
..............................................................................89Product activation
4.8.5
..................................................................................90Registration
4.8.5.1
..................................................................................90Security Admin activation
4.8.5.2
..................................................................................90Activation failure
4.8.5.3
..................................................................................90License
4.8.5.4
..................................................................................90Activation progress
4.8.5.5
..................................................................................91Activation successful
4.8.5.6
.......................................................92Working with ESET Mail Security5.
....................................................................................................93Server5.1
..............................................................................94Agent priority setup
5.1.1
..................................................................................94Modify priority
5.1.1.1
..............................................................................94Agent priority setup
5.1.2
..............................................................................95Antivirus and antispyware
5.1.3
..............................................................................96Antispam protection
5.1.4
..................................................................................97Filtering and verification
5.1.4.1
..................................................................................98Advanced settings
5.1.4.2
..................................................................................101Greylisting settings
5.1.4.3
..............................................................................103Rules
5.1.5
..................................................................................103Rules list
5.1.5.1
........................................................................104Rule wizard
5.1.5.1.1
........................................................................105Rule condition
5.1.5.1.1.1
........................................................................106Rule action
5.1.5.1.1.2
..............................................................................107Mail transport protection
5.1.6
..................................................................................109Advanced settings
5.1.6.1
..............................................................................110Mailbox database protection
5.1.7
..............................................................................111On-demand database scan
5.1.8
..................................................................................112Additional mailbox items
5.1.8.1
..................................................................................113Proxy server
5.1.8.2
..................................................................................113Database scan account details
5.1.8.3
..............................................................................114Mail Quarantine
5.1.9
..................................................................................115Local quarantine
5.1.9.1
........................................................................116File storage
5.1.9.1.1
........................................................................117Web interface
5.1.9.1.2
..................................................................................121Quarantine mailbox and MS Exchange quarantine
5.1.9.2
........................................................................121Quarantine manager settings
5.1.9.2.1
........................................................................122Proxy server
5.1.9.2.2
..................................................................................123Quarantine manager account details
5.1.9.3
....................................................................................................123Computer5.2
..............................................................................124An infiltration is detected
5.2.1
..............................................................................125Processes exclusions
5.2.2
..............................................................................125Automatic exclusions
5.2.3
..............................................................................126Shared local cache
5.2.4
..............................................................................126Performance
5.2.5
..............................................................................126Real-time file system protection
5.2.6
..................................................................................127Exclusions
5.2.6.1
........................................................................128Add or Edit exclusion
5.2.6.1.1
........................................................................128Exclusion format
5.2.6.1.2
..................................................................................128ThreatSense parameters
5.2.6.2
........................................................................131File extenstions excluded from scanning
5.2.6.2.1
........................................................................131Additional ThreatSense parameters
5.2.6.2.2
........................................................................131Cleaning levels
5.2.6.2.3
........................................................................132When to modify real-time protection configuration
5.2.6.2.4
........................................................................132Checking real-time protection
5.2.6.2.5
........................................................................132What to do if real-time protection does not work
5.2.6.2.6
........................................................................132Submission
5.2.6.2.7
........................................................................133Statistics
5.2.6.2.8
........................................................................133Suspicious files
5.2.6.2.9
..............................................................................134On-demand computer scan and Hyper-V scan
5.2.7
..................................................................................134Custom scan and Hyper-V scan launcher
5.2.7.1
..................................................................................136Scan progress
5.2.7.2
..................................................................................137Profile manager
5.2.7.3
..................................................................................138Scan targets
5.2.7.4
..................................................................................138Pause a scheduled scan
5.2.7.5
..............................................................................138Idle-state scanning
5.2.8
..............................................................................139Startup scan
5.2.9
..................................................................................139Automatic startup file check
5.2.9.1
..............................................................................139Removable media
5.2.10
..............................................................................140Document protection
5.2.11
..............................................................................140HIPS
5.2.12
..................................................................................141HIPS rules
5.2.12.1
........................................................................142HIPS rule settings
5.2.12.1.1
..................................................................................143Advanced setup
5.2.12.2
........................................................................143Drivers always allowed to load
5.2.12.2.1
....................................................................................................144Update5.3
..............................................................................145Update rollback
5.3.1
..............................................................................145Update mode
5.3.2
..............................................................................145HTTP Proxy
5.3.3
..............................................................................146Connect to LAN as
5.3.4
..............................................................................147Mirror
5.3.5
..................................................................................148Updating from the Mirror
5.3.5.1
..................................................................................149Mirror files
5.3.5.2
..................................................................................150Troubleshooting Mirror update problems
5.3.5.3
..............................................................................150How to create update tasks
5.3.6
....................................................................................................150Web and email5.4
..............................................................................151Protocol filtering
5.4.1
..................................................................................151Excluded applications
5.4.1.1
..................................................................................151Excluded IP addresses
5.4.1.2
..................................................................................151Web and email clients
5.4.1.3
..............................................................................152SSL/TLS
5.4.2
..................................................................................152Encrypted SSL communication
5.4.2.1
..................................................................................153List of known certificates
5.4.2.2
..............................................................................153Email client protection
5.4.3
..................................................................................154Email protocols
5.4.3.1
..................................................................................154Alerts and notifications
5.4.3.2
..................................................................................155MS Outlook toolbar
5.4.3.3
..................................................................................155Outlook Express and Windows Mail toolbar
5.4.3.4
..................................................................................155Confirmation dialog
5.4.3.5
..................................................................................155Rescan messages
5.4.3.6
..............................................................................156Web access protection
5.4.4
..................................................................................156Basic
5.4.4.1
..................................................................................157URL address management
5.4.4.2
........................................................................157Create new list
5.4.4.2.1
........................................................................158Address list
5.4.4.2.2