EasyManua.ls Logo

ESET SMART SECURITY - Table of Contents

ESET SMART SECURITY
38 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
1. ESET Smart Security ................................4
1.1 What’s new ................................................................... 4
1.2 System requirements
..................................................... 4
2. Installation ............................................5
2.1 Typical installation ........................................................ 5
2.2 Custom installation
....................................................... 6
2.3 Using original settings.................................................... 8
2.4 Entering User name and password
.................................. 8
2.5 On‑demand computer scan
............................................ 8
3. Beginner’s guide .....................................9
3.1 Introducing user interface design – modes ....................... 9
3.1.1 Checking operation of the system ...........................9
3.1.2 What to do if the program doesnt work properly ... 10
3.2 Update setup
...............................................................10
3.3 Trusted zone setup
.......................................................10
3.4 Proxy server setup
.........................................................11
3.5 Settings protection
........................................................11
4. Work with ESET Smart Security ..............12
4.1 Antivirus protection ..................................................... 12
4.1.1 Real‑time file system protection ............................12
4.1.1.1 Control setup........................................................12
4.1.1.1.1 Media to scan ......................................................12
4.1.1.1.2 Scan on (Event‑triggered scanning) ........................12
4.1.1.1.3 Additional ThreatSense parameters for newly created
files ......................................................................12
4.1.1.1.4 Advanced setup ....................................................12
4.1.1.2 Cleaning levels ......................................................12
4.1.1.3 When to modify the real‑time protection
configuration .......................................................13
4.1.1.4 Checking real‑time protection ...............................13
4.1.1.5 What to do if the real‑time protection does
not work ..............................................................13
4.1.2 Email protection ...................................................13
4.1.2.1 POP3 checking ......................................................13
4.1.2.1.1 Compatibility .......................................................13
4.1.2.2 Integration with Microsoft Outlook, Outlook Express,
and Windows Mail ................................................14
4.1.2.2.1 Appending tag messages to email body ..................14
4.1.2.3 Removing infiltrations ..........................................14
4.1.3 Web access protection ..........................................14
4.1.3.1 HTTP ....................................................................14
4.1.3.1.1 Blocked / excluded addresses .................................15
4.1.3.1.2 Web browsers .......................................................15
4.1.4 Computer scan .....................................................15
4.1.4.1 Type of scan ..........................................................16
4.1.4.1.1 Standard scan .......................................................16
4.1.4.1.2 Custom scan.........................................................16
4.1.4.2 Scan targets .........................................................16
4.1.4.3 Scan profiles .........................................................16
4.1.5 ThreatSense engine parameters setup ...................16
4.1.5.1 Objects setup .......................................................17
4.1.5.2 Options ................................................................17
4.1.5.3 Cleaning ...............................................................18
4.1.5.4 Extensions ............................................................18
4.1.6 An infiltration is detected ......................................18
4.2 Personal firewall
..........................................................19
4.2.1 Filtering modes ....................................................19
4.2.2 Block all trac: disconnect network ......................19
4.2.3 Disable filtering: allow all trac ............................19
4.2.4 Configuring and using rules ...................................19
4.2.4.1 Creating new rules ...............................................20
4.2.4.2 Editing rules ........................................................20
4.2.5 Configuring zones ................................................20
4.2.6 Establishing connection – detection .....................20
4.2.7 Logging ................................................................ 21
contents
Copyright © 2007 by ESET, spol. s r. o.
ESET Smart Security was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without a permission in
writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV.20090812005

Table of Contents

Other manuals for ESET SMART SECURITY

Related product manuals