background image

14

4.1.4   An infiltration is detected

Infiltrations can reach the system from various entry
points: webpages, shared folders, email or removable
computer devices (USB, external disks, CDs, DVDs,
diskettes, etc.). 

If your computer is showing signs of malware
infection, e.g., it is slower, often freezes, etc., we
recommend the following steps: 

1. Open ESET Cybersecurity and click 

Computer scan

.

2. Click 

Smart scan

 (for more information, see the

Smart scan

 section).

3. After the scan has finished, review the log for the

number of scanned, infected and cleaned files. 

If you only wish to scan a certain part of your disk,
click 

Custom scan

 and select targets to be scanned for

viruses.

As a general example of how infiltrations are handled
in ESET Cybersecurity, suppose that an infiltration is
detected by the Real-time file system monitor, which
uses the default cleaning level. It will attempt to clean
or delete the file. If there is no predefined action to
take for the Real-time protection module, you will be
asked to select an option in an alert window. Usually,
the options 

Clean

Delete

 and 

No action

 are available.

Selecting 

No action

 is not recommended, since the

infected file(s) would be left untouched. An exception
to this is when you are sure that the file is harmless
and has been detected by mistake.

Cleaning and deleting – Apply cleaning if a file has been
attacked by a virus that has attached malicious code
to it. If this is the case, first attempt to clean the
infected file in order to restore it to its original state. If
the file consists exclusively of malicious code, it will be
deleted.

Deleting files in archives

 – In the default cleaning

mode, the entire archive will be deleted only if it
contains infected files and no clean files. In other
words, archives are not deleted if they also contain
harmless clean files. However, use caution when
performing a 

Strict cleaning

 scan – with Strict

cleaning the archive will be deleted if it contains at
least one infected file, regardless of the status of other
files in the archive.

4.2   Updating the program

Regular updates of ESET Cybersecurity are necessary
to maintain the maximum level of security. The
Update module ensures that the program is always up
to date by updating the virus signature database.

By clicking 

Update

 from the main menu, you can find

the current update status, including the date and time
of the last successful update and if an update is
needed. To begin the update process manually, click
the 

Update virus signature database

.

Under normal circumstances, when updates are
downloaded properly, the message 

Virus signature

database is up to date

 will appear in the Update

window. If the virus signature database cannot be
updated, we recommend that you check the 

update

settings

 - the most common reason for this error is

incorrectly entered authentication data (Username
and Password) or incorrectly configured 

connection

settings

.

The Update window also contains the information
about the virus signature database version. This
numeric indicator is an active link to ESET’s website,
listing all signatures added during the given update.

NOTE:

 Your username and password are provided by

ESET after purchasing ESET Cybersecurity.

4.2.1   Upgrading to a new build

For maximum protection, it is important to use the
latest build of ESET Cybersecurity. To check for a new
version, click 

Update

 from the main menu on the left.

If a new build is available, a message that says 

A new

version of the product is available!

 will be displayed at the

bottom of the window. Click 

Learn more...

 to display

a new window containing the version number of the
new build and the changelog.

11

15

21

Содержание CYBERSECURITY -

Страница 1: ...ESET Cybersecurity Installation Manual and User Guide...

Страница 2: ...duced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise without permission in writing from the author ESET spol...

Страница 3: ...engine parameters setup 4 1 3 12 Objects 4 1 3 1 12 Options 4 1 3 2 13 Cleaning 4 1 3 3 13 Extensions 4 1 3 4 13 Limits 4 1 3 5 13 Others 4 1 3 6 14 An infiltration is detected 4 1 4 14 Updating the...

Страница 4: ...ith Windows users and vice versa Although Windows malware does not pose a direct threat to Mac disabling malware that has infected a Mac machine will prevent its spread to Windows based computers thro...

Страница 5: ...ng system These applications are often bundled with other programs and may be difficult to notice during the installation process Although these applications usually display a notification during inst...

Страница 6: ...ctivation instructions The Activation Key is usually located inside or on the back side of the product package For a successful activation the Activation Key must be entered as supplied 2 If you recei...

Страница 7: ...for common operations It does not display any advanced options To toggle between modes click the plus icon next to Activate advanced mode Activate standard mode in the bottom left corner of the main...

Страница 8: ...em using the suggested solutions click Help to access the help files or search the Knowledgebase If you need assistance you can contact ESET Customer Care support on the ESET website ESET Customer Car...

Страница 9: ...r 4 1 1 1 2 Advanced scan options In this window you can define object types to be scanned by the ThreatSense engine and enable disable Advanced heuristics as well as modify settings for archives and...

Страница 10: ...and how to troubleshoot them Real time protection is disabled If Real time protection was inadvertently disabled by a user it will need to be reactivated To reactivate Real time protection navigate to...

Страница 11: ...g actions select the Scan without cleaning option Furthermore you can choose from three cleaning levels by clicking Setup Cleaning Performing computer scans with Custom scan is recommended for advance...

Страница 12: ...or directory Email files not available in Real time protection scans special files where email messages are contained Mailboxes not available in Real time protection scans user mailboxes in the syste...

Страница 13: ...he log cfg and tmp extensions 4 1 3 5 Limits The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned Maximum Size Defines the maximum size of o...

Страница 14: ...d no clean files In other words archives are not deleted if they also contain harmless clean files However use caution when performing a Strict cleaning scan with Strict cleaning the archive will be d...

Страница 15: ...button Authentication for update servers is based on the Username and Password generated and sent to you after purchase To enable the use of test mode downloads pre release updates click the Setup but...

Страница 16: ...u Five types of scheduled tasks are available Run application Update Log maintenance On demand computer scan System startup file check Since Update is one of the most frequently used scheduled tasks w...

Страница 17: ...e was incorrectly evaluated as infected e g by heuristic analysis of the code and subsequently quarantined please send the file to ESET s Threat Lab To submit a file from quarantine right click the fi...

Страница 18: ...ET Cybersecurity Disabling the Display alerts option will cancel all alert windows and is only suitable in specific situations For most users we recommend that this option be left to its default setti...

Страница 19: ...stem option to activate and then click the Setup button beside the Advanced Options heading 4 7 1 Suspicious files The Suspicious files option allows you to configure the manner in which threats are s...

Страница 20: ...as documents or spreadsheets The most common file types are excluded by default doc etc You can add file types to the list of excluded files Contact Email optional Your email can be sent with any susp...

Страница 21: ...click Setup Import and export settings Select the Export settings option and enter the name of the configuration file Use the browser to select a location on your computer to save the configuration fi...

Страница 22: ...in network applications Worms are therefore much more viable than computer viruses Due to the wide availability of the Internet they can spread across the globe within hours of their release in some c...

Страница 23: ...ntain security codes PINs bank account numbers etc Spyware is often bundled with free versions of a program by its author in order to generate revenue or to offer an incentive for purchasing the softw...

Отзывы: