5.5 Protection statistics 56 ...................................................................................................................
5.5 Cluster 58 .................................................................................................................................
5.5 Cluster wizard - Select nodes 60 ........................................................................................................
5.5 Cluster wizard - Cluster settings 61 .....................................................................................................
5.5 Cluster wizard - Cluster setup settings 61 ..............................................................................................
5.5 Cluster wizard - Nodes check 62 .........................................................................................................
5.5 Cluster wizard - Nodes install 63 ........................................................................................................
5.5 ESET Shell 66 .............................................................................................................................
5.5 Usage 68 ..................................................................................................................................
5.5 Commands 73 ............................................................................................................................
5.5 Batch files / Scripting 76 .................................................................................................................
5.5 ESET SysInspector 77 ....................................................................................................................
5.5 ESET SysRescue Live 78 .................................................................................................................
5.5 Scheduler 78 .............................................................................................................................
5.5 Scheduler - Add task 79 ..................................................................................................................
5.5 Task type 81 ..............................................................................................................................
5.5 Task timing 82 ............................................................................................................................
5.5 Event triggered 82 .......................................................................................................................
5.5 Run application 83 .......................................................................................................................
5.5 Skipped task 83 ..........................................................................................................................
5.5 Scheduled task overview 83 .............................................................................................................
5.5 Submit samples for analysis 83 .........................................................................................................
5.5 Suspicious file 84 .........................................................................................................................
5.5 Suspicious site 84 ........................................................................................................................
5.5 False positive file 85 .....................................................................................................................
5.5 False positive site 85 .....................................................................................................................
5.5 Other 86 ..................................................................................................................................
5.5 Quarantine 86 ............................................................................................................................
6 Server protection settings 87 ...............................................................................................................
6.1 Performance Counters 89 ...............................................................................................................
6.2 On-access filter 90 ........................................................................................................................
6.2 Antivirus and antispyware 91 ............................................................................................................
6.3 On-demand database scan 92 .........................................................................................................
6.3 On-demand database scan targets 93 ..................................................................................................
6.3 Antivirus and antispyware 94 ............................................................................................................
6.4 Rules 95 .......................................................................................................................................
6.4 Rules list 95 ...............................................................................................................................
6.4 Rule wizard 96 ............................................................................................................................
6.4 Rule condition 98 .........................................................................................................................
6.4 Rule action 99 ............................................................................................................................
7 General settings 99 ..............................................................................................................................
7.1 Computer 100 ..............................................................................................................................
7.1 Machine learning protection 102 ........................................................................................................
7.1 Exclusions 105 ...........................................................................................................................
7.1 Performance exclusions 105 ............................................................................................................
7.1 Detection exlusions 107 .................................................................................................................
7.1 Create exclusion wizard 108 ............................................................................................................
7.1 Advanced options 109 ...................................................................................................................
7.1 Automatic exclusions 109 ...............................................................................................................
7.1 Shared local cache 109 ..................................................................................................................
7.1 An infiltration is detected 110 ...........................................................................................................