ESET SMART SECURITY Betriebsanweisung Seite 20

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 46
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 19
20
Warning: In the Default mode, the entire archive file is deleted only
if all files in the archive are infected. If the archive also contains
legitimate files, it will not be deleted. If an infected archive file is
detected in Strict cleaning mode, the entire archive will be deleted,
even if clean files are present.
4.1.6.4 Extensions
An extension is part of the file name delimited by a period. The
extension defines the type and content of the file. This section of the
ThreatSense parameter setup lets you define the types of files to scan.
By default, all files are scanned regardless of their extension. Any
extension can be added to the list of files excluded from scanning.
If the Scan all files option is deselected, the list changes to show
all currently scanned file extensions. Using the Add and Remove
buttons, you can enable or prohibit scanning of desired extensions.
To enable scanning of files with no extension, select the Scan
extensionless files option.
Excluding files from scanning is sometimes necessary if scanning
certain file types prevents the program which is using the extensions
from running properly. For example, it may be advisable to exclude
the .edb, .eml and .tmp extensions when using Microsoft Exchange
servers.
4.1.6.5 Limits
The Limits section allows you to specify the maximum size of objects
and levels of nested archives to be scanned:
Maximum object size: Defines the maximum size of objects to
be scanned. The given antivirus module will then scan only objects
smaller than the size specified. We do not recommend changing the
default value, as there is usually no reason to modify it. This option
should only be changed by advanced users who have specific reasons
for excluding larger objects from scanning.
Maximum scan time for object (sec.): Defines the maximum time
value for scanning an object. If a user‑defined value has been entered
here, the antivirus module will stop scanning an object when that
time has elapsed, regardless of whether the scan has finished.
Archive nesting level: Specifies the maximum depth of archive
scanning. We do not recommend changing the default value of 10;
under normal circumstances, there should be no reason to modify it.
If scanning is prematurely terminated due to the number of nested
archives, the archive will remain unchecked.
Maximum size of file in archive: This option allows you to specify
the maximum file size for files contained in archives (when they
are extracted) that are to be scanned. If scanning of an archive is
prematurely terminated for that reason, the archive will remain
unchecked.
4.1.6.6 Other
Scan alternate data streams (ADS) Alternate data streams (ADS)
used by the NTFS file system are file and folder associations which are
invisible from ordinary scanning techniques. Many infiltrations try to
avoid detection by disguising themselves as alternative data streams.
Run background scans with low priority Each scanning sequence
consumes a certain amount of system resources. If you work with
programs that place a high load on system resources, you can
activate low priority background scanning and save resources for your
applications.
Log all objects If this option is selected, the log file will show all the
scanned files, even those not infected.
Enable Smart optimization Select this option so that files which
have already been scanned are not scanned repeatedly (unless they
have been modified). Files are scanned again immediately after each
virus signature database update.
Preserve last access timestamp Select this option to keep the
original access time of scanned files instead of updating it (e.g., for use
with data backup systems).
Scroll log This option allows you to enable/disable log scrolling. If
selected, information scrolls upwards within the display window.
Display notification about scan completion in a separate window
Opens a standalone window containing information about scan
results.
4.1.7 An infiltration is detected
Infiltrations can reach the system from various entry points;
webpages, shared folders, via email or from removable computer
devices (USB, external disks, CDs, DVDs, diskettes, etc.).
If your computer is showing signs of malware infection, e.g., it is
slower, often freezes, etc., we recommend that you do the following:
Open ESET Smart Security and click Computer scan
Click Smart scan (for more information, see section 4.1.4.1.1,
“Smart scan”)
After the scan has finished, review the log for the number of
scanned, infected and cleaned files.
If you only wish to scan a certain part of your disk, click Custom scan
and select targets to be scanned for viruses.
As a general example of how infiltrations are handled in ESET Smart
Security, suppose that an infiltration is detected by the real‑time file
system monitor, which uses the Default cleaning level. It will attempt
to clean or delete the file. If there is no predefined action to take for
the real‑time protection module, you will be asked to select an option
in an alert window. Usually, the options Clean, Delete and Leave are
available. Selecting Leave is not recommended, since the infected
file(s) would be left untouched. The exception to this is when you are
sure that the file is harmless and has been detected by mistake.
Cleaning and deleting Apply cleaning if a file has been attacked
by a virus which has attached malicious code to the file. If this is the
case, first attempt to clean the infected file in order to restore it to its
original state. If the file consists exclusively of malicious code, it will be
deleted.
Seitenansicht 19
1 2 ... 15 16 17 18 19 20 21 22 23 24 25 ... 45 46

Kommentare zu diesen Handbüchern

Keine Kommentare