
17
in concert to significantly enhance system security. The scanning
engine is capable of controlling several data streams simultaneously,
maximizing the efficiency and detection rate. ThreatSense technology
also successfully eliminates rootkits.
The ThreatSense technology setup options allow the user to specify
several scan parameters:
▪
File types and extensions that are to be scanned
▪
The combination of various detection methods
▪
Levels of cleaning, etc.
To enter the setup window, click the
Setup...
button located in
any module‘s setup window which uses ThreatSense technology
(see below). Different security scenarios could require different
configurations. With this in mind, ThreatSense is individually
configurable for the following protection modules:
▪
Real‑time file system protection
▪
System startup file check
▪
Email protection
▪
Web access protection
▪
On‑demand computer scan
The ThreatSense parameters are highly optimized for each module,
and their modification can significantly influence system operation.
For example, changing parameters to always scan runtime packers,
or enabling advanced heuristics in the real‑time file system
protection module could result in a system slow‑down (normally,
only newly‑created files are scanned using these methods). Therefore,
we recommend that you leave the default ThreatSense parameters
unchanged for all modules except Computer scan.
4.1.5.1
Objects setup
The
Objects
section allows you to define which computer
components and files will be scanned for infiltrations.
Operating memory
–
Scans for threats that attack the operating
memory of the system.
Boot sectors
–
Scans boot sectors for the presence of viruses in the
master boot record
Files
–
Provides scanning of all common file types (programs, pictures,
audio, video files, database files, etc.)
Email files
–
Scans special files where email messages are contained
Archives
–
Provides scanning of files compressed in archives
(.rar, .zip, .arj, .tar, etc.)
Self‑extracting archives
–
Scans files which are contained in
self‑extracting archive files, but typically presented with a .exe
extension
Runtime packers
–
runtime packers (unlike standard archive types)
decompress in memory, in addition to standard static packers
(UPX, yoda, ASPack, FGS, etc.).
4.1.5.2
Options
In the
Options
section, the user can select the methods to be used when
scanning the system for infiltrations. The following options are available:
Signatures
–
Signatures can exactly and reliably detect and identify
infiltrations by their name using virus signatures.
Heuristics
–
Heuristics is an algorithm that analyzes the (malicious)
activity of programs. The main advantage of heuristic detection is
the ability to detect new malicious software which did not previously
exist, or was not included in the list of known viruses (virus signatures
database).
Advanced heuristics
–
Advanced heuristics comprise a unique
heuristic algorithm developed by ESET optimized for detecting
computer worms and trojan horses written in high level programming
languages. Due to advanced heuristics, the detection intelligence
of the program is significantly higher.
Adware/Spyware/Riskware
–
This category includes software which
collects various sensitive information about users without their
informed consent. This category also includes software which displays
advertising material.
Potentially unsafe applications
–
Potentially unsafe applications is
the classification used for commercial, legitimate software. It includes
programs such as remote access tools, which is why this option is
disabled by default.
Potentially unwanted applications
–
Potentially unwanted
applications are not necessarily intended to be malicious, but they
may affect the performance of your computer in a negative way.
Such applications usually require consent for installation. If they are
present on your computer, your system behaves differently (compared
to the state before their installation). The most significant changes
include unwanted pop‑up windows, activation and running of hidden
processes, increased usage of system resources, changes in search
results, and applications communicating with remote servers.