Call a Specialist Today!877-352-0546

ESET Mail Security for Microsoft Exchange Server
Do More With Your MS Exchange Server Secured

Sorry, this product is no longer available, please contact us for a replacement.

More pricing and licensing options below!


ESET Mail Security for Microsoft Exchange Server integrates powerful antivirus and antispam detection capabilities that ensure all harmful email-borne content is filtered away at the server level, while ESET’s light footprint means your system can continue to run at full speed.

With our solution, you get complete server protection – including the server’s own file system. You can apply policies for specific content based on real file type, and monitor security status or fine-tune configuration easily via our user-friendly ESET Remote Administrator tool.

Safeguard your email with simple set-and-forget protection against malware and spam.

  • VMware Ready SoftwareAntivirus & Antispam eliminates all types of threats, including viruses, rootkits, worms and spyware and stops spam and phishing attempts with high interception rates.
  • Local Quarantine of spam and undelivered messages accessible and manageable by mailbox owner via a standalone browser.
  • Meets the needs of complex network infrastructure. Optimized for virtual environments, with snapshot independence and native clustering support.
  • Remote Management. Fully manageable via the new ESET Remote Administrator web console.


Anti-malware Protection and Antispam

  • Antivirus and Antispyware
    Eliminates all types of threats, including viruses, rootkits, worms and spyware with optional cloudpowered scanning for even better performance and detection.
    Optional cloud-powered scanning:
    Whitelisting of safe files based on file reputation database in the cloud for better detection and faster scanning. Only information about executable and archive files is sent to the cloud – such data is not personally attributable.
  • Antispam and Anti-Phishing
    Stops spam and phishing attempts, and delivers high interception rates without the need to manually set a Spam Confidence Level (SCL) Threshold. After installation, the antispam module is ready to run without the need to manually tune settings or thresholds.
  • Local Quarantine Management
    Each mailbox owner can directly interact, via a standalone browser, with spam or suspected-malware messages that have been denied delivery to the mailbox. Based on privileges set by the admin, the user can sort quarantined messages, search among them and execute allowed actions – messageby-message, or by group – all via web browser. Actions vary based on the reason a message was quarantined. A regular email report summarizing quarantined messages with embedded links to execute actions can be sent to the user.
  • Database On-Demand Scan
    Administrators can choose which databases and, in particular, which mailboxes will be scanned. These scans can be further limited by using the modification time-stamp of each message to choose which should be inspected, thereby reducing to a minimum the server resources devoted to the task.
  • Message Processing Rules
    Message processing rules offer a wide range of combinations by which every single message can be handled. The evaluated parameters include standard fields like subject, sender, body and specific message header, but also allow further conditional processing depending on previous anti-spam filtering or antivirus scanner results. Corrupted or password-protected archives are detected and attachments are screened internally to determine real file type, not only purported extension. Rules can be changed according to the desired actions.
  • Exploit Blocker
    Strengthens the security of applications such as web browsers, PDF readers, email clients and MS office components, which are commonly exploited. Monitors process behaviors and looks for suspicious activities typical of exploits. Strengthens protection against targeted attacks and previously unknown exploits, i.e. zero-day attacks.
  • Advanced Memory Scanner
    Monitors the behavior of malicious processes and scans them once they decloak in the memory. This allows for effective infection prevention, even from heavily obfuscated malware.
  • Host-Based Intrusion Prevention System (HIPS)
    Enables you to define rules for system registry, processes, applications and files. Provides anti-tamper protection and detects threats based on system behavior.
  • Device Control
    Blocks unauthorized portable devices from connecting to the server. Enables you to create rules for user groups to comply with your company policies. Allows soft blocking, which notifies the end user that his device is blocked and gives him the option to access it, with activity logged.

