4.1.7.2 Device groups 56 ......................................................................................................................................
4.1.7.3 Adding Device control rules 56 .....................................................................................................................
4.1.8 Host-based Intrusion Prevention System (HIPS) 58 ...............................................................................................
4.1.8.1 HIPS interactive window 60 .........................................................................................................................
4.1.8.1.1 Potential ransomware behavior detected 61 ..................................................................................................
4.1.8.2 HIPS rule management 62 ...........................................................................................................................
4.1.8.2.1 HIPS rule settings 63 ...............................................................................................................................
4.1.8.3 HIPS advanced setup 65 .............................................................................................................................
4.1.8.3.1 Drivers always allowed to load 65 ...............................................................................................................
4.1.9 Presentation mode 66 ..................................................................................................................................
4.1.10 Startup scan 66 .........................................................................................................................................
4.1.10.1 Automatic startup file check 66 ...................................................................................................................
4.1.11 Document protection 67 ..............................................................................................................................
4.1.12 Exclusions 67 ...........................................................................................................................................
4.1.12.1 Performance exclusions 67 ........................................................................................................................
4.1.12.1.1 Add or Edit performance exclusion 68 ........................................................................................................
4.1.12.1.2 Path exclusion format 70 ........................................................................................................................
4.1.12.2 Detection exclusions 71 ............................................................................................................................
4.1.12.2.1 Add or Edit detection exclusion 73 .............................................................................................................
4.1.12.2.2 Create detection exclusion wizard 74 .........................................................................................................
4.1.12.3 Exclusions (7.1 and below) 75 .....................................................................................................................
4.1.12.4 Processes exclusions 75 ............................................................................................................................
4.1.12.4.1 Add or Edit processes exclusions 76 ...........................................................................................................
4.1.12.5 HIPS exclusions 77 ...................................................................................................................................
4.1.13 ThreatSense parameters 77 .........................................................................................................................
4.1.13.1 Cleaning levels 80 ...................................................................................................................................
4.1.13.2 File extensions excluded from scanning 81 ....................................................................................................
4.1.13.3 Additional ThreatSense parameters 82 ..........................................................................................................
4.2 Network 82 ...................................................................................................................................................
4.2.1 Network attack protection 83 .........................................................................................................................
4.2.1.1 Advanced filtering options 83 .......................................................................................................................
4.2.1.2 IDS exceptions 85 .....................................................................................................................................
4.2.1.3 Suspected threat blocked 87 ........................................................................................................................
4.2.1.4 Network protection troubleshooting 87 ...........................................................................................................
4.2.2 Temporary IP address blacklist 88 ....................................................................................................................
4.2.3 Solving problems with ESET Firewall 88 .............................................................................................................
4.2.3.1 Troubleshooting wizard 88 ..........................................................................................................................
4.2.3.2 Logging and creating rules or exceptions from log 88 .........................................................................................
4.2.3.2.1 Create rule from log 89 ............................................................................................................................
4.2.3.3 Creating exceptions from firewall notifications 89 ..............................................................................................
4.2.3.4 Advanced PCAP logging 89 ..........................................................................................................................
4.2.3.5 Solving problems with protocol filtering 90 ......................................................................................................
4.3 Web and email 90 .......................................................................................................................................
4.3.1 Protocol filtering 91 ......................................................................................................................................
4.3.1.1 Excluded applications 92 ............................................................................................................................
4.3.1.2 Excluded IP addresses 92 ............................................................................................................................
4.3.1.3 SSL/TLS 93 ..............................................................................................................................................
4.3.1.3.1 Certificates 94 .......................................................................................................................................
4.3.1.3.1 Encrypted network traffic 94 .....................................................................................................................
4.3.1.3.2 List of known certificates 95 ......................................................................................................................
4.3.1.3.3 List of SSL/TLS filtered applications 95 .........................................................................................................
4.3.2 Email client protection 96 ..............................................................................................................................
4.3.2.1 Email protocols 97 ....................................................................................................................................
4.3.2.2 Email alerts and notifications 98 ...................................................................................................................
4.3.2.3 Integration with email clients 98 ...................................................................................................................
4.3.2.3.1 Microsoft Outlook toolbar 99 ......................................................................................................................
4.3.2.3.2 Outlook Express and Windows Mail toolbar 99 ................................................................................................
4.3.2.3.3 Confirmation dialog 99 .............................................................................................................................