6.6 Tools 55 ........................................................................................................................................................
6.6.1 Running processes 56 ..................................................................................................................................
6.6.2 Watch activity 58 ........................................................................................................................................
6.6.3 Protection statistics 59 .................................................................................................................................
6.6.4 Cluster 61 .................................................................................................................................................
6.6.4.1 Cluster wizard - Select nodes 63 ...................................................................................................................
6.6.4.2 Cluster wizard - Cluster settings 64 ................................................................................................................
6.6.4.3 Cluster wizard - Cluster setup settings 65 ........................................................................................................
6.6.4.4 Cluster wizard - Nodes check 65 ...................................................................................................................
6.6.4.5 Cluster wizard - Nodes install 67 ...................................................................................................................
6.6.5 ESET Shell 70 .............................................................................................................................................
6.6.5.1 Usage 72 ................................................................................................................................................
6.6.5.2 Commands 77 ..........................................................................................................................................
6.6.5.3 Batch files / Scripting 80 .............................................................................................................................
6.6.6 ESET Dynamic Threat Defense 81 ....................................................................................................................
6.6.7 ESET SysInspector 82 ...................................................................................................................................
6.6.8 ESET SysRescue Live 83 ................................................................................................................................
6.6.9 Scheduler 83 ..............................................................................................................................................
6.6.9.1 Scheduler - Add task 84 ..............................................................................................................................
6.6.9.1.1 Task type 86 .........................................................................................................................................
6.6.9.1.2 Task timing 87 .......................................................................................................................................
6.6.9.1.3 Event triggered 87 ..................................................................................................................................
6.6.9.1.4 Run application 88 ..................................................................................................................................
6.6.9.1.5 Skipped task 88 .....................................................................................................................................
6.6.9.1.6 Scheduled task overview 88 ......................................................................................................................
6.6.10 Submit samples for analysis 88 .....................................................................................................................
6.6.10.1 Suspicious file 89 ....................................................................................................................................
6.6.10.2 Suspicious site 89 ....................................................................................................................................
6.6.10.3 False positive file 90 ................................................................................................................................
6.6.10.4 False positive site 90 ................................................................................................................................
6.6.10.5 Other 90 ...............................................................................................................................................
6.6.11 Quarantine 90 ...........................................................................................................................................
7 Server protection settings 92 ..................................................................................................................
7.1 Agent priority setup 92 ..............................................................................................................................
7.2 Antivirus and antispyware 93 ...................................................................................................................
7.3 Antispam protection 95 .............................................................................................................................
7.3.1 Filtering and verification 97 ............................................................................................................................
7.3.2 Antispam advanced settings 99 ......................................................................................................................
7.3.3 Greylisting settings 102 ................................................................................................................................
7.3.4 SPF and DKIM 103 .......................................................................................................................................
7.3.5 Backscatter protection 105 ............................................................................................................................
7.4 Anti-Phishing protection 106 ....................................................................................................................
7.5 Rules 106 ......................................................................................................................................................
7.5.1 Rule condition 109 ......................................................................................................................................
7.5.2 Rule action 112 ..........................................................................................................................................
7.5.3 Rule examples 114 ......................................................................................................................................
7.6 Mail transport protection 115 ...................................................................................................................
7.6.1 Mail transport advanced settings 117 ...............................................................................................................
7.7 Mailbox database protection 118 .............................................................................................................
7.7.1 Background scan 119 ...................................................................................................................................
7.8 On-demand mailbox database scan 120 ..................................................................................................
7.8.1 Mailbox database scan 122 ...........................................................................................................................
7.8.2 Office 365 mailbox scan 124 ..........................................................................................................................
7.8.3 Additional mailbox items 125 .........................................................................................................................
7.8.4 Proxy server 125 ........................................................................................................................................
7.8.5 Database scan account details 126 ..................................................................................................................
7.9 Mail Quarantine types 127 .........................................................................................................................