5.6.1 Running processes 56 ..................................................................................................................................
5.6.2 Watch activity 58 ........................................................................................................................................
5.6.3 Protection statistics 59 .................................................................................................................................
5.6.4 Cluster 61 .................................................................................................................................................
5.6.4.1 Cluster wizard - Select nodes 63 ...................................................................................................................
5.6.4.2 Cluster wizard - Cluster settings 64 ................................................................................................................
5.6.4.3 Cluster wizard - Cluster setup settings 65 ........................................................................................................
5.6.4.4 Cluster wizard - Nodes check 65 ...................................................................................................................
5.6.4.5 Cluster wizard - Nodes install 67 ...................................................................................................................
5.6.5 ESET Shell 70 .............................................................................................................................................
5.6.5.1 Usage 72 ................................................................................................................................................
5.6.5.2 Commands 77 ..........................................................................................................................................
5.6.5.3 Batch files / Scripting 80 .............................................................................................................................
5.6.6 ESET Dynamic Threat Defense 81 ....................................................................................................................
5.6.7 ESET SysInspector 82 ...................................................................................................................................
5.6.8 ESET SysRescue Live 83 ................................................................................................................................
5.6.9 Scheduler 83 ..............................................................................................................................................
5.6.9.1 Scheduler - Add task 84 ..............................................................................................................................
5.6.9.1.1 Task type 86 .........................................................................................................................................
5.6.9.1.2 Task timing 87 .......................................................................................................................................
5.6.9.1.3 Event triggered 87 ..................................................................................................................................
5.6.9.1.4 Run application 88 ..................................................................................................................................
5.6.9.1.5 Skipped task 88 .....................................................................................................................................
5.6.9.1.6 Scheduled task overview 88 ......................................................................................................................
5.6.10 Submit samples for analysis 88 .....................................................................................................................
5.6.10.1 Suspicious file 89 ....................................................................................................................................
5.6.10.2 Suspicious site 89 ....................................................................................................................................
5.6.10.3 False positive file 90 ................................................................................................................................
5.6.10.4 False positive site 90 ................................................................................................................................
5.6.10.5 Other 90 ...............................................................................................................................................
5.6.11 Quarantine 90 ...........................................................................................................................................
6 Server protection settings 92 ..................................................................................................................
6.1 Agent priority setup 92 ..............................................................................................................................
6.2 Antivirus and antispyware 93 ...................................................................................................................
6.3 Antispam protection 95 .............................................................................................................................
6.3.1 Filtering and verification 97 ............................................................................................................................
6.3.2 Antispam advanced settings 98 ......................................................................................................................
6.3.3 Greylisting settings 101 ................................................................................................................................
6.3.4 SPF and DKIM 102 .......................................................................................................................................
6.3.5 Backscatter protection 104 ............................................................................................................................
6.4 Anti-Phishing protection 105 ....................................................................................................................
6.5 Rules 105 ......................................................................................................................................................
6.5.1 Rule condition 108 ......................................................................................................................................
6.5.2 Rule action 111 ..........................................................................................................................................
6.5.3 Rule examples 113 ......................................................................................................................................
6.6 Mail transport protection 114 ...................................................................................................................
6.6.1 Mail transport advanced settings 116 ...............................................................................................................
6.7 Mailbox database protection 117 .............................................................................................................
6.7.1 Background scan 118 ...................................................................................................................................
6.8 On-demand mailbox database scan 119 ..................................................................................................
6.8.1 Mailbox database scan 121 ...........................................................................................................................
6.8.2 Office 365 mailbox scan 123 ..........................................................................................................................
6.8.3 Additional mailbox items 124 .........................................................................................................................
6.8.4 Proxy server 124 ........................................................................................................................................
6.8.5 Database scan account details 125 ..................................................................................................................
6.9 Mail Quarantine types 126 .........................................................................................................................
6.9.1 Local quarantine 127 ...................................................................................................................................