4.1.2.2 Device groups 42 ......................................................................................................................................
4.1.2.3 Adding Device control rules 42 .....................................................................................................................
4.1.3 Host-based Intrusion Prevention System (HIPS) 44 ...............................................................................................
4.1.3.1 HIPS interactive window 46 .........................................................................................................................
4.1.3.1.1 Potential ransomware behavior detected 47 ..................................................................................................
4.1.3.2 HIPS rule management 48 ...........................................................................................................................
4.1.3.2.1 HIPS rule settings 49 ...............................................................................................................................
4.1.3.2.2 Add applicaton/registry path for HIPS 51 .......................................................................................................
4.1.3.3 HIPS exclusions 51 ....................................................................................................................................
4.1.3.4 HIPS advanced setup 52 .............................................................................................................................
4.1.3.4.1 Drivers always allowed to load 52 ...............................................................................................................
4.1.4 Gamer mode 52 ..........................................................................................................................................
4.2 Internet protection 52 ................................................................................................................................
4.2.1 Protocol filtering 53 ......................................................................................................................................
4.2.1.1 Web and email clients 54 ............................................................................................................................
4.2.1.2 Excluded applications 54 ............................................................................................................................
4.2.1.3 Excluded IP addresses 54 ............................................................................................................................
4.2.1.3.1 Add IPv4 address 55 ................................................................................................................................
4.2.1.3.2 Add IPv6 address 55 ................................................................................................................................
4.2.1.4 SSL/TLS 55 ..............................................................................................................................................
4.2.1.4.1 Certificates 56 .......................................................................................................................................
4.2.1.4.1 Encrypted network traffic 57 .....................................................................................................................
4.2.1.4.2 List of known certificates 57 ......................................................................................................................
4.2.1.4.3 List of SSL/TLS filtered applications 58 .........................................................................................................
4.2.2 Email client protection 58 ..............................................................................................................................
4.2.2.1 Email protocols 59 ....................................................................................................................................
4.2.2.1.1 POP3, POP3S filter 60 ..............................................................................................................................
4.2.2.2 Email alerts and notifications 61 ...................................................................................................................
4.2.2.3 Integration with email clients 61 ...................................................................................................................
4.2.2.3.1 Microsoft Outlook toolbar 61 ......................................................................................................................
4.2.2.3.2 Outlook Express and Windows Mail toolbar 61 ................................................................................................
4.2.2.3.3 Confirmation dialog 62 .............................................................................................................................
4.2.2.3.4 Rescan messages 62 ...............................................................................................................................
4.2.3 Web access protection 62 ..............................................................................................................................
4.2.3.1 Web access protection advanced setup 64 ......................................................................................................
4.2.3.2 Web protocols 64 ......................................................................................................................................
4.2.3.3 URL address management 65 .......................................................................................................................
4.2.3.3.1 URL addresses list 66 ..............................................................................................................................
4.2.3.3.2 Create new URL address list 67 ..................................................................................................................
4.2.3.3.3 How to add URL mask 68 ..........................................................................................................................
4.2.4 Anti-Phishing protection 68 ............................................................................................................................
4.3 Updating the program 69 ..........................................................................................................................
4.3.1 Update setup 72 .........................................................................................................................................
4.3.1.1 Update rollback 74 ....................................................................................................................................
4.3.1.2 Program component update 75 ....................................................................................................................
4.3.1.3 Connection options 75 ................................................................................................................................
4.3.2 How to create update tasks 76 ........................................................................................................................
4.4 Tools 76 ........................................................................................................................................................
4.4.1 Tools in ESET NOD32 Antivirus 76 ....................................................................................................................
4.4.1.1 Log files 77 .............................................................................................................................................
4.4.1.1.1 Log filtering 79 ......................................................................................................................................
4.4.1.1.2 Logging configuration 80 ..........................................................................................................................
4.4.1.2 Running processes 80 ................................................................................................................................
4.4.1.3 Security report 82 .....................................................................................................................................
4.4.1.4 Watch activity 83 ......................................................................................................................................
4.4.1.5 ESET SysInspector 84 .................................................................................................................................
4.4.1.6 Scheduler 85 ...........................................................................................................................................
4.4.1.7 System cleaner 87 ....................................................................................................................................