ESET SMART SECURITY 6User Guide(intended for product version 6.0 and higher) Microsoft Windows 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2
102.2.1 Typical installationTypical installation mode provides configuration options appropriate for most users. These settings provide excellentsec
100introduced into the compilation so you do not need to look for it later.5.7.4.4 Internet protocolThis section allows you to configure basic netwo
1015.7.5.1 Using ESET SysRescueSuppose that computers in the network have been infected by a virus which modifies executable (.exe) files. ESETSecu
102/no-unsafedo not scan for potentially unsafe applications (default)/unwantedscan for potentially unwanted applications/no-unwanteddo not scan for p
1036. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 Viru
1046.1.4 RootkitsRootkits are malicious programs that grant Internet attackers unlimited access to a system, while concealing theirpresence. Rootkit
1056.1.8 Potentially unsafe applicationsThere are many legitimate programs whose function is to simplify the administration of networked computers.H
1066.2.4 Port scanningPort scanning is used to determine which computer ports are open on a network host. A port scanner is softwaredesigned to find
1076.3 EmailEmail, or electronic mail, is a modern form of communication with many advantages. It is flexible, fast and direct, andplayed a crucial
1086.3.4 Recognizing spam scamsGenerally, there are a few indicators which can help you identify spam (unsolicited emails) in your mailbox. If a mes
1096.3.4.4 Server-side controlServer-side control is a technique for identifying mass spam based on the number of received messages and thereactions
11The next installation window offers the option to set a password to protect your program settings. Select Protectconfiguration settings with a passw
122.5 Upgrading to a more recent versionNew versions of ESET Smart Security are issued to implement improvements or fix issues that cannot be resolv
133. Beginner's guideThis chapter provides an initial overview of ESET Smart Security and its basic settings.3.1 Introducing user interface des
14change the status of individual modules, click Setup and select the desired module.The red icon signals critical problems – maximum protection of yo
15will respond quickly to your questions and help find a resolution.3.2 UpdatesUpdating the virus signature database and updating program components
16The Advanced setup window (click Setup in the main menu and then click Enter advanced setup..., or press F5 on yourkeyboard) contains additional upd
17communication enabled and have remote desktop sharing available.3.4 Anti-TheftTo protect your computer in case of a loss or theft, choose from the
184. Work with ESET Smart SecurityThe ESET Smart Security setup options allow you to adjust the protection levels of your computer and network.The Set
19Web and Email protection setup allows you to enable or disable the following components:Web access protection – If enabled, all traffic through HTTP
ESET SMART SECURITYCopyright 2013 by ESET, spol. s r. o.ESET Smart Security was developed by ESET, spol. s r. o.For more information visit www.eset.c
20confirm.Computer scan setup... – Click to adjust the parameters of the on-demand scanner (manually executed scan).4.1.1 Antivirus and antispywareA
21By default, Real-time file system protection launches at system startup and provides uninterrupted scanning. In specialcases (e.g., if there is a co
22requirements. While the Advanced heuristics on executing files from removable media option is enabled, if you wishto exclude some removable media (U
234.1.1.1.4 Checking real-time protectionTo verify that real-time protection is working and detecting viruses, use a test file from eicar.com. This
24malware and other potential threats.This type of scan can be also initiated by clicking Custom scan, and then selecting Removable media from the Sca
25currently logged user doesn't have enough privileges to access the appropriate files to be scanned. Note that thisbutton is not available if cu
264.1.1.2.3 Scan profilesYour preferred scan parameters can be saved for future scanning. We recommend that you create a different profile(with vari
274.1.1.4 Idle-state scanningIdle scanner can be configured and enabled in Advanced setup under Computer > Antivirus and antispyware > Idle-st
28Path – Path to excluded files and folders.Threat – If there is a name of a threat next to an excluded file, it means that the file is only excluded
294.1.1.6.2 OptionsUse the Options section to select the methods used when scanning the system for infiltrations. The following optionsare available
Contents...5ESET Smart Security 61...
