5.6 工具 50 .........................................................................................................................................
5.6 正在运行的进程 51 .......................................................................................................................
5.6 防护统计 53 ..............................................................................................................................
5.6 集群 54 ...................................................................................................................................
5.6 群集向导 - 选择节点 56 .................................................................................................................
5.6 群集向导 - 群集设置 57 .................................................................................................................
5.6 群集向导 - “群集设置”设置 58 .......................................................................................................
5.6 群集向导 - 节点检查 58 .................................................................................................................
5.6 群集向导 - 节点安装 60 .................................................................................................................
5.6 ESET Shell 62 .............................................................................................................................
5.6 用法 64 ...................................................................................................................................
5.6 命令 68 ...................................................................................................................................
5.6 键盘快捷键 71 ............................................................................................................................
5.6 批处理文件/脚本 72 .....................................................................................................................
5.6 ESET LiveGuard Advanced 72 ...........................................................................................................
5.6 ESET SysInspector 74 ....................................................................................................................
5.6 ESET SysRescue Live 74 .................................................................................................................
5.6 计划任务 75 ..............................................................................................................................
5.6 计划任务 - 添加任务 76 .................................................................................................................
5.6 任务类型 78 ..............................................................................................................................
5.6 任务执行 78 ..............................................................................................................................
5.6 由事件触发 79 ............................................................................................................................
5.6 运行应用程序 79 .........................................................................................................................
5.6 跳过的任务 79 ............................................................................................................................
5.6 计划任务概述 80 .........................................................................................................................
5.6 提交样本以供分析 80 ....................................................................................................................
5.6 可疑文件 81 ..............................................................................................................................
5.6 可疑站点 81 ..............................................................................................................................
5.6 误报文件 81 ..............................................................................................................................
5.6 误报站点 82 ..............................................................................................................................
5.6 其他 82 ...................................................................................................................................
5.6 隔离区 82 ................................................................................................................................
5.7 Microsoft 365 邮箱扫描向导 84 .........................................................................................................
5.7 注册 ESET Mail Security 扫描程序 85 ...................................................................................................
5.7 注销 ESET Mail Security 扫描程序 88 ...................................................................................................
6 服务器防护设置 90 ...............................................................................................................................
6.1 服务器代理优先级设置 91 ..................................................................................................................
6.2 病毒和间谍软件防护 91 .....................................................................................................................
6.3 反垃圾邮件防护 93 ...........................................................................................................................
6.3 过滤和验证 94 ............................................................................................................................
6.3 反垃圾邮件高级设置 96 ..................................................................................................................
6.3 灰名单设置 99 ............................................................................................................................
6.3 SPF 和 DKIM 100 ........................................................................................................................
6.3 退信式垃圾邮件保护 102 ................................................................................................................
6.3 发件人电子欺诈防护 103 ................................................................................................................
6.4 网络钓鱼防护 104 ...........................................................................................................................
6.5 规则 105 .......................................................................................................................................
6.5 规则条件 107 ............................................................................................................................
6.5 规则操作 111 ............................................................................................................................
6.5 规则示例 113 ............................................................................................................................
6.6 邮件传输防护 115 ...........................................................................................................................