User guide

Table Of Contents
43
4.2.3.4.1.2 Excluded certificates
The Excluded certificates section contains certificates that are considered safe. The content of encrypted
communications utilizing the certificates in the list will not be checked for threats. We recommend only excluding web
certificates that are guaranteed to be safe and the communication utilizing the certificates does not need to be checked.
To delete selected items from the list, click the Remove button. Click the Show option (or double-click the certificate) to
display information about the selected certificate.
4.2.3.4.1.3 Encrypted SSL communication
If the computer is configured for SSL protocol scanning, a dialog window prompting you to choose an action may be
opened when there is an attempt to establish an encrypted communication (using an unknown certificate). The dialog
window contains the following information: name of the application that initiated the communication and name of the
certificate used.
If the certificate is not located in the Trusted Root Certification Authorities store, it is considered to be untrusted.
The following actions are available for certificates:
Yes The certificate will be temporarily marked as trusted for the current session – the alert window will not be
displayed on the next attempt to use the certificate.
Yes, alwaysMarks the certificate as trusted and adds it to the list of trusted certificates – no alert windows are
displayed for trusted certificates.
No Marks the certificate as untrusted for the current session – the alert window will be displayed on the next attempt
to use the certificate.
Exclude Adds the certificate to the list of excluded certificates – data transferred over the given encrypted channel will
not be checked at all.
4.2.4 Anti-Phishing protection
The term phishing defines a criminal activity that uses social engineering (the manipulation of users in order to obtain
confidential information). Phishing is often used to gain access to sensitive data such as bank account numbers, PIN
numbers and more. Read more about this activity in the glossary. ESET NOD32 Antivirus provides anti-phishing
protection, web pages known to distribute this type of content can be blocked.
We strongly recommend that you enable Anti-Phishing in ESET NOD32 Antivirus. This option can be accessed from the
Advanced setup (F5) by navigating to Web and email > Anti-Phishing protection.
Please see also the following ESET Knowledgebase article for an updated and more detailed version of this help page.
Accessing a phishing website
When you access a phishing website, you will receive the following dialog in your web browser. By clicking on Proceed
to the site (not recommended), you will be able to access the website without a warning message.