..............................................................................118SPF en DKIM
6.3.4
..............................................................................120Backscatterbeveiliging
6.3.5
....................................................................................................121Antiphishing-beveiliging6.4
....................................................................................................122Regels6.5
..............................................................................125Regelvoorwaarde
6.5.1
..............................................................................129Regelactie
6.5.2
..............................................................................131Regelvoorbeelden
6.5.3
....................................................................................................133Beveiliging van e-mailtransport6.6
..............................................................................136Gea vanceerde instellingen voor berichtentransport
6.6.1
....................................................................................................137Beveiliging van postvakdatabase6.7
..............................................................................138Achtergrondscan
6.7.1
....................................................................................................139On-demand databasescan van postvak6.8
..............................................................................141Da taba ses can van postvak
6.8.1
..............................................................................143Scan van Office 365-pos tvak
6.8.2
..............................................................................144Extra postvakitems
6.8.3
..............................................................................144Proxyserver
6.8.4
..............................................................................145Details van data basescanaccount
6.8.5
....................................................................................................146Typen Quarantaine voor e-mail6.9
..............................................................................147Loka le quarantaine
6.9.1
..................................................................................148Bestandopslag
6.9.1.1
..................................................................................148Webinterface
6.9.1.2
........................................................................154
E-mailquaranta inerapporten verzenden - geplande
taak
6.9.1.2.1
........................................................................155De gebruikerswebinterface voor e-mailquara nta ine
6.9.1.2.2
..............................................................................157Quarantainepos tvak en MS Exchange-quara nta ine
6.9.2
..................................................................................158Instellingen voor quarantainebeheer
6.9.2.1
..................................................................................158Proxyserver
6.9.2.2
..............................................................................159Accountdetails van quara nta inebeheer
6.9.3
....................................................................................................159Antivirustest6.10
....................................................................................................159Antispamtest6.11
....................................................................................................160Antiphishingtest6.12
.......................................................161Algemene instellingen7.
....................................................................................................161Computer7.1
..............................................................................162Uitzonderingen voor processen
7.1.1
..............................................................................164Uitsluitingen
7.1.2
..................................................................................164Uitsluiting toevoegen of bewerken
7.1.2.1
..............................................................................166Automa tische uitsluitingen
7.1.3
..............................................................................167Gedeelde lokale ca che
7.1.4
..............................................................................167Er is een infiltratie gedetecteerd
7.1.5
..............................................................................168Rea l-timebeveiliging va n bestandssysteem
7.1.6
..................................................................................169ThreatSense-parameters
7.1.6.1
........................................................................173Aanvullende ThreatSense-parameters
7.1.6.1.1
........................................................................173
Bestands extensies die moeten worden uitgesloten
van scans
7.1.6.1.2
..............................................................................174Op de cloud gebaseerde beveiliging
7.1.7
..................................................................................176Uitsluitingsfilter
7.1.7.1
..............................................................................177Malwarescans
7.1.8
..................................................................................178Profielbeheer
7.1.8.1
..................................................................................178Profieldoelen
7.1.8.2
..................................................................................180Scandoelen
7.1.8.3
..................................................................................182Sca n bij inactieve status
7.1.8.4
..................................................................................182Opstartscan
7.1.8.5
........................................................................182Automa tische bestandscontrole bij opsta rten
7.1.8.5.1
..................................................................................183Verwis selba re media
7.1.8.6
..................................................................................183Documentbescherming
7.1.8.7
..............................................................................184Hyper-V-scan
7.1.9
..............................................................................185HIPS
7.1.10
..................................................................................188HIPS-regelinstellingen
7.1.10.1
..................................................................................190Geava nceerde HIPS-instellingen
7.1.10.2
....................................................................................................191Updateconfiguratie7.2
..............................................................................194Ongeda an maken van updates
7.2.1
..............................................................................194Geplande taak - Bijwerken
7.2.2
..............................................................................195Updatemirror
7.2.3
....................................................................................................197Netwerkbeveiliging7.3
..............................................................................198IDS-uitzonderingen
7.3.1
..............................................................................199Zwarte lijst met tijdelijk geblokkeerde IP-adressen
7.3.2
....................................................................................................199Web en e-mail7.4
..............................................................................200Protocolfiltering
7.4.1
..................................................................................200Web- en e-mailclients
7.4.1.1
..............................................................................201SSL/TLS
7.4.2
..................................................................................202Lijst met bekende certificaten
7.4.2.1
..................................................................................202Gecodeerde SSL-communica tie
7.4.2.2
..............................................................................203Beveiliging van e-mailclient
7.4.3
..................................................................................204E-mailprotocollen
7.4.3.1
..................................................................................205Waarschuwingen en meldingen
7.4.3.2
..................................................................................205MS Outlook-werkba lk
7.4.3.3
..................................................................................206Outlook Express- en Windows Mail-werkbalk
7.4.3.4
..................................................................................206Bevestigingsvenster
7.4.3.5
..................................................................................206Berichten opnieuw scannen
7.4.3.6
..............................................................................206Beveiliging van webtoegang
7.4.4
..................................................................................207URL-adresbeheer
7.4.4.1
........................................................................208Nieuwe lijst maken
7.4.4.1.1
..............................................................................210Antiphishing-webbeveiliging
7.4.5
....................................................................................................211Apparaatbeheer7.5
..............................................................................211Apparaatregels
7.5.1
..............................................................................213Apparaatgroepen
7.5.2
....................................................................................................214Configuratie van Hulpmiddelen7.6
..............................................................................214Tijdvakken
7.6.1
..............................................................................215Microsoft Windows® Bijwerken
7.6.2
..............................................................................215ESET CMD
7.6.3
..............................................................................217ESET RMM
7.6.4
..............................................................................217WMI-provider
7.6.5
..................................................................................218Opgegeven gegevens
7.6.5.1
..................................................................................224Toegang tot opgegeven gegevens
7.6.5.2
..............................................................................225ERA/ESMC-scandoelen
7.6.6
..............................................................................225Negeermodus
7.6.7
..............................................................................229Logbestanden
7.6.8
..................................................................................232Sysloggebeurtenis sen koppelen
7.6.8.1
..............................................................................234Proxyserver
7.6.9
..............................................................................235Melding
7.6.10
..................................................................................235Toepassingsmeldingen
7.6.10.1
..................................................................................235Bureaubladmeldingen
7.6.10.2