ESET Smart Security 7, ITA, 2U, 1Y User's Guide

Browse online or download User's Guide for Antivirus security software ESET Smart Security 7, ITA, 2U, 1Y. Eset Smart Security 7, ITA, 2U, 1Y User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 119
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
ESET SMART SECURITY 7
User Guide
(intended for product version 7.0 and higher)
Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011
Click here to download the most recent version of this document
Page view 0
1 2 3 4 5 6 ... 118 119

Summary of Contents

Page 1 - ESET SMART SECURITY 7

ESET SMART SECURITY 7User Guide(intended for product version 7.0 and higher)Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Ser

Page 2 - ESET SMART SECURITY

102.2.1 Advanced settingsAfter selecting Advanced settings, you will be prompted to select a location for the installation. By default, theprogram i

Page 3 - Contents

100Any comparative log can be saved to a file and opened at a later time.ExampleGenerate and save a log, recording original information about the syst

Page 4

1015.6.4 Service ScriptService script is a tool that provides help to customers that use ESET SysInspector by easily removing unwantedobjects from t

Page 5 - 1. ESET Smart Security

102Example:02) Loaded modules:- c:\windows\system32\svchost.exe- c:\windows\system32\kernel32.dll+ c:\windows\system32\khbekhb.dll- c:\windows\system3

Page 6 - 1.2 System requirements

103Example:06) Important registry entries:* Category: Standard Autostart (3 items) HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run- HotKeysCmds = C

Page 7 - 1.3 Prevention

104Example:09) Critical files:* File: win.ini- [fonts]- [extensions]- [files]- MAPI=1[...]* File: system.ini- [386Enh]- woafont=dosapp.fon- EGA80WOA.F

Page 8 - 2. Installation

105Is a specification available for the log file format? What about an SDK ?At the current time, neither a specification for the log file or an SDK ar

Page 9 - 2.2 Offline installation

1065.6.6 ESET SysInspector as part of ESET Smart SecurityTo open the ESET SysInspector section in ESET Smart Security, click Tools > ESET SysInsp

Page 10 - 2.3 Product activation

107Windows.Windows AIK supports:Windows 7Windows VistaWindows XP Service Pack 2 with KB926044Windows XP Service Pack 35.7.2 How to create rescue CDT

Page 11

1085.7.4.1 FoldersTemporary folder is a working directory for files required during ESET SysRescue compilation.ISO folder is a folder, where the res

Page 12

1095.7.4.4 Internet protocolThis section allows you to configure basic network information and set up predefined connections after runningESET SysRe

Page 13 - 3. Beginner's guide

11If you would like to evaluate ESET Smart Security before making a purchase, select Activate Trial License. Fill in youremail address and country to

Page 14

1105.7.5.1 Using ESET SysRescueSuppose that computers in the network have been infected by a virus which modifies executable (.exe) files. ESETSecu

Page 15 - 3.2 Updates

111/no-mailboxdo not scan mailboxes/sfxscan self-extracting archives (default)/no-sfxdo not scan self-extracting archives/rtpscan runtime packers (def

Page 16 - 3.3 Trusted zone setup

1126. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 Viru

Page 17 - 3.5 Parental control tools

113If a file on your computer is detected as a Trojan, it is advisable to delete it, since it most likely contains nothing butmalicious code.6.1.4 R

Page 18

1146.1.7 PackersPacker is a runtime self-extracting executable that rolls up several kinds of malware into a single package.The most common packers

Page 19 - 4.1 Computer

1156.2.3 Worm attacksA computer worm is a program containing malicious code that attacks host computers and spreads via a network.Network worms expl

Page 20

116To avoid attacks, we recommend that you use authentication passwords or keys.6.2.7 ICMP attacksThe ICMP (Internet Control Message Protocol) is a

Page 21

117clean and also flagged to be excluded from future scans. If it is on the blacklist, appropriate actions are taken basedon the nature of the threat.

