Advanced setup
You can configure settings and options based on your needs. The menu on the left includes the following categories:
Enable or disable detection of potentially unwanted, unsafe, suspicious applications and Anti-Stealth protection. Specify exclusions of processes or files and folders. Configure real-time file system protection, ThreatSense parameters, cloud-based protection (ESET LiveGrid®), malware scans (on-demand computer scans and other scan options), Hyper-V scan and HIPS.
Configure update options such as profiles, detection engine age, snapshots for module rollback, update type, custom update server, connection/proxy server, update mirror, access to update files, HTTP server, user account details for network connection and more.
Manage network protection - Network connection profile, Firewall, Network attack protection (IDS), Brute-force attack protection and Botnet protection.
Configure Protocol filtering and exclusions (excluded applications and IP addresses), SSL/TLS protocol filtering options, email client protection (integration, email protocols, alerts and notifications), web access protection (HTTP/HTTPS web protocols and URL address management) and email client anti-phishing protection.
Enable integration and configure device control rules and groups.
Customize tools, such as ESET CMD, ESET RMM, WMI provider, ESET PROTECT scan targets, Windows Update notifications, Log files, Email notifications, Diagnostics, Cluster and more.
Specify the Proxy server settings if required.
Configure the main program window, License information, Password protection, eShell execution policy and more.
Configure notifications to be shown on desktop or sent by email for Application statuses, Desktop notification, Interactive alerts and Forwarding.