4.1.5.1.1 Detected devices 44 ................................................................................................................................
4.1.5.2 Device groups 44 ......................................................................................................................................
4.1.5.3 Adding Device control rules 45 .....................................................................................................................
4.1.6 Host-based Intrusion Prevention System (HIPS) 47 ...............................................................................................
4.1.6.1 HIPS interactive window 49 .........................................................................................................................
4.1.6.1.1 Potential ransomware behavior detected 50 ..................................................................................................
4.1.6.2 HIPS rule management 51 ...........................................................................................................................
4.1.6.2.1 HIPS rule settings 52 ...............................................................................................................................
4.1.6.2.2 Add applicaton/registry path for HIPS 54 .......................................................................................................
4.1.6.3 HIPS advanced setup 54 .............................................................................................................................
4.1.6.3.1 Drivers always allowed to load 54 ...............................................................................................................
4.1.7 Gamer mode 55 ..........................................................................................................................................
4.1.8 Startup scan 55 ..........................................................................................................................................
4.1.8.1 Automatic startup file check 55 ....................................................................................................................
4.1.9 Document protection 56 ................................................................................................................................
4.1.10 Exclusions 56 ...........................................................................................................................................
4.1.10.1 Performance exclusions 56 ........................................................................................................................
4.1.10.1.1 Add or Edit performance exclusion 57 ........................................................................................................
4.1.10.1.2 Path exclusion format 59 ........................................................................................................................
4.1.10.2 Detection exclusions 60 ............................................................................................................................
4.1.10.2.1 Add or Edit detection exclusion 61 .............................................................................................................
4.1.10.2.2 Create detection exclusion wizard 62 .........................................................................................................
4.1.10.3 HIPS exclusions 63 ...................................................................................................................................
4.1.11 ThreatSense parameters 63 .........................................................................................................................
4.1.11.1 File extensions excluded from scanning 66 ....................................................................................................
4.1.11.2 Additional ThreatSense parameters 66 ..........................................................................................................
4.2 Internet protection 67 ................................................................................................................................
4.2.1 Protocol filtering 68 ......................................................................................................................................
4.2.1.1 Excluded applications 68 ............................................................................................................................
4.2.1.2 Excluded IP addresses 69 ............................................................................................................................
4.2.1.2.1 Add IPv4 address 69 ................................................................................................................................
4.2.1.2.2 Add IPv6 address 70 ................................................................................................................................
4.2.1.3 SSL/TLS 70 ..............................................................................................................................................
4.2.1.3.1 Certificates 71 .......................................................................................................................................
4.2.1.3.1 Encrypted network traffic 71 .....................................................................................................................
4.2.1.3.2 List of known certificates 72 ......................................................................................................................
4.2.1.3.3 List of SSL/TLS filtered applications 72 .........................................................................................................
4.2.2 Email client protection 73 ..............................................................................................................................
4.2.2.1 Email protocols 73 ....................................................................................................................................
4.2.2.1.1 POP3, POP3S filter 74 ..............................................................................................................................
4.2.2.2 Email alerts and notifications 75 ...................................................................................................................
4.2.2.3 Integration with email clients 75 ...................................................................................................................
4.2.2.3.1 Microsoft Outlook toolbar 75 ......................................................................................................................
4.2.2.3.2 Outlook Express and Windows Mail toolbar 76 ................................................................................................
4.2.2.3.3 Confirmation dialog 76 .............................................................................................................................
4.2.2.3.4 Rescan messages 76 ...............................................................................................................................
4.2.3 Web access protection 76 ..............................................................................................................................
4.2.3.1 Web access protection advanced setup 79 ......................................................................................................
4.2.3.2 Web protocols 79 ......................................................................................................................................
4.2.3.3 URL address management 80 .......................................................................................................................
4.2.3.3.1 URL addresses list 81 ..............................................................................................................................
4.2.3.3.2 Create new URL address list 81 ..................................................................................................................
4.2.3.3.3 How to add URL mask 82 ..........................................................................................................................
4.2.4 Anti-Phishing protection 82 ............................................................................................................................
4.3 Updating the program 84 ..........................................................................................................................
4.3.1 Update setup 86 .........................................................................................................................................
4.3.1.1 Update rollback 88 ....................................................................................................................................
4.3.1.2 Program component update 89 ....................................................................................................................