4.1.7.1 Device control rules editor 57 .......................................................................................................................
4.1.7.1.1 Detected devices 58 ................................................................................................................................
4.1.7.2 Device groups 58 ......................................................................................................................................
4.1.7.3 Adding Device control rules 58 .....................................................................................................................
4.1.8 Host-based Intrusion Prevention System (HIPS) 60 ...............................................................................................
4.1.8.1 HIPS interactive window 62 .........................................................................................................................
4.1.8.1.1 Potential ransomware behavior detected 63 ..................................................................................................
4.1.8.2 HIPS rule management 64 ...........................................................................................................................
4.1.8.2.1 HIPS rule settings 65 ...............................................................................................................................
4.1.8.3 HIPS advanced setup 67 .............................................................................................................................
4.1.8.3.1 Drivers always allowed to load 67 ...............................................................................................................
4.1.9 Presentation mode 68 ..................................................................................................................................
4.1.10 Startup scan 68 .........................................................................................................................................
4.1.10.1 Automatic startup file check 69 ...................................................................................................................
4.1.11 Document protection 69 ..............................................................................................................................
4.1.12 Exclusions 69 ...........................................................................................................................................
4.1.12.1 Performance exclusions 70 ........................................................................................................................
4.1.12.1.1 Add or Edit performance exclusion 71 ........................................................................................................
4.1.12.1.2 Path exclusion format 72 ........................................................................................................................
4.1.12.2 Detection exclusions 73 ............................................................................................................................
4.1.12.2.1 Add or Edit detection exclusion 75 .............................................................................................................
4.1.12.2.2 Create detection exclusion wizard 76 .........................................................................................................
4.1.12.3 Exclusions (7.1 and below) 77 .....................................................................................................................
4.1.12.4 Processes exclusions 77 ............................................................................................................................
4.1.12.4.1 Add or Edit processes exclusions 78 ...........................................................................................................
4.1.12.5 HIPS exclusions 79 ...................................................................................................................................
4.1.13 ThreatSense parameters 79 .........................................................................................................................
4.1.13.1 Cleaning levels 82 ...................................................................................................................................
4.1.13.2 File extensions excluded from scanning 83 ....................................................................................................
4.1.13.3 Additional ThreatSense parameters 84 ..........................................................................................................
4.2 Network 84 ...................................................................................................................................................
4.2.1 Firewall 85 .................................................................................................................................................
4.2.1.1 Learning mode 87 .....................................................................................................................................
4.2.2 Network attack protection 88 .........................................................................................................................
4.2.2.1 Advanced filtering options 88 .......................................................................................................................
4.2.2.2 IDS exceptions 91 .....................................................................................................................................
4.2.2.3 Suspected threat blocked 93 ........................................................................................................................
4.2.2.4 Network protection troubleshooting 94 ...........................................................................................................
4.2.3 Connected networks 94 ................................................................................................................................
4.2.4 Known networks 94 ......................................................................................................................................
4.2.4.1 Known networks editor 95 ...........................................................................................................................
4.2.4.2 Network authentication - Server configuration 97 ..............................................................................................
4.2.5 Firewall profiles 97 ......................................................................................................................................
4.2.5.1 Profiles assigned to network adapters 98 ........................................................................................................
4.2.6 Application modification detection 98 ...............................................................................................................
4.2.6.1 Applications excluded from modification detection 99 ........................................................................................
4.2.7 Configuring and using rules 99 ........................................................................................................................
4.2.7.1 Firewall rules list 99 ...................................................................................................................................
4.2.7.2 Adding or editing Firewall rules 100 ...............................................................................................................
4.2.7.2.1 Firewall rule - Local 102 ...........................................................................................................................
4.2.7.2.2 Firewall rule - Remote 103 ........................................................................................................................
4.2.8 Temporary IP address blacklist 104 ..................................................................................................................
4.2.9 Trusted zone 104 ........................................................................................................................................
4.2.10 Configuring zones 105 ................................................................................................................................
4.2.10.1 Firewall zones 105 ..................................................................................................................................
4.2.11 Firewall log 105 ........................................................................................................................................
4.2.12 Establishing connection - detection 106 ..........................................................................................................
4.2.13 Solving problems with ESET Firewall 107 .........................................................................................................