4.1.4.4.3 Scan targets 44 ......................................................................................................................................
4.1.4.4.4 Advanced scan options 44 ........................................................................................................................
4.1.5 Device control 45 ........................................................................................................................................
4.1.5.1 Device control rules editor 46 .......................................................................................................................
4.1.5.1.1 Detected devices 46 ................................................................................................................................
4.1.5.2 Device groups 46 ......................................................................................................................................
4.1.5.3 Adding Device control rules 47 .....................................................................................................................
4.1.6 Webcam Protection 49 ..................................................................................................................................
4.1.6.1 Webcam protection rules editor 50 ................................................................................................................
4.1.7 Host-based Intrusion Prevention System (HIPS) 50 ...............................................................................................
4.1.7.1 HIPS interactive window 52 .........................................................................................................................
4.1.7.1.1 Potential ransomware behavior detected 53 ..................................................................................................
4.1.7.2 HIPS rule management 54 ...........................................................................................................................
4.1.7.2.1 HIPS rule settings 55 ...............................................................................................................................
4.1.7.2.2 Add applicaton/registry path for HIPS 57 .......................................................................................................
4.1.7.3 HIPS advanced setup 57 .............................................................................................................................
4.1.7.3.1 Drivers always allowed to load 57 ...............................................................................................................
4.1.8 Gamer mode 58 ..........................................................................................................................................
4.1.9 Startup scan 58 ..........................................................................................................................................
4.1.9.1 Automatic startup file check 58 ....................................................................................................................
4.1.10 Document protection 59 ..............................................................................................................................
4.1.11 Exclusions 59 ...........................................................................................................................................
4.1.11.1 Performance exclusions 60 ........................................................................................................................
4.1.11.1.1 Add or Edit performance exclusion 61 ........................................................................................................
4.1.11.1.2 Path exclusion format 62 ........................................................................................................................
4.1.11.2 Detection exclusions 63 ............................................................................................................................
4.1.11.2.1 Add or Edit detection exclusion 64 .............................................................................................................
4.1.11.2.2 Create detection exclusion wizard 65 .........................................................................................................
4.1.11.3 HIPS exclusions 66 ...................................................................................................................................
4.1.12 ThreatSense parameters 66 .........................................................................................................................
4.1.12.1 File extensions excluded from scanning 69 ....................................................................................................
4.1.12.2 Additional ThreatSense parameters 69 ..........................................................................................................
4.2 Internet protection 70 ................................................................................................................................
4.2.1 Protocol filtering 71 ......................................................................................................................................
4.2.1.1 Excluded applications 71 ............................................................................................................................
4.2.1.2 Excluded IP addresses 72 ............................................................................................................................
4.2.1.2.1 Add IPv4 address 72 ................................................................................................................................
4.2.1.2.2 Add IPv6 address 73 ................................................................................................................................
4.2.1.3 SSL/TLS 73 ..............................................................................................................................................
4.2.1.3.1 Certificates 74 .......................................................................................................................................
4.2.1.3.1 Encrypted network traffic 74 .....................................................................................................................
4.2.1.3.2 List of known certificates 75 ......................................................................................................................
4.2.1.3.3 List of SSL/TLS filtered applications 75 .........................................................................................................
4.2.2 Email client protection 76 ..............................................................................................................................
4.2.2.1 Email protocols 76 ....................................................................................................................................
4.2.2.1.1 POP3, POP3S filter 77 ..............................................................................................................................
4.2.2.2 Email alerts and notifications 78 ...................................................................................................................
4.2.2.3 Integration with email clients 78 ...................................................................................................................
4.2.2.3.1 Microsoft Outlook toolbar 78 ......................................................................................................................
4.2.2.3.2 Outlook Express and Windows Mail toolbar 79 ................................................................................................
4.2.2.3.3 Confirmation dialog 80 .............................................................................................................................
4.2.2.3.4 Rescan messages 80 ...............................................................................................................................
4.2.2.4 Antispam protection 80 ..............................................................................................................................
4.2.2.4.1 Antispam address books 81 .......................................................................................................................
4.2.2.4.2 Blacklist/Whitelist/Exceptions list 82 ............................................................................................................
4.2.2.4.2 Add/Edit Blacklist/Whitelist/Exceptions address 83 ..........................................................................................
4.2.3 Web access protection 83 ..............................................................................................................................
4.2.3.1 Web access protection advanced setup 86 ......................................................................................................