........................................................................85Encrypted SSL communication
3.9.3.1.4.1
........................................................................85List of known certificates
3.9.3.1.4.2
........................................................................86List of SSL/TLS filtered applications
3.9.3.1.4.3
..................................................................................86Email client protection
3.9.3.2
........................................................................86Email clients
3.9.3.2.1
........................................................................87Email protocols
3.9.3.2.2
........................................................................88Alerts and notifications
3.9.3.2.3
........................................................................89Antispam protection
3.9.3.2.4
........................................................................90Blacklist/Whitelist/Exceptions list
3.9.3.2.4.1
........................................................................91Adding addresses to whitelist and blacklist
3.9.3.2.4.2
........................................................................91Marking messages as spam or not spam
3.9.3.2.4.3
..................................................................................91Web access protection
3.9.3.3
........................................................................92Web protocols
3.9.3.3.1
........................................................................92URL address management
3.9.3.3.2
..................................................................................93Anti-Phishing protection
3.9.3.4
..............................................................................94Web control
3.9.4
..................................................................................95Rules
3.9.4.1
........................................................................96Adding Web control rules
3.9.4.1.1
..................................................................................97Category groups
3.9.4.2
..................................................................................98URL groups
3.9.4.3
..............................................................................98Updating the program
3.9.5
..................................................................................102Update setup
3.9.5.1
........................................................................104Update profiles
3.9.5.1.1
........................................................................104Update rollback
3.9.5.1.2
........................................................................105Update mode
3.9.5.1.3
........................................................................105HTTP Proxy
3.9.5.1.4
........................................................................106Connect to LAN as
3.9.5.1.5
........................................................................107Mirror
3.9.5.1.6
........................................................................109Updating from the Mirror
3.9.5.1.6.1
........................................................................111Troubleshooting Mirror update problems
3.9.5.1.6.2
..................................................................................111How to create update tasks
3.9.5.2
..............................................................................112Tools
3.9.6
..................................................................................113Log files
3.9.6.1
........................................................................114Search in log
3.9.6.1.1
..................................................................................114Proxy server setup
3.9.6.2
..................................................................................115Scheduler
3.9.6.3
..................................................................................116Protection statistics
3.9.6.4
..................................................................................117Watch activity
3.9.6.5
..................................................................................118ESET SysInspector
3.9.6.6
..................................................................................118ESET LiveGrid®
3.9.6.7
..................................................................................119Running processes
3.9.6.8
..................................................................................121Network connections
3.9.6.9
..................................................................................122Submission of samples for analysis
3.9.6.10
..................................................................................123Email notifications
3.9.6.11
..................................................................................125Quarantine
3.9.6.12
..................................................................................126Microsoft Windows update
3.9.6.13
..................................................................................126ESET CMD
3.9.6.14
..............................................................................127User interface
3.9.7
..................................................................................127User interface elements
3.9.7.1
..................................................................................129Access setup
3.9.7.2
..................................................................................130Alerts and notifications
3.9.7.3
........................................................................131Advanced settings conflict error
3.9.7.3.1
..................................................................................131System tray icon
3.9.7.4
..................................................................................132Context menu
3.9.7.5
....................................................................................................132Advanced user3.10
..............................................................................132Profile manager
3.10.1
..............................................................................133Diagnostics
3.10.2
..............................................................................133Import and export settings
3.10.3
..............................................................................134Command Line
3.10.4
..............................................................................136Idle-state detection
3.10.5
..............................................................................136ESET SysInspector
3.10.6
..................................................................................136Introduction to ESET SysInspector
3.10.6.1
........................................................................136Starting ESET SysInspector
3.10.6.1.1
..................................................................................137User Interface and application usage
3.10.6.2
........................................................................137Program Controls
3.10.6.2.1
........................................................................139Navigating in ESET SysInspector
3.10.6.2.2
........................................................................140Keyboard shortcuts
3.10.6.2.2.1
........................................................................141Compare
3.10.6.2.3
..................................................................................142Command line parameters
3.10.6.3
..................................................................................143Service Script
3.10.6.4
........................................................................143Generating Service script
3.10.6.4.1
........................................................................143Structure of the Service script
3.10.6.4.2
........................................................................146Executing Service scripts
3.10.6.4.3
..................................................................................146FAQ
3.10.6.5
..................................................................................147ESET SysInspector as part of ESET Endpoint Security
3.10.6.6
..............................................................................148Remote monitoring and management
3.10.7
..................................................................................149RMM Command Line
3.10.7.1
..................................................................................151List of JSON commands
3.10.7.2
........................................................................151get protection-status
3.10.7.2.1
........................................................................152get application-info
3.10.7.2.2
........................................................................155get license-info
3.10.7.2.3
........................................................................155get logs
3.10.7.2.4
........................................................................157get activation-status
3.10.7.2.5
........................................................................157get scan-info
3.10.7.2.6
........................................................................159get configuration
3.10.7.2.7
........................................................................160get update-status
3.10.7.2.8
........................................................................160start scan
3.10.7.2.9
........................................................................161start activation
3.10.7.2.10
........................................................................162start deactivation
3.10.7.2.11
........................................................................163start update
3.10.7.2.12
........................................................................164set configuration
3.10.7.2.13
....................................................................................................165Glossary3.11
..............................................................................165Types of threats
3.11.1
..................................................................................165Viruses
3.11.1.1
..................................................................................165Worms
3.11.1.2
..................................................................................165Trojans
3.11.1.3
..................................................................................166Rootkits
3.11.1.4
..................................................................................166Adware
3.11.1.5
..................................................................................166Spyware
3.11.1.6
..................................................................................167Packers
3.11.1.7
..................................................................................167Potentially unsafe applications
3.11.1.8
..................................................................................167Potentially unwanted applications
3.11.1.9
..................................................................................169Botnet
3.11.1.10
..............................................................................169Types of remote attacks
3.11.2