4.1 Malware scans 55 ........................................................................................................................
4.1 Idle-state scan 55 ........................................................................................................................
4.1 Scan profiles 56 ..........................................................................................................................
4.1 Scan targets 57 ...........................................................................................................................
4.1 Device control 57 .........................................................................................................................
4.1 Device control rules editor 58 ...........................................................................................................
4.1 Detected devices 59 .....................................................................................................................
4.1 Adding Device control rules 59 ..........................................................................................................
4.1 Device groups 61 .........................................................................................................................
4.1 Host-based Intrusion Prevention System (HIPS) 62 .....................................................................................
4.1 HIPS interactive window 65 ..............................................................................................................
4.1 Potential ransomware behavior detected 66 ............................................................................................
4.1 HIPS rule management 67 ...............................................................................................................
4.1 HIPS rule settings 68 .....................................................................................................................
4.1 HIPS advanced setup 70 .................................................................................................................
4.1 Drivers always allowed to load 70 .......................................................................................................
4.1 Presentation mode 71 ....................................................................................................................
4.1 Startup scan 71 ...........................................................................................................................
4.1 Automatic startup file check 72 .........................................................................................................
4.1 Document protection 72 .................................................................................................................
4.1 Exclusions 73 .............................................................................................................................
4.1 Performance exclusions 73 ..............................................................................................................
4.1 Add or Edit performance exclusion 74 ..................................................................................................
4.1 Path exclusion format 76 ................................................................................................................
4.1 Detection exclusions 77 ..................................................................................................................
4.1 Add or Edit detection exclusion 79 ......................................................................................................
4.1 Create detection exclusion wizard 80 ...................................................................................................
4.1 Processes exclusions 81 .................................................................................................................
4.1 Add or Edit processes exclusions 81 ....................................................................................................
4.1 HIPS exclusions 82 .......................................................................................................................
4.1 ThreatSense parameters 82 .............................................................................................................
4.1 Cleaning levels 85 ........................................................................................................................
4.1 File extensions excluded from scanning 85 .............................................................................................
4.1 Additional ThreatSense parameters 86 .................................................................................................
4.2 Network 86 ..................................................................................................................................
4.2 Network protection advanced setup 87 .................................................................................................
4.2 Known networks 88 ......................................................................................................................
4.2 Known networks editor 89 ...............................................................................................................
4.2 Network authentication - Server configuration 92 ......................................................................................
4.2 Configuring zones 92 .....................................................................................................................
4.2 Network Protection zones 92 ............................................................................................................
4.2 Firewall 93 ................................................................................................................................
4.2 Firewall profiles 95 .......................................................................................................................
4.2 Dialog window - Edit Firewall profiles 96 ................................................................................................
4.2 Profiles assigned to network adapters 96 ...............................................................................................
4.2 Configuring and using rules 96 ..........................................................................................................
4.2 Firewall rules list 97 ......................................................................................................................
4.2 Adding or editing Firewall rules 98 ......................................................................................................
4.2 Firewall rule - Local 99 ...................................................................................................................
4.2 Firewall rule - Remote 100 ..............................................................................................................
4.2 Application modification detection 101 .................................................................................................