User manual
Table of Contents 
iii 
10.2.3
  Exceptions ..............................................................................................................40 
10.2.4  Products..................................................................................................................43 
10.2.5  Heuristic .................................................................................................................43 
10.2.6  Report .....................................................................................................................44 
10.3  General .................................................................................................................................44 
10.3.1  Extended threat categories....................................................................................44 
10.3.2  Password.................................................................................................................45 
10.3.3  Security...................................................................................................................46 
10.3.4  WMI........................................................................................................................46 
10.3.5  Events .....................................................................................................................46 
10.3.6  Reports ...................................................................................................................47 
10.3.7  Directories..............................................................................................................47 
10.4  Update..................................................................................................................................48 
10.4.1  Update ....................................................................................................................48 
10.4.2  File server ...............................................................................................................50 
10.4.3  Proxy.......................................................................................................................50 
10.5  Warnings ..............................................................................................................................51 
10.5.1  Guard ......................................................................................................................52 
10.5.2  Scanner ...................................................................................................................52 
10.5.3  Acoustic alerts ........................................................................................................53 
10.6  Email.....................................................................................................................................54 
10.6.1  Email.......................................................................................................................54 
10.6.2  Guard ......................................................................................................................55 
10.6.3  Scanner ...................................................................................................................56 
10.6.4  Updater...................................................................................................................56 
10.6.5  Email template .......................................................................................................58 