Page 22 - 4.1.1.1.2 Cleaning levels

1186.4.3 PhishingThe term phishing defines a criminal activity which uses techniques of social engineering (manipulating users inorder to obtain con

Page 23 - 4.1.1.2 Computer scan

1196.4.4.2 WhitelistIn general, a whitelist is a list of items or persons who are accepted, or have been granted permission. The term“email whitelis

Page 24

122.6 First scan after installationAfter installing ESET Smart Security, a computer scan will start 20 minutes after installation or computer restar

Page 25 - 4.1.1.2.2 Scan progress

133. Beginner's guideThis chapter provides an initial overview of ESET Smart Security and its basic settings.3.1 The main program windowThe mai

Page 26 - 4.1.1.3 Startup scan

14What to do if the program doesn't work properly?If the modules enabled are working properly, the Protection status icon will be green. A red ex

Page 27 - 4.1.1.5 Exclusions

15Phantom account does not exist initially, but is a security feature that is triggered automatically when youmark a device as missing. You may need t

Page 28

16The Advanced setup window (click Setup in the main menu and then click Enter advanced setup..., or press F5 onyour keyboard) contains additional upd

Page 29 - 4.1.1.6.2 Options

17NOTE: By default, workstations from a Trusted zone are granted access to shared files and printers, have incomingRPC communication enabled and have

Page 30 - 4.1.1.6.5 Limits

184. Work with ESET Smart SecurityThe ESET Smart Security setup options allow you to adjust the protection levels of your computer and network.The Set

Page 31 - 4.1.1.6.6 Other

19Web and Email protection setup allows you to enable or disable the following components:Web access protection – If enabled, all traffic through HTTP

Page 32

ESET SMART SECURITYCopyright 2014 by ESET, spol. s r. o.ESET Smart Security was developed by ESET, spol. s r. o.For more information visit www.eset.c

Page 33 - 4.1.3 Device control

204.1.1 Antivirus and antispywareAntivirus and antispyware protection guards against malicious system attacks by controlling file, email and Interne

Page 34

21Media to scanBy default, all types of media are scanned for potential threats:Local drives – Controls all system hard drives.Device control – CD/DVD

Page 35

22Additional ThreatSense parameters for executed filesAdvanced heuristics on file execution – By default, Advanced heuristics is used when files are e

Page 36 - 4.1.4 HIPS

234.1.1.1.3 When to modify real-time protection configurationReal-time protection is the most essential component of maintaining a secure system. Al

Page 37

24Smart scanSmart scan allows you to quickly launch a computer scan and clean infected files with no need for user intervention.The advantage of Smart

Page 38 - 4.1.5 Gamer mode

25Infected items are not cleaned automatically. Scanning without cleaning can be used to obtain an overview of thecurrent protection status. If you ar

Page 39 - 4.2 Network

26After all scans computer takes no action – Triggers a scheduled shutdown or reboot when the computer scanfinishes. Once the scan has finished, a shu

Page 40 - 4.2.1 Filtering modes

274.1.1.3.1 Automatic startup file checkWhen creating a System startup file check scheduled task, you have several options to adjust the followingpa

Page 41 - 4.2.1.1 Learning mode

28an asterisk (*) represents a variable string of zero or more characters.ExamplesIf you wish to exclude all files in a folder, type the path to the f

Page 42 - 4.2.2 Firewall profiles

294.1.1.6 ThreatSense engine parameters setupThreatSense is technology comprised of many complex threat detection methods. This technology is proact

Page 43 - 4.2.3.1 Rules setup

Contents...5ESET Smart Security1...

