1. ESET Smart Security ................................4
1.1 What’s new ................................................................... 4
1.2 System requirements
..................................................... 4
2. Installation ............................................5
2.1 Typical installation ........................................................ 5
2.2 Custom installation
....................................................... 6
2.3 Using original settings.................................................... 8
2.4 Entering User name and password
.................................. 8
2.5 On‑demand computer scan
............................................ 8
3. Beginner’s guide .....................................9
3.1 Introducing user interface design – modes ....................... 9
3.1.1 Checking operation of the system ...........................9
3.1.2 What to do if the program doesn’t work properly ... 10
3.2 Update setup
...............................................................10
3.3 Trusted zone setup
.......................................................10
3.4 Proxy server setup
.........................................................11
3.5 Settings protection
........................................................11
4. Work with ESET Smart Security ..............12
4.1 Antivirus protection ..................................................... 12
4.1.1 Real‑time file system protection ............................12
4.1.1.1 Control setup........................................................12
4.1.1.1.1 Media to scan ......................................................12
4.1.1.1.2 Scan on (Event‑triggered scanning) ........................12
4.1.1.1.3 Additional ThreatSense parameters for newly created
files ......................................................................12
4.1.1.1.4 Advanced setup ....................................................12
4.1.1.2 Cleaning levels ......................................................12
4.1.1.3 When to modify the real‑time protection
configuration .......................................................13
4.1.1.4 Checking real‑time protection ...............................13
4.1.1.5 What to do if the real‑time protection does
not work ..............................................................13
4.1.2 Email protection ...................................................13
4.1.2.1 POP3 checking ......................................................13
4.1.2.1.1 Compatibility .......................................................13
4.1.2.2 Integration with Microsoft Outlook, Outlook Express,
and Windows Mail ................................................14
4.1.2.2.1 Appending tag messages to email body ..................14
4.1.2.3 Removing infiltrations ..........................................14
4.1.3 Web access protection ..........................................14
4.1.3.1 HTTP ....................................................................14
4.1.3.1.1 Blocked / excluded addresses .................................15
4.1.3.1.2 Web browsers .......................................................15
4.1.4 Computer scan .....................................................15
4.1.4.1 Type of scan ..........................................................16
4.1.4.1.1 Standard scan .......................................................16
4.1.4.1.2 Custom scan.........................................................16
4.1.4.2 Scan targets .........................................................16
4.1.4.3 Scan profiles .........................................................16
4.1.5 ThreatSense engine parameters setup ...................16
4.1.5.1 Objects setup .......................................................17
4.1.5.2 Options ................................................................17
4.1.5.3 Cleaning ...............................................................18
4.1.5.4 Extensions ............................................................18
4.1.6 An infiltration is detected ......................................18
4.2 Personal firewall
..........................................................19
4.2.1 Filtering modes ....................................................19
4.2.2 Block all trac: disconnect network ......................19
4.2.3 Disable filtering: allow all trac ............................19
4.2.4 Configuring and using rules ...................................19
4.2.4.1 Creating new rules ...............................................20
4.2.4.2 Editing rules ........................................................20
4.2.5 Configuring zones ................................................20
4.2.6 Establishing connection – detection .....................20
4.2.7 Logging ................................................................ 21
contents
Copyright © 2007 by ESET, spol. s r. o.
ESET Smart Security was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without a permission in
writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support