304.1.1.6.5 LimitsThe Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned:Maximum object si
31Each uses the standard cleaning level and will attempt to clean the file and move it to Quarantine or terminate theconnection. A notification window
324.1.1.8 Document protectionThe Document protection feature scans Microsoft Office documents before they are opened, as well as filesdownloaded aut
334.1.2.1 Filtering rulesThe Filter device access window displays existing extended rules for removable media.Category – Removable media type (CD/DV
34Note: Filtering parameters in all text fields are handled case-sensitive and no wildcards (*, ?) are supported. They haveto be written exactly as de
35 If you select Ask as the default action, ESET Smart Security will display a dialog window every time an operation is run.You can choose to Deny or
364.2 NetworkThe Personal firewall controls all network traffic to and from the system. This is accomplished by allowing or denyingindividual networ
374.2.1 Filtering modesFive filtering modes are available for the ESET Smart Security Personal firewall. Filtering modes can be found in Advanced se
38deny a specific service associated with a standard port number (HTTP – 80, POP3 – 110, etc.) Add remote IP address / Trusted zone – A remote IP addr
39your computer. Many infiltrations try to obtain and send private data, or download other malicious applications to hostworkstations. The Personal fi
...79Proxy server setup4.6.10...
404.2.3.1.1 Detailed view of all rulesTo see the following information in the Zone and rule setup window, click Toggle detailed view of all rules.Na
414.2.3.2 Editing rulesModification is required each time any of the monitored parameters are changed. In this case, the rule cannot fulfill thecond
424.2.4.1.1 Zone authentication - Client configurationIn the Zone and rule setup window, click the Zones tab and create a new zone using the name of
43To test your settings, click the Test button. If authentication is successful, a Server authentication successful notificationwill appear. If authen
444.2.4.1.2 Zone authentication - Server configurationThe authentication process can be executed by any computer/server connected to the network tha
454.2.5 Establishing connection - detectionThe Personal firewall detects each newly-created network connection. The active firewall mode determines
464.2.7 System integrationThe ESET Smart Security Personal firewall can operate at several levels:All features active – The Personal firewall is ful
47It is possible to disable the web/email/antispam protection module temporarily by clicking Enabled.Configure ... – Opens web/email/antispam protecti
484.3.1.1.1 Email client protection configurationThe Email client protection module supports the following email clients: Microsoft Outlook, Outlook
494.3.1.3 POP3, POP3S filterThe POP3 protocol is the most widespread protocol used to receive email communication in an email client application.ESE
51. ESET Smart Security 6ESET Smart Security 6 represents a new approach to truly integrated computer security. The most recent version of theThreatSe
50methods) and the resulting index value determines whether a message is spam or not.Antispam protection in ESET Smart Security allows you to set diff
514.3.2 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the main mediumfo
524.3.2.1.1 Active mode for web browsersESET Smart Security also contains the Active mode submenu, which defines the checking mode for web browsers.
53Remove/Remove all – Click Remove to delete the selected address from the list. To delete all addresses, selectRemove all.Export... – Save addresses
544.3.3.2 Excluded applicationsTo exclude communication of specific network-aware applications from content filtering, select them in the list. HTTP
554.3.3.3 Excluded IP addressesThe entries in the list will be excluded from the protocol content filtering. HTTP/POP3/IMAP communication from/tothe
564.3.3.4 SSL protocol checkingESET Smart Security enables you to check protocols encapsulated in SSL protocol. You can use various scanning modesfo
574.3.3.4.1.2 Excluded certificatesThe Excluded certificates section contains certificates that are considered safe. The content of encryptedcommuni
58NOTE: Potential phishing websites that have been whitelisted will expire after several hours by default. To allow awebsite permanently, you can use
59If you click Parental control in the Setup pane from the main product window of ESET Smart Security, you will see thatthe main window is divided int
6Rollback previous virus signature databaseIf you suspect that a virus signature database or product module update may be unstable or corrupt, you can
601. Open User Accounts by clicking the Start button (located at the bottom left side of your desktop), clicking ControlPanel and then clicking User A
614.4.1 Web page content filteringIf the check box next to a category is selected, it is allowed. Deselect the check box next to a specific category
624.4.2 Blocked and allowed web pagesEnter a URL address into the blank field under the list, select Allow or Block and click Add to add it to the l
63Last successful update – The date of the last update. If you do not see a recent date, your virus signature databasemay not be current.Virus signatu
64Important: Under normal circumstances, when updates are downloaded properly the message Update is notnecessary – Virus signature database is up to d
654.5.1 Update setupUpdate setup options are available from the Advanced setup tree (F5 key) by clicking Update > Update. This sectionspecifies u
