Contents
.................................................4
1. ESET Cybersecurity
.................................................................4
System requirements
1.1
.................................................5
2. Installation
.................................................................5
Typical installation
2.1
.................................................................5
Custom installation
2.2
.................................................................6
Product activation
2.3
.................................................................6
On-demand computer scan
2.4
.................................................7
3. Beginners guide
.................................................................7
Introducing user interface design - modes
3.1
.............................................................................7
Checking operation of the system
3.1.1
.............................................................................7
What to do if the program doesn't work properly
3.1.2
.................................................9
4. Work with ESET Cybersecurity
.................................................................9
Antivirus and antispyware protection
4.1
.............................................................................9
Real-time file system protection
4.1.1
.............................................................................9
Real-time Protection setup
4.1.1.1
...........................................................................9
Scan on (Event triggered scanning)
4.1.1.1.1
...........................................................................9
Advanced scan options
4.1.1.1.2
...........................................................................9
Exclusions from scanning
4.1.1.1.3
.............................................................................10
When to modify Real-time protection
configuration
4.1.1.2
.............................................................................10
Checking Real-time protection
4.1.1.3
.............................................................................10
What to do if Real-time protection does not
work
4.1.1.4
.............................................................................10
On-demand computer scan
4.1.2
.............................................................................11
Type of scan
4.1.2.1
...........................................................................11
Smart scan
4.1.2.1.1
...........................................................................11
Custom scan
4.1.2.1.2
.............................................................................11
Scan targets
4.1.2.2
.............................................................................11
Scan profiles
4.1.2.3
.............................................................................12
ThreatSense engine parameters setup
4.1.3
.............................................................................12
Objects
4.1.3.1
.............................................................................12
Options
4.1.3.2
.............................................................................13
Cleaning
4.1.3.3
.............................................................................13
Extensions
4.1.3.4
.............................................................................13
Limits
4.1.3.5
.............................................................................13
Others
4.1.3.6
.............................................................................14
An infiltration is detected
4.1.4
.................................................................14
Updating the program
4.2
.............................................................................14
Upgrading to a new build
4.2.1
.............................................................................15
Update setup
4.2.2
.............................................................................15
How to create update tasks
4.2.3
.................................................................16
Scheduler
4.3
.............................................................................16
Purpose of scheduling tasks
4.3.1
.............................................................................16
Creating new tasks
4.3.2
.................................................................17
Quarantine
4.4
.............................................................................17
Quarantining files
4.4.1
.............................................................................17
Restoring from Quarantine
4.4.2
.............................................................................17
Submitting file from Quarantine
4.4.3
.................................................................17
Log files
4.5
.............................................................................17
Log maintenance
4.5.1
.............................................................................18
Log filtering
4.5.2
.................................................................18
User interface
4.6
.............................................................................18
Alerts and notifications
4.6.1
.............................................................................18
Alerts and notifications advanced setup
4.6.1.1
.............................................................................18
Privileges
4.6.2
.............................................................................19
Context menu
4.6.3
.................................................................19
ThreatSense.Net
4.7
.............................................................................19
Suspicious files
4.7.1
.................................................21
5. Advanced user
.................................................................21
Import and export settings
5.1
.............................................................................21
Import settings
5.1.1
.............................................................................21
Export settings
5.1.2
.................................................................21
Proxy server setup
5.2
.................................................................21
Removable media blocking
5.3
.................................................22
6. Glossary
.................................................................22
Types of infiltrations
6.1
.............................................................................22
Viruses
6.1.1
.............................................................................22
Worms
6.1.2
.............................................................................22
Trojan horses
6.1.3
.............................................................................23
Adware
6.1.4
.............................................................................23
Spyware
6.1.5
.............................................................................23
Potentially unsafe applications
6.1.6
.............................................................................23
Potentially unwanted applications
6.1.7