4.5 Cluster 53 .................................................................................................................................
4.5 Cluster wizard - Select nodes 54 ........................................................................................................
4.5 Cluster wizard - Cluster settings 56 .....................................................................................................
4.5 Cluster wizard - Cluster setup settings 56 ..............................................................................................
4.5 Cluster wizard - Nodes check 56 .........................................................................................................
4.5 Cluster wizard - Nodes install 58 ........................................................................................................
4.5 ESET Shell 61 .............................................................................................................................
4.5 Usage 63 ..................................................................................................................................
4.5 Commands 68 ............................................................................................................................
4.5 Keyboard shortcuts 71 ...................................................................................................................
4.5 Batch files / Scripting 71 .................................................................................................................
4.5 ESET SysInspector 72 ....................................................................................................................
4.5 ESET SysRescue Live 73 .................................................................................................................
4.5 Scheduler 73 .............................................................................................................................
4.5 Scheduler - Add task 75 ..................................................................................................................
4.5 Task type 77 ..............................................................................................................................
4.5 Task timing 77 ............................................................................................................................
4.5 Event triggered 78 .......................................................................................................................
4.5 Run application 78 .......................................................................................................................
4.5 Skipped task 78 ..........................................................................................................................
4.5 Scheduled task overview 79 .............................................................................................................
4.5 Submit samples for analysis 79 .........................................................................................................
4.5 Suspicious file 80 .........................................................................................................................
4.5 Suspicious site 80 ........................................................................................................................
4.5 False positive file 80 .....................................................................................................................
4.5 False positive site 81 .....................................................................................................................
4.5 Other 81 ..................................................................................................................................
4.5 Quarantine 81 ............................................................................................................................
5 Server protection settings 83 ...............................................................................................................
5.1 Performance Counters 84 ...............................................................................................................
5.2 On-access filter 86 ........................................................................................................................
5.2 Antivirus and antispyware 87 ............................................................................................................
5.3 On-demand database scan 88 .........................................................................................................
5.3 On-demand database scan targets 89 ..................................................................................................
5.3 Antivirus and antispyware 91 ............................................................................................................
5.4 Rules 91 .......................................................................................................................................
5.4 Rules list 92 ...............................................................................................................................
5.4 Rule wizard 93 ............................................................................................................................
5.4 Rule condition 94 .........................................................................................................................
5.4 Rule action 95 ............................................................................................................................
6 General settings 96 ..............................................................................................................................
6.1 Computer 97 ................................................................................................................................
6.1 Machine learning protection 99 ..........................................................................................................
6.1 Exclusions 101 ...........................................................................................................................
6.1 Performance exclusions 102 ............................................................................................................
6.1 Create exclusion wizard 104 ............................................................................................................
6.1 Advanced options 105 ...................................................................................................................
6.1 Automatic exclusions 105 ...............................................................................................................
6.1 Shared local cache 105 ..................................................................................................................
6.1 An infiltration is detected 106 ...........................................................................................................
6.1 Real-time file system protection 107 ...................................................................................................