• Overview
    • Changelogs
    • Prevention
    • What's new?
  • Specifications
    • Application support status
    • Supported languages
    • System requirements
  • Documentation for endpoints managed remotely
    • Introduction to ESET PROTECT On-Prem
    • Introduction to ESET PROTECT
    • Password protected settings
    • What are policies
      • Merging policies
      • How flags work
  • Install/Upgrade
    • Installation with ESET AV Remover
      • ESET AV Remover
      • Uninstallation using ESET AV Remover ended with error
    • Installation (.exe)
      • Change installation folder (.exe)
    • Installation (.msi)
      • Advanced installation (.msi)
    • Minimal modules installation
    • Command-line installation
    • Upgrading to a more recent version
      • Legacy product automatic upgrade
    • Security and stability hotfixes
    • Common installation problems
  • Deploy ESET Endpoint Antivirus
    • Deployment using GPO or SCCM
  • Activate ESET Endpoint Antivirus
    • Entering your License Key during activation
    • ESET PROTECT HUB account
    • Activation failed
    • Dialog windows - Activation
      • Registration
      • Activation progress
      • Activation successful
  • Get started
    • System tray icon
    • Keyboard shortcuts
    • Profiles
    • Context menu
    • Update setup
    • Configure network protection
    • Blocked hashes
  • Using ESET Endpoint Antivirus
    • Protection status
    • Computer scan
      • Custom scan launcher
      • Scan progress
      • Computer scan log
    • Update
      • How to create update tasks
    • Setup
      • Computer
        • A Threat is detected
      • Network
        • Network access troubleshooting
        • Temporary IP address blacklist
        • Network protection logs
        • Solving problems with ESET Network Protection
          • Logging and creating rules or exceptions from log
            • Create rule from log
          • Network protection advanced logging
          • Solving problems with Network traffic scanner
        • Dialog windows - Network protection
          • Network threat blocked
      • Web and email
        • Anti-Phishing protection
      • Import and export settings
    • Tools
      • Log files
        • Log filtering
        • Audit logs
      • Running processes
      • Security report
      • ESET SysInspector
      • Scheduler
        • Dialog windows - Scheduler
          • Scheduled scan options
          • Scheduled task overview
          • Task details
          • Task timing
          • Task timing - Once
          • Task timing - Daily
          • Task timing - Weekly
          • Task timing - Event triggered
          • Skipped task
          • Task details - Update
          • Task details - Run application
      • Submission of samples for analysis
        • Select sample for analysis - Suspicious file
        • Select sample for analysis - Suspicious site
        • Select sample for analysis - False positive file
        • Select sample for analysis - False positive site
        • Select sample for analysis - Other
      • Quarantine
    • Help and support
      • About ESET Endpoint Antivirus
      • Submit system configuration data
      • Technical support
  • Advanced setup
    • Protections
      • Real-time file system protection
        • Processes exclusions
          • Add or Edit processes exclusions
        • When to modify real-time protection configuration
        • Checking real-time protection
        • What to do if real-time protection does not work
      • HIPS - Host-based Intrusion Prevention System
        • HIPS exclusions
        • HIPS advanced setup
          • Drivers always allowed to load
        • HIPS interactive window
          • Potential ransomware behavior detected
        • HIPS rule management
          • HIPS rule settings
          • Add applicaton/registry path for HIPS
      • Cloud-based protection
        • Exclusion filter for Cloud-based protection
      • Network access protection
        • Network connection profiles
          • Add or edit Network connection profiles
            • Activators
        • IP sets
          • Edit IP sets
        • Network attack protection (IDS)
          • IDS rules
          • Brute-force attack protection
            • Rules
            • Exclusions
          • Advanced options
      • SSL/TLS
        • Application scan rules
        • Certificate rules
        • Encrypted network traffic
      • Email client protection
        • Mail transport protection
          • Excluded applications
          • Excluded IPs
        • Mailbox protection
          • Integrations
            • Microsoft Outlook toolbar
            • Confirmation dialog
            • Rescan messages
          • Response
        • ThreatSense
      • Web access protection
        • Excluded applications
        • Excluded IPs
        • URL list management
          • Address list
          • Create new Address list
          • How to add URL mask
        • HTTP(S) traffic scanning
        • ThreatSense
      • Device control
        • Device control rules editor
          • Detected devices
        • Adding Device control rules
        • Device groups
      • Document protection
      • ThreatSense
        • Cleaning levels
        • File extensions excluded from scanning
        • Additional ThreatSense parameters
    • Scans
      • Exclusions
        • Performance exclusions
          • Add or Edit performance exclusion
          • Path exclusion format
        • Detection exclusions
          • Add or Edit detection exclusion
          • Create detection exclusion wizard
      • Antimalware Scan Interface (AMSI)
      • Network traffic scanner
      • Device scan
        • Scan profiles
        • Scan targets
        • Idle-state scan
          • Idle-state detection
        • Startup scan
          • Automatic startup file check
        • Removable media
    • Updates
      • Update rollback
      • Product updates
      • Connection options
      • Update mirror
        • HTTP Server and SSL for the Mirror
        • Updating from the Mirror
        • Troubleshooting Mirror update problems
    • Tools
      • Microsoft Windows update
        • Dialog window - Operating system updates
          • Update information
      • Applications excluded from Presentation mode
      • Time slots
    • Connectivity
      • License interval check
    • Troubleshooting
      • Diagnostics
      • Technical support
      • Log files
    • Remote monitoring and management
      • ERMM Command Line
      • List of ERMM JSON commands
        • get protection-status
        • get application-info
        • get license-info
        • get logs
        • get activation-status
        • get scan-info
        • get configuration
        • get update-status
        • start scan
        • start activation
        • start deactivation
        • start update
        • set configuration
    • User interface
      • User interface elements
      • Access setup
        • Password for Advanced setup
      • ESET CMD
      • Dialog windows
        • Password
        • Safe mode
    • Notifications
      • Application statuses
      • Desktop notifications
        • Customization of notifications
        • Forwarding
        • Dialog window - Desktop notifications
      • Interactive alerts
        • List of interactive alerts
        • Confirmation messages
        • Advanced settings conflict error
        • Restart required
        • Restart recommended
    • Presentation mode
    • Revert Advanced setup settings
      • Revert all settings to default
      • Revert all settings in current section
      • Error while saving the configuration
    • Command line scanner
  • FAQ
    • Auto-updates
    • How to update ESET Endpoint Antivirus
    • How to remove a virus from my PC
    • How to create a new task in Scheduler
      • How to schedule a weekly computer scan
    • How to connect ESET Endpoint Antivirus to ESET PROTECT On-Prem
      • How to use Override mode
      • How to apply a recommended policy for ESET Endpoint Antivirus
    • How to configure a mirror
    • How do I upgrade to Windows 10 with ESET Endpoint Antivirus
    • How to activate Remote monitoring and management
    • How to block the download of specific file types from the Internet
    • How to minimize the ESET Endpoint Antivirus user interface
    • Ransomware Remediation
  • Uninstallation
  • Legal documents
    • End User License Agreement
    • Privacy Policy