Page 44

30writers. Its latest version introduces a completely new way of code emulation based on binary translation. This newbinary translator helps to bypass

Page 45 - 4.2.4 Configuring zones

314.1.1.6.6 OtherYou can configure the following options in the Other section:Log all objects – If this option is selected, the log file will show a

Page 46

32Cleaning and deletingIf there is no predefined action to take for Real-time file system protection, you will be prompted to select anoption in the a

Page 47

334.1.1.8 Document protectionThe Document protection feature scans Microsoft Office documents before they are opened, as well as filesdownloaded aut

Page 48

34If the inserted external device applies an existing rule that performs the Block action, a notification window willpop-up in the lower right corner

Page 49

354.1.3.2 Adding Device control rulesA Device control rule defines the action that will be taken when a device meeting the rule criteria is connecte

Page 50 - 4.2.7 System integration

36number of the given media, not the CD drive.Note: If the above three descriptors are empty, the rule will ignore these fields while matching. Filter

Page 51 - 4.3 Web and email

371. Name the rule and select Block from the Action drop-down menu.2. Open the Target applications tab. Leave the Source applications tab blank to app

Page 52

38the exact parameters for your new rule. Rules created this way are considered equal to rules created manually, so arule created from a dialog window

Page 53 - 4.3.1.2 IMAP, IMAPS scanner

394.2 NetworkThe Personal firewall controls all network traffic to and from the system. This is accomplished by allowing ordenying individual networ

Page 54 - 4.3.1.3 POP3, POP3S filter

...74Update rollback4.5.2...

Page 55 - 4.3.1.4 Antispam protection

40Advanced Personal firewall setup... – Allows you to access the advanced firewall setup options.4.2.1 Filtering modesFour filtering modes are avail

Page 56

414.2.1.1 Learning modeThe Learning mode feature in ESET Smart Security's Personal firewall automatically creates and saves a rule for eachcomm

Page 57 - 4.3.2.1 HTTP, HTTPs

424.2.2 Firewall profilesProfiles can be used to control the behavior of the ESET Smart Security Personal firewall. When creating or editing aPerson

Page 58

43Select what type of rules will be displayed in the Rules setup section using the Rules to display list:Only user defined rules – Displays only those

Page 59 - 4.3.3 Protocol filtering

444.2.3.1.1 Detailed view of all rulesTo see the following information in the Zone and rule setup window, click Toggle detailed view of all rules.Na

Page 60

454.2.3.2 Editing rulesModification is required each time any of the monitored parameters are changed. In this case, the rule cannot fulfillthe cond

Page 61 - 4.3.3.3.2 Add IPv6 address

464.2.4.1 Network authenticationFor mobile computers, it is recommended that you verify the network credibility of the network that you areconnectin

Page 62 - 4.3.3.4.1 Certificates

47The public key can be a file of one of the following types:PEM encrypted public key (.pem)This key can be generated using the ESET Authentication Se

Page 63

484.2.4.1.2 Zone authentication - Server configurationThe authentication process can be executed by any computer/server connected to the network tha

Page 64 - 4.4 Parental control

494.2.5 Establishing connection - detectionThe Personal firewall detects each newly-created network connection. The active firewall mode determines

Page 65

51. ESET Smart SecurityESET Smart Security represents a new approach to truly integrated computer security. The most recent version ofthe ThreatSense®

Page 66

504.2.6 LoggingThe ESET Smart Security Personal firewall saves all important events in a log file, which can be viewed directly fromthe main menu. C

Page 67

514.3 Web and emailWeb and email configuration can be found in the Setup pane by clicking on Web and email. From here you canaccess more detailed se

Page 68 - 4.5 Updating the program

524.3.1 Email client protectionEmail protection provides control of email communication received through the POP3 and IMAP protocols. Usingthe plug-

Page 69

534.3.1.1.1 Email client protection configurationThe Email client protection module supports the following email clients: Microsoft Outlook, Outlook

Page 70

544.3.1.3 POP3, POP3S filterThe POP3 protocol is the most widespread protocol used to receive email communication in an email clientapplication. ESE

Page 71 - 4.5.1 Update settings

554.3.1.4 Antispam protectionUnsolicited email, called spam, ranks among the greatest problems of electronic communication. Spam representsup to 80