66Pre-release updates (the Pre-release update option) are updates which have gone through thorough internal testingand will be generally available soo
67will display a notification.The Regularly check for latest product version option will enable the Regular checking for latest product versionschedul
684.5.1.3 Update rollbackIf you suspect that a new update of the virus database and/or program modules may be unstable or corrupt, you canroll back
694.5.2 How to create update tasksUpdates can be triggered manually by clicking Update virus signature database in the primary window displayed afte
7applications to appear and release security updates to eliminate potential threats on a regular basis. It is important todownload these security upda
70Submit file for analysis – Allows you to submit a suspicious file for analysis to the ESET Virus Lab. The dialog windowdisplayed after clicking this
714.6.1.1 Log maintenanceThe Logging configuration of ESET Smart Security is accessible from the main program window. Click Setup > Enteradvanced
724. Depending on the timing option you choose in the previous step, one of the following dialog windows will bedisplayed:Once – The task will be perf
734.6.4 Watch activityTo see the current File system activity in graph form, click Tools > Watch activity. At the bottom of the graph is atimelin
74The following actions are available:Compare – Compares two existing logs.Create... – Creates a new log. Please wait until the ESET SysInspector log
75you if further information is required for analysis. Please note that you will not receive a response from ESET unlessmore information is needed.Sel
76By clicking a given application at the bottom, the following information will appear at the bottom of the window:File – Location of an application o
77Open in a new window – Displays information in a separate window.The Configure connection view... option in the Network connections screen enters th
784.6.9 QuarantineThe main function of the quarantine is to safely store infected files. Files should be quarantined if they cannot becleaned, if it
794.6.10 Proxy server setupIn large LAN networks, the connection of your computer to the Internet can be mediated by a proxy server. If this is thec
82. InstallationThere are several methods for installing ESET Smart Security on your computer. Installation methods may varydepending on country and m
80receive notifications via the Windows® messaging service.Interval between sending messages (sec.) – To change the length of the interval between not
814.6.13 System updatesThe Windows update feature is an important component of protecting users from malicious software. For this reason,it is vital
824.7.2 Alerts and notificationsThe Alerts and notifications section under User interface allows you to configure how threat alerts and systemnotifi
834.7.5 Program menuSome of the most important setup options and features are available in the main program menu.Frequently used – Displays the most
844.7.6 Context menuThe context menu is displayed after right-clicking an object. The menu lists all options available to perform on theobject.It is
855. Advanced user5.1 Profile managerProfile manager is used in two places within ESET Smart Security – in the Computer scan section and in the Upda
865.3 DiagnosticsDiagnostics provides application crash dumps of ESET's processes (e.g. ekrn). If an application crashes, a dump will begenerat
875.6 ESET SysInspector5.6.1 Introduction to ESET SysInspectorESET SysInspector is an application that thoroughly inspects your computer and displ
885.6.2 User Interface and application usageFor clarity the main program window is divided into four major sections – Program Controls located on th
89with. In "Basic" mode, you have access to information used to find solutions for common problems in your system. Inthe "Medium"
92.2 Offline installationOnce you launch the offline installation (.msi) package, the installation wizard will guide you through the setup process.F
90its hash.Important Registry EntriesContains a list of selected registry entries which are often related to various problems with your system like th
91ViewCtrl+5view by vendor, all vendorsCtrl+6view by vendor, only MicrosoftCtrl+7view by vendor, all other vendorsCtrl+3displays full detailCtrl+2disp
92marked by a were present only in the opened log and are missing in the active one. Description of all symbols that can be displayed next to items:
935.6.4 Service ScriptService script is a tool that provides help to customers that use ESET SysInspector by easily removing unwanted objectsfrom th
94Example:02) Loaded modules:- c:\windows\system32\svchost.exe- c:\windows\system32\kernel32.dll+ c:\windows\system32\khbekhb.dll- c:\windows\system32
95Example:06) Important registry entries:* Category: Standard Autostart (3 items) HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run- HotKeysCmds = C:
965.6.4.3 Executing Service scriptsMark all desired items, then save and close the script. Run the edited script directly from the ESET SysInspector
97What is Anti-Stealth technology ?Anti-Stealth technology provides effective rootkit detection.If the system is attacked by malicious code that behav
985.7.1 Minimum requirementsESET SysRescue works in the Microsoft Windows Preinstallation Environment (Windows PE) version 2.x, which is basedon Win
995.7.4 SettingsBefore initiating ESET SysRescue creation, the install wizard displays compilation parameters. These can be modified byclicking the
Kommentare zu diesen Handbüchern