ESET Online Help

Search English
Select the topic

Web access protection

Web access protection monitors communication between web browsers and remote servers and complies with HTTP (Hypertext Transfer Protocol) rules.

To configure the ESET Endpoint Antivirus for macOS remotely:

1.In ESET PROTECT On-Prem, click Policies > New policy and type a name for the policy.


note

To adjust the settings in an existing policy for ESET Endpoint for macOS (V7+), click the policy you want to change in the list of policies and click Edit > Settings.

2.Click Settings and select ESET Endpoint for macOS (V7+) from the drop-down menu.

3.Adjust the desired settings.

4.Click Continue > Assign and select the appropriate group of computers.

5.Click OK > Finish.


note

To configure the ESET Endpoint Antivirus for macOS locally see application preferences.

In Web and email > Web access protection, you can configure the following settings:

Basic

Enable Web protection – Monitors HTTP communication between web browsers and remote servers.

Web protocols

Enable HTTP protocol checking – Scans the HTTP communication used by any application.

The program will only scan traffic on ports defined in Ports used by HTTP protocol. Other communication ports can be added if necessary. Multiple port numbers must be delimited by a comma.

URL address management

The URL address management enables you to specify HTTP addresses to block, allow, or exclude from scanning. Web sites in the list of Blocked addresses are not accessible. Web sites in the list of Found malware is ignored addresses are accessed without being scanned for malicious code.

To only allow access to URLs listed in the Allowed Address list, enable the slider bar next to Restrict URL addresses.

To activate a list, enable the slider bar next to List active for the specific list name. To receive a notification when entering an address from the specific list, enable the slider bar next to Notify when applying.

You can use the special symbols * (asterisk) and ? (question mark) when building addresses lists. The asterisk substitutes any character string, and the question mark substitutes any symbol.

You should take particular care when specifying excluded addresses because the list should only contain trusted and safe addresses. Similarly, you must ensure that the symbols * and ? are used correctly in this list.

ThreatSense Parameters

ThreatSense parameters enable you to specify configuration options for the web access protection, such as objects to scan, detection methods used, etc. See ThreatSense parameters for detailed information.