1 ESET Endpoint Security for macOS 1 .................................................................................................
1.1 What's new in version 6 1 .........................................................................................................................
1.2 System requirements 2 ..............................................................................................................................
2 Users connecting via ESET Security Management Center 2 .................................................
3 Installation 3 .....................................................................................................................................................
3.1 Typical installation 4 ..................................................................................................................................
3.2 Custom installation 4 .................................................................................................................................
3.3 Remote installation 7 .................................................................................................................................
4 Product activation 7 .....................................................................................................................................
5 Uninstallation 9 ...............................................................................................................................................
6 Basic overview 9 ............................................................................................................................................
6.1 Keyboard shortcuts 9 .................................................................................................................................
6.2 Checking operation of the system 10 ......................................................................................................
6.3 What to do if the program does not work properly 10 .........................................................................
7 Computer protection 11 .............................................................................................................................
7.1 Antivirus and antispyware protection 11 ................................................................................................
7.1.1 General 11 ................................................................................................................................................
7.1.1.1 Exclusions 11 ...........................................................................................................................................
7.1.2 Startup protection 12 ...................................................................................................................................
7.1.3 Real-time file system protection 12 ..................................................................................................................
7.1.3.1 Advanced options 13 .................................................................................................................................
7.1.3.2 When to modify Real-time protection configuration 13 ........................................................................................
7.1.3.3 Checking Real-time protection 13 ..................................................................................................................
7.1.3.4 What to do if Real-time protection does not work 14 ..........................................................................................
7.1.4 On-demand computer scan 14 ........................................................................................................................
7.1.4.1 Type of scan 15 ........................................................................................................................................
7.1.4.1.1 Smart scan 15 .......................................................................................................................................
7.1.4.1.2 Custom scan 15 .....................................................................................................................................
7.1.4.2 Scan targets 16 ........................................................................................................................................
7.1.4.3 Scan profiles 16 ........................................................................................................................................
7.1.5 ThreatSense engine parameters setup 17 ..........................................................................................................
7.1.5.1 Objects 18 ..............................................................................................................................................
7.1.5.2 Options 18 ..............................................................................................................................................
7.1.5.3 Cleaning 18 .............................................................................................................................................
7.1.5.4 Exclusions 19 ...........................................................................................................................................
7.1.5.5 Limits 19 ................................................................................................................................................
7.1.5.6 Others 20 ...............................................................................................................................................
7.1.6 An infiltration is detected 20 ..........................................................................................................................
7.2 Web and email protection 21 ....................................................................................................................
7.2.1 Web access protection 21 ..............................................................................................................................
7.2.1.1 Ports 21 ..................................................................................................................................................
7.2.1.2 URL lists 21 .............................................................................................................................................
7.2.2 Email protection 22 ......................................................................................................................................
7.2.2.1 POP3 protocol checking 23 ..........................................................................................................................
7.2.2.2 IMAP protocol checking 23 ...........................................................................................................................
7.3 Anti-Phishing 23 ..........................................................................................................................................
8 Firewall 23 ..........................................................................................................................................................
8.1 Filtering modes 24 ......................................................................................................................................
8.2 Firewall rules 25 ..........................................................................................................................................
8.2.1 Creating new rules 25 ...................................................................................................................................
8.3 Firewall zones 26 ........................................................................................................................................
8.4 Firewall profiles 26 .....................................................................................................................................
8.5 Firewall logs 26 ...........................................................................................................................................