background image

Integrated components:

ESET NOD32 Antivirus
ESET NOD32 Antispyware
ESET Personal Firewall
ESET Antispam

New generation
of NOD32 technology

User Guide

Summary of Contents for SMART SECURITY

Page 1: ...Integrated components ESET NOD32 Antivirus ESET NOD32 Antispyware ESET Personal Firewall ESET Antispam New generation of NOD32 technology User Guide ...

Page 2: ...body 14 4 1 2 3 Removing infiltrations 14 4 1 3 Web access protection 14 4 1 3 1 HTTP 14 4 1 3 1 1 Blocked excluded addresses 15 4 1 3 1 2 Web browsers 15 4 1 4 Computer scan 15 4 1 4 1 Type of scan 16 4 1 4 1 1 Standard scan 16 4 1 4 1 2 Custom scan 16 4 1 4 2 Scan targets 16 4 1 4 3 Scan profiles 16 4 1 5 ThreatSense engine parameters setup 16 4 1 5 1 Objects setup 17 4 1 5 2 Options 17 4 1 5 3 ...

Page 3: ...28 4 8 1 Alerts and notifications 29 4 9 ThreatSense Net 29 4 9 1 Suspicious files 30 4 9 2 Statistics 30 4 9 3 Submission 31 4 10 Remote administration 31 4 11 License 32 5 Advanced user 33 5 1 Proxy server setup 33 5 2 Export import settings 33 5 2 1 Export settings 33 5 2 2 Import settings 33 5 3 Command Line 33 6 Glossary 35 6 1 Types of infiltrations 35 6 1 1 Viruses 35 6 1 2 Worms 35 6 1 3 T...

Page 4: ...rk communication scanning on the Data Link Layer enables ESET Personal firewall to overcome a variety of attacks that would otherwise be undetectable IPv6 support ESET Personal firewall displays IPv6 addresses and allows users to create rules for them Executable file monitoring Monitoring changes in executable files in order to overcome infection It is possible to allow file modification of signed...

Page 5: ...rs later option Authentication data can be inserted at any time later on directly from the program The next step in the installation is configuration of the ThreatSense Net Early Warning System The ThreatSense Net Early Warning System helps to ensure that ESET is immediately and continuously informed about new infiltrations in order to quickly protect its customers The system allows for submission...

Page 6: ...e a proxy server it must be correctly configured in order for virus signature updates to work properly If you don t know whether you use a proxy server to connect to the Internet leave the default setting I am unsure if my Internet connection uses a proxy server Use the same settings as Internet Explorer and click Next If you do not use a proxy server select the corresponding option To configure y...

Page 7: ...rd you wish to protect the program with Retype the password to confirm The steps Configuration of the ThreatSense Net Early Warning System and Detection of potentially unwanted applications are the same as for a Typical installation and are not shown here see page 5 The last step in Custom mode is to select the ESET Personal firewall filtering mode Three modes are available Automatic Interactive P...

Page 8: ...tically updated This is only possible if the correct user name and password are entered in the update setup If you did not enter your user name and password during the installation you can do so now In the main program window click Update and then click User name and Password Setup Enter the data you received with your product license into the License details window 2 5 On demand computer scan Aft...

Page 9: ...T Knowledgebase ESET s web site and access a Customer Care support request The ESET Smart Security user interface allows users to toggle Standard and Advanced modes To toggle between modes see the Display link located in the bottom left corner of the main ESET Smart Security window Click this button to select the desired display mode The Standard mode provides access to features required for commo...

Page 10: ... time of purchase should be entered If the User name and Password were entered during the installation of ESET Smart Security you will not be prompted for them at this point The Advanced Setup window to access press F5 contains other detailed update options The Update server drop down menu should be set to Choose automatically To configure advanced update options such as the update mode proxy serv...

Page 11: ...a If this information is not available you can attempt to automatically detect proxy server settings for ESET Smart Security by clicking the Detect proxy server button NOTE Proxy server options for various update profiles may differ If this is the case configure the proxy server in the advanced update setup 3 5 Settings protection ESET Smart Security Settings can be very important from the perspec...

