..............................................................................97Shared local cache
4.4.4
..............................................................................98Real-time file system protection
4.4.5
..................................................................................99Exclusions
4.4.5.1
........................................................................100Add or Edit exclusion
4.4.5.1.1
........................................................................101Exclusion format
4.4.5.1.2
..................................................................................101Threa tSense para meters
4.4.5.2
........................................................................104File extenstions excluded from sca nning
4.4.5.2.1
........................................................................104Additiona l ThreatSense para meters
4.4.5.2.2
........................................................................105Cleaning levels
4.4.5.2.3
........................................................................105When to modify real-time protection configura tion
4.4.5.2.4
........................................................................105Checking real-time protection
4.4.5.2.5
........................................................................105What to do if real-time protection does not work
4.4.5.2.6
........................................................................106Submission
4.4.5.2.7
........................................................................106Statistics
4.4.5.2.8
........................................................................106Suspicious files
4.4.5.2.9
..............................................................................107On-dema nd computer scan and Hyper-V scan
4.4.6
..................................................................................108Custom sca n and Hyper-V sca n launcher
4.4.6.1
..................................................................................110Scan progress
4.4.6.2
..................................................................................112Scan log
4.4.6.3
..................................................................................113Profile mana ger
4.4.6.4
..................................................................................113Scan targets
4.4.6.5
..................................................................................113Pause a scheduled scan
4.4.6.6
..............................................................................113Idle-state sca nning
4.4.7
..............................................................................114Startup scan
4.4.8
..................................................................................114Automa tic startup file check
4.4.8.1
..............................................................................115Remova ble media
4.4.9
..............................................................................115Document protection
4.4.10
..............................................................................115HIPS
4.4.11
..................................................................................117HIPS rules
4.4.11.1
........................................................................118HIPS rule settings
4.4.11.1.1
..................................................................................120Advanced setup
4.4.11.2
........................................................................120Drivers always allowed to loa d
4.4.11.2.1
....................................................................................................120Update4.5
..............................................................................123Update rollback
4.5.1
..............................................................................123Update mode
4.5.2
..............................................................................124HTTP Proxy
4.5.3
..............................................................................125Connect to LAN as
4.5.4
..............................................................................126Mirror
4.5.5
..................................................................................128Updating from the Mirror
4.5.5.1
..................................................................................130Mirror files
4.5.5.2
..................................................................................130Troubleshooting Mirror update problems
4.5.5.3
....................................................................................................130Device control4.6
..............................................................................131Device control rules editor
4.6.1
..............................................................................132Adding Device control rules
4.6.2
..............................................................................133Detected devices
4.6.3
..............................................................................133Device groups
4.6.4
....................................................................................................134Tools4.7
..............................................................................134ESET LiveGrid®
4.7.1
..................................................................................136Exclusion filter
4.7.1.1
..............................................................................137Microsoft Windows update
4.7.2
..............................................................................137ESET CMD
4.7.3
..............................................................................138WMI Provider
4.7.4
..................................................................................139Provided da ta
4.7.4.1
..................................................................................144Accessing Provided Da ta
4.7.4.2
..............................................................................144ERA scan targets
4.7.5
..............................................................................146Log files
4.7.6
..................................................................................147Log filtering
4.7.6.1
..................................................................................148Find in log
4.7.6.2
..............................................................................148Proxy server
4.7.7
..............................................................................150Email notifications
4.7.8
..................................................................................151Mes sage format
4.7.8.1
..............................................................................151Pres enta tion mode
4.7.9
..............................................................................152Diagnostics
4.7.10
..............................................................................152Customer Care
4.7.11
..............................................................................153Cluster
4.7.12
....................................................................................................154User interface4.8
..............................................................................156Alerts a nd notifications
4.8.1
..............................................................................157Access s etup
4.8.2
..................................................................................157Password
4.8.2.1
..................................................................................157Password setup
4.8.2.2
..............................................................................158Help
4.8.3
..............................................................................158ESET Shell
4.8.4
..............................................................................158Disable GUI on Termina l Server
4.8.5
..............................................................................158Disabled messa ges and statuses
4.8.6
..................................................................................159Confirma tion messa ges
4.8.6.1
..................................................................................159Application sta tuses settings
4.8.6.2
..............................................................................159System tra y icon
4.8.7
..................................................................................160Pause protection
4.8.7.1
..............................................................................160Context menu
4.8.8
....................................................................................................161Revert all settings in this section4.9
....................................................................................................161Revert to default settings4.10
....................................................................................................161Scheduler4.11
..............................................................................162Task details
4.11.1
..............................................................................162Task timing - Once
4.11.2
..............................................................................162Task timing
4.11.3
..............................................................................163Task timing - Daily
4.11.4
..............................................................................163Task timing - Weekly
4.11.5
..............................................................................163Task timing - Event triggered
4.11.6
..............................................................................163Task details - Run a pplication
4.11.7
..............................................................................163Skipped task
4.11.8
..............................................................................164Scheduled tas k overview
4.11.9
..............................................................................164Update profiles
4.11.10
....................................................................................................165Quarantine4.12
..............................................................................165Quarantining files
4.12.1
..............................................................................165Restoring from Quarantine
4.12.2
..............................................................................165Submitting file from Quara ntine
4.12.3
....................................................................................................165Operating system updates4.13
.......................................................166Glossary5.
....................................................................................................166Types of infiltration5.1
..............................................................................166Viruses
5.1.1
..............................................................................167Worms
5.1.2
..............................................................................167Trojan horses
5.1.3