
21
If an infected file is “locked“ or in use by a system process, it will usually
only be deleted after it is released (normally after a system restart).
Deleting files in archives – In the Default cleaning mode, the entire
archive will be deleted only if it contains infected files and no clean
files. In other words, archives are not deleted if they also contain
harmless clean files. However, use caution when performing a Strict
cleaning scan – with Strict cleaning the archive will be deleted if it
contains at least one infected file, regardless of the status of other files
in the archive.
4.2 Personal firewall
The Personal firewall controls all network trac to and from the
system. This is accomplished by allowing or denying individual
network connections based on specified filtering rules. It provides
protection against attacks from remote computers and enables
blocking of some services. It also provides antivirus protection
for HTTP and POP3 protocols. This functionality represents a very
important element of computer security.
4.2.1 Filtering modes
Five filtering modes are available for the ESET Smart Security Personal
firewall. The behavior of the firewall changes based on the selected
mode. Filtering modes also influence the level of user interaction
required.
Filtering can be performed in one of five modes:
Automatic mode – The default mode. It is suitable for users who
prefer easy and convenient use of the firewall with no need to define
rules. Automatic mode allows all outbound trac for the given system
and blocks all new connections initiated from the network side.
Automatic mode with exceptions (user‑defined rules) – In addition
to automatic mode it enables you to add custom rules.
Interactive mode – Allows you to build a tailor‑made configuration
for your Personal firewall. When a communication is detected and no
rule exists which applies to that communication, a dialog window
reporting an unknown connection will be displayed. The dialog
window gives the option of allowing or denying the communication,
and the decision to allow or deny can be remembered as a new rule for
the Personal firewall. If you choose to create a new rule at this time,
all future connections of this type will be allowed or blocked according
to the rule.
Policy‑based mode – Blocks all connections which are not defined by
a specific rule that allows them. This mode allows advanced users to
define rules that permit only desired and secure connections. All other
unspecified connections will be blocked by the Personal firewall.
Learning mode – Automatically creates and saves rules; this mode
is suitable for initial configuration of the Personal firewall. No user
interaction is required, because ESET Smart Security saves rules
according to predefined parameters. Learning mode is not secure, and
should only be used until all rules for required communications have
been created.
4.2.2 Profiles
Profiles are a tool to control the behavior of the ESET Smart Security
Personal firewall. When creating or editing a Personal firewall rule,
you can assign it to a specific profile or have it apply to every profile.
When you select a profile, only the global rules (with no profile
specified) and the rules that have been assigned to that profile are
applied. You can create multiple profiles with dierent rules assigned
to easily alter the Personal firewall behavior.
4.2.2.1 Profile management
Click the Profiles... button (see figure in section 4.2.1, “Filtering
modes”) to open the Firewall profiles window, where you can Add...,
Edit and Remove profiles. Please note that to Edit or Remove a
profile, it must not be selected in the Selected profile drop‑down
menu. When adding or editing a profile, you can also define the
conditions that trigger it. The following possibilities are available:
Do not switch automatically ‑ The automatic trigger is turned o
(profile must be activated manually).
When the automatic profile becomes invalid and no other profile
is activated automatically (default profile) – When the automatic
profile becomes invalid (if the computer is connected to an untrusted
network – see section 4.2.6.1, “Network authentication”) and another
profile is not activated in its place (computer is not connected to
another trusted network), the Personal firewall will switch to this
profile. Only one profile can use this trigger.
If this zone is authenticated – This profile will be triggered when
the specified zone is authenticated (see section 4.2.6.1, “Network
authentication”).
Kommentare zu diesen Handbüchern