McAfee Security for Email Servers

McAfee Security for Email Servers

Robust content security for your Microsoft Exchange and Lotus Domino servers

Next Steps:

Overview

McAfee Security for Email Servers provides comprehensive content security for Microsoft Exchange and Lotus Domino servers.

Industry-leading protection — Uses award-winning McAfee in-memory and incremental on-demand scanning to remove viruses, worms, Trojans, and other threats from incoming and outgoing email.

Strong internal safeguards — Detects threats that may have either slipped past your perimeter defenses or entered your network via infected laptops and internal email. It also blocks spam with the anti-spam module.

Powerful filtering — Enforces corporate policies for email use by filtering offensive content and plugging leaks of sensitive data.

Single console management — Use the McAfee ePolicy Orchestrator (ePO) platform to manage security and view detailed graphical reports from a centralized web-based console.

Strengthen email security for
Office 365

Learn More

Features & Benefits

Protect your servers 24/7

Check email subject, body, and attachments of incoming and outgoing email messages for viruses, worms, Trojans, and other malware. Real-time, cloud-based file reputation and sender reputation from McAfee Global Threat Intelligence (GTI) protect against both known and emerging malware-based threats. Automatic updates keep you current with the latest security intelligence from McAfee Labs, the world’s top threat research center.

Enforce compliance

Filter messages based on size, message content, or attachment content. Block or quarantine messages that contain specific words or phrases in the subject line, message body, or attachments.

Implement data leak prevention and content scanning

Use prebuilt dictionaries that cover most enterprise- and country-specific compliance rules or customize content filters to keep sensitive data from leaking out of your organization. Create rules on a global basis, with exceptions as needed for individuals and departments. Manage via the built-in HTML interface or the McAfee ePolicy Orchestrator (McAfee ePO) platform.

Filter spam and boost productivity

Catch spam and phishing emails using the antispam module with IP reputation, helping to maintain employee productivity and reduce wasted email server storage. Users may create their own whitelists and blacklists.

Stay updated with less effort

Automatically download the latest virus definitions (.DAT files) via HTTP, FTP, network file share, or the McAfee ePO centralized management console. As a result, your IT staff won’t need to spend valuable time on manual updates.

Support all your servers

Ensure protection for your email servers on major operating systems, including Windows and Linux, on 32-bit and 64-bit platforms.

System Requirements

These are minimum system requirements only. Recommended requirements are in parentheses, where applicable. Actual requirements will vary depending on the nature of your environment.

McAfee Security for Microsoft Exchange

  • Microsoft Exchange Servers:
    • Exchange Server 2013
    • Exchange Server 2010
    • Exchange Server 2007
    • Exchange Server 2003
  • Operating systems:
    • Windows Server 2012 Standard and Enterprise (64-bit)
    • Windows Server 2008 R2 Standard and Enterprise (64-bit)
    • Windows Server 2008 Standard and Enterprise (64-bit)
    • Windows Server 2003 R2 Standard and Enterprise (64-bit)
    • Windows Server 2003 Standard and Enterprise (32-bit)
  • System requirements:
    • 8 GB RAM for Microsoft Exchange 2013
    • 4 GB RAM for Microsoft Exchange 2010
    • 2 GB RAM for Microsoft Exchange 2007
    • 256 MB RAM for Microsoft Exchange 2003
    • 740 MB of free disk space

McAfee Security for Lotus Domino on a Windows Server

  • Lotus Domino versions:
    • 9.x (32-bit and 64-bit)
    • 8.5.x (32-bit and 64-bit)
  • Operating systems:
    • Windows Server 2012 Standard and Enterprise (64-bit)
    • Windows 2008 Server with Service Pack (SP) 2
    • Windows 2003 Enterprise Server with SP2 or higher
    • Windows 2003 Server
  • System requirements:
    • 1 GB RAM (2 GB recommended)
    • 1 GB disk space per partition (1.5 GB per partition recommended)
    • Intel Pentium or higher and compatibles

Demos / Tutorials

Tutorials

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Customer Stories

Brelje & Race Consulting Engineers

This small business centralizes antivirus security management with McAfee ePolicy Orchestrator, saving time for the company's security administrator.

Highlights
  • IT manager’s time spent configuring and updating individual workstations cut by 90%
  • Centralized management ensures that all workstations are up to date with latest protection
  • Protection running in the background without intruding on employees’ work
  • Comprehensive and centrallymanaged solution for same price as many standalone antivirus products

Resources

Data Sheets

Security for Email Servers

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Briefs

Optimize Your Email Security

McAfee is a leader in the email security market, delivering optimal email security solutions for any enterprise. Learn what you need to consider as you decide which type of deployment — cloud, hybrid, or on-premises — is best suited for your business.

Community

Blogs

  • Meet ‘Tox': Ransomware for the Rest of Us
    Jim Walter - May 23, 2015

    The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free.       […]

    The post Meet ‘Tox': Ransomware for the Rest of Us appeared first on McAfee.

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - May 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - May 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.

  • Defending Against Ransomware with McAfee Threat Intelligence Exchange
    Dan Larson - April 30, 2015

    In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as malware by antivirus signatures. Click […]

    The post Defending Against Ransomware with McAfee Threat Intelligence Exchange appeared first on McAfee.

  • Advice for Unfastening CryptoLocker Ransomware
    Dan Larson - April 22, 2015

    In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]

    The post Advice for Unfastening CryptoLocker Ransomware appeared first on McAfee.

Threats and Risks