Web access protection
Web access protection monitors communication between web browsers and remote servers and complies with HTTP (Hypertext Transfer Protocol) rules.
To configure the ESET Endpoint Antivirus for macOS remotely:
1.In ESET PROTECT On-Prem, click Policies > New policy and type a name for the policy.
To adjust the settings in an existing policy for ESET Endpoint for macOS (V7+), click the policy you want to change in the list of policies and click Edit > Settings. |
2.Click Settings and select ESET Endpoint for macOS (V7+) from the drop-down menu.
3.Adjust the desired settings.
4.Click Continue > Assign and select the appropriate group of computers.
5.Click OK > Finish.
To configure the ESET Endpoint Antivirus for macOS locally see application preferences. |
In Web and email > Web access protection, you can configure the following settings:
Basic
Enable Web protection – Monitors HTTP communication between web browsers and remote servers.
Web protocols
Enable HTTP protocol checking – Scans the HTTP communication used by any application.
The program will only scan traffic on ports defined in Ports used by HTTP protocol. Other communication ports can be added if necessary. Multiple port numbers must be delimited by a comma.
URL address management
The URL address management enables you to specify HTTP addresses to block, allow, or exclude from scanning. Web sites in the list of Blocked addresses are not accessible. Web sites in the list of Found malware is ignored addresses are accessed without being scanned for malicious code.
To only allow access to URLs listed in the Allowed Address list, enable the slider bar next to Restrict URL addresses.
To activate a list, enable the slider bar next to List active for the specific list name. To receive a notification when entering an address from the specific list, enable the slider bar next to Notify when applying.
You can use the special symbols * (asterisk) and ? (question mark) when building addresses lists. The asterisk substitutes any character string, and the question mark substitutes any symbol.
You should take particular care when specifying excluded addresses because the list should only contain trusted and safe addresses. Similarly, you must ensure that the symbols * and ? are used correctly in this list.
ThreatSense Parameters
ThreatSense parameters enable you to specify configuration options for the web access protection, such as objects to scan, detection methods used, etc. See ThreatSense parameters for detailed information.