ESET Cybersecurity
Copyright ©2010 by ESET, spol. s.r.o.
ESET Cybersecurity was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in
any form or by any means, electronic, mechanical,
photocopying, recording, scanning, or otherwise without
permission in writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV. 11/3/2010
Contents
.................................................41. ESET Cybersecurity
.................................................................4System requirements1.1
.................................................52. Installation
.................................................................5Typical installation2.1
.................................................................5Custom installation2.2
.................................................................6On-demand computer scan2.3
.................................................73. Beginners guide
.................................................................7Introducing user interface design - modes3.1
.......................................................................................7Checking operation of the system3.1.1
3.1.2
What to do if the program doesn't work
.......................................................................................7
properly
.................................................94. Work with ESET Cybersecurity
.................................................................9Antivirus and antispyware protection4.1
.......................................................................................9Real-time file system protection4.1.1
......................................................................................9Real-time Protection setup4.1.1.1
....................................................................................9Scan on (Event triggered scanning)4.1.1.1.1
....................................................................................9Advanced scan options4.1.1.1.2
....................................................................................9Exclusions from scanning4.1.1.1.3
4.1.1.2
4.1.1.4
When to modify Real-time protection
......................................................................................9
configuration
......................................................................................10Checking Real-time protection4.1.1.3
What to do if Real-time protection does not
......................................................................................10
work
.......................................................................................10On-demand computer scan4.1.2
......................................................................................10Type of scan4.1.2.1
....................................................................................10Smart scan4.1.2.1.1
....................................................................................10Custom scan4.1.2.1.2
......................................................................................11Scan targets4.1.2.2
......................................................................................11Scan profiles4.1.2.3
.......................................................................................11ThreatSense engine parameters setup4.1.3
......................................................................................12Objects4.1.3.1
......................................................................................12Options4.1.3.2
......................................................................................12Cleaning4.1.3.3
......................................................................................12Extensions4.1.3.4
......................................................................................13Limits4.1.3.5
......................................................................................13Others4.1.3.6
.......................................................................................13An infiltration is detected4.1.4
.................................................................14Updating the program4.2
.......................................................................................14Upgrading to a new build4.2.1
.......................................................................................14Update setup4.2.2
.......................................................................................15How to create update tasks4.2.3
.................................................................15Scheduler4.3
.......................................................................................15Purpose of scheduling tasks4.3.1
.......................................................................................15Creating new tasks4.3.2
.................................................................16Quarantine4.4
.......................................................................................16Quarantining files4.4.1
.......................................................................................16Restoring from Quarantine4.4.2
.......................................................................................16Submitting file from Quarantine4.4.3
.................................................................16Log files4.5
.......................................................................................17Log maintenance4.5.1
.......................................................................................17Log filtering4.5.2
.................................................................17User interface4.6
.......................................................................................17Alerts and notifications4.6.1
......................................................................................17Alerts and notifications advanced setup4.6.1.1
.......................................................................................17Privileges4.6.2
.......................................................................................18Context menu4.6.3
.................................................................18ThreatSense.Net4.7
.......................................................................................18Suspicious files4.7.1
.................................................205. Advanced user
.................................................................20Import and export settings5.1
.......................................................................................20Import settings5.1.1
.......................................................................................20Export settings5.1.2
.................................................................20Proxy server setup5.2
.................................................................20Removable media blocking5.3
.................................................216. Glossary
.................................................................21Types of infiltrations6.1
.......................................................................................21Viruses6.1.1
.......................................................................................21Worms6.1.2
.......................................................................................21Trojan horses6.1.3
.......................................................................................21Adware6.1.4
.......................................................................................22Spyware6.1.5
.......................................................................................22Potentially unsafe applications6.1.6
.......................................................................................22Potentially unwanted applications6.1.7
2. Installation
detailed settings for the submission of suspicious files.
(For more information see ThreatSense.Net ).
18
Before you begin the installation process, please close all
open programs on your computer. ESET Cybersecurity
contains components that may conflict with other
antivirus programs that may already be installed on your
computer. ESET strongly recommends that you remove
any other program to prevent potential problems. You
can install ESET Cybersecurity from an installation CD or
from a file available on the ESET website.
To launch the installer wizard, do one of the following:
If you are installing from the installation CD, insert the
CD into the CD-ROM drive and the menu screen will
appear. Double-click on the ESET Cybersecurity
Installation icon to launch the installer.
If you are installing from a downloaded file, doubleclick the file you downloaded to launch the installer.
Additional features, including manuals, training, and
uninstalling can be accessed by double-clicking on the
appropriate icon from the menu screen.
The next step in the installation process is to configure
Detection of potentially unwanted applications.
Potentially unwanted applications are not necessarily
malicious, but can often negatively affect the behavior of
your operating system. These applications are often
bundled with other programs and may be difficult to
notice during the installation process. Although these
applications usually display a notification during
installation, they can easily be installed without your
consent. Select the Enable detection of potentially
unwanted applications option to allow ESET
Cybersecurity to detect this type of threat
(recommended). If you do not wish to Enable this
feature, select the Disable detection of potentially
unwanted applications option.
The final step in Typical installation mode is to confirm
installation by clicking the Install button.
2.2 Custom installation
Custom installation is designed for experienced users
who wish to modify advanced settings during the
installation process.
Launch the installer and the installation wizard will guide
you through the basic setup. After agreeing to the End
User License Agreement, you can choose from the
following installation types:
Typical installation
Custom installation
5
5
2.1 Typical installation
Typical installation includes the configuration options
that are appropriate for most users. The settings provide
maximum security combined with excellent system
performance. Typical installation is the default option
and is recommended if you do not have particular
requirements for specific settings.
The ThreatSense.Net Early Warning System helps
ensure that ESET is immediately and continuously
informed of new infiltrations in order to quickly protect
our customers. The system allows for submission of new
threats to ESET Threat Lab, where they are analyzed,
processed and added to the virus signature database. By
default, the Enable ThreatSense.Net Early Warning
System option is selected. Click Setup... to modify
If you are using a proxy server you can define its
parameters now by selecting the I use a proxy server
option. Enter the IP address or URL of your proxy server
in the Address field. In the Port field, specify the port
where the proxy server accepts connections (3128 by
default). In the event that the proxy server requires
authentication, enter a valid Username and Password
to grant access to the proxy server. If you are sure that
no proxy server is used, choose the I do not use a proxy
server option.If you are not sure, you can use your
current system settings by selecting Use system
settings (Recommended).
In the next step you can Define privileged users that will
be able to edit the program configuration. From the list
of users on the left side, select the users and Add them
to the Privileged Users list. To display all system users,
select the Show all users option.
The ThreatSense.Net Early Warning System helps
ensure that ESET is immediately and continuously
informed of new infiltrations in order to quickly protect
our customers. The system allows for submission of new
threats to ESET Threat Lab, where they are analyzed,
processed and added to the virus signature database. By
default, the Enable ThreatSense.Net Early Warning
System option is selected. Click Setup... to modify
detailed settings for the submission of suspicious files.
For more information see ThreatSense.Net .
18
The next step in the installation process is to configure
detection of potentially unwanted applications.
Potentially unwanted applications are not necessarily
malicious, but can often negatively affect the behavior of
your operating system. These applications are often
bundled with other programs and may be difficult to
5
notice during the installation process. Although these
applications usually display a notification during
installation, they can easily be installed without your
consent. Select the Enable detection of potentially
unwanted applications option to allow ESET
Cybersecurity to detect this type of threat
(recommended).
Click Install to install ESET Cybersecurity on standard
Macintosh HD disk. If you wish to select another disk,
click Change Install Location...
2.3 On-demand computer scan
After installing ESET Cybersecurity, a computer scan for
malicious code should be performed. From the main
program window, click Computer scan and then click
Smart scan. For more information about On-demand
computer scans, see the section On-demand computer
10
scan .
6
3. Beginners guide
This chapter provides an initial overview of ESET
Cybersecurity and its basic settings.
3.1 Introducing user interface design modes
The main program window of ESET Cybersecurity is
divided into two main sections. The primary window on
the right displays information that corresponds to the
option selected from the main menu on the left.
Standard mode:
The following is a description of options within the main
menu:
Protection status – Provides information about the
protection status of ESET Cybersecurity. If Advanced
mode is activated, the Statistics submenu will
display.
Computer scan – This option allows you to configure
and launch the On-demand computer scan.
Update – Displays information about updates to the
virus signature database.
Setup – Select this option to adjust your computer’s
security level. If Advanced mode is activated, the
Antivirus and antispyware submenu will display.
Tools – Provides access to Log files, Quarantine and
Scheduler. This option only displays in Advanced
mode.
Help – Provides program information, access to help
files, Internet Knowledgebase and ESET website.
The ESET Cybersecurity user interface allows users to
toggle between Standard and Advanced mode.
Standard mode provides access to features required for
common operations. It does not display any advanced
options. To toggle between modes, click the plus icon
next to Activate advanced mode/Activate standard
mode in the bottom left corner of the main program
window.
Advanced mode:
3.1.1 Checking operation of the system
To view the Protection status, click the top option from
the main menu. A status summary about the operation
of ESET Cybersecurity will display in the primary window
as well as a submenu with Statistics. Select it to view
more detailed information and statistics about computer
scans that have been performed on your system. The
Statistics window is available only in advanced mode.
The Standard mode provides access to features required
for common operations. It does not display any
advanced options.
Toggling to Advanced mode adds the Tools option to
the main menu. The Tools option allows you to access
the submenus for Log files, Quarantine and Scheduler.
NOTE: All remaining instructions in this guide take place
in Advanced mode.
3.1.2 What to do if the program doesn't work
properly
If the modules enabled are working properly, they are
assigned a green check icon. If not, a red exclamation
point or orange notification icon is displayed, and
additional information about the module is shown in the
upper part of the window. A suggested solution for
fixing the module is also displayed. To change the status
of individual modules, click Setup in the main menu and
click on the desired module.
7