5.6 Tools 56 .......................................................................................................................................
5.6 Running processes 57 ....................................................................................................................
5.6 Protection statistics 59 ...................................................................................................................
5.6 Cluster 61 .................................................................................................................................
5.6 Cluster wizard - Select nodes 63 ........................................................................................................
5.6 Cluster wizard - Cluster settings 64 .....................................................................................................
5.6 Cluster wizard - Cluster setup settings 65 ..............................................................................................
5.6 Cluster wizard - Nodes check 65 .........................................................................................................
5.6 Cluster wizard - Nodes install 67 ........................................................................................................
5.6 ESET Shell 69 .............................................................................................................................
5.6 Usage 71 ..................................................................................................................................
5.6 Commands 76 ............................................................................................................................
5.6 Keyboard shortcuts 79 ...................................................................................................................
5.6 Batch files / Scripting 80 .................................................................................................................
5.6 ESET LiveGuard Advanced 81 ...........................................................................................................
5.6 ESET SysInspector 82 ....................................................................................................................
5.6 ESET SysRescue Live 83 .................................................................................................................
5.6 Scheduler 83 .............................................................................................................................
5.6 Scheduler - Add task 84 ..................................................................................................................
5.6 Task type 87 ..............................................................................................................................
5.6 Task execution 88 ........................................................................................................................
5.6 Event triggered 88 .......................................................................................................................
5.6 Run application 89 .......................................................................................................................
5.6 Skipped task 89 ..........................................................................................................................
5.6 Mail server protection report 89 .........................................................................................................
5.6 Scheduled task overview 90 .............................................................................................................
5.6 Submit samples for analysis 90 .........................................................................................................
5.6 Suspicious file 91 .........................................................................................................................
5.6 Suspicious site 91 ........................................................................................................................
5.6 False positive file 92 .....................................................................................................................
5.6 False positive site 92 .....................................................................................................................
5.6 Other 92 ..................................................................................................................................
5.6 Quarantine 93 ............................................................................................................................
5.7 Microsoft 365 mailbox scan wizard 94 .............................................................................................
5.7 Register ESET Mail Security scanner 95 .................................................................................................
5.7 Unregister ESET Mail Security scanner 98 ..............................................................................................
6 Server protection settings 100 .............................................................................................................
6.1 Agent priority setup 101 ................................................................................................................
6.2 Antivirus and antispyware 102 .......................................................................................................
6.3 Antispam protection 103 ...............................................................................................................
6.3 Filtering and verification 104 ............................................................................................................
6.3 Antispam advanced settings 106 .......................................................................................................
6.3 Greylisting settings 110 .................................................................................................................
6.3 SPF and DKIM 111 .......................................................................................................................
6.3 Backscatter protection 113 .............................................................................................................
6.3 Sender spoofing protection 114 .........................................................................................................
6.4 Anti-Phishing protection 115 ..........................................................................................................
6.5 Rules 116 .....................................................................................................................................
6.5 Rule condition 119 .......................................................................................................................
6.5 Rule action 124 ..........................................................................................................................
6.5 Rule examples 126 ......................................................................................................................