EasyManua.ls Logo

ESET NOD32 ANTIVIRUS POUR MS EXCHANGE User Manual

ESET NOD32 ANTIVIRUS POUR MS EXCHANGE
12 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
ESET NOD32 Antivirus
for MS Exchange Server
Installation
w e p r o t e c t d i g i t a l w o r l d s
Question and Answer IconNeed help?

Do you have a question about the ESET NOD32 ANTIVIRUS POUR MS EXCHANGE and is the answer not in the manual?

ESET NOD32 ANTIVIRUS POUR MS EXCHANGE Specifications

General IconGeneral
Product NameESET NOD32 Antivirus pour MS Exchange
PlatformMicrosoft Exchange Server
LicenseCommercial
VendorESET
CategoryAntivirus
Protection FeaturesEmail protection, Anti-spam
CompatibilityMicrosoft Exchange Server
System RequirementsMicrosoft Exchange Server

Summary

Introduction to ESET NOD32 Antivirus for MS Exchange Server

Installation and Activation Procedures

Additional Activation of XMON

Details how to activate the XMON module using a license file after initial installation.

XMON Module Overview

The Main Window

Describes the primary XMON interface, status indicators, and activation status.

Settings Overview

Introduces the eight setting areas for configuring the XMON module's behavior.

XMON Configuration Settings

Scanner Configuration

Configures background scanning, message body scanning, and repeat scanning options.

Detection Settings

Sets detection methods like signatures, heuristics, and identifies malware types.

Extensions Configuration

Manages file types included or excluded from virus scanning.

Actions on Detection

Defines actions to take when a virus is detected, such as cleaning or deleting.

Rules Configuration

Allows creation of custom rules for handling specific file types or messages.

Deleting Options

Specifies actions for deleting messages or attachments upon detection.

Performance Settings

Optimizes scanning speed, manages temporary files, and configures thread usage.

Protocol and Logging

Configures the virus scanning log details, scope, and synchronous logging.

Recommended Settings

Provides guidance for initial installation and background scanning tuning.

Background Scanning Scheduling

Configures scheduled tasks for background virus scanning with timeout parameters.

Event Log and Infected File Handling

Explains viewing logs and provides advice on handling renamed infected files.

Related product manuals