4.1.4.2 Scan progress ......................................................................................................................................................................................... 48
4.1.4.3 Computer scan log ................................................................................................................................................................................. 49
4.1.4.4 Malware scans ....................................................................................................................................................................................... 49
4.1.4.4.1 Idle-state scan .................................................................................................................................................................................... 50
4.1.4.4.2 Scan profiles ....................................................................................................................................................................................... 50
4.1.4.4.3 Scan targets ........................................................................................................................................................................................ 50
4.1.4.4.4 Advanced scan options ....................................................................................................................................................................... 51
4.1.5 Device control ........................................................................................................................................................................................... 51
4.1.5.1 Device control rules editor ..................................................................................................................................................................... 52
4.1.5.1.1 Detected devices ................................................................................................................................................................................ 52
4.1.5.2 Device groups ........................................................................................................................................................................................ 53
4.1.5.3 Adding Device control rules .................................................................................................................................................................... 54
4.1.6 Removable media ..................................................................................................................................................................................... 56
4.1.7 Host-based Intrusion Prevention System (HIPS)......................................................................................................................................... 56
4.1.7.1 HIPS interactive window ........................................................................................................................................................................ 58
4.1.7.1.1 Potential ransomware behavior detected .......................................................................................................................................... 59
4.1.7.2 HIPS rule management ........................................................................................................................................................................... 60
4.1.7.2.1 HIPS rule settings ................................................................................................................................................................................ 60
4.1.7.3 HIPS advanced setup .............................................................................................................................................................................. 63
4.1.7.3.1 Drivers always allowed to load ........................................................................................................................................................... 63
4.1.8 Presentation mode ................................................................................................................................................................................... 64
4.1.9 Startup scan .............................................................................................................................................................................................. 64
4.1.9.1 Automatic startup file check .................................................................................................................................................................. 65
4.1.10 Document protection .............................................................................................................................................................................. 65
4.1.11 Exclusions ............................................................................................................................................................................................... 66
4.1.11.1 Add or Edit exclusion ............................................................................................................................................................................ 67
4.1.11.2 Path exclusion format .......................................................................................................................................................................... 69
4.1.12 ThreatSense parameters ........................................................................................................................................................................ 70
4.1.12.1 File extensions excluded from scanning ............................................................................................................................................... 73
4.2 Network ......................................................................................................................................................................................................... 74
4.2.1 Firewall ..................................................................................................................................................................................................... 75
4.2.1.1 Learning mode ....................................................................................................................................................................................... 77
4.2.2 Network attack protection ........................................................................................................................................................................ 78
4.2.2.1 IDS exceptions ....................................................................................................................................................................................... 78
4.2.2.2 Allowed services and advanced options ................................................................................................................................................. 80
4.2.2.3 Suspected threat blocked ...................................................................................................................................................................... 83
4.2.2.4 Network protection troubleshooting ...................................................................................................................................................... 83
4.2.3 Connected networks ................................................................................................................................................................................. 84
4.2.4 Known networks ....................................................................................................................................................................................... 84
4.2.4.1 Known networks editor .......................................................................................................................................................................... 84
4.2.4.2 Network authentication - Server configuration ....................................................................................................................................... 87
4.2.5 Firewall profiles ........................................................................................................................................................................................ 88
4.2.5.1 Profiles assigned to network adapters ................................................................................................................................................... 88
4.2.6 Application modification detection ........................................................................................................................................................... 89
4.2.6.1 Applications excluded from modification detection ............................................................................................................................... 89
4.2.7 Configuring and using rules ....................................................................................................................................................................... 89
4.2.7.1 Firewall rules ......................................................................................................................................................................................... 90
4.2.7.2 Working with rules ................................................................................................................................................................................. 91
4.2.8 Temporary IP address blacklist ................................................................................................................................................................. 92
4.2.9 Trusted zone ............................................................................................................................................................................................. 92
4.2.10 Configuring zones .................................................................................................................................................................................... 92
4.2.10.1 Firewall zones ...................................................................................................................................................................................... 93