background image

10

If the 

Heuristics

 option is selected, ESET Mobile 

Antivirus uses heuristic scanning techniques. Heuristics 

is an algorithm‑based detection method that analyzes 

the code and searches for typical virus behavior. Its main 

advantage is the ability to identify malicious software 

not yet known by the current virus signature database.

Archive nesting

 allows you to specify the depth of 

nested archives to be scanned.
Select

 Archive deletion

 to automatically 

delete archive files containing infected objects.

Figure 3-6:  General settings

3.4  Scan objects setup

To specify the file types to be scanned on your mobile 

device, tap 

Menu > Settings > Extensions

.

The 

Extension settings

 window will display (Figure 

3‑7), showing the most common file types exposed to 

infiltration. Select the file types you wish to be scanned. 

To exclude an extension from scanning, deselect its 

check box.

To scan all files, deselect the 

Extension sensitive

 

check box. 

Figure 3-7:  Advanced scan parameter setup

4.  Virus found

If a virus is found, ESET Mobile Antivirus will prompt 

you to take an action. We recommend you select 

Delete infected file

. If you select 

Do nothing (not 

recommended)

, no action will be performed and the 

infected file will remain on your mobile device. If you 

select 

Move to quarantine

, the file will be moved to 

quarantine and deleted. 

Figure 4-1:  Action if a virus is found

When a virus is detected, ESET Mobile Antivirus displays 

the 

Show alert dialog

 check box. Deselect this option 

to prevent alert windows from displaying in the future. 

All future actions will be performed automatically.

NOTE:

 If an infiltration is detected in an archive, the 

Delete archive

 option is available in the alert window. 

Select this option along with the 

Delete infected file

 

option to delete all infected archive files.

Figure 4-2:  Virus found

Summary of Contents for MOBILE ANTIVIRUS - ANNEXE 480

Page 1: ...ESET Mobile Antivirus Installation Manual and User Guide...

Page 2: ...rieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise without permission in writing from the author ESET spol s r o reserves the r...

Page 3: ...ing On access Scanning 8 3 On demand scanner 8 3 1 Running a Whole device scan 8 3 2 Scanning a folder 9 3 3 Settings 9 3 4 Scan objects setup 10 4 Virus found 10 4 1 Quarantine 11 5 Spam filter 11 5...

Page 4: ...r PC After downloading the cab file tap Start File Explorer to locate the file and tap it to launch the installer Figure 1 1 Installation package Figure 1 2 Installation progress When you see the mess...

Page 5: ...bile device click OK to exit the installer on your computer To finish installation follow the steps described in section 1 2 1 Installation on your device Figure 1 6 Installing the cab file on your de...

Page 6: ...our purchase Select the Registration key option enter a current contact address in the e mail field and then enter the information you received in the Key field Tap Activate to complete activation You...

Page 7: ...n Access scan If selected the On access scanner runs in the background Heuristics Select this option to apply heuristic scanning techniques Heuristics identifies new malware not yet detected by the vi...

Page 8: ...device for the presence of infiltrations By default specific predefined file types are scanned To run the On demand scanner tap Scan in the lower left corner of the main ESET Mobile Antivirus window F...

Page 9: ...to scanning tap Menu Settings General Figure 3 5 The Settings menu The General settings window allows you to specify what action to take if a virus is found Select the Show alert dialog option to disp...

Page 10: ...anned To exclude an extension from scanning deselect its check box To scan all files deselect the Extension sensitive check box Figure 3 7 Advanced scan parameter setup 4 Virus found If a virus is fou...

Page 11: ...service providers or messages from unknown or unspecified users 5 1 Settings Tap Menu View Statistics to see statistical information about the number of received and blocked messages In the Spam filt...

Page 12: ...the Whitelist Blacklist select the tab for the list you want to modify and tap Options Figure 5 3 The Blacklist 5 3 Locating blocked Spam messages The Spam folder is used to store blocked messages tha...

Page 13: ...update option 2 Download the file containing the most recent virus signature database to your PC 3 Connect your device to your PC Windows XP and earlier require that ActiveSync be installed Windows V...

Page 14: ...ion 6 Update 7 Viewing Logs and statistics The Choose log section Menu View Logs stores all file scan results and scan status reports along with information about locked and infected files Logs are cr...

Page 15: ...ogram is not able to contact the update servers Try the following solutions 1 Check your Internet connection Open your Internet browser to http www eset com to verify that you are connected to the Int...

Page 16: ...e you can choose from the following options To find answers to the most frequently asked questions access the ESET Knowledgebase here http kb eset com The Knowledgebase contains an abundance of useful...

Reviews: