ESET SMART SECURITY Betriebsanweisung Seite 37

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 46
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 36
37
General options:
help show help and quit
version show version information and quit
base‑dir = FOLDER load modules from FOLDER
quar‑dir = FOLDER quarantine FOLDER
aind show activity indicator
Targets:
files scan files (default)
no‑files do not scan files
boots scan boot sectors (default)
no‑boots do not scan boot sectors
arch scan archives (default)
no‑arch do not scan archives
max‑archive‑level = LEVEL maximum archive nesting LEVEL
scan‑timeout = LIMIT scan archives for LIMIT seconds at
maximum. If the scanning time reaches this limit, the scanning of
the archive is stopped and the scan will continue with the
next file
max‑arch‑size=SIZE scan only the first SIZE bytes in
archives (default 0 = unlimited)
mail scan email files
no‑mail do not scan email files
sfx scan self‑extracting archives
no‑sfx do not scan self‑extracting archives
rtp scan runtime packers
no‑rtp do not scan runtime packers
exclude = FOLDER exclude FOLDER from scanning
subdir scan subfolders (default)
no‑subdir do not scan subfolders
max‑subdir‑level = LEVEL maximum subfolder nesting LEVEL
(default 0 = unlimited)
symlink follow symbolic links (default)
no‑symlink skip symbolic links
ext‑remove = EXTENSIONS
ext‑exclude = EXTENSIONS exclude EXTENSIONS delimited by
colon from scanning
Methods:
adware scan for Adware/Spyware/Riskware
no‑adware do not scan for Adware/Spyware/
Riskware
unsafe scan for potentially unsafe
applications
no‑unsafe do not scan for potentially unsafe
applications
unwanted scan for potentially unwanted
applications
no‑unwanted do not scan for potentially unwanted
applications
pattern use signatures
no‑pattern do not use signatures
heur enable heuristics
no‑heur disable heuristics
adv‑heur enable advanced heuristics
no‑adv‑heur disable advanced heuristics
Cleaning:
action = ACTION perform ACTION on infected objects.
Available actions: none, clean, prompt
quarantine copy infected files to Quarantine
(supplements ACTION)
no‑quarantine do not copy infected files to
Quarantine
Logs:
log‑file=FILE log output to FILE
log‑rewrite overwrite output file (default –
append)
log‑all log also clean files
no‑log‑all do not log clean files (default)
Possible exit codes of the scan:
0 – no threat found
1 – threat found but not cleaned
10 – some infected files remained
101 – archive error
102 – access error
103 – internal error
NOTE: Exit codes greater than 100 mean that the file was not scanned
and thus can be infected.
5.4 ESET SysInspector
ESET SysInspector is an application that thoroughly inspects your
computer and displays system data in a comprehensive way.
Information about installed drivers and applications, network
connections or important registry entries can help you investigate
suspicious system behavior and determine whether it is due to
software/hardware incompatibility or malware infection.
You can access SysInspector two ways: From the integrated version
in ESET Smart Security or by downloading the standalone version
(SysInspector.exe) for free from ESET’s website. To open SysInspector,
activate Advanced mode by pressing CTRL + M and clicking Tools
> SysInspector. Both versions are identical in function and have
the same program controls. The only dierence is how outputs are
managed. The downloaded and integrated versions each allow you
to export system snapshots to an .xml file and save them to disk.
However,the integrated version also allows you to store your system
snapshots directly in Tools > SysInspector (for more information see
section 5.4.1.4, ”SysInspector as part of ESET Smart Security 4”).
Please allow some time while ESET SysInspector scans your computer.
It may take from 10 seconds up to a few minutes depending on
your hardware configuration, operating system and the number of
applications installed on your computer.
5.4.1 User Interface and application usage
The main window includes four sections – Program Controls on the
top, the Navigation window on the left, and the Description window
on the right which is directly above the Details window.
5.4.1.1 Program Controls
This section contains descriptions of all program controls available in
ESET SysInspector
File Click here to store your current report status for later
investigation or to open a previously stored report.If you want to
publish your report we recommend you choose Generate > Suitable
for sending. This report format omits sensitive information.
NOTE: You can open previously stored ESET SysInspector reports by
dragging‑and‑dropping them into the main window.
Tree Allows you to expand or close all nodes.
Seitenansicht 36
1 2 ... 32 33 34 35 36 37 38 39 40 41 42 ... 45 46

Kommentare zu diesen Handbüchern

Keine Kommentare