....................................................................................................78Network protection4.3
..............................................................................79Firewall
4.3.1
..................................................................................81Learning mode settings
4.3.1.1
..............................................................................82Firewall profiles
4.3.2
..................................................................................82Profiles assigned to network adapters
4.3.2.1
..............................................................................82Application modification detection
4.3.3
..................................................................................83List of applications excluded from checking
4.3.3.1
..............................................................................83Configuring and using rules
4.3.4
..................................................................................84Firewall rules
4.3.4.1
..................................................................................85Working with rules
4.3.4.2
..............................................................................85Configuring zones
4.3.5
..................................................................................86Firewall zones
4.3.5.1
..............................................................................86Network attack protection
4.3.6
..................................................................................86IDS exceptions
4.3.6.1
..................................................................................89Allowed services and advanced options
4.3.6.2
..................................................................................92Suspected threat blocked
4.3.6.3
..................................................................................92Network protection troubleshooting
4.3.6.4
..............................................................................92Connected networks
4.3.7
..................................................................................93Network adapters
4.3.7.1
..............................................................................93Known networks
4.3.8
..................................................................................93Known networks editor
4.3.8.1
..................................................................................97Network authentication - Server configuration
4.3.8.2
..............................................................................97Temporary IP address blacklist
4.3.9
..............................................................................98Firewall log
4.3.10
..............................................................................98Establishing connection - detection
4.3.11
..............................................................................99Solving problems with ESET Firewall
4.3.12
..................................................................................99Troubleshooting wizard
4.3.12.1
..................................................................................99Logging and creating rules or exceptions from log
4.3.12.2
........................................................................100Create rule from log
4.3.12.2.1
..................................................................................100
Creating exceptions from Personal firewall
notifications
4.3.12.3
..................................................................................100Advanced PCAP logging
4.3.12.4
..................................................................................100Solving problems with protocol filtering
4.3.12.5
....................................................................................................101Security tools4.4
..............................................................................101An overview to ESET Anti-Theft
4.4.1
..................................................................................102Sign in with your my.eset.com account
4.4.1.1
........................................................................102Computer name
4.4.1.1.1
........................................................................102Adding new device - progress
4.4.1.1.2
........................................................................102Device associaton completed
4.4.1.1.3
........................................................................102Adding new device failed
4.4.1.1.4
........................................................................103Disable Anti-Theft
4.4.1.1.5
..............................................................................103Banking and Payment protection
4.4.2
..................................................................................103Banking and Payment protection advanced setup
4.4.2.1
..................................................................................103Protected websites
4.4.2.2
..............................................................................104Parental control
4.4.3
..................................................................................106Categories
4.4.3.1
..................................................................................107Website exceptions
4.4.3.2
....................................................................................................108Updating the program4.5
..............................................................................111Update settings
4.5.1
..................................................................................113Advanced update setup
4.5.1.1
........................................................................113Update mode
4.5.1.1.1
........................................................................113Connection options
4.5.1.1.2
..............................................................................114Update rollback
4.5.2
..............................................................................115How to create update tasks
4.5.3
....................................................................................................116Tools4.6
..............................................................................116Connected Home Monitor
4.6.1
..................................................................................118Network device
4.6.1.1
..............................................................................118Webcam Protection
4.6.2
..............................................................................119Tools in ESET Internet Security
4.6.3
..................................................................................120Log files
4.6.3.1
........................................................................121Log filtering
4.6.3.1.1
........................................................................122Logging configuration
4.6.3.1.2
..................................................................................123Running processes
4.6.3.2
..................................................................................124Security report
4.6.3.3
..................................................................................125Watch activity
4.6.3.4
..................................................................................126Network connections
4.6.3.5
..................................................................................127ESET SysInspector
4.6.3.6
..................................................................................127Scheduler
4.6.3.7
..................................................................................129System cleaner
4.6.3.8
..................................................................................130ESET SysRescue Live
4.6.3.9
..................................................................................130Cloud-based protection
4.6.3.10
........................................................................131Suspicious files
4.6.3.10.1
..................................................................................132Quarantine
4.6.3.11
..................................................................................133Proxy server
4.6.3.12
..................................................................................134Email notifications
4.6.3.13
........................................................................135Message format
4.6.3.13.1
..................................................................................135Select sample for analysis
4.6.3.14
..................................................................................136Microsoft Windows® update
4.6.3.15
..................................................................................137ESET CMD
4.6.3.16
....................................................................................................138User interface4.7
..............................................................................139User interface elements
4.7.1
..............................................................................139Alerts and notifications
4.7.2
..................................................................................141Confirmation messages
4.7.2.1
..............................................................................141Access setup
4.7.3
..............................................................................142System tray icon
4.7.4
..............................................................................143Help and support
4.7.5
..................................................................................145About ESET Internet Security
4.7.5.1
..................................................................................145ESET News
4.7.5.2
..................................................................................146Submit system configuration data
4.7.5.3
.......................................................147Advanced user5.
....................................................................................................147Profiles5.1
....................................................................................................147Keyboard shortcuts5.2
....................................................................................................148Diagnostics5.3
....................................................................................................149Import and export settings5.4
....................................................................................................149Command Line5.5
....................................................................................................151Idle-state detection5.6
.......................................................152Common Questions6.
....................................................................................................152
How to update the ESET Internet
Security
6.1
....................................................................................................152How to remove a virus from my PC6.2
....................................................................................................153
How to allow communication for a
certain application
6.3