..................................................................................113Gea vanceerde instellingen
4.1.4.2
..................................................................................117Instellingen voor grijze lijs t
4.1.4.3
..................................................................................119SPF en DKIM
4.1.4.4
..............................................................................121Regels
4.1.5
..................................................................................123Lijst met regels
4.1.5.1
........................................................................124Regelwizard
4.1.5.1.1
........................................................................125Regelvoorwaarde
4.1.5.1.1.1
........................................................................128Regelactie
4.1.5.1.1.2
..............................................................................129Beveiliging va n e-mailtransport
4.1.6
..................................................................................131Gea vanceerde instellingen
4.1.6.1
..............................................................................132Beveiliging va n postvakda taba se
4.1.7
..............................................................................134Op aanvraag da taba se sca nnen
4.1.8
..................................................................................136Extra postvakitems
4.1.8.1
..................................................................................136Proxyserver
4.1.8.2
..................................................................................136Details van databasesca naccount
4.1.8.3
..............................................................................138Qua rantaine voor e-mail
4.1.9
..................................................................................139Loka le quara nta ine
4.1.9.1
........................................................................139Bestandopslag
4.1.9.1.1
........................................................................140Webinterface
4.1.9.1.2
..................................................................................145Quaranta inepos tvak en MS Exchange-quara nta ine
4.1.9.2
........................................................................146Instellingen voor quaranta inebeheer
4.1.9.2.1
........................................................................146Proxyserver
4.1.9.2.2
..................................................................................147Accountdeta ils van quara nta inebeheer
4.1.9.3
....................................................................................................147Computer4.2
..............................................................................148Er is een infiltratie gedetecteerd
4.2.1
..............................................................................149Uitzonderingen voor processen
4.2.2
..............................................................................149Automatische uitsluitingen
4.2.3
..............................................................................150Gedeelde lokale cache
4.2.4
..............................................................................151Real-timebeveiliging va n bes tandssysteem
4.2.5
..................................................................................152Uitsluitingen
4.2.5.1
........................................................................154Uitsluiting toevoegen of bewerken
4.2.5.1.1
........................................................................155Uitsluitingsindeling
4.2.5.1.2
..................................................................................155ThreatSense-parameters
4.2.5.2
........................................................................158
Bestands extensies die moeten worden uitgesloten
van scans
4.2.5.2.1
........................................................................159Aanvullende ThreatSense-parameters
4.2.5.2.2
........................................................................159Opschoonniveaus
4.2.5.2.3
........................................................................160
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
4.2.5.2.4
........................................................................160Real-timebeveiliging controleren
4.2.5.2.5
........................................................................160
Te volgen procedure als rea l-timebeveiliging niet
werkt
4.2.5.2.6
........................................................................160Verzending
4.2.5.2.7
........................................................................161Statistieken
4.2.5.2.8
........................................................................161Verdachte bestanden
4.2.5.2.9
..............................................................................162Computerscan op aanvraag en Hyper-V-scan
4.2.6
..................................................................................163
Sta rtprogramma voor aangepa ste scan en
Hyper-V-scan
4.2.6.1
..................................................................................165Scanvoortgang
4.2.6.2
..................................................................................166Profielbeheer
4.2.6.3
..................................................................................167Scandoelen
4.2.6.4
..................................................................................167Een geplande scan tijdelijk uits cha kelen
4.2.6.5
..............................................................................167Scannen bij inactieve status
4.2.7
..............................................................................168Opstartscan
4.2.8
..................................................................................168Automatis che bestands controle bij opstarten
4.2.8.1
..............................................................................169Verwisselba re media
4.2.9
..............................................................................169Documentsbescherming
4.2.10
..............................................................................169HIPS
4.2.11
..................................................................................172HIPS-regels
4.2.11.1
........................................................................173HIPS-regelinstellingen
4.2.11.1.1
..................................................................................174Geava nceerde instellingen
4.2.11.2
........................................................................175Stuurprogramma 's die altijd mogen worden gela den
4.2.11.2.1
....................................................................................................175Bijwerken4.3
..............................................................................178Updates terugdraaien
4.3.1
..............................................................................178Updatemodus
4.3.2
..............................................................................180HTTP-proxy
4.3.3
..............................................................................181Verbinding ma ken met LAN als
4.3.4
..............................................................................182Mirror
4.3.5
..................................................................................184Bijwerken vanaf de mirror
4.3.5.1
..................................................................................186Mirrorbestanden
4.3.5.2
..................................................................................186Updateproblemen met mirrors oplossen
4.3.5.3
....................................................................................................187Web en e-mail4.4
..............................................................................187Protocolfiltering
4.4.1
..................................................................................187Uitgesloten toepassingen
4.4.1.1
..................................................................................188Uitgesloten IP-adressen
4.4.1.2
..................................................................................188Web- en e-mailclients
4.4.1.3
..............................................................................188SSL/TLS
4.4.2
..................................................................................190Gecodeerde SSL-communica tie
4.4.2.1
..................................................................................190Lijst met bekende certifica ten
4.4.2.2
..............................................................................191Beveiliging van e-mailclient
4.4.3
..................................................................................192E-mailprotocollen
4.4.3.1
..................................................................................193Waarschuwingen en meldingen
4.4.3.2
..................................................................................193MS Outlook-werkba lk
4.4.3.3
..................................................................................194Outlook Express- en Windows Mail-werkbalk
4.4.3.4
..................................................................................194Bevestigingsvenster
4.4.3.5
..................................................................................194Berichten opnieuw sca nnen
4.4.3.6
..............................................................................194Beveiliging van webtoegang
4.4.4
..................................................................................195Basis
4.4.4.1
..................................................................................195URL-adresbeheer
4.4.4.2
........................................................................196Nieuwe lijst maken
4.4.4.2.1
........................................................................198Adreslijst
4.4.4.2.2
..............................................................................199Antiphishing-beveiliging
4.4.5
....................................................................................................201Apparaatbeheer4.5
..............................................................................201Regeleditor voor appa raa tbeheer
4.5.1
..............................................................................202Regels voor Appara atbeheer toevoegen
4.5.2
..............................................................................204Gedetecteerde appara ten
4.5.3
..............................................................................204Apparaatgroepen
4.5.4
....................................................................................................205Hulpmiddelen4.6
..............................................................................205ESET LiveGrid
4.6.1
..................................................................................207Uitsluitingsfilter
4.6.1.1
..............................................................................208Microsoft Windows Update
4.6.2
..............................................................................208ESET CMD
4.6.3
..............................................................................210WMI-provider
4.6.4
..................................................................................210Opgegeven gegevens
4.6.4.1
..................................................................................213Toegang tot opgegeven gegevens
4.6.4.2