4.1 Malware scans 57 ........................................................................................................................
4.1 Idle-state scan 58 ........................................................................................................................
4.1 Scan profiles 58 ..........................................................................................................................
4.1 Scan targets 59 ...........................................................................................................................
4.1 Advanced scan options 59 ...............................................................................................................
4.1 Device control 60 .........................................................................................................................
4.1 Device control rules editor 60 ...........................................................................................................
4.1 Detected devices 61 .....................................................................................................................
4.1 Device groups 62 .........................................................................................................................
4.1 Adding Device control rules 63 ..........................................................................................................
4.1 Host-based Intrusion Prevention System (HIPS) 65 .....................................................................................
4.1 HIPS interactive window 67 ..............................................................................................................
4.1 Potential ransomware behavior detected 68 ............................................................................................
4.1 HIPS rule management 69 ...............................................................................................................
4.1 HIPS rule settings 70 .....................................................................................................................
4.1 HIPS advanced setup 72 .................................................................................................................
4.1 Drivers always allowed to load 72 .......................................................................................................
4.1 Presentation mode 73 ....................................................................................................................
4.1 Startup scan 74 ...........................................................................................................................
4.1 Automatic startup file check 74 .........................................................................................................
4.1 Document protection 74 .................................................................................................................
4.1 Exclusions 75 .............................................................................................................................
4.1 Performance exclusions 75 ..............................................................................................................
4.1 Add or Edit performance exclusion 76 ..................................................................................................
4.1 Path exclusion format 78 ................................................................................................................
4.1 Detection exclusions 78 ..................................................................................................................
4.1 Add or Edit detection exclusion 81 ......................................................................................................
4.1 Create detection exclusion wizard 82 ...................................................................................................
4.1 Exclusions (7.1 and below) 83 ...........................................................................................................
4.1 Processes exclusions 84 .................................................................................................................
4.1 Add or Edit processes exclusions 84 ....................................................................................................
4.1 HIPS exclusions 85 .......................................................................................................................
4.1 ThreatSense parameters 85 .............................................................................................................
4.1 Cleaning levels 87 ........................................................................................................................
4.1 File extensions excluded from scanning 88 .............................................................................................
4.1 Additional ThreatSense parameters 89 .................................................................................................
4.2 Network 89 ..................................................................................................................................
4.2 Firewall 90 ................................................................................................................................
4.2 Learning mode 92 ........................................................................................................................
4.2 Network attack protection 93 ............................................................................................................
4.2 Brute-force attack protection 94 ........................................................................................................
4.2 Rules 94 ..................................................................................................................................
4.2 Exclusions 96 .............................................................................................................................
4.2 Advanced filtering options 96 ............................................................................................................
4.2 IDS rules 99 ...............................................................................................................................
4.2 Suspected threat blocked 101 ..........................................................................................................
4.2 Network protection troubleshooting 101 ...............................................................................................
4.2 Connected networks 102 ................................................................................................................
4.2 Known networks 102 ....................................................................................................................
4.2 Known networks editor 103 .............................................................................................................
4.2 Network authentication - Server configuration 105 ....................................................................................