Contents | Index | Search


  • Introduction
    • What's new
    • Help pages
    • System requirements
    • User interface
    • Managed via ESET Remote Administrator
      • Override mode
  • Installation
    • ESET Security for Kerio installation steps
      • Command line installation
        • ESET AV Remover
    • Product activation
    • Terminal Server
  • Beginner's guide
    • Monitoring
    • Log files
    • Scan
      • Hyper-V scan
    • Update
      • Setting up virus DB update
      • Configuring Proxy server for updates
    • Setup
      • Server
      • Computer
      • Tools
      • Import and export settings
    • Tools
      • Running processes
      • Watch activity
        • Time period selection
      • Protection statistics
      • Cluster
        • Cluster wizard - page 1
        • Cluster wizard - page 2
        • Cluster wizard - page 3
        • Cluster wizard - page 4
      • ESET Shell
        • Usage
        • Commands
        • Batch files / Scripting
      • ESET SysInspector
        • Create a computer status snapshot
        • ESET SysInspector
          • Introduction to ESET SysInspector
            • Starting ESET SysInspector
          • User Interface and application usage
            • Program Controls
            • Navigating in ESET SysInspector
              • Keyboard shortcuts
            • Compare
          • Command line parameters
          • Service Script
            • Generating Service script
            • Structure of the Service script
            • Executing Service scripts
          • System requirements for ESET SysInspector
          • FAQ
      • ESET SysRescue Live
      • Scheduler
        • Scheduler - Add task
      • Submit samples for analysis
        • Suspicious file
        • Suspicious site
        • False positive file
        • False positive site
        • Other
      • Quarantine
    • Help and support
      • How to
        • How to update ESET Security for Kerio
        • How to activate ESET Security for Kerio
        • How to create a new task in Scheduler
        • How to schedule a scan task (every 24 hours) 
        • How to remove a virus from your server
      • Submit support request
      • ESET Specialized Cleaner
      • About ESET Security for Kerio
      • Product activation
        • Registration
        • Security Admin activation
        • Activation failure
        • License
        • Activation progress
        • Activation successful
  • Working with ESET Security for Kerio
    • Server
      • Kerio Connect
      • Kerio Control
    • Antivirus and antispyware
    • Rules
      • Rules list
        • Rule wizard
          • Rule condition
          • Rule action
    • Computer
      • An infiltration is detected
      • Processes exclusions
      • Automatic exclusions
      • Shared local cache
      • Real-time file system protection
        • Exclusions
          • Add or Edit exclusion
          • Exclusion format
        • ThreatSense parameters
          • File extenstions excluded from scanning
          • Additional ThreatSense parameters
          • Cleaning levels
          • When to modify real-time protection configuration
          • Checking real-time protection
          • What to do if real-time protection does not work
          • Submission
          • Statistics
          • Suspicious files
      • On-demand computer scan and Hyper-V scan
        • Custom scan and Hyper-V scan launcher
        • Scan progress
        • Scan log
        • Profile manager
        • Scan targets
        • Pause a scheduled scan
      • Idle-state scanning
      • Startup scan
        • Automatic startup file check
      • Removable media
      • Document protection
      • HIPS
        • HIPS rules
          • HIPS rule settings
        • Advanced setup
          • Drivers always allowed to load
    • Update
      • Update rollback
      • Update mode
      • HTTP Proxy
      • Connect to LAN as
      • Mirror
        • Updating from the Mirror
        • Mirror files
        • Troubleshooting Mirror update problems
    • Device control
      • Device control rules editor
      • Adding Device control rules
      • Detected devices
      • Device groups
    • Tools
      • ESET LiveGrid®
        • Exclusion filter
      • Microsoft Windows update
      • ESET CMD
      • WMI Provider
        • Provided data
        • Accessing Provided Data
      • ERA scan targets
      • Log files
        • Log filtering
        • Find in log
      • Proxy server
      • Email notifications
        • Message format
      • Presentation mode
      • Diagnostics
      • Customer Care
      • Cluster
    • User interface
      • Alerts and notifications
      • Access setup
        • Password
        • Password setup
      • Help
      • ESET Shell
      • Disable GUI on Terminal Server
      • Disabled messages and statuses
        • Confirmation messages
        • Application statuses settings
      • System tray icon
        • Pause protection
      • Context menu
    • Revert all settings in this section
    • Revert to default settings
    • Scheduler
      • Task details
      • Task timing - Once
      • Task timing
      • Task timing - Daily
      • Task timing - Weekly
      • Task timing - Event triggered
      • Task details - Run application
      • Skipped task
      • Scheduled task overview
      • Update profiles
    • Quarantine
      • Quarantining files
      • Restoring from Quarantine
      • Submitting file from Quarantine
    • Operating system updates
  • Glossary
    • Types of infiltration
      • Viruses
      • Worms
      • Trojan horses
      • Rootkits
      • Adware
      • Spyware
      • Botnet
      • Ransomware
      • Packers
      • Exploit Blocker
      • Advanced Memory Scanner
      • Potentially unsafe applications
      • Potentially unwanted applications
    • Email
      • Advertisements
      • Hoaxes
      • Phishing
      • Recognizing spam scams
        • Rules
        • Whitelist
        • Blacklist
        • Server-side control
  • End-User License Agreement (EULA)
  • Privacy policy