4.1.7.1 HIPS interactive window 46 .........................................................................................................................
4.1.7.1.1 Potential ransomware behavior detected 47 ..................................................................................................
4.1.7.2 HIPS rule management 48 ...........................................................................................................................
4.1.7.2.1 HIPS rule settings 49 ...............................................................................................................................
4.1.7.2.2 Add applicaton/registry path for HIPS 51 .......................................................................................................
4.1.7.3 HIPS advanced setup 51 .............................................................................................................................
4.1.7.3.1 Drivers always allowed to load 52 ...............................................................................................................
4.1.8 Gamer mode 52 ..........................................................................................................................................
4.1.9 Startup scan 52 ..........................................................................................................................................
4.1.9.1 Automatic startup file check 52 ....................................................................................................................
4.1.10 Document protection 53 ..............................................................................................................................
4.1.11 Exclusions 53 ...........................................................................................................................................
4.1.11.1 Performance exclusions 54 ........................................................................................................................
4.1.11.1.1 Add or Edit performance exclusion 55 ........................................................................................................
4.1.11.1.2 Path exclusion format 56 ........................................................................................................................
4.1.11.2 Detection exclusions 57 ............................................................................................................................
4.1.11.2.1 Add or Edit detection exclusion 58 .............................................................................................................
4.1.11.3 HIPS exclusions 59 ...................................................................................................................................
4.1.12 ThreatSense parameters 59 .........................................................................................................................
4.1.12.1 File extensions excluded from scanning 62 ....................................................................................................
4.1.12.2 Additional ThreatSense parameters 62 ..........................................................................................................
4.2 Internet protection 63 ................................................................................................................................
4.2.1 Protocol filtering 63 ......................................................................................................................................
4.2.1.1 Excluded applications 64 ............................................................................................................................
4.2.1.2 Excluded IP addresses 65 ............................................................................................................................
4.2.1.2.1 Add IPv4 address 65 ................................................................................................................................
4.2.1.2.2 Add IPv6 address 65 ................................................................................................................................
4.2.1.3 SSL/TLS 66 ..............................................................................................................................................
4.2.1.3.1 Certificates 67 .......................................................................................................................................
4.2.1.3.1 Encrypted network traffic 67 .....................................................................................................................
4.2.1.3.2 List of known certificates 67 ......................................................................................................................
4.2.1.3.3 List of SSL/TLS filtered applications 68 .........................................................................................................
4.2.2 Email client protection 68 ..............................................................................................................................
4.2.2.1 Email protocols 69 ....................................................................................................................................
4.2.2.1.1 POP3, POP3S filter 70 ..............................................................................................................................
4.2.2.2 Email alerts and notifications 71 ...................................................................................................................
4.2.2.3 Integration with email clients 71 ...................................................................................................................
4.2.2.3.1 Microsoft Outlook toolbar 71 ......................................................................................................................
4.2.2.3.2 Outlook Express and Windows Mail toolbar 71 ................................................................................................
4.2.2.3.3 Confirmation dialog 72 .............................................................................................................................
4.2.2.3.4 Rescan messages 72 ...............................................................................................................................
4.2.3 Web access protection 72 ..............................................................................................................................
4.2.3.1 Web access protection advanced setup 74 ......................................................................................................
4.2.3.2 Web protocols 75 ......................................................................................................................................
4.2.3.3 URL address management 75 .......................................................................................................................
4.2.3.3.1 URL addresses list 76 ..............................................................................................................................
4.2.3.3.2 Create new URL address list 77 ..................................................................................................................
4.2.3.3.3 How to add URL mask 78 ..........................................................................................................................
4.2.4 Anti-Phishing protection 78 ............................................................................................................................
4.3 Updating the program 79 ..........................................................................................................................
4.3.1 Update setup 82 .........................................................................................................................................
4.3.1.1 Update rollback 84 ....................................................................................................................................
4.3.1.2 Program component update 85 ....................................................................................................................
4.3.1.3 Connection options 85 ................................................................................................................................
4.3.2 How to create update tasks 86 ........................................................................................................................
4.4 Tools 86 ........................................................................................................................................................
4.4.1 Tools in ESET NOD32 Antivirus 86 ....................................................................................................................
4.4.1.1 Log files 88 .............................................................................................................................................