EasyManuals Logo

ESET SMART SECURITY User Manual

ESET SMART SECURITY
38 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #2 background imageLoading...
Page #2 background image
1. ESET Smart Security ................................4
1.1 What’s new ................................................................... 4
1.2 System requirements
..................................................... 4
2. Installation ............................................5
2.1 Typical installation ........................................................ 5
2.2 Custom installation
....................................................... 6
2.3 Using original settings.................................................... 8
2.4 Entering User name and password
.................................. 8
2.5 On‑demand computer scan
............................................ 8
3. Beginner’s guide .....................................9
3.1 Introducing user interface design – modes ....................... 9
3.1.1 Checking operation of the system ...........................9
3.1.2 What to do if the program doesnt work properly ... 10
3.2 Update setup
...............................................................10
3.3 Trusted zone setup
.......................................................10
3.4 Proxy server setup
.........................................................11
3.5 Settings protection
........................................................11
4. Work with ESET Smart Security ..............12
4.1 Antivirus protection ..................................................... 12
4.1.1 Real‑time file system protection ............................12
4.1.1.1 Control setup........................................................12
4.1.1.1.1 Media to scan ......................................................12
4.1.1.1.2 Scan on (Event‑triggered scanning) ........................12
4.1.1.1.3 Additional ThreatSense parameters for newly created
files ......................................................................12
4.1.1.1.4 Advanced setup ....................................................12
4.1.1.2 Cleaning levels ......................................................12
4.1.1.3 When to modify the real‑time protection
configuration .......................................................13
4.1.1.4 Checking real‑time protection ...............................13
4.1.1.5 What to do if the real‑time protection does
not work ..............................................................13
4.1.2 Email protection ...................................................13
4.1.2.1 POP3 checking ......................................................13
4.1.2.1.1 Compatibility .......................................................13
4.1.2.2 Integration with Microsoft Outlook, Outlook Express,
and Windows Mail ................................................14
4.1.2.2.1 Appending tag messages to email body ..................14
4.1.2.3 Removing infiltrations ..........................................14
4.1.3 Web access protection ..........................................14
4.1.3.1 HTTP ....................................................................14
4.1.3.1.1 Blocked / excluded addresses .................................15
4.1.3.1.2 Web browsers .......................................................15
4.1.4 Computer scan .....................................................15
4.1.4.1 Type of scan ..........................................................16
4.1.4.1.1 Standard scan .......................................................16
4.1.4.1.2 Custom scan.........................................................16
4.1.4.2 Scan targets .........................................................16
4.1.4.3 Scan profiles .........................................................16
4.1.5 ThreatSense engine parameters setup ...................16
4.1.5.1 Objects setup .......................................................17
4.1.5.2 Options ................................................................17
4.1.5.3 Cleaning ...............................................................18
4.1.5.4 Extensions ............................................................18
4.1.6 An infiltration is detected ......................................18
4.2 Personal firewall
..........................................................19
4.2.1 Filtering modes ....................................................19
4.2.2 Block all trac: disconnect network ......................19
4.2.3 Disable filtering: allow all trac ............................19
4.2.4 Configuring and using rules ...................................19
4.2.4.1 Creating new rules ...............................................20
4.2.4.2 Editing rules ........................................................20
4.2.5 Configuring zones ................................................20
4.2.6 Establishing connection – detection .....................20
4.2.7 Logging ................................................................ 21
contents
Copyright © 2007 by ESET, spol. s r. o.
ESET Smart Security was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without a permission in
writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV.20090812005

Table of Contents

Other manuals for ESET SMART SECURITY

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ESET SMART SECURITY and is the answer not in the manual?

ESET SMART SECURITY Specifications

General IconGeneral
TypeAntivirus security
Number of PCs3
Software typeBox
Language versionTurkish
License quantity3 license(s)
License term in years1 year(s)
PlatformPC
Minimum processor-
Minimum storage drive space- MB
Mac operating systems supportedNo
Windows operating systems supportedYes

Related product manuals