background image

12

4.1.3   ThreatSense engine parameters setup

ThreatSense is the name of the technology consisting
of complex threat detection methods. This technology
is proactive, which means it also provides protection
during the early hours of the spread of a new threat. It
uses a combination of several methods (code analysis,
code emulation, generic signatures, virus signatures)
which work in concert to significantly enhance system
security. The scanning engine is capable of controlling
several data streams simultaneously, maximizing the
efficiency and detection rate. ThreatSense technology
also successfully eliminates rootkits.

The ThreatSense technology setup options allow you
to specify several scan parameters:

File types and extensions that are to be scanned
The combination of various detection methods
Levels of cleaning, etc.

To enter the setup window, click 

Setup

 > 

Antivirus

and antispyware

 > 

Advanced Antivirus and

antispyware protection setup

 and then click the

Setup...

 button located in the 

System Protection

,

Real-Time Protection

 and 

Computer Scan

 wildcards,

which all use ThreatSense technology (see below).
Different security scenarios could require different
configurations. With this in mind, ThreatSense is
individually configurable for the following protection
modules:

System Protection

 > Automatic startup file check

Real-Time Protection

 > Real-time file system

protection

Computer Scan

 > On-demand computer scan

The ThreatSense parameters are specifically optimized
for each module, and their modification can
significantly influence system operation. For example,
changing settings to always scan runtime packers, or
enabling advanced heuristics in the Real-time file
system protection module could result in a slower
system . Therefore, we recommend that you leave the
default ThreatSense parameters unchanged for all
modules except Computer scan.

4.1.3.1   Objects

The 

Objects

 section allows you to define which

computer files will be scanned for infiltrations.

Files

 – provides scanning of all common file types

(programs, pictures, audio, video files, database
files, etc.).

Symbolic links

 - (On-demand scanner only) scans

special type of files that contain a text string that is
interpreted and followed by the operating system as
a path to another file or directory.

Email files

 - (not available in Real-time protection)

scans special files where email messages are
contained.

Mailboxes

 - (not available in Real-time protection)

scans user mailboxes in the system. Incorrect use of
this option may result in a conflict with your email
client. To learn more about advantages and
disadvantages of this option, read this 

knowledgebase article

.

Archives

 - (not available in Real-time protection)

provides scanning of files compressed in archives (.
rar, .zip, .arj, .tar, etc.).

Self-extracting archives

 - (not available in Real-

time protection) scans files which are contained in
self-extracting archive files.

Runtime packers

 - unlike standard archive types,

runtime packers decompress in memory, in addition
to standard static packers (UPX, yoda, ASPack, FGS,
etc.).

4.1.3.2   Options

In the 

Options

 section, you can select the methods

used during a scan of the system for infiltrations. The
following options are available:

Virus signature database

 – Signatures can exactly

and reliably detect and identify infiltrations by name
using the virus signature database. 

Heuristics

 – Heuristics use an algorithm that

analyzes the (malicious) activity of programs. The
main advantage of heuristic detection is the ability
to detect new malicious software which did not
previously exist, or was not included in the list of
known viruses (virus signatures database).

Advanced heuristics

 – Advanced heuristics

comprise a unique heuristic algorithm, developed by
ESET, optimized for detecting computer worms and
trojan horses written in high-level programming
languages. The program's detection ability is
significantly higher as a result of advanced
heuristics.

Adware/Spyware/Riskware

 – This category

includes software that collects sensitive information
about users without their informed consent. This
category also includes software which displays
advertising material.

Potentially unwanted applications

 – These

applications are not necessarily intended to be
malicious, but may affect the performance of your
computer in a negative way. Such applications
usually require consent for installation. If they are
present on your computer, your system behaves
differently (compared to the way it behaved before
these applications were installed). The most
significant changes include unwanted pop-up
windows, activation and running of hidden
processes, increased usage of system resources,
changes in search results, and applications
communicating with remote servers.

Summary of Contents for CYBERSECURITY -

Page 1: ...ESET Cybersecurity Installation Manual and User Guide...

Page 2: ...duced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise without permission in writing from the author ESET spol...

Page 3: ...engine parameters setup 4 1 3 12 Objects 4 1 3 1 12 Options 4 1 3 2 13 Cleaning 4 1 3 3 13 Extensions 4 1 3 4 13 Limits 4 1 3 5 13 Others 4 1 3 6 14 An infiltration is detected 4 1 4 14 Updating the...

Page 4: ...ith Windows users and vice versa Although Windows malware does not pose a direct threat to Mac disabling malware that has infected a Mac machine will prevent its spread to Windows based computers thro...

Page 5: ...ng system These applications are often bundled with other programs and may be difficult to notice during the installation process Although these applications usually display a notification during inst...

Page 6: ...ctivation instructions The Activation Key is usually located inside or on the back side of the product package For a successful activation the Activation Key must be entered as supplied 2 If you recei...

Page 7: ...for common operations It does not display any advanced options To toggle between modes click the plus icon next to Activate advanced mode Activate standard mode in the bottom left corner of the main...

Page 8: ...em using the suggested solutions click Help to access the help files or search the Knowledgebase If you need assistance you can contact ESET Customer Care support on the ESET website ESET Customer Car...

Page 9: ...r 4 1 1 1 2 Advanced scan options In this window you can define object types to be scanned by the ThreatSense engine and enable disable Advanced heuristics as well as modify settings for archives and...

Page 10: ...and how to troubleshoot them Real time protection is disabled If Real time protection was inadvertently disabled by a user it will need to be reactivated To reactivate Real time protection navigate to...

Page 11: ...g actions select the Scan without cleaning option Furthermore you can choose from three cleaning levels by clicking Setup Cleaning Performing computer scans with Custom scan is recommended for advance...

Page 12: ...or directory Email files not available in Real time protection scans special files where email messages are contained Mailboxes not available in Real time protection scans user mailboxes in the syste...

Page 13: ...he log cfg and tmp extensions 4 1 3 5 Limits The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned Maximum Size Defines the maximum size of o...

Page 14: ...d no clean files In other words archives are not deleted if they also contain harmless clean files However use caution when performing a Strict cleaning scan with Strict cleaning the archive will be d...

Page 15: ...button Authentication for update servers is based on the Username and Password generated and sent to you after purchase To enable the use of test mode downloads pre release updates click the Setup but...

Page 16: ...u Five types of scheduled tasks are available Run application Update Log maintenance On demand computer scan System startup file check Since Update is one of the most frequently used scheduled tasks w...

Page 17: ...e was incorrectly evaluated as infected e g by heuristic analysis of the code and subsequently quarantined please send the file to ESET s Threat Lab To submit a file from quarantine right click the fi...

Page 18: ...ET Cybersecurity Disabling the Display alerts option will cancel all alert windows and is only suitable in specific situations For most users we recommend that this option be left to its default setti...

Page 19: ...stem option to activate and then click the Setup button beside the Advanced Options heading 4 7 1 Suspicious files The Suspicious files option allows you to configure the manner in which threats are s...

Page 20: ...as documents or spreadsheets The most common file types are excluded by default doc etc You can add file types to the list of excluded files Contact Email optional Your email can be sent with any susp...

Page 21: ...click Setup Import and export settings Select the Export settings option and enter the name of the configuration file Use the browser to select a location on your computer to save the configuration fi...

Page 22: ...in network applications Worms are therefore much more viable than computer viruses Due to the wide availability of the Internet they can spread across the globe within hours of their release in some c...

Page 23: ...ntain security codes PINs bank account numbers etc Spyware is often bundled with free versions of a program by its author in order to generate revenue or to offer an incentive for purchasing the softw...

Reviews: