.......................................................88Working with ESET Mail Security5.
....................................................................................................89Server5.1
..............................................................................90Protected tasks
5.1.1
..............................................................................91Protected partitions
5.1.2
..............................................................................91Antivirus and antispyware
5.1.3
..............................................................................92Antispam protection
5.1.4
..................................................................................92Filtering and verification
5.1.4.1
..................................................................................93Advanced settings
5.1.4.2
..................................................................................96Greylisting settings
5.1.4.3
..............................................................................98Rules
5.1.5
..................................................................................98Rules list
5.1.5.1
........................................................................100Rule wizard
5.1.5.1.1
........................................................................100Rule condition
5.1.5.1.1.1
........................................................................101Rule action
5.1.5.1.1.2
..............................................................................103Mail transport protection
5.1.6
..................................................................................104Advanced settings
5.1.6.1
..............................................................................104Database protection
5.1.7
..................................................................................105Database excluded from scan
5.1.7.1
..............................................................................106On-demand database scan
5.1.8
..............................................................................106Mail Quarantine
5.1.9
..................................................................................107ESET Quarantine
5.1.9.1
....................................................................................................108Computer5.2
..............................................................................109An infiltration is detected
5.2.1
..............................................................................110Processes exclusions
5.2.2
..............................................................................110Automatic exclusions
5.2.3
..............................................................................111Shared local cache
5.2.4
..............................................................................111Performance
5.2.5
..............................................................................112Real-time file system protection
5.2.6
..................................................................................113Exclusions
5.2.6.1
........................................................................114Add or Edit exclusion
5.2.6.1.1
........................................................................114Exclusion format
5.2.6.1.2
..................................................................................114ThreatSense parameters
5.2.6.2
........................................................................116File extenstions excluded from scanning
5.2.6.2.1
........................................................................117Additional ThreatSense parameters
5.2.6.2.2
........................................................................117Cleaning levels
5.2.6.2.3
........................................................................117When to modify real-time protection configuration
5.2.6.2.4
........................................................................118Checking real-time protection
5.2.6.2.5
........................................................................118What to do if real-time protection does not work
5.2.6.2.6
........................................................................118Submission
5.2.6.2.7
........................................................................119Statistics
5.2.6.2.8
........................................................................119Suspicious files
5.2.6.2.9
..............................................................................120On-demand computer scan and Hyper-V scan
5.2.7
..................................................................................120Custom scan and Hyper-V scan launcher
5.2.7.1
..................................................................................122Scan progress
5.2.7.2
..................................................................................124Scan log
5.2.7.3
..................................................................................125Profile manager
5.2.7.4
..................................................................................125Scan targets
5.2.7.5
..................................................................................125Pause a scheduled scan
5.2.7.6
..............................................................................126Idle-state scanning
5.2.8
..............................................................................127Startup scan
5.2.9
..................................................................................127Automatic startup file check
5.2.9.1
..............................................................................127Removable media
5.2.10
..............................................................................128Document protection
5.2.11
..............................................................................129HIPS
5.2.12
..................................................................................130HIPS rules
5.2.12.1
........................................................................131HIPS rule settings
5.2.12.1.1
..................................................................................133Advanced setup
5.2.12.2
........................................................................133Drivers always allowed to load
5.2.12.2.1
....................................................................................................133Update5.3
..............................................................................135Update rollback
5.3.1
..............................................................................135Update mode
5.3.2
..............................................................................136HTTP Proxy
5.3.3
..............................................................................137Connect to LAN as
5.3.4
..............................................................................138Mirror
5.3.5
..................................................................................139Updating from the Mirror
5.3.5.1
..................................................................................141Mirror files
5.3.5.2
..................................................................................141Troubleshooting Mirror update problems
5.3.5.3
..............................................................................141How to create update tasks
5.3.6
....................................................................................................142Web and email5.4
..............................................................................142Protocol filtering
5.4.1
..................................................................................142Excluded applications
5.4.1.1
..................................................................................143Excluded IP addresses
5.4.1.2
..................................................................................143Web and email clients
5.4.1.3
..............................................................................143SSL/TLS
5.4.2
..................................................................................144Encrypted SSL communication
5.4.2.1
..................................................................................145List of known certificates
5.4.2.2
..............................................................................145Email client protection
5.4.3
..................................................................................146Email protocols
5.4.3.1
..................................................................................146Alerts and notifications
5.4.3.2
..................................................................................147MS Outlook toolbar
5.4.3.3
..................................................................................147Outlook Express and Windows Mail toolbar
5.4.3.4
..................................................................................148Confirmation dialog
5.4.3.5
..................................................................................148Rescan messages
5.4.3.6
..............................................................................148Web access protection
5.4.4
..................................................................................149Basic
5.4.4.1
..................................................................................149URL address management
5.4.4.2
........................................................................150Create new list
5.4.4.2.1
........................................................................150Address list
5.4.4.2.2
..............................................................................151Anti-Phishing protection
5.4.5
....................................................................................................152Device control5.5
..............................................................................153Device control- Rules editor
5.5.1
..............................................................................154Adding Device control rules
5.5.2
..............................................................................155Detected devices
5.5.3
..............................................................................155Device groups
5.5.4
....................................................................................................156Tools5.6
..............................................................................156ESET LiveGrid
5.6.1
..................................................................................157Exclusion filter
5.6.1.1
..............................................................................158Quarantine
5.6.2
..............................................................................158Microsoft Windows update
5.6.3
..............................................................................159WMI Provider
5.6.4
..................................................................................160Provided data
5.6.4.1
..................................................................................164Accessing Provided Data
5.6.4.2
..............................................................................164ERA scan targets
5.6.5