Page 72 - 4.5.1.2.1 Update mode

56Spam score loggingThe ESET Smart Security Antispam engine assigns a spam score to every scanned message. The message will berecorded in the antispam

Page 73 - 4.5.1.2.2 Proxy server

574.3.2 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the mainmedium fo

Page 74 - 4.5.2 Update rollback

584.3.2.2 URL address managementThe URL address management section enables you to specify HTTP addresses to block, allow or exclude fromchecking. Ad

Page 75 - 4.6 Tools

594.3.3 Protocol filteringAntivirus protection for the application protocols is provided by the ThreatSense scanning engine, which seamlesslyintegra

Page 76 - 4.6.1 Log files

61.1 What's new in version 7ESET Smart Security version 7 features many small improvements:Device control – A replacement of Removable media co

Page 77 - 4.6.2 Scheduler

604.3.3.2 Excluded applicationsTo exclude communication of specific network-aware applications from content filtering, select them in the list.HTTP/

Page 78

614.3.3.3 Excluded IP addressesThe entries in the list will be excluded from protocol content filtering. HTTP/POP3/IMAP communication from/tothe sel

Page 79 - 4.6.4 Watch activity

624.3.3.4 SSL protocol checkingESET Smart Security enables you to check protocols encapsulated in SSL protocol. You can use various scanningmodes fo

Page 80 - 4.6.6 ESET Live Grid

634.3.3.4.1.2 Excluded certificatesThe Excluded certificates section contains certificates that are considered safe. The content of encryptedcommuni

Page 81 - 4.6.6.1 Suspicious files

64NOTE: Potential phishing websites that have been whitelisted will expire after several hours by default. To allow awebsite permanently, you can use

Page 82 - 4.6.7 Running processes

65that do not match a category, click the Blocked and allowed web pages tab.If you click Parental control in the Setup pane from the main product wind

Page 83 - 4.6.8 Network connections

661. Open User Accounts by clicking the Start button (located at the bottom left side of your desktop), clicking ControlPanel and then clicking User A

Page 84

674.4.1 Web page content filteringIf the check box next to a category is selected, it is allowed. Deselect the check box next to a specific category

Page 85 - 4.6.9 Quarantine

684.4.2 Blocked and allowed web pagesEnter a URL address into the blank field under the list, select Allow or Block and click Add to add it to the l

Page 86 - 4.6.10 Proxy server setup

69Last successful update – The date of the last update. If you do not see a recent date, your virus signature databasemay not be current.Virus signatu

Page 87 - 4.6.11.1 Message format

71.3 PreventionWhen you work with your computer, and especially when you browse the Internet, please keep in mind that noantivirus system in the wor

Page 88 - 4.7 User interface

70necessary – Virus signature database is up to date will appear in the Update window. If this is not the case, theprogram is out of date and more vul

Page 89 - 4.7.2.1 Advanced setup

714.5.1 Update settingsUpdate setup options are available from the Advanced setup tree (F5 key) by clicking Update > Settings. This sectionspecif

Page 90 - 4.7.5 Program menu

724.5.1.1 Update profilesUpdate profiles can be created for various update configurations and tasks. Creating update profiles is especiallyuseful fo

Page 91 - 4.7.6 Context menu

734.5.1.2.2 Proxy serverTo access the proxy server setup options for a given update profile, click Update in the Advanced setup tree (F5)and then cl

Page 92 - 5. Advanced user

744.5.2 Update rollbackIf you suspect that a new update of the virus database and/or program modules may be unstable or corrupt, you canroll back to

Page 93 - 5.3 Diagnostics

754.5.3 How to create update tasksUpdates can be triggered manually by clicking Update virus signature database in the primary window displayedafter

Page 94 - 5.6 ESET SysInspector

76This menu includes the following tools:Log filesProtection statisticsWatch activityRunning processes (if ESET Live Grid is enabled in ESET Smart Sec

