4.1 Scan profiles 54 ..........................................................................................................................
4.1 Scan targets 55 ...........................................................................................................................
4.1 Device control 55 .........................................................................................................................
4.1 Device control rules editor 56 ...........................................................................................................
4.1 Detected devices 57 .....................................................................................................................
4.1 Adding Device control rules 57 ..........................................................................................................
4.1 Device groups 59 .........................................................................................................................
4.1 Host-based Intrusion Prevention System (HIPS) 60 .....................................................................................
4.1 HIPS interactive window 63 ..............................................................................................................
4.1 Potential ransomware behavior detected 64 ............................................................................................
4.1 HIPS rule management 65 ...............................................................................................................
4.1 HIPS rule settings 66 .....................................................................................................................
4.1 HIPS advanced setup 68 .................................................................................................................
4.1 Drivers always allowed to load 68 .......................................................................................................
4.1 Presentation mode 69 ....................................................................................................................
4.1 Startup scan 69 ...........................................................................................................................
4.1 Automatic startup file check 69 .........................................................................................................
4.1 Document protection 70 .................................................................................................................
4.1 Exclusions 70 .............................................................................................................................
4.1 Performance exclusions 71 ..............................................................................................................
4.1 Add or Edit performance exclusion 72 ..................................................................................................
4.1 Path exclusion format 73 ................................................................................................................
4.1 Detection exclusions 74 ..................................................................................................................
4.1 Add or Edit detection exclusion 77 ......................................................................................................
4.1 Create detection exclusion wizard 78 ...................................................................................................
4.1 Processes exclusions 78 .................................................................................................................
4.1 Add or Edit processes exclusions 79 ....................................................................................................
4.1 HIPS exclusions 79 .......................................................................................................................
4.1 ThreatSense parameters 79 .............................................................................................................
4.1 Cleaning levels 82 ........................................................................................................................
4.1 File extensions excluded from scanning 82 .............................................................................................
4.1 Additional ThreatSense parameters 83 .................................................................................................
4.2 Network 83 ..................................................................................................................................
4.2 Network protection advanced setup 84 .................................................................................................
4.2 Known networks 85 ......................................................................................................................
4.2 Known networks editor 86 ...............................................................................................................
4.2 Network authentication - Server configuration 89 ......................................................................................
4.2 Configuring zones 89 .....................................................................................................................
4.2 Network Protection zones 89 ............................................................................................................
4.2 Network attack protection (IDS) 90 ......................................................................................................
4.2 Brute-force attack protection 90 ........................................................................................................
4.2 Rules 90 ..................................................................................................................................
4.2 Exclusions 93 .............................................................................................................................
4.2 IDS rules 93 ...............................................................................................................................
4.2 Suspected threat blocked 96 ............................................................................................................
4.2 Network protection troubleshooting 96 .................................................................................................
4.2 Allowed services and advanced options 96 .............................................................................................
4.2 Temporary IP address blacklist 98 .......................................................................................................
4.2 Solving problems with ESET Network Protection 98 ....................................................................................
4.2 Troubleshooting wizard 99 ...............................................................................................................
4.2 Logging and creating rules or exceptions from log 99 .................................................................................