
53
A thorough analysis of this data can help detect attempts to compromise system security. Many other factors indicate
potential security risks and allow you to minimize their impact: too frequent connections from unknown locations,
multiple attempts to establish connections, unknown applications communicating or unusual port numbers used.
4.2.7 System integration
The ESET Endpoint Security Personal firewall can operate at several levels:
All features active – The Personal firewall is fully integrated and its components are active (default option). In case
the computer is connected to a larger network or the internet, it is advisable to leave this option activated. This is the
most secure option and fully protects your system.
Personal firewall is inactive – The Personal firewall is integrated in the system and mediates network
communication but does not check for threats.
Only scan application protocols – Only components of the Personal firewall that provide scanning of application
protocols (HTTP, POP3, IMAP and their secured versions) are active. If the application protocols are not scanned,
protection is carried out at the level of real-time file system protection and on-demand computer scan.
Personal firewall is completely disabled – Select this option to completely unregister the Personal firewall from the
system. No scanning is performed. This can be useful when testing – if an application is blocked, you can check if it is
blocked by the firewall. This is the least secure option, so we recommend being cautious when disabling the firewall
completely.
Postpone Personal firewall module update until a computer restart – The update will only be downloaded,
installation will be performed during a computer restart.
4.3 Web and email
Web and email configuration can be found in the Setup pane after clicking on the Web and email title. From here you
can access more detailed settings of the program.
Internet connectivity is a standard feature for personal computers. Unfortunately, it has also become the main medium
for transferring malicious code. Because of this, it is essential that you carefully consider your Web access protection.
Email client protection provides control of email communication received through the POP3 and IMAP protocol.
Using the plug-in program for your email client, ESET Endpoint Security provides control of all communications from
Comentarios a estos manuales