variables available in rule actions.
-
SLV reacted to a post in a topic: ESET Mail Security - to add some improvements
-
SLV reacted to a post in a topic: ESET Mail Security - to add some improvements
-
ESET Mail Security - to add some improvements
M.K. replied to SLV's topic in ESET Products for Windows Servers
Ad %FROMADDRESS%: we will add all missing expandable macros to rule actions in the upcoming feature release. Ad. Exceptions for conditions in rules: we track this feature in our backlog. It didn't have a very high priority compared to other requirements, as there is a workaround available for most cases and we didn't want to overcomplicate the current design of rules. It's possible we will re-prioritize it again in the future. Ad. Infected status for attachments blocked by rules - we are aware of this situation and are analyzing possible solutions. -
ESET Mail Security - to add some improvements
M.K. replied to SLV's topic in ESET Products for Windows Servers
Hello, the environment variable you mentioned should already work. Maybe the documentation hasn't been updated, but this is the list of currently supported macros (case insensitive): %ENVELOPESENDER% %ENVELOPEDOMAIN% %FROMADDRESS% %FROMDOMAIN% %REPLYTOADDRESS% %REPLYTODOMAIN% Ad #2 and #3 - will look at that. Ad #4 - all conditions should have a way how to define them also as a negation, i.e. "is" vs "is not", "contain" vs "doesn't contain" etc... Do you have some example where you can't define the rule now in a way that you want? -
Hi, once a rule has hit, by default no other rules are evaluated further. You can however add an action "Evaluate other rules" to any rule to continue with evaluation, so that possibly more rules can hit. If you refer to a situation when conditions for both (multiple) rules were true and you need to prioritize which action would be selected, the simplest solution is to change the order of rules, so that the rule with preferred action is on top.
-
How to remove tags from quarantined emails.
M.K. replied to Yafu Ji's topic in ESET Products for Windows Servers
Hi, currently it's not possible. You could write a market requirement for this. -
Mail security for Exchange: Quarantine management
M.K. replied to THG's topic in ESET Products for Windows Servers
Hi, a possible workaround is to switch the type of quarantine from "Local quarantine" to "Quarantine mailbox". That way you can access the quarantined emails also via Outlook/OWA/... and get access to the attachments before releasing them via ESET Mail Security. -
SLV reacted to a post in a topic: Mail Security - Rule Condition - Internal message and Outgoing message
-
SLV reacted to a post in a topic: RBL and DNSBL advanced antispam protection on Mail Security for Exchange
-
Peter Randziak reacted to a post in a topic: RBL and DNSBL advanced antispam protection on Mail Security for Exchange
-
Hi, when there is a limit on number of IP addresses from Received headers set by user, they are counted from the most recent (appears on top). Local IP addresses and addresses on Ignore list are skipped i.e. not counted towards the limit. Note: besides Received headers, we also acquire the IP address of the connecting server from the SMTP session - this address is always checked against our cloud blacklists/whitelists, independent on whether it is part of Received headers or not.
-
Hi, Ad. Internal: messages are consider as internal if the SMTP connection is not marked as external by Exchange server, or when the email comes from the internal mailbox, or when is submitted via local pickup. Ad. Outgoing: this is based on the email recipients categories. EMSX checks all recipients of the email to determine whether they are located in the same organization, in different organization, or are marked by Exchange as external.
-
Which standard RBLs are using in ESET Mail Security?
M.K. replied to Daenni's topic in ESET Products for Windows Servers
Hi, ESET Mail Security doesn't use any third party RBL by default, only our own cloud service. -
How to get Mailheader from quarantined or Spammail?
M.K. replied to Daenni's topic in ESET Products for Windows Servers
Hi Daenni, yes in Mail Quarantine you can check the original headers of quarantined emails, in the Details window.