ESET CYBERSECURITY Installation Manual

Hide thumbs Also See for CYBERSECURITY:
Table of Contents

Advertisement

Quick Links

ESET
Cybersecurity
Installation Manual and User Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CYBERSECURITY and is the answer not in the manual?

Questions and answers

Summary of Contents for ESET CYBERSECURITY

  • Page 1 ESET Cybersecurity Installation Manual and User Guide...
  • Page 2 ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
  • Page 3: Table Of Contents

    Removable media blocking ..............20 3.1.2 What to do if the program doesn't work 6. Glossary ..........21 properly ..................7 Types of infiltrations ..............21 4. Work with ESET Cybersecurity ..........9 6.1.1 Viruses ..................21 Antivirus and antispyware protection ..............9 6.1.2 Worms ..................21 4.1.1 Real-time file system protection ..................9...
  • Page 4: Eset Cybersecurity

    1. ESET Cybersecurity As a result of the increasing popularity of Unix-based operating systems, malware users are developing more threats to target Mac users. ESET Cybersecurity offers powerful and efficient protection against threats. ESET Cybersecurity includes the ability to deflect Windows threats, protecting Mac users as they interact with Windows users and vice versa.
  • Page 5: Installation

    You bundled with other programs and may be difficult to can install ESET Cybersecurity from an installation CD or notice during the installation process. Although these from a file available on the ESET website.
  • Page 6: On-Demand Computer Scan

    If you wish to select another disk, click Change Install Location... 2.3 On-demand computer scan After installing ESET Cybersecurity, a computer scan for malicious code should be performed. From the main program window, click Computer scan and then click Smart scan.
  • Page 7: Beginners Guide

    A status summary about the operation files, Internet Knowledgebase and ESET website. of ESET Cybersecurity will display in the primary window as well as a submenu with Statistics. Select it to view The ESET Cybersecurity user interface allows users to more detailed information and statistics about computer toggle between Standard and Advanced mode.
  • Page 8 If you are unable to solve a problem using the suggested solutions, click Help to access the help files or search the Knowledgebase. If you need assistance, you can contact ESET Customer Care support on the ESET website. ESET Customer Care will respond quickly to your questions and help...
  • Page 9: Work With Eset Cybersecurity

    ThreatSense engine parameter setup cases (e.g., if there is a conflict with another Real-time scanner), Real-time protection can be terminated by clicking the ESET Cybersecurity icon located in your 4.1.1.1.3 Exclusions from scanning menu bar (top of the screen) and then selecting the...
  • Page 10: Checking Real-Time Protection

    If Real-time protection is not initiated at system startup, it may be due to conflicts with other programs. If this is To select scan targets, select Computer scan > Custom the case, please consult ESET‘s Customer Care scan and select specific Scan Targets from the tree specialists.
  • Page 11: Scan Targets

    specified by entering the path to the folder or file(s) you wish to include. If you are only interested in scanning the system without additional cleaning actions, select the Scan without cleaning option. Furthermore, you can choose from three cleaning levels by clicking Setup...
  • Page 12: Objects

    Advanced heuristics – Advanced heuristics comprise period. The extension defines the type and content of a unique heuristic algorithm, developed by ESET, the file. This section of the ThreatSense parameter setup optimized for detecting computer worms and trojan lets you define the types of files to be excluded from horses written in high-level programming languages.
  • Page 13: Limits

    Optimization is not rigidly defined within the product. The ESET Development Team is continuously implementing new changes which then get integrated into your ESET Cybersecurity via the regular updates. If the Smart Optimization is disabled, only the user- defined settings in the ThreatSense core of the particular module are applied when performing a scan.
  • Page 14: Updating The Program

    ESET server with the For maximum protection, it is important to use the latest least network traffic. build of ESET Cybersecurity. To check for a new version, click Update from the main menu on the left. If a new...
  • Page 15: How To Create Update Tasks

    4.3 Scheduler Scheduler is available if Advanced mode in ESET Cybersecurity is activated. The Scheduler can be found in the ESET Cybersecurity main menu under Tools. The Scheduler contains a list of all scheduled tasks and configuration properties such as the predefined date, time, and scanning profile used.
  • Page 16: Quarantine

    Files should be quarantined if they cannot be to ESET‘s Threat Lab. To submit a file from quarantine, cleaned, if it is not safe or advisable to delete them, or if...
  • Page 17: Log Maintenance

    4.6.2 Privileges the ability to allow toggling to Advanced mode. Advanced mode displays more detailed settings and ESET Cybersecurity settings can be very important to additional controls for ESET Cybersecurity. your organization’s security policy. Unauthorized modifications may endanger the stability and protection To enable the startup splash screen functionality select of your system.
  • Page 18: Context Menu

    System to submit anonymous information about new # osver=9.5.0 threats and where the new threatening code is # engine=5417 contained. This file can be sent to ESET for detailed # components=2.50.2 analysis. Studying these threats will help ESET update # moduleid=0x4e4f4d41...
  • Page 19 – Your email can be sent with any suspicious files and may be used to contact you if further information is required for analysis. Please note that you will not receive a response from ESET unless more information is needed.
  • Page 20: Advanced User

    Import and export are useful if you need to backup the current configuration of ESET Cybersecurity to be able to use it later. The export settings option is also convenient for users who wish to use their preferred configuration of ESET Cybersecurity on multiple systems - they can easily import the configuration file to transfer the desired settings.
  • Page 21: Glossary

    than other types of malware. 6. Glossary A worm activated in a system can cause a number of inconveniences: It can delete files, degrade system 6.1 Types of infiltrations performance, or even deactivate programs. The nature of a computer worm qualifies it as a “means of transport“ An Infiltration is a piece of malicious software trying to for other types of infiltrations.
  • Page 22: Spyware

    6.1.6 Potentially unsafe applications There are many legitimate programs whose function is to simplify the administration of networked computers. However, in the wrong hands they may be misused for malicious purposes. ESET Cybersecurity provides the option to detect such threats.

Table of Contents