4.2 Add IPv4 address 93 .....................................................................................................................
4.2 Add IPv6 address 93 .....................................................................................................................
4.2 SSL/TLS 94 ................................................................................................................................
4.2 Certificates 95 ............................................................................................................................
4.2 Encrypted network traffic 95 ............................................................................................................
4.2 List of known certificates 96 .............................................................................................................
4.2 List of SSL/TLS filtered applications 97 ..................................................................................................
4.2 Email client protection 97 ................................................................................................................
4.2 Email client integration 98 ...............................................................................................................
4.2 Microsoft Outlook toolbar 98 .............................................................................................................
4.2 Outlook Express and Windows Mail toolbar 99 .........................................................................................
4.2 Confirmation dialog 100 .................................................................................................................
4.2 Rescan messages 100 ...................................................................................................................
4.2 Email protocols 100 ......................................................................................................................
4.2 POP3, POP3S filter 101 ..................................................................................................................
4.2 Email tags 102 ...........................................................................................................................
4.2 Antispam protection 102 ................................................................................................................
4.2 Address processing result 104 ..........................................................................................................
4.2 Antispam address lists 104 ..............................................................................................................
4.2 Address lists 105 .........................................................................................................................
4.2 Add/Edit address 106 ....................................................................................................................
4.2 Web access protection 106 .............................................................................................................
4.2 Web access protection advanced setup 109 ...........................................................................................
4.2 Web protocols 109 .......................................................................................................................
4.2 URL address management 110 .........................................................................................................
4.2 URL addresses list 111 ..................................................................................................................
4.2 Create new list 112 ......................................................................................................................
4.2 How to add URL mask 113 ..............................................................................................................
4.2 Anti-Phishing protection 113 ............................................................................................................
4.3 Network protection 115 .................................................................................................................
4.3 Network protection advanced setup 116 ...............................................................................................
4.3 Known networks 118 ....................................................................................................................
4.3 Known networks editor 118 .............................................................................................................
4.3 Network authentication - Server configuration 121 ....................................................................................
4.3 Configuring zones 122 ...................................................................................................................
4.3 Firewall zones 122 .......................................................................................................................
4.3 Firewall 123 ..............................................................................................................................
4.3 Firewall profiles 125 .....................................................................................................................
4.3 Dialog window - Edit Firewall profiles 125 ..............................................................................................
4.3 Profiles assigned to network adapters 125 .............................................................................................
4.3 Configuring and using rules 126 ........................................................................................................
4.3 Firewall rules list 126 ....................................................................................................................
4.3 Adding or editing Firewall rules 128 ....................................................................................................
4.3 Firewall rule - Local 129 .................................................................................................................
4.3 Firewall rule - Remote 130 ..............................................................................................................
4.3 Application modification detection 131 .................................................................................................
4.3 List of applications excluded from detection 132 ......................................................................................
4.3 Learning mode settings 132 ............................................................................................................
4.3 Network attack protection (IDS) 133 ....................................................................................................
4.3 Brute-force attack protection 133 ......................................................................................................
4.3 Rules 134 ................................................................................................................................