1 ESET Endpoint Security for macOS 1 .................................................................................................
1.1 What's new in version 6 1 .........................................................................................................................
1.2 System requirements 2 ..............................................................................................................................
2 Introduction to ESET PROTECT 2 ..........................................................................................................
3 Introduction to ESET PROTECT CLOUD 3 .........................................................................................
4 Remote installation 3 ..................................................................................................................................
4.1 Create a remote installation package 6 ..................................................................................................
5 Local installation 8 ........................................................................................................................................
5.1 Typical installation 9 ..................................................................................................................................
5.2 Custom installation 10 ...............................................................................................................................
5.3 Allow system extensions localy 11 ...........................................................................................................
5.4 Allow Full disk access localy 11 ................................................................................................................
6 Product activation 12 ...................................................................................................................................
7 Uninstallation 13 .............................................................................................................................................
8 Basic overview 13 ..........................................................................................................................................
8.1 Keyboard shortcuts 14 ...............................................................................................................................
8.2 Checking operation of the system 14 ......................................................................................................
8.3 What to do if the program does not work properly 15 .........................................................................
9 Computer protection 15 .............................................................................................................................
9.1 Antivirus and antispyware protection 15 ................................................................................................
9.1.1 General 15 ................................................................................................................................................
9.1.1.1 Exclusions 16 ...........................................................................................................................................
9.1.2 Startup protection 16 ...................................................................................................................................
9.1.3 Real-time file system protection 16 ..................................................................................................................
9.1.3.1 Advanced options 17 .................................................................................................................................
9.1.3.2 When to modify Real-time protection configuration 17 ........................................................................................
9.1.3.3 Checking Real-time protection 17 ..................................................................................................................
9.1.3.4 What to do if Real-time protection does not work 18 ..........................................................................................
9.1.4 On-demand computer scan 18 ........................................................................................................................
9.1.4.1 Type of scan 19 ........................................................................................................................................
9.1.4.1.1 Smart scan 19 .......................................................................................................................................
9.1.4.1.2 Custom scan 19 .....................................................................................................................................
9.1.4.2 Scan targets 20 ........................................................................................................................................
9.1.4.3 Scan profiles 20 ........................................................................................................................................
9.1.5 ThreatSense engine parameters setup 21 ..........................................................................................................
9.1.5.1 Objects 21 ..............................................................................................................................................
9.1.5.2 Options 22 ..............................................................................................................................................
9.1.5.3 Cleaning 22 .............................................................................................................................................
9.1.5.4 Exclusions 22 ...........................................................................................................................................
9.1.5.5 Limits 23 ................................................................................................................................................
9.1.5.6 Others 23 ...............................................................................................................................................
9.1.6 An infiltration is detected 23 ..........................................................................................................................
9.2 Web and email protection 24 ....................................................................................................................
9.2.1 Web access protection 24 ..............................................................................................................................
9.2.1.1 Ports 24 ..................................................................................................................................................
9.2.1.2 URL lists 24 .............................................................................................................................................
9.2.2 Email protection 25 ......................................................................................................................................
9.2.2.1 POP3 protocol checking 26 ..........................................................................................................................
9.2.2.2 IMAP protocol checking 26 ...........................................................................................................................
9.3 Anti-Phishing 26 ..........................................................................................................................................
10 Firewall 26 .......................................................................................................................................................
10.1 Filtering modes 27 ....................................................................................................................................