Page 12: ...y created files The probability of infection in newly created files is comparatively higher than in existing files This is why the program checks these files with additional scanning parameters Along with common signature based scanning methods advanced heuristics are used which greatly improves detection rates In addition to newly created files scanning is also performed on self extracting files ...

Page 13: ... are enabled at the same time they may conflict with each other We recommend that you uninstall any other antivirus programs on your system Real time protection does not start If real time protection is not initiated at system startup and the Automatic real time file system protection startup option is enabled it may be due to conflicts with other programs If this is the case please consult ESET s...

Page 14: ... protection Email protection The program can Append tag messages to received and read mail as well as Append tag messages to sent mail Users also have the ability to decide whether tag messages should be appended to all email to infected email only or not at all ESET Smart Security also allows the user to append messages to the original subject of infected messages To enable appending to the subje...

Page 15: ...application is monitored regardless of the port numbers involved in the communication The Web browsers feature complements the HTTP checking feature as HTTP checking only takes place on predefined ports However many Internet services utilize dynamically changing or unknown port numbers To account for this the Web browser feature can establish control of port communications regardless of the connec...

Page 16: ...s The Scan targets drop down menu allows you to select files folders and devices disks to be scanned for viruses Using the quick scan targets menu option you can select the following targets Local drives controls all system hard drives Removable media diskettes USB storage devices CD DVD Network drives all mapped drives A scan target can also be more precisely specified by entering the path to the...

Page 17: ...rchives Scans files which are contained in self extracting archive files but typically presented with a exe extension Runtime packers runtime packers unlike standard archive types decompress in memory in addition to standard static packers UPX yoda ASPack FGS etc 4 1 5 2 Options In the Options section the user can select the methods to be used when scanning the system for infiltrations The followi...

Page 18: ...f files with no extension select the Scan extensionless files option Excluding files from scanning has its purpose if the scanning of certain file types prevents the program using the extensions to run properly For example it may be advisable to exclude the edb eml and tmp extensions when using the MS Exchange server 4 1 6 An infiltration is detected Infiltrations can reach the system from various...

Page 19: ... gives the option of allowing or denying the communication and the decision to allow or deny can be remembered as a new rule for the Personal firewall If the user chooses to create a new rule at this time all future connections of this type will be allowed or blocked according to the rule Policy based mode blocks all connections which are not defined by a specific rule that allows them This mode a...

Page 20: ...on about the remote port port range It also allows the user to define a list of remote IP addresses or zones for a given rule A good example of adding a new rule is allowing your Internet browser to access the network The following must be provided in this case On the General tab enable outgoing communication via the TCP UDP protocol Add the process representing your browser application for Intern...

Page 21: ...t ESET Personal firewall log from the Log drop down menu The log files are an invaluable tool for detecting errors and revealing intrusions into the system and should be given appropriate attention ESET Personal firewall logs contain the following data Date and time of event Name of event Source and target network address Network communication protocol Rule applied or name of worm if identified Ap...

Page 22: ...ssify selected messages as spam or click Spam from the ESET Smart Security Antispam toolbar located in your email client Reclassified messages are automatically moved to the SPAM folder but the sender email address is not added to blacklist Similarly messages can be classified as not spam If messages from the Junk E mail folder are classified as not spam they are moved to their original folder Mar...

Page 23: ...vanced update setup click the Setup button Advanced update setup options include configuration of Update Mode HTTP Proxy LAN and Mirror 4 4 1 2 1 Update mode The Update mode tab contains options related to the program component update In the Program component update section three options are available Never update program components Always update program components Ask before downloading program c...

Page 24: ...ng system authentication for each network connection is required by default In most cases a local system account doesn t have sufficient rights to access the Mirror folder the Mirror folder contains copies of update files If this is the case enter the user name and password in the update setup section or specify an existing account under which the program will enter the update server Mirror To con...

Page 25: ...ion used by the HTTP server By default the Server port is set to the value 2221 The Authentication option defines the method of authentication used for accessing the update files The following options are available NONE Basic and NTLM Select Basic to use the base64 encoding with basic user name and password authentication The NTLM option provides encoding using a safe encoding method For authentic...

