4.1.5.2 Scan progress 45 ......................................................................................................................................
4.1.5.3 Computer scan log 46 ................................................................................................................................
4.1.5.4 Malware scans 47 .....................................................................................................................................
4.1.5.4.1 Idle-state scan 48 ...................................................................................................................................
4.1.5.4.2 Scan profiles 48 .....................................................................................................................................
4.1.5.4.3 Scan targets 49 ......................................................................................................................................
4.1.5.4.4 Advanced scan options 49 ........................................................................................................................
4.1.6 Device control 50 ........................................................................................................................................
4.1.6.1 Device control rules editor 50 .......................................................................................................................
4.1.6.1.1 Detected devices 51 ................................................................................................................................
4.1.6.2 Device groups 51 ......................................................................................................................................
4.1.6.3 Adding Device control rules 52 .....................................................................................................................
4.1.7 Webcam Protection 54 ..................................................................................................................................
4.1.7.1 Webcam protection rules editor 55 ................................................................................................................
4.1.8 Host Intrusion Prevention System (HIPS) 55 ........................................................................................................
4.1.8.1 HIPS interactive window 57 .........................................................................................................................
4.1.8.1.1 Potential ransomware behavior detected 58 ..................................................................................................
4.1.8.2 HIPS rule management 59 ...........................................................................................................................
4.1.8.2.1 HIPS rule settings 60 ...............................................................................................................................
4.1.8.2.2 Add applicaton/registry path for HIPS 62 .......................................................................................................
4.1.8.3 HIPS advanced setup 63 .............................................................................................................................
4.1.8.3.1 Drivers always allowed to load 63 ...............................................................................................................
4.1.9 Gamer mode 63 ..........................................................................................................................................
4.1.10 Startup scan 64 .........................................................................................................................................
4.1.10.1 Automatic startup file check 64 ...................................................................................................................
4.1.11 Document protection 64 ..............................................................................................................................
4.1.12 Exclusions 65 ...........................................................................................................................................
4.1.12.1 Performance exclusions 65 ........................................................................................................................
4.1.12.1.1 Add or Edit performance exclusion 66 ........................................................................................................
4.1.12.1.2 Path exclusion format 67 ........................................................................................................................
4.1.12.2 Detection exclusions 68 ............................................................................................................................
4.1.12.2.1 Add or Edit detection exclusion 69 .............................................................................................................
4.1.12.2.2 Create detection exclusion wizard 70 .........................................................................................................
4.1.12.3 HIPS exclusions 71 ...................................................................................................................................
4.1.13 ThreatSense parameters 71 .........................................................................................................................
4.1.13.1 File extensions excluded from scanning 74 ....................................................................................................
4.1.13.2 Additional ThreatSense parameters 75 ..........................................................................................................
4.2 Internet protection 75 ................................................................................................................................
4.2.1 Protocol filtering 76 ......................................................................................................................................
4.2.1.1 Excluded applications 77 ............................................................................................................................
4.2.1.2 Excluded IP addresses 78 ............................................................................................................................
4.2.1.2.1 Add IPv4 address 78 ................................................................................................................................
4.2.1.2.2 Add IPv6 address 79 ................................................................................................................................
4.2.1.3 SSL/TLS 79 ..............................................................................................................................................
4.2.1.3.1 Certificates 80 .......................................................................................................................................
4.2.1.3.1 Encrypted network traffic 80 .....................................................................................................................
4.2.1.3.2 List of known certificates 81 ......................................................................................................................
4.2.1.3.3 List of SSL/TLS filtered applications 81 .........................................................................................................
4.2.2 Email client protection 82 ..............................................................................................................................
4.2.2.1 Email protocols 83 ....................................................................................................................................
4.2.2.1.1 POP3, POP3S filter 84 ..............................................................................................................................
4.2.2.2 Email alerts and notifications 84 ...................................................................................................................
4.2.2.3 Integration with email clients 84 ...................................................................................................................
4.2.2.3.1 Microsoft Outlook toolbar 85 ......................................................................................................................
4.2.2.3.2 Outlook Express and Windows Mail toolbar 85 ................................................................................................
4.2.2.3.3 Confirmation dialog 86 .............................................................................................................................
4.2.2.3.4 Rescan messages 86 ...............................................................................................................................
4.2.2.4 Antispam protection 86 ..............................................................................................................................