background image

13

Potentially unsafe applications

 – these

applications refer to commercial, legitimate
software that can be abused by attackers, if it was
installed without user's knowledge. The
classification includes programs such as remote
access tools, which is why this option is disabled by
default.

4.1.3.3   Cleaning

The cleaning settings determine the manner in which
the scanner cleans infected files. There are 3 levels of
cleaning:

No cleaning

 – Infected files are not cleaned

automatically. The program will display a warning
window and allow you to choose an action. 

Standard cleaning

 – The program will attempt to

automatically clean or delete an infected file. If it is
not possible to select the correct action
automatically, the program will offer a choice of
follow-up actions. The choice of follow-up actions
will also be displayed if a predefined action could not
be completed.

Strict cleaning

 – The program will clean or delete all

infected files (including archives). The only
exceptions are system files. If it is not possible to
clean them, you will be offered an action to take in a
warning window.

Warning:

 In the Default Standard cleaning mode, the

entire archive file is deleted only if all files in the archive
are infected. If the archive also contains legitimate
files, it will not be deleted. If an infected archive file is
detected in Strict cleaning mode, the entire archive
will be deleted, even if clean files are present.

4.1.3.4   Extensions

An extension is the part of the file name delimited by a
period. The extension defines the type and content of
the file. This section of the ThreatSense parameter
setup lets you define the types of files to be excluded
from scanning.

By default, all files are scanned regardless of their
extension. Any extension can be added to the list of
files excluded from scanning. Using the 

Add

 and

Remove

 buttons, you can enable or prohibit scanning

of desired extensions.

Excluding files from scanning is sometimes necessary if
scanning of certain file types prevents the proper
function of a program that is using the extensions. For
example, it may be advisable to exclude the 

.log

.cfg

and 

.tmp

 extensions.

4.1.3.5   Limits

The Limits section allows you to specify the maximum
size of objects and levels of nested archives to be
scanned:

Maximum Size:

 Defines the maximum size of

objects to be scanned. The antivirus module will
then scan only objects smaller than the size
specified. We do not recommend changing the
default value, as there is usually no reason to modify
it. This option should only be changed by advanced
users who have specific reasons for excluding larger
objects from scanning.

Maximum Scan Time:

 Defines the maximum time

allotted for scanning an object. If a user-defined
value has been entered here, the antivirus module
will stop scanning an object when that time has
elapsed, whether or not the scan has finished.

Maximum Nesting Level:

 Specifies the maximum

depth of archive scanning. We do not recommend
changing the default value of 10; under normal
circumstances, there should be no reason to modify
it. If scanning is prematurely terminated due to the
number of nested archives, the archive will remain
unchecked.

Maximum File Size: 

This option allows you to

specify the maximum file size for files contained in
archives (when they are extracted) that are to be
scanned. If scanning is prematurely terminated as a
result of this limit, the archive will remain
unchecked.

4.1.3.6   Others

With Smart Optimization enabled, the most optimal
settings are used to ensure the most efficient scanning
level, while simultanneously maintaining the highest
scanning speeds. The various protection modules scan
intelligently, making use of different scanning
methods while applying them to specific file types. The
Smart Optimization is not rigidly defined within the
product. The ESET Development Team is continuously
implementing new changes which then get integrated
into your ESET Cybersecurity via the regular updates. If
the Smart Optimization is disabled, only the user-
defined settings in the ThreatSense core of the
particular module are applied when performing a scan.

Scan alternative data streams

 (On-demand scanner

only)
Alternate data streams (resource/data forks) used by
the file system are file and folder associations which
are invisible from ordinary scanning techniques. Many
infiltrations try to avoid detection by disguising
themsleves as alternative data streams.

Содержание CYBERSECURITY -

Страница 1: ...ESET Cybersecurity Installation Manual and User Guide...

Страница 2: ...duced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise without permission in writing from the author ESET spol...

Страница 3: ...engine parameters setup 4 1 3 12 Objects 4 1 3 1 12 Options 4 1 3 2 13 Cleaning 4 1 3 3 13 Extensions 4 1 3 4 13 Limits 4 1 3 5 13 Others 4 1 3 6 14 An infiltration is detected 4 1 4 14 Updating the...

Страница 4: ...ith Windows users and vice versa Although Windows malware does not pose a direct threat to Mac disabling malware that has infected a Mac machine will prevent its spread to Windows based computers thro...

Страница 5: ...ng system These applications are often bundled with other programs and may be difficult to notice during the installation process Although these applications usually display a notification during inst...

Страница 6: ...ctivation instructions The Activation Key is usually located inside or on the back side of the product package For a successful activation the Activation Key must be entered as supplied 2 If you recei...

Страница 7: ...for common operations It does not display any advanced options To toggle between modes click the plus icon next to Activate advanced mode Activate standard mode in the bottom left corner of the main...

Страница 8: ...em using the suggested solutions click Help to access the help files or search the Knowledgebase If you need assistance you can contact ESET Customer Care support on the ESET website ESET Customer Car...

Страница 9: ...r 4 1 1 1 2 Advanced scan options In this window you can define object types to be scanned by the ThreatSense engine and enable disable Advanced heuristics as well as modify settings for archives and...

Страница 10: ...and how to troubleshoot them Real time protection is disabled If Real time protection was inadvertently disabled by a user it will need to be reactivated To reactivate Real time protection navigate to...

Страница 11: ...g actions select the Scan without cleaning option Furthermore you can choose from three cleaning levels by clicking Setup Cleaning Performing computer scans with Custom scan is recommended for advance...

Страница 12: ...or directory Email files not available in Real time protection scans special files where email messages are contained Mailboxes not available in Real time protection scans user mailboxes in the syste...

Страница 13: ...he log cfg and tmp extensions 4 1 3 5 Limits The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned Maximum Size Defines the maximum size of o...

Страница 14: ...d no clean files In other words archives are not deleted if they also contain harmless clean files However use caution when performing a Strict cleaning scan with Strict cleaning the archive will be d...

Страница 15: ...button Authentication for update servers is based on the Username and Password generated and sent to you after purchase To enable the use of test mode downloads pre release updates click the Setup but...

Страница 16: ...u Five types of scheduled tasks are available Run application Update Log maintenance On demand computer scan System startup file check Since Update is one of the most frequently used scheduled tasks w...

Страница 17: ...e was incorrectly evaluated as infected e g by heuristic analysis of the code and subsequently quarantined please send the file to ESET s Threat Lab To submit a file from quarantine right click the fi...

Страница 18: ...ET Cybersecurity Disabling the Display alerts option will cancel all alert windows and is only suitable in specific situations For most users we recommend that this option be left to its default setti...

Страница 19: ...stem option to activate and then click the Setup button beside the Advanced Options heading 4 7 1 Suspicious files The Suspicious files option allows you to configure the manner in which threats are s...

Страница 20: ...as documents or spreadsheets The most common file types are excluded by default doc etc You can add file types to the list of excluded files Contact Email optional Your email can be sent with any susp...

Страница 21: ...click Setup Import and export settings Select the Export settings option and enter the name of the configuration file Use the browser to select a location on your computer to save the configuration fi...

Страница 22: ...in network applications Worms are therefore much more viable than computer viruses Due to the wide availability of the Internet they can spread across the globe within hours of their release in some c...

Страница 23: ...ntain security codes PINs bank account numbers etc Spyware is often bundled with free versions of a program by its author in order to generate revenue or to offer an incentive for purchasing the softw...

Отзывы: