5.5 Web 和電子郵件 52 .......................................................................................................................
5.5 工具 - 診斷記錄 52 .....................................................................................................................
5.5 匯入及匯出設定 53 .......................................................................................................................
5.6 工具 54 .........................................................................................................................................
5.6 執行中的處理程序 55 ....................................................................................................................
5.6 即時監控 57 ..............................................................................................................................
5.6 防護統計 58 ..............................................................................................................................
5.6 叢集 60 ...................................................................................................................................
5.6 叢集精靈 - 選取節點 62 .................................................................................................................
5.6 叢集精靈 - 叢集設定 63 .................................................................................................................
5.6 叢集精靈 - 叢集安裝設定 64 ............................................................................................................
5.6 叢集精靈 - 節點檢查 64 .................................................................................................................
5.6 叢集精靈 - 節點安裝 66 .................................................................................................................
5.6 ESET Shell 69 .............................................................................................................................
5.6 使用 71 ...................................................................................................................................
5.6 命令 75 ...................................................................................................................................
5.6 批次檔案 / 腳本 78 .....................................................................................................................
5.6 ESET LiveGuard Advanced 79 ...........................................................................................................
5.6 ESET SysInspector 80 ....................................................................................................................
5.6 ESET SysRescue Live 81 .................................................................................................................
5.6 排程器 81 ................................................................................................................................
5.6 排程器 - 新增工作 82 ...................................................................................................................
5.6 工作類型 84 ..............................................................................................................................
5.6 工作時間 85 ..............................................................................................................................
5.6 事件觸發 85 ..............................................................................................................................
5.6 執行應用程式 86 .........................................................................................................................
5.6 略過的工作 86 ............................................................................................................................
5.6 已排程的工作概要 86 ....................................................................................................................
5.6 提交樣本以供分析 86 ....................................................................................................................
5.6 可疑檔案 87 ..............................................................................................................................
5.6 可疑網站 87 ..............................................................................................................................
5.6 誤判檔案 88 ..............................................................................................................................
5.6 誤判網站 88 ..............................................................................................................................
5.6 其他 88 ...................................................................................................................................
5.6 隔離區 89 ................................................................................................................................
6 伺服器防護設定 90 ...............................................................................................................................
6.1 代理程式優先順序設定 90 ..................................................................................................................
6.2 病毒及間諜程式防護 91 .....................................................................................................................
6.3 垃圾郵件防護 92 .............................................................................................................................
6.3 過濾與驗證 94 ............................................................................................................................
6.3 垃圾郵件防護進階設定 96 ...............................................................................................................
6.3 灰名單設定 99 ............................................................................................................................
6.3 SPF 和 DKIM 100 ........................................................................................................................
6.3 退信防護 102 ............................................................................................................................
6.3 寄件者詐騙防護 103 .....................................................................................................................
6.4 網路釣魚防護 104 ...........................................................................................................................
6.5 規則 105 .......................................................................................................................................
6.5 規則條件 107 ............................................................................................................................
6.5 規則處理方法 111 .......................................................................................................................
6.5 規則範例 112 ............................................................................................................................
6.6 郵件傳輸防護 114 ...........................................................................................................................