ESET SMART SECURITY User's Guide Page 30

  • Download
  • Add to my manuals
  • Print
  • Page
    / 120
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 29
30
writers. Its latest version introduces a completely new way of code emulation based on binary translation. This new
binary translator helps to bypass anti-emulation tricks used by malware writers. In addition to these improvements,
DNA-based scanning has been significantly updated to allow for better generic detections and address current
malware more accurately.
ESET Live Grid Using ESET reputation technology, information about scanned files is verified against data from the
cloud-based ESET Live Grid to improve detection and scanning speed.
4.1.1.6.3 Cleaning
The cleaning settings determine the behavior of the scanner while cleaning infected files. There are 3 levels of
cleaning.
4.1.1.6.4 Extensions
An extension is a part of a file name delimited by a period. An extension defines the type and content of a file. This
section of the ThreatSense parameter setup lets you define the types of files to scan.
By default, all files are scanned regardless of their extension. Any extension can be added to the list of files
excluded from scanning. If Scan all files is deselected, the list changes to show all currently scanned file extensions.
To enable the scanning of files without an extension, select Scan extensionless files. Do not scan extensionless
files becomes available when Scan all files is enabled.
Excluding files is sometimes necessary if scanning certain file types prevents the program that is using certain
extensions from running properly. For example, it may be advisable to exclude the .edb, .eml and .tmp extensions
when using Microsoft Exchange servers.
Using the Add and Remove buttons, you can allow or prohibit scanning of specific file extensions. Typing an
Extension activates the Add button, which adds the new extension to the list. Select an extension in the list and
then click Remove to delete that extension from the list.
The special symbols * (asterisk) and ? (question mark) can be used. The asterisk substitutes any character string, and
the question mark substitutes any symbol. Particular care should be taken when specifying excluded addresses,
because the list should only contain trusted and safe addresses. Similarly, it is necessary to ensure that the symbols
* and ? are used correctly in this list.
To scan the default set of extensions only, click Default and click Yes when prompted to confirm.
4.1.1.6.5 Limits
The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned:
Maximum object size Defines the maximum size of objects to be scanned. The given antivirus module will then
scan only objects smaller than the size specified. This option should only be changed by advanced users who may
have specific reasons for excluding larger objects from scanning. Default value: unlimited.
Maximum scan time for object (sec.) Defines the maximum time value for scanning of an object. If a user-defined
value has been entered here, the antivirus module will stop scanning an object when that time has elapsed,
regardless of whether the scan has finished. Default value: unlimited.
Archive nesting level Specifies the maximum depth of archive scanning. Default value: 10.
Maximum size of file in archive This option allows you to specify the maximum file size for files contained in
archives (when they are extracted) that are to be scanned. Default value: unlimited.
If scanning of an archive is prematurely terminated for these reasons, the archive check box will remain deselected.
Note: We do not recommend changing the default values; under normal circumstances, there should be no reason
to modify them.
Page view 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 119 120

Comments to this Manuals

No comments