4.2 Add IPv6 address 91 .....................................................................................................................
4.2 SSL/TLS 92 ................................................................................................................................
4.2 Certificates 93 ............................................................................................................................
4.2 Encrypted network traffic 93 ............................................................................................................
4.2 List of known certificates 94 .............................................................................................................
4.2 List of SSL/TLS filtered applications 95 ..................................................................................................
4.2 Email client protection 95 ................................................................................................................
4.2 Email client integration 96 ...............................................................................................................
4.2 Microsoft Outlook toolbar 96 .............................................................................................................
4.2 Outlook Express and Windows Mail toolbar 97 .........................................................................................
4.2 Confirmation dialog 98 ...................................................................................................................
4.2 Rescan messages 98 .....................................................................................................................
4.2 Email protocols 98 ........................................................................................................................
4.2 POP3, POP3S filter 99 ....................................................................................................................
4.2 Email tags 100 ...........................................................................................................................
4.2 Antispam protection 100 ................................................................................................................
4.2 Address processing result 102 ..........................................................................................................
4.2 Antispam address lists 102 ..............................................................................................................
4.2 Address lists 103 .........................................................................................................................
4.2 Add/Edit address 104 ....................................................................................................................
4.2 Web access protection 104 .............................................................................................................
4.2 Web access protection advanced setup 107 ...........................................................................................
4.2 Web protocols 107 .......................................................................................................................
4.2 URL address management 108 .........................................................................................................
4.2 URL addresses list 109 ..................................................................................................................
4.2 Create new list 110 ......................................................................................................................
4.2 How to add URL mask 111 ..............................................................................................................
4.2 Anti-Phishing protection 111 ............................................................................................................
4.3 Network protection 113 .................................................................................................................
4.3 Network protection advanced setup 114 ...............................................................................................
4.3 Known networks 115 ....................................................................................................................
4.3 Known networks editor 116 .............................................................................................................
4.3 Network authentication - Server configuration 118 ....................................................................................
4.3 Configuring zones 119 ...................................................................................................................
4.3 Firewall zones 119 .......................................................................................................................
4.3 Firewall 120 ..............................................................................................................................
4.3 Firewall profiles 122 .....................................................................................................................
4.3 Dialog window - Edit Firewall profiles 122 ..............................................................................................
4.3 Profiles assigned to network adapters 122 .............................................................................................
4.3 Configuring and using rules 123 ........................................................................................................
4.3 Firewall rules list 123 ....................................................................................................................
4.3 Adding or editing Firewall rules 125 ....................................................................................................
4.3 Firewall rule - Local 126 .................................................................................................................
4.3 Firewall rule - Remote 127 ..............................................................................................................
4.3 Application modification detection 128 .................................................................................................
4.3 List of applications excluded from detection 129 ......................................................................................
4.3 Learning mode settings 129 ............................................................................................................
4.3 Network attack protection (IDS) 130 ....................................................................................................
4.3 Brute-force attack protection 130 ......................................................................................................
4.3 Rules 131 ................................................................................................................................
4.3 IDS rules 133 .............................................................................................................................