6.3 Network protection 123 .............................................................................................................................
6.3.1 IDS exceptions 124 ......................................................................................................................................
6.3.2 Temporary IP address blacklist 125 ..................................................................................................................
6.4 Web and email 125 .....................................................................................................................................
6.4.1 Protocol filtering 125 ....................................................................................................................................
6.4.1.1 Web and email clients 126 ..........................................................................................................................
6.4.2 SSL/TLS 126 ..............................................................................................................................................
6.4.2.1 List of known certificates 128 ......................................................................................................................
6.4.2.2 Encrypted SSL communication 128 ...............................................................................................................
6.4.3 Email client protection 129 ............................................................................................................................
6.4.3.1 Email protocols 130 ..................................................................................................................................
6.4.3.2 Alerts and notifications 130 .........................................................................................................................
6.4.3.3 MS Outlook toolbar 131 ..............................................................................................................................
6.4.3.4 Outlook Express and Windows Mail toolbar 131 ................................................................................................
6.4.3.5 Confirmation dialog 132 .............................................................................................................................
6.4.3.6 Rescan messages 132 ...............................................................................................................................
6.4.4 Web access protection 132 ............................................................................................................................
6.4.4.1 URL address management 133 .....................................................................................................................
6.4.4.1.1 Create new list 134 .................................................................................................................................
6.4.5 Anti-Phishing web protection 135 ....................................................................................................................
6.5 Device control 136 ......................................................................................................................................
6.5.1 Device rules 137 .........................................................................................................................................
6.5.2 Device groups 138 ......................................................................................................................................
6.6 Tools configuration 139 ..............................................................................................................................
6.6.1 Time slots 140 ...........................................................................................................................................
6.6.2 Microsoft Windows update 140 .......................................................................................................................
6.6.3 ESET CMD 140 ...........................................................................................................................................
6.6.4 ESET RMM 142 ...........................................................................................................................................
6.6.5 License 143 ...............................................................................................................................................
6.6.6 WMI Provider 143 ........................................................................................................................................
6.6.6.1 Provided data 143 ....................................................................................................................................
6.6.6.2 Accessing Provided Data 150 .......................................................................................................................
6.6.7 ERA/ESMC scan targets 150 ...........................................................................................................................
6.6.8 Override mode 151 .....................................................................................................................................
6.6.9 Log files 154 ..............................................................................................................................................
6.6.10 Proxy server 155 .......................................................................................................................................
6.6.11 Notification 155 ........................................................................................................................................
6.6.11.1 Application notifications 156 ......................................................................................................................
6.6.11.2 Desktop notifications 156 ..........................................................................................................................
6.6.11.3 Email notifications 156 .............................................................................................................................
6.6.11.4 Customization 158 ..................................................................................................................................
6.6.12 Presentation mode 158 ...............................................................................................................................
6.6.13 Diagnostics 159 ........................................................................................................................................
6.6.13.1 Technical support 159 ..............................................................................................................................
6.6.14 Cluster 160 ..............................................................................................................................................
6.7 User interface 161 .......................................................................................................................................
6.7.1 Alerts and message boxes 162 .......................................................................................................................
6.7.2 Access setup 162 ........................................................................................................................................
6.7.3 ESET Shell 163 ...........................................................................................................................................
6.7.4 Disable GUI on Terminal Server 163 .................................................................................................................
6.7.5 Disabled messages and statuses 164 ...............................................................................................................
6.7.5.1 Application statuses settings 164 ..................................................................................................................
6.7.6 System tray icon 164 ...................................................................................................................................
6.8 Revert to default settings 166 ..................................................................................................................
6.9 Help and support 166 .................................................................................................................................
6.9.1 Submit support request 167 ..........................................................................................................................
6.9.2 About ESET File Security 168 .........................................................................................................................
6.10 Glossary 168 ..............................................................................................................................................