..................................................................................77
Creating exceptions from Personal firewall
notifications
4.3.8.3
..................................................................................78Advanced PCAP logging
4.3.8.4
..................................................................................78Solving problems with protocol filtering
4.3.8.5
....................................................................................................79Security tools4.4
..............................................................................79Parental control
4.4.1
..................................................................................81Categories
4.4.1.1
..................................................................................82Website exceptions
4.4.1.2
....................................................................................................83Updating the program4.5
..............................................................................86Update settings
4.5.1
..................................................................................88Advanced update setup
4.5.1.1
........................................................................88Update mode
4.5.1.1.1
........................................................................88Connection options
4.5.1.1.2
..............................................................................89Update rollback
4.5.2
..............................................................................90How to create update tasks
4.5.3
....................................................................................................91Tools4.6
..............................................................................91Connected Home Monitor
4.6.1
..................................................................................92Network device
4.6.1.1
..............................................................................93Webcam Protection
4.6.2
..............................................................................93Tools in ESET Internet Security
4.6.3
..................................................................................94Log files
4.6.3.1
........................................................................95Logging configuration
4.6.3.1.1
..................................................................................96Running processes
4.6.3.2
..................................................................................98Security report
4.6.3.3
..................................................................................99Watch activity
4.6.3.4
..................................................................................100Network connections
4.6.3.5
..................................................................................101ESET SysInspector
4.6.3.6
..................................................................................101Scheduler
4.6.3.7
..................................................................................103System cleaner
4.6.3.8
..................................................................................103ESET SysRescue
4.6.3.9
..................................................................................104Cloud-based protection
4.6.3.10
........................................................................105Suspicious files
4.6.3.10.1
..................................................................................106Quarantine
4.6.3.11
..................................................................................107Proxy server
4.6.3.12
..................................................................................108Email notifications
4.6.3.13
........................................................................109Message format
4.6.3.13.1
..................................................................................109Select sample for analysis
4.6.3.14
..................................................................................110Microsoft Windows® update
4.6.3.15
..................................................................................110ESET CMD
4.6.3.16
....................................................................................................112User interface4.7
..............................................................................112User interface elements
4.7.1
..............................................................................113Alerts and notifications
4.7.2
..................................................................................114Advanced setup
4.7.2.1
..............................................................................115Access setup
4.7.3
..............................................................................116Program menu
4.7.4
.......................................................118Advanced user5.
....................................................................................................118Profiles5.1
....................................................................................................118Keyboard shortcuts5.2
....................................................................................................119Diagnostics5.3
....................................................................................................120Import and export settings5.4
....................................................................................................120ESET SysInspector5.5
..............................................................................120Introduction to ESET SysInspector
5.5.1
..................................................................................121Starting ESET SysInspector
5.5.1.1
..............................................................................121User Interface and application usage
5.5.2
..................................................................................121Program Controls
5.5.2.1
..................................................................................123Navigating in ESET SysInspector
5.5.2.2
........................................................................124Keyboard shortcuts
5.5.2.2.1
..................................................................................125Compare
5.5.2.3
..............................................................................126Command line parameters
5.5.3
..............................................................................127Service Script
5.5.4
..................................................................................127Generating Service script
5.5.4.1
..................................................................................127Structure of the Service script
5.5.4.2
..................................................................................130Executing Service scripts
5.5.4.3
..............................................................................131FAQ
5.5.5
....................................................................................................132Command Line5.6
.......................................................134Glossary6.
....................................................................................................134Types of infiltration6.1
..............................................................................134Viruses
6.1.1
..............................................................................134Worms
6.1.2
..............................................................................134Trojans
6.1.3
..............................................................................135Rootkits
6.1.4
..............................................................................135Adware
6.1.5
..............................................................................135Spyware
6.1.6
..............................................................................136Packers
6.1.7
..............................................................................136Potentially unsafe applications
6.1.8
..............................................................................136Potentially unwanted applications
6.1.9
..............................................................................139Botnet
6.1.10
....................................................................................................139Types of remote attacks6.2
..............................................................................139DoS attacks
6.2.1
..............................................................................139DNS Poisoning
6.2.2
..............................................................................139Worm attacks
6.2.3
..............................................................................139Port scanning
6.2.4
..............................................................................140TCP desynchronization
6.2.5
..............................................................................140SMB Relay
6.2.6
..............................................................................140ICMP attacks
6.2.7
....................................................................................................141ESET Technology6.3
..............................................................................141Exploit Blocker
6.3.1
..............................................................................141Advanced Memory Scanner
6.3.2
..............................................................................141Network Attack Protection
6.3.3
..............................................................................141ESET LiveGrid®
6.3.4
..............................................................................142Botnet protection
6.3.5
..............................................................................142Java Exploit Blocker
6.3.6
..............................................................................142Banking & Payment protection
6.3.7
..............................................................................143Script-Based Attacks Protection
6.3.8
..............................................................................143Ransomware Shield
6.3.9
..............................................................................143UEFI Scanner
6.3.10
....................................................................................................144Email6.4
..............................................................................144Advertisements
6.4.1
..............................................................................144Hoaxes
6.4.2
..............................................................................145Phishing
6.4.3
..............................................................................145Recognizing spam scams
6.4.4
..................................................................................145Rules
6.4.4.1