McAfee Security for Email Servers

McAfee Security for Email Servers

Robust content security for your Microsoft Exchange and Lotus Domino servers

Overview

McAfee Security for Email Servers provides comprehensive content security for Microsoft Exchange and Lotus Domino servers.

Industry-leading protection — Uses award-winning McAfee in-memory and incremental on-demand scanning to remove viruses, worms, Trojans, and other threats from incoming and outgoing email.

Strong internal safeguards — Detects threats that may have either slipped past your perimeter defenses or entered your network via infected laptops and internal email. It also blocks spam with the anti-spam module.

Powerful filtering — Enforces corporate policies for email use by filtering offensive content and plugging leaks of sensitive data.

Single console management — Use the McAfee ePolicy Orchestrator (ePO) platform to manage security and view detailed graphical reports from a centralized web-based console.

Strengthen email security for
Office 365

Learn More

Features & Benefits

Protect your servers 24/7

Check email subject, body, and attachments of incoming and outgoing email messages for viruses, worms, Trojans, and other malware. Real-time, cloud-based file reputation and sender reputation from McAfee Global Threat Intelligence (GTI) protect against both known and emerging malware-based threats. Automatic updates keep you current with the latest security intelligence from McAfee Labs, the world’s top threat research center.

Enforce compliance

Filter messages based on size, message content, or attachment content. Block or quarantine messages that contain specific words or phrases in the subject line, message body, or attachments.

Implement data leak prevention and content scanning

Use prebuilt dictionaries that cover most enterprise- and country-specific compliance rules or customize content filters to keep sensitive data from leaking out of your organization. Create rules on a global basis, with exceptions as needed for individuals and departments. Manage via the built-in HTML interface or the McAfee ePolicy Orchestrator (McAfee ePO) platform.

Filter spam and boost productivity

Catch spam and phishing emails using the antispam module with IP reputation, helping to maintain employee productivity and reduce wasted email server storage. Users may create their own whitelists and blacklists.

Stay updated with less effort

Automatically download the latest virus definitions (.DAT files) via HTTP, FTP, network file share, or the McAfee ePO centralized management console. As a result, your IT staff won’t need to spend valuable time on manual updates.

Support all your servers

Ensure protection for your email servers on major operating systems, including Windows and Linux, on 32-bit and 64-bit platforms.

System Requirements

These are minimum system requirements only. Recommended requirements are in parentheses, where applicable. Actual requirements will vary depending on the nature of your environment.

McAfee Security for Microsoft Exchange

  • Microsoft Exchange Servers:
    • Exchange Server 2013
    • Exchange Server 2010
    • Exchange Server 2007
    • Exchange Server 2003
  • Operating systems:
    • Windows Server 2012 Standard and Enterprise (64-bit)
    • Windows Server 2008 R2 Standard and Enterprise (64-bit)
    • Windows Server 2008 Standard and Enterprise (64-bit)
    • Windows Server 2003 R2 Standard and Enterprise (64-bit)
    • Windows Server 2003 Standard and Enterprise (32-bit)
  • System requirements:
    • 8 GB RAM for Microsoft Exchange 2013
    • 4 GB RAM for Microsoft Exchange 2010
    • 2 GB RAM for Microsoft Exchange 2007
    • 256 MB RAM for Microsoft Exchange 2003
    • 740 MB of free disk space

McAfee Security for Lotus Domino on a Windows Server

  • Lotus Domino versions:
    • 9.x (32-bit and 64-bit)
    • 8.5.x (32-bit and 64-bit)
  • Operating systems:
    • Windows Server 2012 Standard and Enterprise (64-bit)
    • Windows 2008 Server with Service Pack (SP) 2
    • Windows 2003 Enterprise Server with SP2 or higher
    • Windows 2003 Server
  • System requirements:
    • 1 GB RAM (2 GB recommended)
    • 1 GB disk space per partition (1.5 GB per partition recommended)
    • Intel Pentium or higher and compatibles

Demos / Tutorials

Tutorials

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Customer Stories

Brelje & Race Consulting Engineers

This small business centralizes antivirus security management with McAfee ePolicy Orchestrator, saving time for the company's security administrator.

Highlights
  • IT manager’s time spent configuring and updating individual workstations cut by 90%
  • Centralized management ensures that all workstations are up to date with latest protection
  • Protection running in the background without intruding on employees’ work
  • Comprehensive and centrallymanaged solution for same price as many standalone antivirus products

CSTISA

This Dominican Republic-based reseller of IT services relies on a portfolio of on-premises and cloud-based McAfee endpoint and data protection solutions to serve its base of SMB customers.

Highlights
  • Supports year-over-year scalability and business continuity
  • Helps build trust as an IT security advisor to customers
  • Provides expert service to customers, from sales and installation through ongoing support
  • Allows expansion into new markets, such as cloud security services

Informa

Informa standardized its security with a single vendor, reducing costs and increasing protection against various types of malware.

Highlights
  • Gained fast ROI through solid protection, reasonable pricing, and reduced internal costs
  • Created an environment of easy deployment and administration
  • Protected against malware with augmented malware detection abilities
  • Assured that the entire network is protected
  • Increased control over the security infrastructure

News / Events

Resources

Data Sheets

Security for Email Servers

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Briefs

Optimize Your Email Security

McAfee is a leader in the email security market, delivering optimal email security solutions for any enterprise. Learn what you need to consider as you decide which type of deployment — cloud, hybrid, or on-premises — is best suited for your business.

Community

Blogs

  • Taking a Close Look at Data-Stealing NionSpy File Infector
    Sanchit Karve - April 14, 2015

    W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]

    The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.

  • VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
    Diwakar Dinkar - April 13, 2015

    Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]

    The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.

  • Takedown Stops Polymorphic Botnet
    Raj Samani - April 9, 2015

    Several global law enforcement agencies—with assistance from Intel Security—this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known by Intel Security as W32/Worm-AAEH. The purpose of this worm is to facilitate downloading other malware, including ZBot banking password stealers, Necurs and ZeroAccess rootkits, Cutwail spambots, fake antivirus, and ransomware. The worm spreads quickly […]

    The post Takedown Stops Polymorphic Botnet appeared first on McAfee.

  • Hidden Low Hanging Avaya IP Office Default Credentials
    McAfee Foundstone Professional Services - March 30, 2015

    Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

    The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.

  • Protect Yourself by Protecting Others
    Carly Listman - January 21, 2015

    How the consumerization of IT is affecting endpoint security What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal […]

    The post Protect Yourself by Protecting Others appeared first on McAfee.

Threats and Risks