Contents
.................................................41. ESET Cybersecurity
.................................................................4System requirements1.1
.................................................52. Installation
.................................................................5Typical installation2.1
.................................................................5Custom installation2.2
.................................................................6Product activation2.3
.................................................................6On-demand computer scan2.4
.................................................73. Beginners guide
.................................................................7Introducing user interface design - modes3.1
.............................................................................7Checking operation of the system3.1.1
.............................................................................7What to do if the program doesn't work properly3.1.2
.................................................94. Work with ESET Cybersecurity
.................................................................9Antivirus and antispyware protection4.1
.............................................................................9Real-time file system protection4.1.1
.............................................................................9Real-time Protection setup4.1.1.1
...........................................................................9Scan on (Event triggered scanning)4.1.1.1.1
...........................................................................9Advanced scan options4.1.1.1.2
...........................................................................9Exclusions from scanning4.1.1.1.3
.............................................................................10
When to modify Real-time protection
configuration
4.1.1.2
.............................................................................10Checking Real-time protection4.1.1.3
.............................................................................10
What to do if Real-time protection does not
work
4.1.1.4
.............................................................................10On-demand computer scan4.1.2
.............................................................................11Type of scan4.1.2.1
...........................................................................11Smart scan4.1.2.1.1
...........................................................................11Custom scan4.1.2.1.2
.............................................................................11Scan targets4.1.2.2
.............................................................................11Scan profiles4.1.2.3
.............................................................................12ThreatSense engine parameters setup4.1.3
.............................................................................12Objects4.1.3.1
.............................................................................12Options4.1.3.2
.............................................................................13Cleaning4.1.3.3
.............................................................................13Extensions4.1.3.4
.............................................................................13Limits4.1.3.5
.............................................................................13Others4.1.3.6
.............................................................................14An infiltration is detected4.1.4
.................................................................14Updating the program4.2
.............................................................................14Upgrading to a new build4.2.1
.............................................................................15Update setup4.2.2
.............................................................................15How to create update tasks4.2.3
.................................................................16Scheduler4.3
.............................................................................16Purpose of scheduling tasks4.3.1
.............................................................................16Creating new tasks4.3.2
.................................................................17Quarantine4.4
.............................................................................17Quarantining files4.4.1
.............................................................................17Restoring from Quarantine4.4.2
.............................................................................17Submitting file from Quarantine4.4.3
.................................................................17Log files4.5
.............................................................................17Log maintenance4.5.1
.............................................................................18Log filtering4.5.2
.................................................................18User interface4.6
.............................................................................18Alerts and notifications4.6.1
.............................................................................18Alerts and notifications advanced setup4.6.1.1
.............................................................................18Privileges4.6.2
.............................................................................19Context menu4.6.3
.................................................................19ThreatSense.Net4.7
.............................................................................19Suspicious files4.7.1
.................................................215. Advanced user
.................................................................21Import and export settings5.1
.............................................................................21Import settings5.1.1
.............................................................................21Export settings5.1.2
.................................................................21Proxy server setup5.2
.................................................................21Removable media blocking5.3
.................................................226. Glossary
.................................................................22Types of infiltrations6.1
.............................................................................22Viruses6.1.1
.............................................................................22Worms6.1.2
.............................................................................22Trojan horses6.1.3
.............................................................................23Adware6.1.4
.............................................................................23Spyware6.1.5
.............................................................................23Potentially unsafe applications6.1.6
.............................................................................23Potentially unwanted applications6.1.7