..................................................................................111Activation failure
3.8.5.3
..................................................................................111License
3.8.5.4
..................................................................................111Activation progress
3.8.5.5
..................................................................................111Activation succes sful
3.8.5.6
.......................................................112Working with ESET Mail Security4.
....................................................................................................113Server4.1
..............................................................................114Agent priority setup
4.1.1
..................................................................................114Modify priority
4.1.1.1
..............................................................................114Agent priority setup
4.1.2
..............................................................................115Antivirus a nd antispyware
4.1.3
..............................................................................117Antis pam protection
4.1.4
..................................................................................118Filtering and verification
4.1.4.1
..................................................................................119Advanced settings
4.1.4.2
..................................................................................123Greylisting settings
4.1.4.3
..................................................................................125SPF and DKIM
4.1.4.4
..............................................................................127Rules
4.1.5
..................................................................................129Rules list
4.1.5.1
........................................................................130Rule wizard
4.1.5.1.1
........................................................................131Rule condition
4.1.5.1.1.1
........................................................................133Rule a ction
4.1.5.1.1.2
..............................................................................135Mail trans port protection
4.1.6
..................................................................................137Advanced settings
4.1.6.1
..............................................................................138Mailbox database protection
4.1.7
..............................................................................139On-demand da tabase sca n
4.1.8
..................................................................................141Additional mailbox items
4.1.8.1
..................................................................................141Proxy s erver
4.1.8.2
..................................................................................142Data bas e scan account deta ils
4.1.8.3
..............................................................................143Mail Quarantine
4.1.9
..................................................................................144Local quarantine
4.1.9.1
........................................................................144File storage
4.1.9.1.1
........................................................................145Web interface
4.1.9.1.2
..................................................................................150Quarantine mailbox and MS Excha nge quara ntine
4.1.9.2
........................................................................150Quarantine manager settings
4.1.9.2.1
........................................................................151Proxy server
4.1.9.2.2
..................................................................................151Quarantine manager account deta ils
4.1.9.3
....................................................................................................152Computer4.2
..............................................................................152An infiltration is detected
4.2.1
..............................................................................153Processes exclus ions
4.2.2
..............................................................................154Automa tic exclusions
4.2.3
..............................................................................155Sha red local ca che
4.2.4
..............................................................................155Rea l-time file system protection
4.2.5
..................................................................................157Exclusions
4.2.5.1
........................................................................158Add or Edit exclusion
4.2.5.1.1
........................................................................159Exclusion format
4.2.5.1.2
..................................................................................159ThreatSense pa rameters
4.2.5.2
........................................................................162File extenstions excluded from sca nning
4.2.5.2.1
........................................................................162Additional ThreatSense parameters
4.2.5.2.2
........................................................................163Cleaning levels
4.2.5.2.3
........................................................................163When to modify rea l-time protection configuration
4.2.5.2.4
........................................................................163Checking real-time protection
4.2.5.2.5
........................................................................163Wha t to do if rea l-time protection does not work
4.2.5.2.6
........................................................................164Submission
4.2.5.2.7
........................................................................164Statistics
4.2.5.2.8
........................................................................164Suspicious files
4.2.5.2.9
..............................................................................165On-demand computer scan and Hyper-V s can
4.2.6
..................................................................................166Custom s can and Hyper-V sca n la uncher
4.2.6.1
..................................................................................168Scan progress
4.2.6.2
..................................................................................169Profile mana ger
4.2.6.3
..................................................................................170Scan targets
4.2.6.4
..................................................................................170Pause a scheduled scan
4.2.6.5
..............................................................................170Idle-state scanning
4.2.7
..............................................................................170Sta rtup scan
4.2.8
..................................................................................171Automatic sta rtup file check
4.2.8.1
..............................................................................171Remova ble media
4.2.9
..............................................................................172Document protection
4.2.10
..............................................................................172HIPS
4.2.11
..................................................................................174HIPS rules
4.2.11.1
........................................................................175HIPS rule settings
4.2.11.1.1
..................................................................................176Advanced setup
4.2.11.2
........................................................................176Drivers always allowed to load
4.2.11.2.1
....................................................................................................177Update4.3
..............................................................................179Update rollba ck
4.3.1
..............................................................................180Update mode
4.3.2
..............................................................................181HTTP Proxy
4.3.3
..............................................................................182Connect to LAN as
4.3.4
..............................................................................183Mirror
4.3.5
..................................................................................185Updating from the Mirror
4.3.5.1
..................................................................................187Mirror files
4.3.5.2
..................................................................................187Troubleshooting Mirror update problems
4.3.5.3
....................................................................................................187Web and email4.4
..............................................................................188Protocol filtering
4.4.1
..................................................................................188Excluded applications
4.4.1.1
..................................................................................188Excluded IP address es
4.4.1.2
..................................................................................189Web a nd email clients
4.4.1.3
..............................................................................189SSL/TLS
4.4.2
..................................................................................190Encrypted SSL communication
4.4.2.1
..................................................................................190List of known certificates
4.4.2.2
..............................................................................191Email client protection
4.4.3
..................................................................................192Email protocols
4.4.3.1
..................................................................................193Alerts a nd notifications
4.4.3.2
..................................................................................193MS Outlook toolbar
4.4.3.3
..................................................................................193Outlook Express and Windows Mail toolba r
4.4.3.4
..................................................................................194Confirmation dia log
4.4.3.5
..................................................................................194Rescan messages
4.4.3.6
..............................................................................194Web access protection
4.4.4
..................................................................................195Basic
4.4.4.1
..................................................................................195URL addres s mana gement
4.4.4.2
........................................................................195Crea te new list
4.4.4.2.1
........................................................................197Address list
4.4.4.2.2
..............................................................................198Anti-Phishing protection
4.4.5
....................................................................................................200Device control4.5
..............................................................................200Device control rules editor
4.5.1
..............................................................................201Adding Device control rules
4.5.2