4.1.1.8 Document protection 43 .............................................................................................................................
4.1.2 Device control and Webcam protection 43 .........................................................................................................
4.1.2.1 Device control rules editor 44 .......................................................................................................................
4.1.2.1.1 Detected devices 45 ................................................................................................................................
4.1.2.2 Device groups 45 ......................................................................................................................................
4.1.2.3 Adding Device control rules 45 .....................................................................................................................
4.1.2.4 Webcam protection rules editor 47 ................................................................................................................
4.1.3 Host-based Intrusion Prevention System (HIPS) 47 ...............................................................................................
4.1.3.1 HIPS interactive window 49 .........................................................................................................................
4.1.3.1.1 Potential ransomware behavior detected 50 ..................................................................................................
4.1.3.2 HIPS rule management 51 ...........................................................................................................................
4.1.3.2.1 HIPS rule settings 52 ...............................................................................................................................
4.1.3.2.2 Add applicaton/registry path for HIPS 54 .......................................................................................................
4.1.3.3 HIPS exclusions 54 ....................................................................................................................................
4.1.3.4 HIPS advanced setup 55 .............................................................................................................................
4.1.3.4.1 Drivers always allowed to load 55 ...............................................................................................................
4.1.4 Gamer mode 55 ..........................................................................................................................................
4.2 Internet protection 56 ................................................................................................................................
4.2.1 Protocol filtering 57 ......................................................................................................................................
4.2.1.1 Web and email clients 57 ............................................................................................................................
4.2.1.2 Excluded applications 57 ............................................................................................................................
4.2.1.3 Excluded IP addresses 58 ............................................................................................................................
4.2.1.3.1 Add IPv4 address 58 ................................................................................................................................
4.2.1.3.2 Add IPv6 address 59 ................................................................................................................................
4.2.1.4 SSL/TLS 59 ..............................................................................................................................................
4.2.1.4.1 Certificates 60 .......................................................................................................................................
4.2.1.4.1 Encrypted network traffic 60 .....................................................................................................................
4.2.1.4.2 List of known certificates 61 ......................................................................................................................
4.2.1.4.3 List of SSL/TLS filtered applications 61 .........................................................................................................
4.2.2 Email client protection 62 ..............................................................................................................................
4.2.2.1 Email protocols 63 ....................................................................................................................................
4.2.2.1.1 POP3, POP3S filter 64 ..............................................................................................................................
4.2.2.2 Email alerts and notifications 64 ...................................................................................................................
4.2.2.3 Integration with email clients 65 ...................................................................................................................
4.2.2.3.1 Microsoft Outlook toolbar 65 ......................................................................................................................
4.2.2.3.2 Outlook Express and Windows Mail toolbar 65 ................................................................................................
4.2.2.3.3 Confirmation dialog 66 .............................................................................................................................
4.2.2.3.4 Rescan messages 66 ...............................................................................................................................
4.2.2.4 Antispam protection 66 ..............................................................................................................................
4.2.2.4.1 Antispam address books 68 .......................................................................................................................
4.2.2.4.2 Blacklist/Whitelist/Exceptions list 69 ............................................................................................................
4.2.2.4.2 Add/Edit Blacklist/Whitelist/Exceptions address 69 ..........................................................................................
4.2.3 Web access protection 69 ..............................................................................................................................
4.2.3.1 Web access protection advanced setup 72 ......................................................................................................
4.2.3.2 Web protocols 72 ......................................................................................................................................
4.2.3.3 URL address management 73 .......................................................................................................................
4.2.3.3.1 URL addresses list 74 ..............................................................................................................................
4.2.3.3.2 Create new URL address list 74 ..................................................................................................................
4.2.3.3.3 How to add URL mask 75 ..........................................................................................................................
4.2.4 Anti-Phishing protection 75 ............................................................................................................................
4.3 Network protection 76 ...............................................................................................................................
4.3.1 Firewall 78 .................................................................................................................................................
4.3.1.1 Learning mode settings 80 ..........................................................................................................................
4.3.2 Firewall profiles 81 ......................................................................................................................................
4.3.2.1 Profiles assigned to network adapters 81 ........................................................................................................
4.3.3 Application modification detection 82 ...............................................................................................................
4.3.3.1 List of applications excluded from checking 82 .................................................................................................
4.3.4 Configuring and using rules 82 ........................................................................................................................