Contents
4.3.2.1 Email protocols ...................................................................................................................................................................................... 85
4.3.2.2 Email alerts and notifications ................................................................................................................................................................ 86
4.3.3 Web access protection ............................................................................................................................................................................. 87
4.3.3.1 Basic ...................................................................................................................................................................................................... 87
4.3.3.2 Web protocols ....................................................................................................................................................................................... 88
4.3.3.3 URL address management ..................................................................................................................................................................... 88
4.3.3.3.1 URL addresses list ............................................................................................................................................................................... 89
4.3.3.3.2 Create new URL address list ................................................................................................................................................................ 90
4.3.3.3.3 How to add URL mask .......................................................................................................................................................................... 91
4.3.4 Anti-Phishing protection ........................................................................................................................................................................... 91
4.4 Updating the program ................................................................................................................................................................................. 93
4.4.1 Update setup ............................................................................................................................................................................................ 96
4.4.1.1 Update rollback ..................................................................................................................................................................................... 99
4.4.1.2 Program component update .................................................................................................................................................................. 99
4.4.1.3 Connection options .............................................................................................................................................................................. 100
4.4.1.4 Update mirror ...................................................................................................................................................................................... 102
4.4.1.4.1 HTTP Server ....................................................................................................................................................................................... 103
4.4.1.4.2 Updating from the Mirror .................................................................................................................................................................. 104
4.4.1.4.3 Troubleshooting Mirror update problems ......................................................................................................................................... 106
4.4.2 How to create update tasks .................................................................................................................................................................... 106
4.5 Tools .............................................................................................................................................................................................................. 107
4.5.1 Log files ................................................................................................................................................................................................... 108
4.5.1.1 Log filtering .......................................................................................................................................................................................... 109
4.5.1.2 Logging configuration ........................................................................................................................................................................... 110
4.5.1.3 Audit logs ............................................................................................................................................................................................. 111
4.5.2 Scheduler ................................................................................................................................................................................................ 112
4.5.3 Protection statistics ............................................................................................................................................................................... 113
4.5.4 Watch activity ......................................................................................................................................................................................... 114
4.5.5 ESET SysInspector .................................................................................................................................................................................... 114
4.5.6 Cloud-based protection .......................................................................................................................................................................... 115
4.5.7 Running processes .................................................................................................................................................................................. 117
4.5.8 Security report ........................................................................................................................................................................................ 118
4.5.9 ESET SysRescue Live ................................................................................................................................................................................. 119
4.5.10 Submission of samples for analysis ....................................................................................................................................................... 119
4.5.11 Email notifications ................................................................................................................................................................................ 120
4.5.12 Quarantine ........................................................................................................................................................................................... 122
4.5.13 Proxy server setup ................................................................................................................................................................................ 123
4.5.14 Time slots ............................................................................................................................................................................................. 124
4.5.15 Microsoft Windows update ................................................................................................................................................................... 125
4.5.16 ESET CMD ............................................................................................................................................................................................... 125
4.6 User interface .............................................................................................................................................................................................. 127
4.6.1 User interface elements ......................................................................................................................................................................... 127
4.6.2 Access setup ........................................................................................................................................................................................... 129
4.6.3 Alerts and message boxes ....................................................................................................................................................................... 129
4.6.3.1 Confirmation messages ....................................................................................................................................................................... 131
4.6.3.2 Advanced settings conflict error ........................................................................................................................................................... 131
4.6.4 Notifications ........................................................................................................................................................................................... 131
4.6.5 System tray icon ...................................................................................................................................................................................... 132
4.6.6 Context menu ......................................................................................................................................................................................... 133
4.6.7 Help and support .................................................................................................................................................................................... 133
4.6.7.1 About ESET Endpoint Antivirus .............................................................................................................................................................. 134