
37
General options:
– help show help and quit
– version show version information and quit
– base‑dir = FOLDER load modules from FOLDER
– quar‑dir = FOLDER quarantine FOLDER
– aind show activity indicator
Targets:
– files scan files (default)
– no‑files do not scan files
– boots scan boot sectors (default)
– no‑boots do not scan boot sectors
– arch scan archives (default)
– no‑arch do not scan archives
– max‑archive‑level = LEVEL maximum archive nesting LEVEL
– scan‑timeout = LIMIT scan archives for LIMIT seconds at
maximum. If the scanning time reaches this limit, the scanning of
the archive is stopped and the scan will continue with the
next file
– max‑arch‑size=SIZE scan only the first SIZE bytes in
archives (default 0 = unlimited)
– mail scan email files
– no‑mail do not scan email files
– sfx scan self‑extracting archives
– no‑sfx do not scan self‑extracting archives
– rtp scan runtime packers
– no‑rtp do not scan runtime packers
– exclude = FOLDER exclude FOLDER from scanning
– subdir scan subfolders (default)
– no‑subdir do not scan subfolders
– max‑subdir‑level = LEVEL maximum subfolder nesting LEVEL
(default 0 = unlimited)
– symlink follow symbolic links (default)
– no‑symlink skip symbolic links
– ext‑remove = EXTENSIONS
– ext‑exclude = EXTENSIONS exclude EXTENSIONS delimited by
colon from scanning
Methods:
– adware scan for Adware/Spyware/Riskware
– no‑adware do not scan for Adware/Spyware/
Riskware
– unsafe scan for potentially unsafe
applications
– no‑unsafe do not scan for potentially unsafe
applications
– unwanted scan for potentially unwanted
applications
– no‑unwanted do not scan for potentially unwanted
applications
– pattern use signatures
– no‑pattern do not use signatures
– heur enable heuristics
– no‑heur disable heuristics
– adv‑heur enable advanced heuristics
– no‑adv‑heur disable advanced heuristics
Cleaning:
– action = ACTION perform ACTION on infected objects.
Available actions: none, clean, prompt
– quarantine copy infected files to Quarantine
(supplements ACTION)
– no‑quarantine do not copy infected files to
Quarantine
Logs:
– log‑file=FILE log output to FILE
– log‑rewrite overwrite output file (default –
append)
– log‑all log also clean files
– no‑log‑all do not log clean files (default)
Possible exit codes of the scan:
0 – no threat found
1 – threat found but not cleaned
10 – some infected files remained
101 – archive error
102 – access error
103 – internal error
NOTE: Exit codes greater than 100 mean that the file was not scanned
and thus can be infected.
5.4 ESET SysInspector
ESET SysInspector is an application that thoroughly inspects your
computer and displays system data in a comprehensive way.
Information about installed drivers and applications, network
connections or important registry entries can help you investigate
suspicious system behavior and determine whether it is due to
software/hardware incompatibility or malware infection.
You can access SysInspector two ways: From the integrated version
in ESET Smart Security or by downloading the standalone version
(SysInspector.exe) for free from ESET’s website. To open SysInspector,
activate Advanced mode by pressing CTRL + M and clicking Tools
> SysInspector. Both versions are identical in function and have
the same program controls. The only dierence is how outputs are
managed. The downloaded and integrated versions each allow you
to export system snapshots to an .xml file and save them to disk.
However,the integrated version also allows you to store your system
snapshots directly in Tools > SysInspector (for more information see
section 5.4.1.4, ”SysInspector as part of ESET Smart Security 4”).
Please allow some time while ESET SysInspector scans your computer.
It may take from 10 seconds up to a few minutes depending on
your hardware configuration, operating system and the number of
applications installed on your computer.
5.4.1 User Interface and application usage
The main window includes four sections – Program Controls on the
top, the Navigation window on the left, and the Description window
on the right which is directly above the Details window.
5.4.1.1 Program Controls
This section contains descriptions of all program controls available in
ESET SysInspector
File – Click here to store your current report status for later
investigation or to open a previously stored report.If you want to
publish your report we recommend you choose Generate > Suitable
for sending. This report format omits sensitive information.
NOTE: You can open previously stored ESET SysInspector reports by
dragging‑and‑dropping them into the main window.
Tree – Allows you to expand or close all nodes.
Kommentare zu diesen Handbüchern