Page 26: ...veryone a domain user name and password will still need to be entered in the update setup section ESET Smart Security reports an error connecting to the Mirror server communication on the port defined for accessing the HTTP version of the Mirror is blocked 4 4 2 How to create update tasks Updates can be triggered manually by clicking Update virus signature database in the information window displa...

Page 27: ... is to safely store infected files Files should be quarantined if they cannot be cleaned if it is not safe or advisable to delete them or if they are being falsely detected by ESET Smart Security The user can choose to quarantine any file he or she wants to This is advisable if a file behaves suspiciously but is not detected by the antivirus scanner Quarantined files can be submitted for analysis ...

Page 28: ...ed to the clipboard by selecting the entry and clicking the Copy button To select multiple entries the CTRL and SHIFT keys can be used 4 7 1 Log maintenance The Logging configuration of ESET Smart Security is accessible from the main program window Click Setup Enter entire advanced setup tree Tools Log files You can specify the following options for log files Delete records automatically Log entri...

Page 29: ...d To close pop up windows automatically after a certain period of time select the option Close messageboxes automatically after sec If they are not closed manually by the user alert windows are automatically closed after the specified time period has expired Notifications on the desktop and balloon tips are informative only and do not require or offer user interaction They are displayed in the not...

Page 30: ...this option is selected suspicious files are sent in the background If you wish to know which files have been sent for analysis and confirm the submission select the Ask before submitting option If you don t want any files to be submitted select Do not submit for analysis Note that not submitting files for analysis does not affect submission of statistical information to ESET Statistical informati...

Page 31: ...mission of a suspicious file or a piece of statistical information an entry in the event log is created 4 10 Remote administration Remote administration is a powerful tool for maintaining security policy and for obtaining an overview of the overall security management within the network It is especially useful when applied to larger networks Remote Administration not only increases the security le...

Page 32: ...nse manager is accessible from the Advanced Setup tree under Miscellaneous Licenses The license key is a text file containing information about the purchased product its owner number of licenses and the expiry date The license manager window allows the user to upload and view the content of a license key using the Add button the information contained is displayed in the manager To delete license f...

Page 33: ...he user Proxy server settings can also be established within the Advanced update setup Update branch of the Advanced Setup tree This setting applies for the given update profile and is recommended for laptops as they often receive virus signature updates from different locations For more information about this setting see Section 4 4 Updating the system 5 2 Export import settings Export and import...

Page 34: ...lder nesting LEVEL default 0 unlimited symlink follow symbolic links default no symlink skip symbolic links ext remove EXTENSIONS ext exclude EXTENSIONS exclude EXTENSIONS delimited by colon from scanning Methods adware scan for Adware Spyware Riskware no adware do not scan for Adware Spyware Riskware unsafe scan for potentially unsafe applications no unsafe do not scan for potentially unsafe appl...

Page 35: ... of well known worms are Lovsan Blaster Stration Warezov Bagle and Netsky 6 1 3 Trojan horses Historically computer trojan horses have been defined as a class of infiltrations which attempt to present themselves as useful programs thus tricking users into letting them run But it is important to note that this was true for trojan horses in the past today there is no longer a need for them to disgui...

Page 36: ...usually require consent for installation If they are present on your computer your system behaves differently compared to the state before their installation The most significant changes are new windows you haven t seen previously are opened activation and running of hidden processes increased usage of system resources changes in search results application communicates with remote servers 6 2 Type...

Page 37: ...nce and danger to the user is increased by the fact that the costs of sending are next to zero and authors of spam have many tools and sources available to acquire new email addresses In addition the volume and variety of spam makes it very difficult to regulate The longer you use your email address the higher the possibility of it ending up in a spam engine database Some hints for prevention If p...

Page 38: ... categories and learns for example that spam usually contains words rolex or viagra and legitimate messages are sent by family members or from addresses in the user s contact list Provided that a greater number of messages was processed the Bayesian filter is able to assign a certain spam index to each message and thus decide on whether it is spam or not The main advantage is its flexibility If a ...

Reviews: