Jump to content

Chadh

Members
  • Posts

    75
  • Joined

  • Last visited

  • Days Won

    3

Chadh last won the day on December 3 2014

Chadh had the most liked content!

About Chadh

  • Rank
    Newbie
    Newbie

Profile Information

  • Gender
    Not Telling
  • Location
    USA

Recent Profile Visitors

846 profile views
  1. Hello DanAvni, It is not possible to exempt an address or domain from one particular type of antispam detection (i.e. reputation checking). Exemptions in the Mail Security Allowed Senders list or the Exchange Safe Senders list will apply for all antispam module checking. You can adjust the sensitivity of the DNSBL and RBL checking, however THIS IS NOT ADVISED. This will affect all email that is scanned by Mail Security. For steps on this process, please see below: Open ESET Mail Security by clicking Start -> All Programs -> ESET -> ESET Mail Security -> ESET Mail Security. Press F5 on your keyboard to open Setup. Expand Antispam protection, click Antispam engine and then click Setup. Click Verification -> DNSBL. Adjust the DNSBL verification sensitivity, depending on your needs. If the spam score of the email is already greater than the "high" value, then only those DNSBL servers which can bring score below "high" value are queried. If the spam score of the email is already less than the "low" value, then only those DNSBL servers which can bring score above "low" value are queried. If the spam score of the email is already between "low" and "high", then all DNSBL servers are queried. Click OK, then click OK again to save your changes. Thank you, ChadH
  2. Hello Ted, Please ensure there is no database in your existing SQL instance with the name “era_db” (without the quotes). The Remote Administrator installation process will automatically create a new database. Thank you, ChadH
  3. Hello wind-e, As of now, there is no way to run the installation of Endpoint Antivirus 6 with AV Remover silently. Thank you, ChadH
  4. Hello theodolus, The management password is the password specified in Step 6 of the Virtual Appliance deployment process described in Chapter 3.3 of the ERA v6 manual. Step 7 has a screenshot with the password box highlighted. Please ensure this password is configured, and try the deployment again. Thank you, ChadH
  5. Hello hmatthews, If you encounter this error, you will need to ensure your existing SQL instance is listening on port 1433. To enable the instance to listen on port 1433, please use the following steps: On the Start menu, point to All Programs, point to Microsoft SQL Server, point to Configuration Tools, and then click SQL Server Configuration Manager. Navigate to SQL Server Network Configuration -> Protocols for %YOUR_INSTANCE_NAME% (the default is MSSQLServer or SQLEXPRESS) Double-click the TCP/IP protocol Locate the Enabled field and change the drop-down box to Yes Select the IP Addresses tab Navigate to the IPAll section In the IPAll section, delete any information in the field "TCP Dynamic Ports" In the IPAll section, change the field for TCP Port to 1433 Click OK Select the SQL Server Services entry in the list on the left In the pane on the right, right-click SQL Server (%YOUR_INSTANCE_NAME%) and select Restart Thank you, ChadH
  6. Hello soundman87, Thank you for posting this answer. I have reformatted and expanded the steps you outlined.If you encounter this error, you will need to ensure your existing SQL instance is listening on port 1433. To enable the instance to listen on port 1433, please use the following steps: On the Start menu, point to All Programs, point to Microsoft SQL Server, point to Configuration Tools, and then click SQL Server Configuration Manager. Navigate to SQL Server Network Configuration -> Protocols for %YOUR_INSTANCE_NAME% (the default is MSSQLServer or SQLEXPRESS) Double-click the TCP/IP protocol Locate the Enabled field and change the drop-down box to Yes Select the IP Addresses tab Navigate to the IPAll section In the IPAll section, delete any information in the field "TCP Dynamic Ports" In the IPAll section, change the field for TCP Port to 1433 Click OK Select the SQL Server Services entry in the list on the left In the pane on the right, right-click SQL Server (%YOUR_INSTANCE_NAME%) and select Restart Thank you, ChadH
  7. Hello DocTonza, “Non-specific spam indicator” is the designation used for emails that are detected as spam by the Mail Security anti-spam heuristics. There is no way to adjust this detection directly. To address this issue, please ensure you are on the latest version of ESET Mail Security. For your reference on this procedure, please see this ESET Knowledgebase article. If Mail Security is still automatically assigning a score of 50 to all emails with a signature, please adjust the automatic configuration for Mail Security. To change Mail Security’s automatic configuration, please follow the steps below: Open ESET Mail Security by clicking Start -> All Programs -> ESET -> ESET Mail Security -> ESET Mail Security. Press F5 on your keyboard to open Setup. Expand Antispam protection, click Antispam engine and then click Setup. Click Options, and then on the right-hand side of the window, change the value for "Automatic configuration" to "Focus on minimizing FP". Click OK, then click OK again to save your changes. Thank you, ChadH
  8. Hello paulschnack, Please review the following ESET Knowledgebase articles to see if they resolve your issue: Is ESET Mail Security for Microsoft Exchange Server blocking my email? Sending and receiving email is slow on my Microsoft Exchange Server with ESET Mail Security for Microsoft Exchange Server installed How does Antispam scoring and email filtering work in ESET products? Thank you, ChadH
  9. Hello mvinoth, Per our user manual for ESET File Security for Linux: For your reference, please see Section 3 in the user manual. You can download a copy of the user manual at the following link: ESET FILE SECURITY - Installation Manual and User Guide Thank you, ChadH
  10. Hello TySu, ESET Mail Security for Linux is licensed per mailbox. For more information, please contact your local ESET Partner. You can find the contact information for the ESET partner in your country on this page. Thank you, ChadH
  11. Hello UnDocumented, Replication sounds like a great option to ensure you can manage both of your sites from one Remote Administrator (ERA) server. For directions on configuring replication, please click or copy/paste the following ESET Knowledgebase article into your web browser: How do I configure ESET Remote Administrator server replication? Please designate one of your ERA servers to be the parent and the other ERA server will be the Child server. If you have any questions, please let us know. Thank you, ChadH
  12. Hello sos4eset, ESET File Security must be uninstalled prior to installing ESET Mail Security. Mail Security will protect both your Exchange server and the Operating System that is running it. Think of Mail Security as ESET File Security + Exchange scanning. With regards to the licenses, Mail Security and File Security have their own unique licenses. Please contact the company you purchased through or ESET Sales for more information regarding licenses. Please contact your local ESET Partner, you can find the contact information for the ESET partner in your country on this page. Mail Security can be installed on any Exchange server node that is running a Transport Agent. Remote Administrator can be installed on any system. It is independent of any other ESET product. Thank you, ChadH
  13. Hello cesareset, This forum is English only. Even if you don't speak English, try using Google Translate. Even if English translation is not perfect, there's a good chance we will understand the point. Thank you, ChadH
  14. Hello Bastien, ESET File Security will attempt to write logs using the syslog daemon by default. In some systems, the daemon is configured to write these logs to /var/log. To correct this issue, you have three options: Ensure there is enough free space for /var by deleting items or allocating more space. Adjust the destination for the logs written by the syslog daemon, see the man page for syslogd and the man page for syslog.conf. Adjust the syslog facility used by File Security and ensure that facility is configured to write to a different location. To do this, please follow the steps below: Edit the configuration for File Security, located here: /etc/opt/eset/esets/esets.cfg. Locate the line #syslog_facility = "daemon". Uncomment the line. Replace “daemon” with any of the other syslog facilities (the names of the other facilities are two lines above #syslog_facility = "daemon"). For example, syslog_facility = "local0". Ensure your chosen facility is configured to write to a location other than /var. Please see Step 2 for information about configuring syslog facilities. Please let me know if this does not work. Thank you, ChadH
  15. Hello BeattieComms, Please compress the cfg.xml file you are using into a zipped folder and send it to me in a Private Message. Thank you, ChadH
×
×
  • Create New...