Computer

ESET Mail Security has all of the necessary components to ensure significant protection of the server as a computer. Each component provides a specific type of protection, such as: Antivirus and Antispyware, Real-time file system protection, Web-access, Email client, Anti-Phishing protection, etc.

The Computer section can be found under Setup > Computer. You'll see a list of components which you can enable/disable using the switch MODULE_ENABLED. To configure settings for a specific item, click the gear icon icon_cogwheel.

For Real-time file system protection, there is also an option to Edit exclusions, which will open the exclusions setup window where you can exclude files and folders from scanning.

Pause Antivirus and antispyware protection - Any time that you temporarily disable Antivirus and antispyware protection, you can select the period of time for which you want the selected component to be disabled using the drop-down menu and then click Apply to disable the security component. To re-enable protection, click Enable Antivirus and antispyware protection.

The Computer module allows you to enable/disable and configure the following components:

page_setup_computer

Real-time file system protection - All files are scanned for malicious code when they are opened, created or run on your computer.

Document protection - The document protection feature scans Microsoft Office documents before they are opened, as well as files downloaded automatically by Internet Explorer, such as Microsoft ActiveX elements.

note_icon_note NOTE

Document protection is disabled by default. If you want, you can easily enable it by clicking the switch icon.

Device control - This module allows you to scan, block or adjust extended filters/permissions and define a user's ability to access and work with a given device.

HIPS - The HIPS system monitors events that occur within the operating system and reacts to them according to a customized set of rules.

Presentation mode - A feature for users that demand uninterrupted usage of their software, do not want to be disturbed by pop-up windows, and want to minimize CPU usage. You will receive a warning message (potential security risk) and the main program window will turn orange after enabling Presentation mode.

Anti-Stealth protection - Provides detection of dangerous programs, such as rootkits, which are able to hide themselves from the operating system. This means it is not possible to detect them using ordinary testing techniques.

Web access protection - If enabled, all HTTP or HTTPS traffic is scanned for malicious software.

Email client protection - Monitors communication received through the POP3 and IMAP protocols.

Anti-Phishing protection - Protects you from attempts to acquire passwords, banking data and other sensitive information by illegitimate websites disguised as legitimate ones.

There are additional options at the bottom of the setup window. To load setup parameters using an .xml configuration file, or to save the current setup parameters to a configuration file, use Import/Export settings. Please see Import/Export settings for more detailed information.

If you want to set more detailed options, click Advanced setup or press F5.