Protocol filtering
Antivirus protection for application protocols is provided by the ThreatSense scanning engine, which seamlessly integrates all advanced malware scanning techniques. Protocol filtering works automatically, regardless of the Internet browser or email client used. To edit encrypted (SSL) settings, go to Advanced Setup (F5) > Web and email > SSL/TLS.
Enable application protocol content filtering – Can be used to disable protocol filtering. Note that many ESET Endpoint Security components (Web access protection, Email protocols protection, Anti-Phishing, Web control) depend on this and will be non-functional without it.
Excluded applications – Allows you to exclude specific applications from protocol filtering. Useful when protocol filtering causes compatibility issues.
Excluded IP addresses – Allows you to exclude specific remote addresses from protocol filtering. Useful when protocol filtering causes compatibility issues.
IPv4 addresses and mask: •192.168.0.10 – IP address of an individual computer for which the rule is to be applied. •192.168.0.1 to 192.168.0.99 – the starting and ending address IP address to specify the IP range (of several computers) for which the rule is to be applied. •Subnet (a group of computers) defined by an IP address and mask. For example, 255.255.255.0 is the network mask for the 192.168.1.0/24 prefix, that means 192.168.1.1 to 192.168.1.254 address range. IPv6 address and mask: •2001:718:1c01:16:214:22ff:fec9:ca5 – the IPv6 address of an individual computer for which the rule is to be applied •2002:c0a8:6301:1::1/64 – IPv6 address with the prefix length of 64 bits, that means 2002:c0a8:6301:0001:0000:0000:0000:0000 to 2002:c0a8:6301:0001:ffff:ffff:ffff:ffff |