..................................................................................108License
5.7.5.4
..................................................................................108Activation progress
5.7.5.5
..................................................................................109Activation success ful
5.7.5.6
.......................................................110Working with ESET Mail Security6.
....................................................................................................110Server6.1
..............................................................................112Protected tasks
6.1.1
..............................................................................113Protected partitions
6.1.2
..............................................................................113Antivirus and antis pyware
6.1.3
..............................................................................115Antis pam protection
6.1.4
..................................................................................116Filtering and verification
6.1.4.1
..................................................................................117Advanced settings
6.1.4.2
..................................................................................121Greylis ting settings
6.1.4.3
..................................................................................123SPF a nd DKIM
6.1.4.4
..............................................................................124Rules
6.1.5
..................................................................................126Rules lis t
6.1.5.1
........................................................................127Rule wizard
6.1.5.1.1
........................................................................128Rule condition
6.1.5.1.1.1
........................................................................130Rule action
6.1.5.1.1.2
..............................................................................131Mail transport protection
6.1.6
..................................................................................133Advanced settings
6.1.6.1
..............................................................................133Da tabase protection
6.1.7
..................................................................................135Data bas e excluded from s can
6.1.7.1
..............................................................................136On-demand data bas e scan
6.1.8
..............................................................................136Mail Quarantine
6.1.9
..................................................................................138ESET Qua rantine
6.1.9.1
..................................................................................139Recover from quara ntine
6.1.9.2
....................................................................................................140Computer6.2
..............................................................................141An infiltra tion is detected
6.2.1
..............................................................................142Processes exclusions
6.2.2
..............................................................................142Automatic exclusions
6.2.3
..............................................................................143Shared local ca che
6.2.4
..............................................................................144Real-time file system protection
6.2.5
..................................................................................145Exclusions
6.2.5.1
........................................................................146Add or Edit exclusion
6.2.5.1.1
........................................................................147Exclusion format
6.2.5.1.2
..................................................................................147Threa tSense parameters
6.2.5.2
........................................................................150File extens tions excluded from scanning
6.2.5.2.1
........................................................................150Additional ThreatSense pa rameters
6.2.5.2.2
........................................................................151Cleaning levels
6.2.5.2.3
........................................................................151When to modify rea l-time protection configura tion
6.2.5.2.4
........................................................................151Checking rea l-time protection
6.2.5.2.5
........................................................................151Wha t to do if rea l-time protection does not work
6.2.5.2.6
........................................................................152Submission
6.2.5.2.7
........................................................................152Statistics
6.2.5.2.8
........................................................................153Suspicious files
6.2.5.2.9
..............................................................................154On-demand computer sca n and Hyper-V scan
6.2.6
..................................................................................155Custom scan and Hyper-V s can launcher
6.2.6.1
..................................................................................157Scan progress
6.2.6.2
..................................................................................159Scan log
6.2.6.3
..................................................................................160Profile manager
6.2.6.4
..................................................................................160Scan targets
6.2.6.5
..................................................................................160Paus e a scheduled sca n
6.2.6.6
..............................................................................160Idle-state scanning
6.2.7
..............................................................................161Sta rtup sca n
6.2.8
..................................................................................161Automatic sta rtup file check
6.2.8.1
..............................................................................161Remova ble media
6.2.9
..............................................................................162Document protection
6.2.10
..............................................................................162HIPS
6.2.11
..................................................................................164HIPS rules
6.2.11.1
........................................................................165HIPS rule settings
6.2.11.1.1
..................................................................................167Advanced setup
6.2.11.2
........................................................................167Drivers alwa ys allowed to load
6.2.11.2.1
....................................................................................................167Update6.3
..............................................................................170Update rollback
6.3.1
..............................................................................170Update mode
6.3.2
..............................................................................171HTTP Proxy
6.3.3
..............................................................................172Connect to LAN a s
6.3.4
..............................................................................173Mirror
6.3.5
..................................................................................175Updating from the Mirror
6.3.5.1
..................................................................................177Mirror files
6.3.5.2
..................................................................................177Troubleshooting Mirror update problems
6.3.5.3
....................................................................................................177Web and email6.4
..............................................................................178Protocol filtering
6.4.1
..................................................................................178Excluded applications
6.4.1.1
..................................................................................178Excluded IP addresses
6.4.1.2
..................................................................................179Web a nd email clients
6.4.1.3
..............................................................................179SSL/TLS
6.4.2
..................................................................................180Encrypted SSL communication
6.4.2.1
..................................................................................180List of known certificates
6.4.2.2
..............................................................................181Email client protection
6.4.3
..................................................................................182Email protocols
6.4.3.1
..................................................................................183Alerts and notifications
6.4.3.2
..................................................................................183MS Outlook toolbar
6.4.3.3
..................................................................................183Outlook Express and Windows Mail toolbar
6.4.3.4
..................................................................................184Confirmation dia log
6.4.3.5
..................................................................................184Res can messages
6.4.3.6
..............................................................................184Web access protection
6.4.4
..................................................................................185Basic
6.4.4.1
..................................................................................185URL address ma nagement
6.4.4.2
........................................................................185Crea te new lis t
6.4.4.2.1
........................................................................187Address list
6.4.4.2.2
..............................................................................188Anti-Phishing protection
6.4.5
....................................................................................................190Device control6.5
..............................................................................190Device control rules editor
6.5.1
..............................................................................191Adding Device control rules
6.5.2
..............................................................................193Detected devices
6.5.3
..............................................................................193Device groups
6.5.4
....................................................................................................194Tools6.6
..............................................................................194ESET LiveGrid®
6.6.1
..................................................................................196Exclus ion filter
6.6.1.1
..............................................................................197Microsoft Windows update
6.6.2
..............................................................................197ESET CMD
6.6.3
..............................................................................198WMI Provider
6.6.4