ESET Cyber Security
 
ESET Cyber Security – Table of Contents

Protocol Exclusions

The entries in the exclusion lists will be excluded from protocol content filtering. We recommend that you only use this option for applications or IP addresses that are known to be trustworthy.