Page 95 - 5.6.2.1 Program Controls

77Parental control – Shows web pages blocked or allowed by Parental control. The Match type and Match valuescolumns tell you how the filtering rules w

Page 96

78checkboxes at the beginning of each entry to activate/deactivate the tasks.By default, the following scheduled tasks are displayed in Scheduler:Log

Page 97

794.6.3 Protection statisticsTo view a graph of statistical data related to ESET Smart Security's protection modules, click Tools > Protecti

Page 98

82. InstallationThere are several methods for installing ESET Smart Security on your computer. Installation methods may varydepending on country and m

Page 99 - 5.6.2.3 Compare

80You can also select Network activity from the Activity drop-down menu. The graph display and options for Filesystem activity and Network activity ar

Page 100

81Do not submit statistics – Select this option if you do not want to submit anonymous information gathered by ESETLive Grid about your computer. This

Page 101 - 5.6.4 Service Script

824.6.7 Running processesRunning processes displays the running programs or processes on your computer and keeps ESET immediately andcontinuously in

Page 102

83By clicking a given application at the bottom, the following information will appear at the bottom of the window:File – Location of an application o

Page 103

84The Configure connection view... option in the Network connections screen enters the advanced setup structure forthis section, enabling you to modif

Page 104 - 5.6.5 FAQ

854.6.9 QuarantineThe main function of the quarantine is to safely store infected files. Files should be quarantined if they cannot becleaned, if it

Page 105

86the context menu.4.6.10 Proxy server setupIn large LAN networks, the connection of your computer to the Internet can be mediated by a proxy server

Page 106 - 5.7 ESET SysRescue

87Sender address – This field specifies the sender address which will be displayed in the header of notificationemails.Recipient address – This field

Page 107 - 5.7.4 Settings

884.6.12 Submission of samples for analysisThe file submission dialog enables you to send a file or a site to ESET for analysis and can be found in

Page 108 - 5.7.4.2 ESET Antivirus

89The Context menu is displayed after right-clicking an object. Use this tool to integrate ESET Smart Security controlelements into the context menu.4

Page 109 - 5.7.4.6 Burn

92.2 Offline installationOnce you launch the offline installation (.msi) package, the installation wizard will guide you through the setupprocess.Fi

Page 110 - 5.8 Command Line

90would be a system or network administrator. This option is especially useful for terminal servers, provided that allsystem notifications are sent to

Page 111

91protection, which guards against malicious system attacks by controlling file, web and email communication. SelectDo not ask again to avoid this mes

Page 112 - 6. Glossary

925. Advanced user5.1 Profile managerProfile manager is used in two places within ESET Smart Security – in the On-demand computer scan section and i

Page 113 - 6.1.6 Spyware

93-collapses Advanced setup tree nodesTABmoves the cursor in a windowEsccloses the active dialog window5.3 DiagnosticsDiagnostics provides applicati

Page 114 - 6.2 Types of remote attacks

945.5 Idle state detectionIdle state detection settings can be configured in Advanced setup under Tools > Idle state detection. These settingsspe

Page 115 - 6.2.6 SMB Relay

955.6.2 User Interface and application usageFor clarity the main program window is divided into four major sections – Program Controls located on th

Page 116 - 6.3 ESET Technology

96HelpContains information about the application and its functions.DetailThis setting influences the information displayed in the main program window

Page 117 - 6.4 Email

97Description window you may find additional details for each process such as dynamic libraries used by the processand their location in the system, t

Page 118 - 6.4.4.1 Rules

985.6.2.2.1 Keyboard shortcutsKey shortcuts that can be used when working with the ESET SysInspector include:FileCtrl+Oopens existing logCtrl+Ssaves

Page 119 - 6.4.4.5 Server-side control

99ComparingCtrl+Alt+Oopens original / comparative logCtrl+Alt+Rcancels comparisonCtrl+Alt+1displays all itemsCtrl+Alt+2displays only added items, log

Comments to this Manuals

No comments