Web access protection
Web access protection monitors communication between web browsers and remote servers and complies with HTTP (Hypertext Transfer Protocol) rules.
To configure the ESET Endpoint Security remotely:
1.In ESET PROTECT, click Policies > New policy and type a name for the policy.
To adjust the settings in an existing policy for ESET Endpoint for macOS (V7+), click the policy you want to change in the list of policies and click Edit > Settings. |
2.Click Settings and select ESET Endpoint for macOS (V7+) from the drop-down menu.
3.Adjust the desired settings.
4.Click Continue > Assign and select the appropriate group of computers.
5.Click Finish.
To configure the ESET Endpoint Security locally see application preferences. |
In Web and email > Web access protection, you can configure the following settings:
Basic
Enable Web protection – Monitors HTTP communication between web browsers and remote servers.
Enable Anti-Phishing protection – Anti-Phishing protection is another layer of protection that provides increased defense from illegitimate websites that attempt to acquire passwords and other sensitive information. Anti-Phishing protection is enabled by default.
Web protocols
Enable HTTP protocol checking – Scans the HTTP communication used by any application.
The program will only scan traffic on ports defined in Ports used by HTTP protocol. Other communication ports can be added if necessary. Multiple port numbers must be delimited by a comma.
URL address management
The URL address management enables you to specify HTTP addresses to block, allow, or exclude from scanning. Web sites in the list of Blocked addresses are not accessible. Web sites in the list of Found malware is ignored addresses are accessed without being scanned for malicious code.
To only allow access to URLs listed in the Allowed Address list, enable the slider bar next to Restrict URL addresses.
To activate a list, enable the slider bar next to List active for the specific list name. To receive a notification when entering an address from the specific list, enable the slider bar next to Notify when applying.
You can use the special symbols * (asterisk) and ? (question mark) when building addresses lists. The asterisk substitutes any character string, and the question mark substitutes any symbol.
You should take particular care when specifying excluded addresses because the list should only contain trusted and safe addresses. Similarly, you must ensure that the symbols * and ? are used correctly in this list.
Protocol Filtering
Protocol filtering allows you to filter the data transmitted through the POP3, IMAP and HTTP application protocols, employing the ThreatSense scanning technology.
Excluded applications – communication of applications in the list will be excluded from protocol content filtering.
Excluded IP addresses – the entries in the list will be excluded from protocol content filtering. Communication from/to selected IP addresses will not be scanned. We recommend that you only use this option for addresses that are known to be trustworthy.
Enable Protocol filtering advanced logging – record all events to allow diagnosing and solving problems.
ThreatSense Parameters
ThreatSense parameters enable you to specify configuration options for the web access protection, such as objects to scan, detection methods used, etc. See ThreatSense parameters for detailed information.