Contents
.................................................41. ESET Cybersecurity
.................................................................4System requirements1.1
.................................................52. Installation
.................................................................5Typical installation2.1
.................................................................5Custom installation2.2
.................................................................6On-demand computer scan2.3
.................................................73. Beginners guide
.................................................................7Introducing user interface design - modes3.1
.......................................................................................7Checking operation of the system3.1.1
.......................................................................................7
What to do if the program doesn't work
properly
3.1.2
.................................................94. Work with ESET Cybersecurity
.................................................................9Antivirus and antispyware protection4.1
.......................................................................................9Real-time file system protection4.1.1
......................................................................................9Real-time Protection setup4.1.1.1
....................................................................................9Scan on (Event triggered scanning)4.1.1.1.1
....................................................................................9Advanced scan options4.1.1.1.2
....................................................................................9Exclusions from scanning4.1.1.1.3
......................................................................................9
When to modify Real-time protection
configuration
4.1.1.2
......................................................................................10Checking Real-time protection4.1.1.3
......................................................................................10
What to do if Real-time protection does not
work
4.1.1.4
.......................................................................................10On-demand computer scan4.1.2
......................................................................................10Type of scan4.1.2.1
....................................................................................10Smart scan4.1.2.1.1
....................................................................................10Custom scan4.1.2.1.2
......................................................................................11Scan targets4.1.2.2
......................................................................................11Scan profiles4.1.2.3
.......................................................................................11ThreatSense engine parameters setup4.1.3
......................................................................................12Objects4.1.3.1
......................................................................................12Options4.1.3.2
......................................................................................12Cleaning4.1.3.3
......................................................................................12Extensions4.1.3.4
......................................................................................13Limits4.1.3.5
......................................................................................13Others4.1.3.6
.......................................................................................13An infiltration is detected4.1.4
.................................................................14Updating the program4.2
.......................................................................................14Upgrading to a new build4.2.1
.......................................................................................14Update setup4.2.2
.......................................................................................15How to create update tasks4.2.3
.................................................................15Scheduler4.3
.......................................................................................15Purpose of scheduling tasks4.3.1
.......................................................................................15Creating new tasks4.3.2
.................................................................16Quarantine4.4
.......................................................................................16Quarantining files4.4.1
.......................................................................................16Restoring from Quarantine4.4.2
.......................................................................................16Submitting file from Quarantine4.4.3
.................................................................16Log files4.5
.......................................................................................17Log maintenance4.5.1
.......................................................................................17Log filtering4.5.2
.................................................................17User interface4.6
.......................................................................................17Alerts and notifications4.6.1
......................................................................................17Alerts and notifications advanced setup4.6.1.1
.......................................................................................17Privileges4.6.2
.......................................................................................18Context menu4.6.3
.................................................................18ThreatSense.Net4.7
.......................................................................................18Suspicious files4.7.1
.................................................205. Advanced user
.................................................................20Import and export settings5.1
.......................................................................................20Import settings5.1.1
.......................................................................................20Export settings5.1.2
.................................................................20Proxy server setup5.2
.................................................................20Removable media blocking5.3
.................................................216. Glossary
.................................................................21Types of infiltrations6.1
.......................................................................................21Viruses6.1.1
.......................................................................................21Worms6.1.2
.......................................................................................21Trojan horses6.1.3
.......................................................................................21Adware6.1.4
.......................................................................................22Spyware6.1.5
.......................................................................................22Potentially unsafe applications6.1.6
.......................................................................................22Potentially unwanted applications6.1.7