• ESET Internet Security
    • What's new in this version?
    • Which product do I have?
    • System requirements
      • Your version of Windows 7 is outdated
      • Windows 7 is no longer supported by Microsoft
      • Windows Vista is no longer supported
    • Prevention
    • Help pages
  • Installation
    • Live installer
    • Offline installation
    • Product activation
      • Entering your License Key during activation
      • Use License Manager
      • Activate Trial License
      • Free ESET License key
      • Activation failed - common scenarios
      • Activation failed due to leaked license
    • Product change
      • License upgrade
      • Product upgrade
      • License downgrade
      • Product downgrade
    • Common installation problems
    • First scan after installation
    • Upgrading to a more recent version
      • Legacy product automatic upgrade
    • Referring ESET product to a friend
  • Beginner's guide
    • The main program window
    • Updates
    • Setup additional ESET security tools
    • Trusted zone setup
    • Anti-Theft
    • Parental control tools
  • Working with ESET Internet Security
    • Computer protection
      • Detection engine
        • Detection engine advanced options
      • An infiltration is detected
      • Real-time file system protection
        • Cleaning levels
        • When to modify real-time protection configuration
        • Checking real-time protection
        • What to do if real-time protection does not work
        • Processes exclusions
          • Add or Edit processes exclusions
      • Computer scan
        • Custom scan launcher
        • Scan progress
        • Computer scan log
        • Malware scans
          • Idle-state scan
          • Scan profiles
          • Scan targets
          • Advanced scan options
      • Device control
        • Device control rules editor
          • Detected devices
        • Device groups
        • Adding Device control rules
      • Webcam Protection
        • Webcam protection rules editor
      • Host-based Intrusion Prevention System (HIPS)
        • HIPS interactive window
          • Potential ransomware behavior detected
        • HIPS rule management
          • HIPS rule settings
          • Add applicaton/registry path for HIPS
        • HIPS advanced setup
          • Drivers always allowed to load
      • Gamer mode
      • Startup scan
        • Automatic startup file check
      • Document protection
      • Exclusions
        • Performance exclusions
          • Add or Edit performance exclusion
          • Path exclusion format
        • Detection exclusions
          • Add or Edit detection exclusion
        • HIPS exclusions
      • ThreatSense parameters
        • File extensions excluded from scanning
        • Additional ThreatSense parameters
    • Internet protection
      • Protocol filtering
        • Excluded applications
        • Excluded IP addresses
          • Add IPv4 address
          • Add IPv6 address
        • SSL/TLS
          • Certificates
            • Encrypted network traffic
          • List of known certificates
          • List of SSL/TLS filtered applications
      • Email client protection
        • Email protocols
          • POP3, POP3S filter
        • Email alerts and notifications
        • Integration with email clients
          • Microsoft Outlook toolbar
          • Outlook Express and Windows Mail toolbar
          • Confirmation dialog
          • Rescan messages
        • Antispam protection
          • Antispam address books
          • Blacklist/Whitelist/Exceptions list
            • Add/Edit Blacklist/Whitelist/Exceptions address
      • Web access protection
        • Web access protection advanced setup
        • Web protocols
        • URL address management
          • URL addresses list
          • Create new URL address list
          • How to add URL mask
      • Anti-Phishing protection
    • Network protection
      • Firewall
        • Learning mode settings
      • Firewall profiles
        • Profiles assigned to network adapters
      • Application modification detection
        • List of applications excluded from detection
      • Configuring and using rules
        • Firewall rules list
        • Adding or editing Firewall rules
          • Firewall rule - Local
          • Firewall rule - Remote
      • Configuring zones
        • Firewall zones
      • Network attack protection
        • Allowed services and advanced options
        • IDS exceptions
        • Suspected threat blocked
        • Network protection troubleshooting
      • Connected networks
        • Network adapters
      • Known networks
        • Known networks editor
        • Network authentication - Server configuration
      • Temporary IP address blacklist
      • Network protection log
      • Establishing connection - detection
      • Solving problems with ESET Firewall
        • Troubleshooting wizard
        • Logging and creating rules or exceptions from log
          • Create rule from log
        • Creating exceptions from Personal firewall notifications
        • Network protection advanced logging
        • Solving problems with protocol filtering
    • Security tools
      • An overview to ESET Anti-Theft
        • Sign in with your my.eset.com account
          • Computer name
          • Adding new device - progress
          • Device associaton completed
          • Adding new device failed
          • Disable Anti-Theft
      • Banking and Payment protection
        • Banking and Payment protection advanced setup
        • Protected websites
      • Parental control
        • Website exceptions
        • User accounts
          • Categories
          • Working with user accounts
    • Updating the program
      • Update setup
        • Update rollback
        • Program component update
        • Connection options
      • How to create update tasks
    • Tools
      • Connected Home
        • Network device in Connected Home
        • Notifications | Connected Home
      • Tools in ESET Internet Security
        • Log files
          • Log filtering
          • Logging configuration
        • Running processes
        • Security report
        • Watch activity
        • Network connections
        • ESET SysInspector
        • Scheduler
        • System cleaner
        • ESET SysRescue Live
        • Cloud-based protection
          • Exclusion filter for Cloud-based protection
        • Quarantine
        • Proxy server
        • Notifications
          • Desktop notifications
          • Email notifications
        • Select sample for analysis
          • Select sample for analysis - Suspicious file
          • Select sample for analysis - Suspicious site
          • Select sample for analysis - False positive file
          • Select sample for analysis - False positive site
          • Select sample for analysis - Other
        • Microsoft Windows® update
    • User interface
      • User interface elements
      • Alerts and message boxes
        • Confirmation messages
        • Removable media
      • Access setup
        • Password for Advanced setup
      • System tray icon
      • Screen reader support
      • Help and support
        • About ESET Internet Security
        • ESET News
        • Submit system configuration data
  • Advanced user
    • Profiles
    • Keyboard shortcuts
    • Diagnostics
    • Configuration
      • Import and export settings
      • Revert all settings in current section
      • Revert to default settings
      • Error while saving the configuration
    • Command line scanner
    • ESET CMD
    • Idle-state detection
  • Common Questions
    • How to resolve incompatibility issues with your operating system
    • How to update the ESET Internet Security
    • How to remove a virus from my PC
    • How to allow communication for a certain application
    • How to enable Parental control for an account
    • How to create a new task in Scheduler
    • How to schedule a weekly computer scan
    • How to resolve "Banking & Payment protection could not be redirected to the requested web page"
    • How to unlock Advanced setup
  • Customer Experience Improvement Program
  • End User License Agreement
  • Privacy Policy
| Last updated: January 14, 2021