IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Libra ESVA 2.0 review

Libra ESVA combines an impressive arsenal of anti-spam measures in a VMware virtual appliance. It's surprisingly inexpensive too, but how does it perform in our live lab tests? Read on to find out.

Initial setup starts by pointing a web browser at the appliance's default IP address and running through a quick setup wizard. After entering network details, you provide information about your company and email server, create a certificate and you're done.

The main web console shows how much work Libra has put into development of the GUI as it provides a lot of useful information. Spam statistics for the current week are shown in a graph at the top and valuable information about the VM swap file status and disk usage is provided alongside it.

A table below shows the day's activity whilst next to it is a big pie chart providing a breakdown of clean messages, spam and infections. You can also browse the last fifteen messages received and these are all colour coded showing clearly how they were classified by ESVA.

Along with an intuitive web interface, Libra has integrated many new features into ESVA which can all be configured without any knowledge of Linux. The local real time block list (RBL) is unusual as this is created by ESVA using data from its own anti-spam engine for the past day. Any IP address that it thinks is sending too much spam during this period will be automatically blocked.

Libra has added support for Active Directory and Exchange and only direct LDAP server queries are made by the appliance so it doesn't cache passwords locally. Access controls are good as you can decide which users are allowed to administer the appliance and any authenticated user can login, view their own spam digest and release or delete stored messages.

The anti-spam engine scores suspect messages as ham or spam and the scoring thresholds for these can be modified. For each category you can decide to quarantine, block, forward, delete or bounce messages, strip out HTML content and tag their subject lines.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Most Popular

Actively exploited server backdoor remains undetected in most organisations' networks
cyber attacks

Actively exploited server backdoor remains undetected in most organisations' networks

1 Jul 2022
Former Uber security chief to face fraud charges over hack coverup
data breaches

Former Uber security chief to face fraud charges over hack coverup

29 Jun 2022
Why India wants to become a chipmaking powerhouse
components

Why India wants to become a chipmaking powerhouse

28 Jun 2022