4.2 Email client protection 91 ................................................................................................................
4.2 Email client integration 92 ...............................................................................................................
4.2 Microsoft Outlook toolbar 92 .............................................................................................................
4.2 Outlook Express and Windows Mail toolbar 92 .........................................................................................
4.2 Confirmation dialog 93 ...................................................................................................................
4.2 Rescan messages 93 .....................................................................................................................
4.2 Email protocols 93 ........................................................................................................................
4.2 POP3, POP3S filter 94 ....................................................................................................................
4.2 Email tags 95 .............................................................................................................................
4.2 Web access protection 95 ...............................................................................................................
4.2 Web access protection advanced setup 98 .............................................................................................
4.2 Web protocols 98 .........................................................................................................................
4.2 URL address management 99 ...........................................................................................................
4.2 URL addresses list 100 ..................................................................................................................
4.2 Create new list 101 ......................................................................................................................
4.2 How to add URL mask 102 ..............................................................................................................
4.2 Anti-Phishing protection 102 ............................................................................................................
4.3 Updating the program 104 .............................................................................................................
4.3 Update setup 106 ........................................................................................................................
4.3 Update rollback 108 .....................................................................................................................
4.3 Rollback time interval 110 ..............................................................................................................
4.3 Product updates 110 ....................................................................................................................
4.3 Connection options 110 .................................................................................................................
4.3 How to create update tasks 111 ........................................................................................................
4.3 Dialog window - Restart required 111 ..................................................................................................
4.4 Tools 112 .....................................................................................................................................
4.4 Tools in ESET NOD32 Antivirus 112 .....................................................................................................
4.4 Log files 113 .............................................................................................................................
4.4 Log filtering 115 .........................................................................................................................
4.4 Logging configuration 117 ..............................................................................................................
4.4 Running processes 118 ..................................................................................................................
4.4 Security report 119 ......................................................................................................................
4.4 ESET SysInspector 120 ..................................................................................................................
4.4 Scheduler 121 ...........................................................................................................................
4.4 Scheduled scan options 124 ............................................................................................................
4.4 Scheduled task overview 124 ...........................................................................................................
4.4 Task details 125 .........................................................................................................................
4.4 Task timing 125 ..........................................................................................................................
4.4 Task timing - Once 125 ..................................................................................................................
4.4 Task timing - Daily 125 ..................................................................................................................
4.4 Task timing - Weekly 126 ...............................................................................................................
4.4 Task timing - Event triggered 126 ......................................................................................................
4.4 Skipped task 126 ........................................................................................................................
4.4 Task details - Update 127 ...............................................................................................................
4.4 Task details - Run application 127 ......................................................................................................
4.4 System cleaner 127 .....................................................................................................................
4.4 ESET SysRescue Live 129 ...............................................................................................................
4.4 Quarantine 129 ..........................................................................................................................
4.4 Proxy server 132 .........................................................................................................................
4.4 Select sample for analysis 133 ..........................................................................................................
4.4 Select sample for analysis - Suspicious file 134 ........................................................................................