This error is caused by missing access rights to a key file. This is located in the folder C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys. You can either change the permissions on the entire folder or check which file needs the permissions.
To find out which file this is, you can use window's own "Procmon". This shows all file accesses. Open the program and set the filter "Path contains C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys". Then check which file the "ESTArchiveStorageService" process tries to accessand allow access to this file.
We have planned a quarantine function for the future. Until this is implemented, you can, for example, set up a quarantine mailbox and deliver emails that have been detected as spam to it. To do this, you can use the following rule:
"Mail is spam" condition. To do this, you need to set a spam score. By default, the value 5 is recommended here.
Action "Forward copy to SMTP server". Here you specify the e-mail address of the quarantine mailbox and the SMTP server connection.
Action "Do not deliver email". This will delete the original email and deliver only the copy to the quarantine mailbox. It is important that this action is listed last.
Alternatively, you can use this action instead of "Forward copy to SMTP server":
"Modify recipients (SMTP)" action. Delete the existing recipients here and specify the quarantine mailbox as the recipient.
This action is useful if the quarantine mailbox is on the same SMTP server as the original recipient.
In order to finish the installation process the installing user needs to have administrative rights.
These are required since there are services and firewall rules that need to be installed.
In order to create the Active Directory user the creating user needs to be a member of the "Account Operator" group.
"ClamAv in a Box" and "SpamAssassin in a Box", also integrated in SmartPOP2Exchange and Exchange Server Toolbox already update their rules / virus signatures every 3 hours automatically.