ESET Online Help

Search English
Select the topic

Web access protection

Web access protection monitors communication between web browsers and remote servers to protect users from online threats. It complies with HTTP (Hypertext Transfer Protocol) and HTTPS (encrypted communication) rules.

Access to web pages known to contain malicious content is blocked before content is downloaded. All other web pages are scanned by the ThreatSense scanning engine when they are loaded and blocked if malicious content is detected. Web access protection offers two levels of protection, blocking by blacklist and blocking by content.


important

We highly recommend keeping Web access protection enabled.

Enable Web access protection—When this feature is disabled, both Web access protection and Anti-Phishing protection will not function.

Enable Anti-Phishing protection—When enabled, this feature blocks phishing websites. For more information, see Anti-Phishing protection.

Excluded applications—To exclude specific network-aware applications from content filtering, select them from the list. The HTTP/POP3 communications of these selected applications will not be checked for threats, allowing you to exempt them from protocol filtering. Click Edit and then Add to choose an executable from the list of applications to exclude it from protocol filtering.


important

We recommend using this option only for applications that are not working correctly while their communication is monitored.

Excluded IPs—To exclude specific remote addresses from protocol filtering. The IP addresses in this list will be excluded from protocol content filtering. HTTP/POP3/IMAP communication from/to the selected addresses will not be checked for threats.


important

We recommend using this option exclusively for addresses that are known to be trustworthy.

To specify the IP address, address range, or subnet for the exclusion, click Edit and then Add. If you select Enter multiple values, you can input multiple IP addresses separated by newlines, commas, or semicolons. When multiple selection is enabled, the excluded IP addresses will be displayed in the list.


note

Exclusions are useful when protocol filtering causes compatibility issues.

URL list management

ThreatSense parameters

Web control