10
optimized to provide the maximum level of system
security for users. To restore the default settings, click
the Default button located at the bottom-left of the
Real-Time Protection window (Setup > Enter
application preferences ... > Protection > Real-Time
Protection).
4.1.1.3 Checking Real-time protection
To verify that Real-time protection is working and
detecting viruses, use the eicar.com test file. This test file
is a special harmless file detectable by all antivirus
programs. The file was created by the EICAR company
(European Institute for Computer Antivirus Research) to
test the functionality of antivirus programs. The file eicar.
com is available for download at http://www.eicar.org/
anti_virus_test_file.htm.
4.1.1.4 What to do if Real-time protection does
not work
In this chapter, we describe problem situations that may
arise when using Real-time protection, and how to
troubleshoot them.
Real-time protection is disabled
If Real-time protection was inadvertently disabled by a
user, it will need to be reactivated. To reactivate Real-
time protection, navigate to Setup > Antivirus and
antispyware and click the Enable real-time file system
protection link (to the right) in the main program
window. You can alternatively enable the Real-time file
system protection in the Advanced setup window under
Protection > Real-Time Protection by selecting the
Enable real-time file system protection option.
Real-time protection does not detect and clean infiltrations
Make sure that no other antivirus programs are installed
on your computer. If two real-time protection shields are
enabled at the same time, they may conflict with each
other. We recommend that you uninstall any other
antivirus programs that may be on your system.
Real-time protection does not start
If Real-time protection is not initiated at system startup,
it may be due to conflicts with other programs. If this is
the case, please consult ESET‘s Customer Care
specialists.
4.1.2 On-demand computer scan
If you suspect that your computer is infected (it behaves
abnormally), run Computer scan > Smart scan to
examine your computer for infiltrations. For maximum
protection, computer scans should be run regularly as
part of routine security measures, not just run when an
infection is suspected. Regular scanning can detect
infiltrations that were not detected by the Real-time
scanner when they were saved to the disk. This can
happen if the Real-time scanner was disabled at the time
of infection, or if the virus signature database is not up-
to-date.
We recommend that you run an On-demand computer
scan at least once a month. Scanning can be configured
as a scheduled task from Tools > Scheduler.
4.1.2.1 Type of scan
Two types of On-demand computer scans are available.
Smart scan quickly scans the system with no need for
further configuration of the scan parameters. Custom
scan allows you to select any of the predefined scan
profiles, as well as choose specific scan targets.
4.1.2.1.1 Smart scan
Smart scan allows you to quickly launch a computer scan
and clean infected files with no need for user
intervention. Its main advantages are easy operation
with no detailed scanning configuration. Smart scan
checks all files in all folders and automatically cleans or
deletes detected infiltrations. The cleaning level is
automatically set to the default value. For more detailed
information on types of cleaning, see the section on
Cleaning .
4.1.2.1.2 Custom scan
Custom scan is optimal if you would like to specify
scanning parameters such as scan targets and scanning
methods. The advantage of running a Custom scan is
the ability to configure the parameters in detail. Different
configurations can be saved as user-defined scan
profiles, which can be useful if scanning is repeatedly
performed with the same parameters.
To select scan targets, select Computer scan > Custom
scan and select specific Scan Targets from the tree
structure. A scan target can also be more precisely
12