4.1.6.1 Device control rules editor 57 .......................................................................................................................
4.1.6.1.1 Detected devices 58 ................................................................................................................................
4.1.6.2 Device groups 58 ......................................................................................................................................
4.1.6.3 Adding Device control rules 59 .....................................................................................................................
4.1.7 Host-based Intrusion Prevention System (HIPS) 61 ...............................................................................................
4.1.7.1 HIPS interactive window 63 .........................................................................................................................
4.1.7.1.1 Potential ransomware behavior detected 64 ..................................................................................................
4.1.7.2 HIPS rule management 65 ...........................................................................................................................
4.1.7.2.1 HIPS rule settings 66 ...............................................................................................................................
4.1.7.3 HIPS advanced setup 68 .............................................................................................................................
4.1.7.3.1 Drivers always allowed to load 68 ...............................................................................................................
4.1.8 Presentation mode 68 ..................................................................................................................................
4.1.9 Startup scan 69 ..........................................................................................................................................
4.1.9.1 Automatic startup file check 69 ....................................................................................................................
4.1.10 Document protection 70 ..............................................................................................................................
4.1.11 Exclusions 70 ...........................................................................................................................................
4.1.11.1 Performance exclusions 71 ........................................................................................................................
4.1.11.1.1 Add or Edit performance exclusion 72 ........................................................................................................
4.1.11.1.2 Path exclusion format 73 ........................................................................................................................
4.1.11.2 Detection exclusions 74 ............................................................................................................................
4.1.11.2.1 Add or Edit detection exclusion 76 .............................................................................................................
4.1.11.2.2 Create detection exclusion wizard 77 .........................................................................................................
4.1.11.3 Exclusions (7.1 and below) 78 .....................................................................................................................
4.1.11.4 Processes exclusions 78 ............................................................................................................................
4.1.11.4.1 Add or Edit processes exclusions 79 ...........................................................................................................
4.1.11.5 HIPS exclusions 80 ...................................................................................................................................
4.1.12 ThreatSense parameters 80 .........................................................................................................................
4.1.12.1 Cleaning levels 83 ...................................................................................................................................
4.1.12.2 File extensions excluded from scanning 84 ....................................................................................................
4.1.12.3 Additional ThreatSense parameters 85 ..........................................................................................................
4.2 Network 85 ...................................................................................................................................................
4.2.1 Firewall 86 .................................................................................................................................................
4.2.1.1 Learning mode 88 .....................................................................................................................................
4.2.2 Network attack protection 89 .........................................................................................................................
4.2.2.1 Advanced filtering options 89 .......................................................................................................................
4.2.2.2 IDS rules 92 .............................................................................................................................................
4.2.2.3 Suspected threat blocked 94 ........................................................................................................................
4.2.2.4 Network protection troubleshooting 95 ...........................................................................................................
4.2.3 Connected networks 95 ................................................................................................................................
4.2.4 Known networks 95 ......................................................................................................................................
4.2.4.1 Known networks editor 96 ...........................................................................................................................
4.2.4.2 Network authentication - Server configuration 98 ..............................................................................................
4.2.5 Firewall profiles 98 ......................................................................................................................................
4.2.5.1 Profiles assigned to network adapters 99 ........................................................................................................
4.2.6 Application modification detection 99 ...............................................................................................................
4.2.6.1 Applications excluded from modification detection 100 ......................................................................................
4.2.7 Configuring and using rules 100 ......................................................................................................................
4.2.7.1 Firewall rules list 100 .................................................................................................................................
4.2.7.2 Adding or editing Firewall rules 101 ...............................................................................................................
4.2.7.2.1 Firewall rule - Local 103 ...........................................................................................................................
4.2.7.2.2 Firewall rule - Remote 104 ........................................................................................................................
4.2.8 Temporary IP address blacklist 105 ..................................................................................................................
4.2.9 Trusted zone 105 ........................................................................................................................................
4.2.10 Configuring zones 106 ................................................................................................................................
4.2.10.1 Firewall zones 106 ..................................................................................................................................
4.2.11 Firewall log 106 ........................................................................................................................................
4.2.12 Establishing connection - detection 107 ..........................................................................................................
4.2.13 Solving problems with ESET Firewall 108 .........................................................................................................