....................................................................................................116Anti-Phishing protection6.4
....................................................................................................117Rules6.5
..............................................................................119Rule condition
6.5.1
..............................................................................123Rule action
6.5.2
..............................................................................125Rule examples
6.5.3
....................................................................................................127Mail transport protection6.6
..............................................................................129Mail transport adva nced settings
6.6.1
....................................................................................................130Mailbox database protection6.7
..............................................................................132Background scan
6.7.1
....................................................................................................132On-demand mailbox database scan6.8
..............................................................................134Mailbox database sca n
6.8.1
..............................................................................137Office 365 mailbox scan
6.8.2
..............................................................................138Additiona l ma ilbox items
6.8.3
..............................................................................138Proxy server
6.8.4
..............................................................................138Da tabase sca n a ccount details
6.8.5
....................................................................................................139Mail Quarantine types6.9
..............................................................................140Local quara ntine
6.9.1
..................................................................................141File s torage
6.9.1.1
..................................................................................141Web interface
6.9.1.2
........................................................................147Send Mail Quarantine reports - scheduled task
6.9.1.2.1
........................................................................148User Mail Quarantine Web interface
6.9.1.2.2
..............................................................................150Quara ntine mailbox and MS Excha nge quarantine
6.9.2
..................................................................................151Quarantine manager settings
6.9.2.1
..................................................................................151Proxy server
6.9.2.2
..............................................................................152Quara ntine manager account deta ils
6.9.3
....................................................................................................152Antivirus test6.10
....................................................................................................152Antispam test6.11
....................................................................................................153Anti-Phishing test6.12
.......................................................154General settings7.
....................................................................................................154Computer7.1
..............................................................................155Process es exclus ions
7.1.1
..............................................................................156Exclusions
7.1.2
..................................................................................157Add or edit exclusion
7.1.2.1
..............................................................................158Automatic exclus ions
7.1.3
..............................................................................159Shared local ca che
7.1.4
..............................................................................159An infiltration is detected
7.1.5
..............................................................................160Real-time file system protection
7.1.6
..................................................................................161ThreatSense pa rameters
7.1.6.1
........................................................................164Additional ThreatSens e pa rameters
7.1.6.1.1
........................................................................165File extenstions excluded from sca nning
7.1.6.1.2
..............................................................................165Cloud-based protection
7.1.7
..................................................................................167Exclus ion filter
7.1.7.1
..............................................................................168Malware s cans
7.1.8
..................................................................................169Profile mana ger
7.1.8.1
..................................................................................170Profile ta rgets
7.1.8.2
..................................................................................171Scan targets
7.1.8.3
..................................................................................173Idle-sta te scan
7.1.8.4
..................................................................................173Startup sca n
7.1.8.5
........................................................................173Automatic sta rtup file check
7.1.8.5.1
..................................................................................174Removable media
7.1.8.6
..................................................................................174Document protection
7.1.8.7
..............................................................................175Hyper-V sca n
7.1.9
..............................................................................176HIPS
7.1.10
..................................................................................178HIPS rule settings
7.1.10.1
..................................................................................181HIPS advanced settings
7.1.10.2
....................................................................................................181Update configuration7.2
..............................................................................184Update rollba ck
7.2.1
..............................................................................184Scheduled Tas k - Upda te
7.2.2
..............................................................................185Update mirror
7.2.3
....................................................................................................187Network protection7.3
..............................................................................188IDS exceptions
7.3.1
..............................................................................189Temporary IP address bla cklist
7.3.2
....................................................................................................189Web and email7.4
..............................................................................189Protocol filtering
7.4.1
..................................................................................190Web a nd email clients
7.4.1.1
..............................................................................190SSL/TLS
7.4.2
..................................................................................191List of known certificates
7.4.2.1
..................................................................................192Encrypted SSL communication
7.4.2.2
..............................................................................193Email client protection
7.4.3
..................................................................................193Email protocols
7.4.3.1
..................................................................................194Alerts a nd notifications
7.4.3.2
..................................................................................195MS Outlook toolbar
7.4.3.3
..................................................................................195Outlook Express and Windows Mail toolba r
7.4.3.4
..................................................................................195Confirmation dia log
7.4.3.5
..................................................................................195Rescan messages
7.4.3.6
..............................................................................196Web access protection
7.4.4
..................................................................................196URL addres s mana gement
7.4.4.1
........................................................................197Crea te new list
7.4.4.1.1
..............................................................................199Anti-Phishing web protection
7.4.5
....................................................................................................200Device control7.5
..............................................................................200Device rules
7.5.1
..............................................................................202Device groups
7.5.2
....................................................................................................203Tools configuration7.6
..............................................................................203Time slots
7.6.1
..............................................................................203Microsoft Windows upda te
7.6.2
..............................................................................204ESET CMD
7.6.3
..............................................................................205ESET RMM
7.6.4
..............................................................................206WMI Provider
7.6.5
..................................................................................206Provided data
7.6.5.1
..................................................................................213Accessing Provided Data
7.6.5.2
..............................................................................213ERA/ESMC s can targets
7.6.6
..............................................................................214Override mode
7.6.7
..............................................................................217Log files
7.6.8
..................................................................................220Syslog event mapping
7.6.8.1
..............................................................................222Proxy server
7.6.9
..............................................................................223Notification
7.6.10
..................................................................................223Application notifications
7.6.10.1
..................................................................................224Desktop notifications
7.6.10.2
..................................................................................224Email notifications
7.6.10.3
..................................................................................225Customization
7.6.10.4
..............................................................................226Presentation mode
7.6.11