User guide

Table Of Contents
34
4.2 Web and email
Web and email configuration can be found in the Setup pane by clicking on Web and email. From here you can access
more detailed settings of the program.
Internet connectivity is a standard feature for personal computers. Unfortunately, the Internet has become the primary
medium for distributing malicious code. For this reason it is essential that you carefully consider your Web access
protection settings.
Email client protection provides control of email communication received through POP3 and IMAP protocol. Using
the plug-in program for your email client, ESET NOD32 Antivirus provides control of all communications to and from
your email client (POP3, MAPI, IMAP, HTTP).
It is possible to disable the web/email protection module temporarily by clicking Enabled.
Configure ... Opens web/email protection advanced settings.
4.2.1 Email client protection
Email protection provides control of email communication received through the POP3 and IMAP protocols. Using the
plug-in for Microsoft Outlook and other e-mail clients, ESET NOD32 Antivirus provides control of all communications
from the email client (POP3, MAPI, IMAP, HTTP). When examining incoming messages, the program uses all the
advanced scanning methods provided by the ThreatSense scanning engine. This means that detection of malicious
programs takes place even before being matched against the virus signature database. Scanning of POP3 and IMAP
protocol communications is independent of the email client used.
The options for this functionality are available through Advanced setup > Web and email > Email client protection.
ThreatSense engine parameter setupThe advanced virus scanner setup enables you to configure scan targets,
detection methods, etc. Click Setup... to display the detailed virus scanner setup window.
After an email has been checked, a notification with the scan result can be appended to the message. You can select to
Append tag messages to received and read mail, as well as Append tag messages to sent mail. The tag messages
cannot be relied on without question, since they may be omitted in problematic HTML messages or can be forged by
some viruses. The tag messages can be added to received and read email, to sent email, or both. The available options