[KB5956] Configure Approved (whitelist), Blocked (blacklist) and Ignored (exceptions) lists in ESET Mail Security for Microsoft Exchange (6.x)

Issue

  • Add a domain name,email address or IP address to the Approved lists (whitelist) to prevent the ESET Mail Security spam filter from scanning those communications.This criteria is based on keywords searchedin the email addresses, domain namesor IP addresses.
  • Add a domain name,email address or IPaddress, character set or country to the Blocked lists (blacklist)to have ESET Mail Security mark all communications from those communicationsas spam.
  • Add adomain name,email address or IPaddress to the Ignored lists to continue to scan all communications forspam except for those specific lists selected to ignore. This feature is designed to protect you from spoofed emails that take advantage of your familiarity with a certain email address.

Details

The whitelist, blacklist and exception lists in ESET Mail Securityfor Microsoft Exchange (EMSX) have changed between versions 4.x and 6.x. In EMSX version 6.x and later, these options are now controlled by the Approved, Blocked and Ignored lists.

Solution

A new version is available

ESET Mail Security for Microsoft Exchange Server (ESMX) version 7.x is available. We highly recommend that you upgrade to the latest version.

Configure theApproved list

  1. Open ESET Mail Security. Click Start All Programs ESET ESET Mail Security ESET Mail Security.
  2. Press the F5 key to open Advanced Setup.
  3. In the Server section, click Antispam protectionand expand Filtering and Verification.

Figure 1-1

  1. Next to one of lists below, click Edit.
  • Approved IP list
  • Approved Senders list (email)
  • Approved Domain to IP list (this whitelists emails originating from IP addresses that are resolved from specific domains)

Figure 1-2

  1. Click Add and type the domain name,email or IP address you want to add to the Approved list.
  2. Once you are finished, click OK twice to save the entry and to close the list window.

Figure 1-3


Configure the Blocked list

  1. Open ESET Mail Security. ClickStartAll ProgramsESETESET Mail SecurityESET Mail Security.
  2. Press theF5key to open Advanced Setup.
  3. In theServersection, clickAntispam protectionand expandFiltering and Verification.

Figure 2-1

  1. Next to one of lists below, clickEdit.
    • Blocked IP list
    • Blocked Body Domain list(blocks emails that contain the specified domain in the message body)
    • Blocked Body IP list(blocks emails that contain the specified IP address in the message body)
    • Blocked Senders list(email)
    • Blocked Domain to IP list(this whitelists emails originating from IP addresses that are resolved from specific domains)
    • Blocked charsets list(blocks emails in specified character sets)
    • Blocked countries list(blocks emails from specified countries)

Figure 2-2

  1. ClickAddand type the domain name,email or IP address (or add the specified criteria for each list)you want to add to the Blocked list.
  2. Once you are finished, clickOKtwice to save the entry and to close the list window.

Figure 2-3


Configure the Ignored list

  1. Open ESET Mail Security. ClickStartAll ProgramsESETESET Mail SecurityESET Mail Security.
  2. Press theF5key to open Advanced Setup.
  3. In theServersection, clickAntispam protectionand expandFiltering and Verification.

Figure 3-1

  1. Next to one of lists below, clickEdit.
    • IgnoredIP list(list of IP addresses which will be ignored during classification)
    • Ignored Body Domain list(specified domains in the message body will be ignored during classification)
    • Ignored Body IP list(specified IP addresses in the message body will be ignored during classification)
    • IgnoredDomain to IP list(list of domains that resolves to IP addresses which in turn will not be checked during classification)

Figure 3-2

  1. ClickAddand type the domain name,email or IP address you want to add to the Ignored list.
  2. Once you are finished, clickOKtwice to save the entry and to close the list window.

Figure 3-3