eset_eav_8_userguide_enu | Malware

Please download to get full document.

View again

of 94
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Information Report
Category:

Documents

Published:

Views: 7 | Pages: 94

Extension: PDF | Download: 0

Share
Related documents
Description
asda
Transcript
  ESET NOD32 ANTIVIRUS 8 User Guide (intended for product version 8.0 and higher)Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011Click here to download the most recent version of this document  ESET   NOD32 ANTIVIRUS Copyright 2014 by ESET, spol. s r. o. ESET NOD32 Antivirus was developed by ESET, spol. s r. o.For more information visit www.eset.com.All rights reserved. No part of this documentation may be reproduced, stored in a retrievalsystem or transmitted in any form or by any means, electronic, mechanical, photocopying,recording, scanning, or otherwise without permission in writing from the author.ESET, spol. s r. o. reserves the right to change any of the described application software withoutprior notice.Worldwide Customer Support: www.eset.com/supportREV. 9/30/2014  Contents .......................................................5   ESET NOD32 Antivirus1. ....................................................................................................5   What's new in version 81.1....................................................................................................6   System requirements1.2....................................................................................................6   Prevention1.3 .......................................................8   Installation2. ....................................................................................................8   Live installer2.1....................................................................................................9   Offline installation2.2 ..............................................................................10   Advanced settings 2.2.1 ....................................................................................................10   Product activation2.3....................................................................................................11   Entering username and password2.4....................................................................................................11   Upgrading to a more recent version2.5....................................................................................................12   First scan after installation2.6 .......................................................13   Beginner's guide3. ....................................................................................................13   The main program window3.1....................................................................................................15   Updates3.2 .......................................................17   Work with ESET NOD32 Antivirus4. ....................................................................................................18   Computer4.1 ..............................................................................19   Antivirus and antispyware 4.1.1 ..................................................................................19   Real-time file system protection 4.1.1.1 ........................................................................20   Advanced scan options 4.1.1.1.1 ........................................................................21   Cleaning levels 4.1.1.1.2 ........................................................................22   When to modify real-time protection configuration 4.1.1.1.3 ........................................................................22   Checking real-time protection 4.1.1.1.4 ........................................................................22   What to do if real-time protection does not work 4.1.1.1.5 ..................................................................................22   Computer scan 4.1.1.2 ........................................................................23   Custom scan launcher 4.1.1.2.1 ........................................................................24   Scan progress 4.1.1.2.2 ........................................................................25   Scan profiles 4.1.1.2.3 ..................................................................................25   Startup scan 4.1.1.3 ........................................................................26   Automatic startup file check 4.1.1.3.1 ..................................................................................26   Idle-state scanning 4.1.1.4 ..................................................................................26   Exclusions 4.1.1.5 ..................................................................................28   ThreatSense engine parameters setup 4.1.1.6 ........................................................................28Objects 4.1.1.6.1 ........................................................................28Options 4.1.1.6.2 ........................................................................29   Cleaning 4.1.1.6.3 ........................................................................29   Extensions 4.1.1.6.4 ........................................................................29Limits 4.1.1.6.5 ........................................................................30Other 4.1.1.6.6 ..................................................................................30   An infiltration is detected 4.1.1.7 ..................................................................................32   Document protection 4.1.1.8 ..............................................................................32   Removable media 4.1.2 ..............................................................................32   Device control 4.1.3 ..................................................................................33   Device control rules 4.1.3.1 ..................................................................................34   Adding Device control rules 4.1.3.2 ..............................................................................35HIPS 4.1.4 ..............................................................................37   Gamer mode 4.1.5 ....................................................................................................38   Web and email4.2 ..............................................................................38   Email client protection 4.2.1 ..................................................................................39   Integration with email clients 4.2.1.1 ........................................................................39   Email client protection configuration 4.2.1.1.1 ..................................................................................40   IMAP, IMAPS scanner 4.2.1.2 ..................................................................................40   POP3, POP3S filter 4.2.1.3 ..............................................................................41   Web access protection 4.2.2 ..................................................................................42   HTTP, HTTPs 4.2.2.1 ..................................................................................42   URL address management 4.2.2.2 ..............................................................................43   Protocol filtering 4.2.3 ..................................................................................44   Web and email clients 4.2.3.1 ..................................................................................44   Excluded applications 4.2.3.2 ..................................................................................45   Excluded IP addresses 4.2.3.3 ........................................................................45   Add IPv4 address 4.2.3.3.1 ........................................................................45   Add IPv6 address 4.2.3.3.2 ..................................................................................46   SSL protocol checking 4.2.3.4 ........................................................................46   Certificates 4.2.3.4.1 ........................................................................46   Trusted certificates 4.2.3.4.1.1 ........................................................................47   Excluded certificates 4.2.3.4.1.2 ........................................................................47   Encrypted SSL communication 4.2.3.4.1.3 ..............................................................................47   Anti-Phishing protection 4.2.4 ....................................................................................................48   Updating the program4.3 ..............................................................................51   Update settings 4.3.1 ..................................................................................52   Update profiles 4.3.1.1 ..................................................................................52   Advanced update setup 4.3.1.2 ........................................................................52   Update mode 4.3.1.2.1 ........................................................................53   Proxy server 4.3.1.2.2 ........................................................................53   Connecting to the LAN 4.3.1.2.3 ..............................................................................54   Update rollback 4.3.2 ..............................................................................55   How to create update tasks 4.3.3 ....................................................................................................56   Tools4.4 ..............................................................................57   Log files 4.4.1 ..................................................................................58   Log maintenance 4.4.1.1 ..............................................................................58   Scheduler 4.4.2 ..............................................................................59   Protection statistics 4.4.3 ..............................................................................60   Watch activity 4.4.4 ..............................................................................60   ESET SysInspector 4.4.5 ..............................................................................61   ESET Live Grid 4.4.6 ..................................................................................62   Suspicious files 4.4.6.1 ..............................................................................62   Running processes 4.4.7 ..............................................................................64   Quarantine 4.4.8 ..............................................................................65   Proxy server setup 4.4.9 ..............................................................................65   Alerts and notifications 4.4.10 ..................................................................................66   Message format 4.4.10.1 ..............................................................................67   Submission of samples for analysis 4.4.11 ..............................................................................67   System updates 4.4.12 ....................................................................................................67   User interface4.5 ..............................................................................68   Graphics 4.5.1 ..............................................................................68   Alerts and notifications 4.5.2 ..................................................................................68   Advanced setup 4.5.2.1 ..............................................................................69   Hidden notification windows 4.5.3 ..............................................................................69   Access setup 4.5.4  ..............................................................................69   Program menu 4.5.5 ..............................................................................70   Context menu 4.5.6 .......................................................71   Advanced user5. ....................................................................................................71   Profile manager5.1....................................................................................................71   Keyboard shortcuts5.2....................................................................................................72   Diagnostics5.3....................................................................................................72   Import and export settings5.4....................................................................................................73   Idle state detection5.5....................................................................................................73   ESET SysInspector5.6 ..............................................................................73   Introduction to ESET SysInspector 5.6.1 ..................................................................................73   Starting ESET SysInspector 5.6.1.1 ..............................................................................74   User Interface and application usage 5.6.2 ..................................................................................74   Program Controls 5.6.2.1 ..................................................................................75   Navigating in ESET SysInspector 5.6.2.2 ........................................................................77   Keyboard shortcuts 5.6.2.2.1 ..................................................................................78   Compare 5.6.2.3 ..............................................................................79   Command line parameters 5.6.3 ..............................................................................79   Service Script 5.6.4 ..................................................................................80   Generating Service script 5.6.4.1 ..................................................................................80   Structure of the Service script 5.6.4.2 ..................................................................................82   Executing Service scripts 5.6.4.3 ..............................................................................83FAQ  5.6.5 ..............................................................................84   ESET SysInspector as part of ESET NOD32 Antivirus 5.6.6 ....................................................................................................84   ESET SysRescue5.7 ..............................................................................84   Minimum requirements 5.7.1 ..............................................................................85   How to create rescue CD 5.7.2 ..............................................................................85   Target selection 5.7.3 ..............................................................................85   Settings 5.7.4 ..................................................................................86   Folders 5.7.4.1 ..................................................................................86   ESET Antivirus 5.7.4.2 ..................................................................................86   Advanced settings 5.7.4.3 ..................................................................................87   Internet protocol 5.7.4.4 ..................................................................................87   Bootable USB device 5.7.4.5 ..................................................................................87   Burn 5.7.4.6 ..............................................................................87   Working with ESET SysRescue 5.7.5 ..................................................................................88   Using ESET SysRescue 5.7.5.1 ....................................................................................................88   Command Line5.8 .......................................................90   Glossary6. ....................................................................................................90   Types of infiltration6.1 ..............................................................................90   Viruses 6.1.1 ..............................................................................90   Worms 6.1.2 ..............................................................................90   Trojans 6.1.3 ..............................................................................91   Rootkits 6.1.4 ..............................................................................91   Adware 6.1.5 ..............................................................................91   Spyware 6.1.6 ..............................................................................92   Packers 6.1.7 ..............................................................................92   Potentially unsafe applications 6.1.8 ..............................................................................92   Potentially unwanted applications 6.1.9 ....................................................................................................92   ESET Technology6.2 ..............................................................................92   Exploit Blocker 6.2.1 ..............................................................................92   Advanced Memory Scanner 6.2.2 ..............................................................................93   ESET Live Grid 6.2.3 ..............................................................................93   Java Exploit Blocker 6.2.4 ....................................................................................................93   Email6.3 ..............................................................................94   Advertisements 6.3.1 ..............................................................................94   Hoaxes 6.3.2 ..............................................................................94   Phishing 6.3.3 ..............................................................................94   Recognizing spam scams 6.3.4
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks