Eset CYBERSECURITY User Manual

ESET Cybersecurity
Installation Manual and User Guide
ESET Cybersecurity
Copyright ©2010 by ESET, spol. s.r.o.
ESET Cybersecurity was developed by ESET, spol. s r.o. For more information visit www.eset.com. All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without permission in writing from the author. ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support
REV. 11/3/2010
Contents
.................................................41. ESET Cybersecurity
.................................................................4System requirements1.1
.................................................52. Installation
.................................................................5Typical installation2.1
.................................................................5Custom installation2.2
.................................................................6On-demand computer scan2.3
.................................................73. Beginners guide
.................................................................7Introducing user interface design - modes3.1
.......................................................................................7Checking operation of the system3.1.1
3.1.2
What to do if the program doesn't work
.......................................................................................7
properly
.................................................94. Work with ESET Cybersecurity
.................................................................9Antivirus and antispyware protection4.1
.......................................................................................9Real-time file system protection4.1.1
......................................................................................9Real-time Protection setup4.1.1.1
....................................................................................9Scan on (Event triggered scanning)4.1.1.1.1
....................................................................................9Advanced scan options4.1.1.1.2
....................................................................................9Exclusions from scanning4.1.1.1.3
4.1.1.2
4.1.1.4
When to modify Real-time protection
......................................................................................9
configuration
......................................................................................10Checking Real-time protection4.1.1.3
What to do if Real-time protection does not
......................................................................................10
work
.......................................................................................10On-demand computer scan4.1.2
......................................................................................10Type of scan4.1.2.1
....................................................................................10Smart scan4.1.2.1.1
....................................................................................10Custom scan4.1.2.1.2
......................................................................................11Scan targets4.1.2.2
......................................................................................11Scan profiles4.1.2.3
.......................................................................................11ThreatSense engine parameters setup4.1.3
......................................................................................12Objects4.1.3.1
......................................................................................12Options4.1.3.2
......................................................................................12Cleaning4.1.3.3
......................................................................................12Extensions4.1.3.4
......................................................................................13Limits4.1.3.5
......................................................................................13Others4.1.3.6
.......................................................................................13An infiltration is detected4.1.4
.................................................................14Updating the program4.2
.......................................................................................14Upgrading to a new build4.2.1
.......................................................................................14Update setup4.2.2
.......................................................................................15How to create update tasks4.2.3
.................................................................15Scheduler4.3
.......................................................................................15Purpose of scheduling tasks4.3.1
.......................................................................................15Creating new tasks4.3.2
.................................................................16Quarantine4.4
.......................................................................................16Quarantining files4.4.1
.......................................................................................16Restoring from Quarantine4.4.2
.......................................................................................16Submitting file from Quarantine4.4.3
.................................................................16Log files4.5
.......................................................................................17Log maintenance4.5.1
.......................................................................................17Log filtering4.5.2
.................................................................17User interface4.6
.......................................................................................17Alerts and notifications4.6.1
......................................................................................17Alerts and notifications advanced setup4.6.1.1
.......................................................................................17Privileges4.6.2
.......................................................................................18Context menu4.6.3
.................................................................18ThreatSense.Net4.7
.......................................................................................18Suspicious files4.7.1
.................................................205. Advanced user
.................................................................20Import and export settings5.1
.......................................................................................20Import settings5.1.1
.......................................................................................20Export settings5.1.2
.................................................................20Proxy server setup5.2
.................................................................20Removable media blocking5.3
.................................................216. Glossary
.................................................................21Types of infiltrations6.1
.......................................................................................21Viruses6.1.1
.......................................................................................21Worms6.1.2
.......................................................................................21Trojan horses6.1.3
.......................................................................................21Adware6.1.4
.......................................................................................22Spyware6.1.5
.......................................................................................22Potentially unsafe applications6.1.6
.......................................................................................22Potentially unwanted applications6.1.7
1. ESET Cybersecurity

System requirements

Processor architecture
32bit, 64bit Intel® Operating system
Mac OS X 10.5 and later
Memory
512 MB
Free disk space
100 MB
As a result of the increasing popularity of Unix-based operating systems, malware users are developing more threats to target Mac users. ESET Cybersecurity offers powerful and efficient protection against threats. ESET Cybersecurity includes the ability to deflect Windows threats, protecting Mac users as they interact with Windows users and vice versa. Although Windows malware does not pose a direct threat to Mac, disabling malware that has infected a Mac machine will prevent its spread to Windows-based computers through a local network or the Internet.
1.1 System requirements
For the seamless operation of ESET Cybersecurity, your system should meet the following hardware and software requirements:
ESET Cybersecurity:
4
2. Installation
detailed settings for the submission of suspicious files. (For more information see ThreatSense.Net ).
18
Before you begin the installation process, please close all open programs on your computer. ESET Cybersecurity contains components that may conflict with other antivirus programs that may already be installed on your computer. ESET strongly recommends that you remove any other program to prevent potential problems. You can install ESET Cybersecurity from an installation CD or from a file available on the ESET website.
To launch the installer wizard, do one of the following:
If you are installing from the installation CD, insert the CD into the CD-ROM drive and the menu screen will appear. Double-click on the ESET Cybersecurity

Installation icon to launch the installer.

If you are installing from a downloaded file, double­click the file you downloaded to launch the installer. Additional features, including manuals, training, and uninstalling can be accessed by double-clicking on the appropriate icon from the menu screen.
The next step in the installation process is to configure
Detection of potentially unwanted applications.
Potentially unwanted applications are not necessarily malicious, but can often negatively affect the behavior of your operating system. These applications are often bundled with other programs and may be difficult to notice during the installation process. Although these applications usually display a notification during installation, they can easily be installed without your consent. Select the Enable detection of potentially
unwanted applications option to allow ESET
Cybersecurity to detect this type of threat (recommended). If you do not wish to Enable this feature, select the Disable detection of potentially
unwanted applications option.
The final step in Typical installation mode is to confirm installation by clicking the Install button.
2.2 Custom installation
Custom installation is designed for experienced users who wish to modify advanced settings during the installation process.
Launch the installer and the installation wizard will guide you through the basic setup. After agreeing to the End User License Agreement, you can choose from the following installation types:
Typical installation Custom installation
5
5
2.1 Typical installation
Typical installation includes the configuration options that are appropriate for most users. The settings provide maximum security combined with excellent system performance. Typical installation is the default option and is recommended if you do not have particular requirements for specific settings.
The ThreatSense.Net Early Warning System helps ensure that ESET is immediately and continuously informed of new infiltrations in order to quickly protect our customers. The system allows for submission of new threats to ESET Threat Lab, where they are analyzed, processed and added to the virus signature database. By default, the Enable ThreatSense.Net Early Warning
System option is selected. Click Setup... to modify
If you are using a proxy server you can define its parameters now by selecting the I use a proxy server option. Enter the IP address or URL of your proxy server in the Address field. In the Port field, specify the port where the proxy server accepts connections (3128 by default). In the event that the proxy server requires authentication, enter a valid Username and Password to grant access to the proxy server. If you are sure that no proxy server is used, choose the I do not use a proxy
server option.If you are not sure, you can use your
current system settings by selecting Use system
settings (Recommended).
In the next step you can Define privileged users that will be able to edit the program configuration. From the list of users on the left side, select the users and Add them to the Privileged Users list. To display all system users, select the Show all users option.
The ThreatSense.Net Early Warning System helps ensure that ESET is immediately and continuously informed of new infiltrations in order to quickly protect our customers. The system allows for submission of new threats to ESET Threat Lab, where they are analyzed, processed and added to the virus signature database. By default, the Enable ThreatSense.Net Early Warning
System option is selected. Click Setup... to modify
detailed settings for the submission of suspicious files. For more information see ThreatSense.Net .
18
The next step in the installation process is to configure detection of potentially unwanted applications. Potentially unwanted applications are not necessarily malicious, but can often negatively affect the behavior of your operating system. These applications are often bundled with other programs and may be difficult to
5
notice during the installation process. Although these applications usually display a notification during installation, they can easily be installed without your consent. Select the Enable detection of potentially
unwanted applications option to allow ESET
Cybersecurity to detect this type of threat (recommended).
Click Install to install ESET Cybersecurity on standard
Macintosh HD disk. If you wish to select another disk,
click Change Install Location...
2.3 On-demand computer scan
After installing ESET Cybersecurity, a computer scan for malicious code should be performed. From the main program window, click Computer scan and then click
Smart scan. For more information about On-demand
computer scans, see the section On-demand computer
10
scan .
6
3. Beginners guide
This chapter provides an initial overview of ESET Cybersecurity and its basic settings.
3.1 Introducing user interface design ­modes
The main program window of ESET Cybersecurity is divided into two main sections. The primary window on the right displays information that corresponds to the option selected from the main menu on the left.
Standard mode:
The following is a description of options within the main menu:
Protection status – Provides information about the
protection status of ESET Cybersecurity. If Advanced
mode is activated, the Statistics submenu will
display.
Computer scan – This option allows you to configure
and launch the On-demand computer scan.
Update – Displays information about updates to the
virus signature database.
Setup – Select this option to adjust your computer’s
security level. If Advanced mode is activated, the
Antivirus and antispyware submenu will display. Tools – Provides access to Log files, Quarantine and Scheduler. This option only displays in Advanced mode. Help – Provides program information, access to help
files, Internet Knowledgebase and ESET website.
The ESET Cybersecurity user interface allows users to toggle between Standard and Advanced mode. Standard mode provides access to features required for common operations. It does not display any advanced options. To toggle between modes, click the plus icon next to Activate advanced mode/Activate standard
mode in the bottom left corner of the main program
window.
Advanced mode:
3.1.1 Checking operation of the system
To view the Protection status, click the top option from the main menu. A status summary about the operation of ESET Cybersecurity will display in the primary window as well as a submenu with Statistics. Select it to view more detailed information and statistics about computer scans that have been performed on your system. The Statistics window is available only in advanced mode.
The Standard mode provides access to features required for common operations. It does not display any advanced options.
Toggling to Advanced mode adds the Tools option to the main menu. The Tools option allows you to access the submenus for Log files, Quarantine and Scheduler.
NOTE: All remaining instructions in this guide take place in Advanced mode.
3.1.2 What to do if the program doesn't work properly
If the modules enabled are working properly, they are assigned a green check icon. If not, a red exclamation point or orange notification icon is displayed, and additional information about the module is shown in the upper part of the window. A suggested solution for fixing the module is also displayed. To change the status of individual modules, click Setup in the main menu and click on the desired module.
7
Loading...
+ 15 hidden pages