Complex Infrastructure Covered

  • Snapshot Independence
    ESET updates and program modules can be stored outside of the default location – so are not affected by reverting to an earlier snapshot of the virtual machine. As a result, the updates and modules don’t have to be downloaded every time a virtual machine is reverted to an earlier snapshot and the reverted machine can utilize untouched updates and avoid large downloads, resulting in faster snapshot recovery times.
  • Native Clustering Support
    Allows you to configure the solution to automatically replicate settings when installed in a cluster environment. Our intuitive wizard makes it easy to interconnect several installed nodes of ESET Mail Security within a cluster and manage them as one, eliminating the need to replicate changes in configuration manually to other nodes in the cluster.
  • ESET Shared Local Cache
    ESET Shared Local Cache compares the metadata of files with the metadata of those that have already been stored, and automatically skips previously whitelisted clean files. Whenever a new, previously unscanned file is found, it’s automatically added to the cache. This means that files already scanned on one virtual machine are not repeatedly scanned on other virtual machines within the same virtual environment, resulting in a significant scanning boost. As communication happens over the same physical hardware, there is practically no delay in scanning, resulting in considerable resource savings.
  • Windows Management Instrumentation (WMI) Provider
    Provides the possibility to monitor key functionalities of ESET Mail Security via Windows Management Instrumentation framework. This allows integration of ESET Mail Server into 3rd party management and SIEM software, such as Microsoft System Center Operations Manager, Nagios, and others.


  • Process Exclusions
    The admin can define processes which are ignored by the real-time protection module – all file operations that can be attributed to these privileged processes are considered to be safe. This is especially useful for processes that often interfere with real-time protection, like backup or live virtual machine migration. Excluded process can access even unsafe files or objects without triggering an alert.
  • Incremental Micro-Definitions
    Regular updates and actualizations are downloaded and applied incrementally in small packages. This concept conserves system resources and internet bandwidth without any noticeable impact on the speed of the whole network infrastructure and servers, or on endpoints system demands on memory or the CPU.
  • Component-Based Installation
    Apart from the required components, ESET allows you to choose to install only those components you need:
    • Real-Time File System Protection
    • Web and Email Protection
    • Device Control
    • Graphical User Interface (GUI)
    • ESET Log Collector
    • and others
  • Remote Management
    ESET Mail Security is fully manageable via ESET Remote Administrator. Deploy, run tasks, set up policies, collect logs, and get notifications and an overall security overview of your network – all via a single webbased management console.
  • ESET Log Collector
    A simple tool which collects all logs relevant for troubleshooting, assisted by ESET’s technical support, and bundles them into a single archive which can be sent via email or uploaded to a shared network drive to speed up the troubleshooting process.
  • ESET License Administrator
    Makes it possible to handle all licenses transparently, from one place via web browser. You can merge, delegate and manage all licenses centrally in real-time, even if you are not using ESET Remote Administrator

System Requirements:

Operating Systems:

  • Microsoft Windows Server 2012 R2
  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows Server 2008
  • Microsoft Windows Server 2003
  • Microsoft Small Business Server 2011
  • Microsoft Small Business Server 2008
  • Microsoft Small Business Server 2003

Mail Servers:

  • Microsoft Exchange Server 2016
  • Microsoft Exchange Server 2013
  • Microsoft Exchange Server 2010
  • Microsoft Exchange Server 2007
  • Microsoft Exchange Server 2003

Compatible with ESET Remote Administrator 6

  • Note: Not compatible with previous versions of ESET Remote Administrator
  • See more information about ESET Remote Administrator compatibility

Product Comparison:

  ESET Mail Security for Microsoft Exchange Server ESET Mail Security for Linux / FreeBSD ESET Mail Security for IBM Domino ESET Security for Kerio
Mail Security Comparison
Platform Windows Linux Windows Kerio
Antivirus and Antispyware
Filters malware at the mail level with proven antivirus and antispyware technology.
Keeps company inboxes spam-free filtering out unsolicited emails, scams, phishing and frauds.
Virtualization Support
Designed for virtual environments with a range of features for seamless operation and high performance.
Host Protection
Efficiently protects the server file system as a host against malware and breaches.
Kerio Plugin
The NOD32 scanning core seamlessly integrates with Kerio infrastructure as a plugin to filter out malwares.
Remote Management
Allows to manage mail security and push policies centrally from a single console.
User Interface
The interface provides for a pleasant user experience , with good clarity in the main areas and a great level of fine-tuning under the covers.

Pricing Notes: