background image

5

2. Installation

Before you begin the installation process, please close
all open programs on your computer. ESET
Cybersecurity contains components that may conflict
with other antivirus programs that may already be
installed on your computer. ESET strongly
recommends that you remove any other program to
prevent potential problems. You can install ESET
Cybersecurity from an installation CD or from a file
available on the ESET website.

To launch the installer wizard, do one of the following:

If you are installing from the installation CD, insert
the CD into the CD-ROM drive. Double-click on the
ESET Cybersecurity installation icon to launch the
installer.
If you are installing from a downloaded file, double-
click the file you downloaded to launch the installer.

Launch the installer and the installation wizard will
guide you through the basic setup. After agreeing to
the End User License Agreement, you can choose from
the following installation types:

Typical installation
Custom installation

2.1   Typical installation

Typical installation includes the configuration options
that are appropriate for most users. The settings
provide maximum security combined with excellent
system performance. Typical installation is the default
option and is recommended if you do not have
particular requirements for specific settings.

The 

ThreatSense.Net Early Warning System

 helps

ensure that ESET is immediately and continuously
informed of new infiltrations in order to quickly
protect our customers. The system allows for
submission of new threats to ESET Threat Lab, where
they are analyzed, processed and added to the virus
signature database. By default, the

 Enable

ThreatSense.Net Early Warning System

 option is

selected. Click 

Setup...

 to modify detailed settings for

the submission of suspicious files. (For more
information see 

ThreatSense.Net

).

The next step in the installation process is to configure
Detection of potentially unwanted applications.
Potentially unwanted applications are not necessarily
malicious, but can often negatively affect the behavior
of your operating system. These applications are often
bundled with other programs and may be difficult to
notice during the installation process. Although these
applications usually display a notification during
installation, they can easily be installed without your
consent. Select the

 Enable detection of potentially

unwanted applications

 option to allow ESET

Cybersecurity to detect this type of threat
(recommended). If you do not wish to Enable this
feature, select the 

Disable detection of potentially

unwanted applications

 option.

The final step in Typical installation mode is to confirm
installation by clicking the 

Install

 button.

2.2   Custom installation

Custom installation is designed for experienced users
who wish to modify advanced settings during the
installation process.

If you are using a proxy server you can define its
parameters now by selecting the 

I use a proxy server

option. Enter the IP address or URL of your proxy
server in the 

Address

 field. In the Port field, specify the

port where the proxy server accepts connections (3128
by default). In the event that the proxy server requires
authentication, enter a valid 

Username

 and 

Password

to grant access to the proxy server. If you are sure that
no proxy server is used, choose the 

I do not use a

proxy server

 option.If you are not sure, you can use

your current system settings by selecting 

Use system

settings (Recommended)

.

In the next step you can 

Define privileged users

 that

will be able to edit the program configuration. From
the list of users on the left side, select the users and 

Add

 them to the 

Privileged Users

 list. To display all

system users, select the 

Show all users

 option.

The 

ThreatSense.Net Early Warning System

 helps

ensure that ESET is immediately and continuously
informed of new infiltrations in order to quickly
protect our customers. The system allows for
submission of new threats to ESET Threat Lab, where
they are analyzed, processed and added to the virus
signature database. By default, the

 Enable

ThreatSense.Net Early Warning System

 option is

selected. Click 

Setup...

 to modify detailed settings for

the submission of suspicious files. For more
information see 

ThreatSense.Net

.

The next step in the installation process is to configure
detection of potentially unwanted applications.

5

5

19

19

Содержание CYBERSECURITY -

Страница 1: ...ESET Cybersecurity Installation Manual and User Guide...

Страница 2: ...duced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise without permission in writing from the author ESET spol...

Страница 3: ...engine parameters setup 4 1 3 12 Objects 4 1 3 1 12 Options 4 1 3 2 13 Cleaning 4 1 3 3 13 Extensions 4 1 3 4 13 Limits 4 1 3 5 13 Others 4 1 3 6 14 An infiltration is detected 4 1 4 14 Updating the...

Страница 4: ...ith Windows users and vice versa Although Windows malware does not pose a direct threat to Mac disabling malware that has infected a Mac machine will prevent its spread to Windows based computers thro...

Страница 5: ...ng system These applications are often bundled with other programs and may be difficult to notice during the installation process Although these applications usually display a notification during inst...

Страница 6: ...ctivation instructions The Activation Key is usually located inside or on the back side of the product package For a successful activation the Activation Key must be entered as supplied 2 If you recei...

Страница 7: ...for common operations It does not display any advanced options To toggle between modes click the plus icon next to Activate advanced mode Activate standard mode in the bottom left corner of the main...

Страница 8: ...em using the suggested solutions click Help to access the help files or search the Knowledgebase If you need assistance you can contact ESET Customer Care support on the ESET website ESET Customer Car...

Страница 9: ...r 4 1 1 1 2 Advanced scan options In this window you can define object types to be scanned by the ThreatSense engine and enable disable Advanced heuristics as well as modify settings for archives and...

Страница 10: ...and how to troubleshoot them Real time protection is disabled If Real time protection was inadvertently disabled by a user it will need to be reactivated To reactivate Real time protection navigate to...

Страница 11: ...g actions select the Scan without cleaning option Furthermore you can choose from three cleaning levels by clicking Setup Cleaning Performing computer scans with Custom scan is recommended for advance...

Страница 12: ...or directory Email files not available in Real time protection scans special files where email messages are contained Mailboxes not available in Real time protection scans user mailboxes in the syste...

Страница 13: ...he log cfg and tmp extensions 4 1 3 5 Limits The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned Maximum Size Defines the maximum size of o...

Страница 14: ...d no clean files In other words archives are not deleted if they also contain harmless clean files However use caution when performing a Strict cleaning scan with Strict cleaning the archive will be d...

Страница 15: ...button Authentication for update servers is based on the Username and Password generated and sent to you after purchase To enable the use of test mode downloads pre release updates click the Setup but...

Страница 16: ...u Five types of scheduled tasks are available Run application Update Log maintenance On demand computer scan System startup file check Since Update is one of the most frequently used scheduled tasks w...

Страница 17: ...e was incorrectly evaluated as infected e g by heuristic analysis of the code and subsequently quarantined please send the file to ESET s Threat Lab To submit a file from quarantine right click the fi...

Страница 18: ...ET Cybersecurity Disabling the Display alerts option will cancel all alert windows and is only suitable in specific situations For most users we recommend that this option be left to its default setti...

Страница 19: ...stem option to activate and then click the Setup button beside the Advanced Options heading 4 7 1 Suspicious files The Suspicious files option allows you to configure the manner in which threats are s...

Страница 20: ...as documents or spreadsheets The most common file types are excluded by default doc etc You can add file types to the list of excluded files Contact Email optional Your email can be sent with any susp...

Страница 21: ...click Setup Import and export settings Select the Export settings option and enter the name of the configuration file Use the browser to select a location on your computer to save the configuration fi...

Страница 22: ...in network applications Worms are therefore much more viable than computer viruses Due to the wide availability of the Internet they can spread across the globe within hours of their release in some c...

Страница 23: ...ntain security codes PINs bank account numbers etc Spyware is often bundled with free versions of a program by its author in order to generate revenue or to offer an incentive for purchasing the softw...

Отзывы: