background image

11

4.1.2.1   Type of scan

Two types of On-demand computer scans are
available. 

Smart scan

 quickly scans the system with

no need for further configuration of the scan
parameters. 

Custom scan

 allows you to select any of

the predefined scan profiles, as well as choose specific
scan targets.

4.1.2.1.1   Smart scan

Smart scan allows you to quickly launch a computer
scan and clean infected files with no need for user
intervention. Its main advantages are easy operation
with no detailed scanning configuration. Smart scan
checks all files in all folders and automatically cleans or
deletes detected infiltrations. The cleaning level is
automatically set to the default value. For more
detailed information on types of cleaning, see the
section on 

Cleaning

.

4.1.2.1.2   Custom scan

Custom scan

 is optimal if you would like to specify

scanning parameters such as scan targets and
scanning methods. The advantage of running a
Custom scan is the ability to configure the parameters
in detail. Different configurations can be saved as user-
defined scan profiles, which can be useful if scanning is
repeatedly performed with the same parameters. 

To select scan targets, select 

Computer scan

 >

Custom scan

 and select specific 

Scan Targets

 from

the tree structure. A scan target can also be more
precisely specified by entering the path to the folder or
file(s) you wish to include. If you are only interested in
scanning the system without additional cleaning
actions, select the 

Scan without cleaning

 option.

Furthermore, you can choose from three cleaning
levels by clicking 

Setup...

 > 

Cleaning

.

Performing computer scans with Custom scan is
recommended for advanced users with previous
experience using antivirus programs.

4.1.2.2   Scan targets

The Scan targets tree structure allows you to select
files and folders to be scanned for viruses. Folders may
also be selected according to a profile's settings.

A scan target can be more precisely defined by
entering the path to the folder or file(s) you wish to
include in scanning. Select targets from the tree
structure that lists all available folders on the
computer.

4.1.2.3   Scan profiles

Your preferred scan settings can be saved for future
scanning. We recommend that you create a different
profile (with various scan targets, scan methods and
other parameters) for each regularly used scan.

To create a new profile, go to 

Setup

 > 

Enter

application preferences ...

 > 

Protection

 > 

Computer

Scan

 and click 

Edit...

 next to the list of current

profiles.

To help you create a scan profile to fit your needs, see
the 

ThreatSense engine parameters setup

 section

for a description of each parameter of the scan setup.

Example: Suppose that you want to create your own
scan profile and the Smart scan configuration is
partially suitable, but you do not want to scan runtime
packers or potentially unsafe applications and you also
want to apply Strict cleaning. In the 

On-demand

Scanner Profiles List

 window, write the profile name,

click the 

Add

 button and confirm by 

OK

. Then adjust

the parameters to meet your requirements by setting 

ThreatSense Engine

 and 

Scan Targets

.

13

12

Summary of Contents for CYBERSECURITY -

Page 1: ...ESET Cybersecurity Installation Manual and User Guide...

Page 2: ...duced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise without permission in writing from the author ESET spol...

Page 3: ...engine parameters setup 4 1 3 12 Objects 4 1 3 1 12 Options 4 1 3 2 13 Cleaning 4 1 3 3 13 Extensions 4 1 3 4 13 Limits 4 1 3 5 13 Others 4 1 3 6 14 An infiltration is detected 4 1 4 14 Updating the...

Page 4: ...ith Windows users and vice versa Although Windows malware does not pose a direct threat to Mac disabling malware that has infected a Mac machine will prevent its spread to Windows based computers thro...

Page 5: ...ng system These applications are often bundled with other programs and may be difficult to notice during the installation process Although these applications usually display a notification during inst...

Page 6: ...ctivation instructions The Activation Key is usually located inside or on the back side of the product package For a successful activation the Activation Key must be entered as supplied 2 If you recei...

Page 7: ...for common operations It does not display any advanced options To toggle between modes click the plus icon next to Activate advanced mode Activate standard mode in the bottom left corner of the main...

Page 8: ...em using the suggested solutions click Help to access the help files or search the Knowledgebase If you need assistance you can contact ESET Customer Care support on the ESET website ESET Customer Car...

Page 9: ...r 4 1 1 1 2 Advanced scan options In this window you can define object types to be scanned by the ThreatSense engine and enable disable Advanced heuristics as well as modify settings for archives and...

Page 10: ...and how to troubleshoot them Real time protection is disabled If Real time protection was inadvertently disabled by a user it will need to be reactivated To reactivate Real time protection navigate to...

Page 11: ...g actions select the Scan without cleaning option Furthermore you can choose from three cleaning levels by clicking Setup Cleaning Performing computer scans with Custom scan is recommended for advance...

Page 12: ...or directory Email files not available in Real time protection scans special files where email messages are contained Mailboxes not available in Real time protection scans user mailboxes in the syste...

Page 13: ...he log cfg and tmp extensions 4 1 3 5 Limits The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned Maximum Size Defines the maximum size of o...

Page 14: ...d no clean files In other words archives are not deleted if they also contain harmless clean files However use caution when performing a Strict cleaning scan with Strict cleaning the archive will be d...

Page 15: ...button Authentication for update servers is based on the Username and Password generated and sent to you after purchase To enable the use of test mode downloads pre release updates click the Setup but...

Page 16: ...u Five types of scheduled tasks are available Run application Update Log maintenance On demand computer scan System startup file check Since Update is one of the most frequently used scheduled tasks w...

Page 17: ...e was incorrectly evaluated as infected e g by heuristic analysis of the code and subsequently quarantined please send the file to ESET s Threat Lab To submit a file from quarantine right click the fi...

Page 18: ...ET Cybersecurity Disabling the Display alerts option will cancel all alert windows and is only suitable in specific situations For most users we recommend that this option be left to its default setti...

Page 19: ...stem option to activate and then click the Setup button beside the Advanced Options heading 4 7 1 Suspicious files The Suspicious files option allows you to configure the manner in which threats are s...

Page 20: ...as documents or spreadsheets The most common file types are excluded by default doc etc You can add file types to the list of excluded files Contact Email optional Your email can be sent with any susp...

Page 21: ...click Setup Import and export settings Select the Export settings option and enter the name of the configuration file Use the browser to select a location on your computer to save the configuration fi...

Page 22: ...in network applications Worms are therefore much more viable than computer viruses Due to the wide availability of the Internet they can spread across the globe within hours of their release in some c...

Page 23: ...ntain security codes PINs bank account numbers etc Spyware is often bundled with free versions of a program by its author in order to generate revenue or to offer an incentive for purchasing the softw...

Reviews: