Hide thumbs Also See for NOD32 ANTIVIRUS 3.0:
Table of Contents

Advertisement

NOD32
Antivirus 3.0
Integrated components:
ESET NOD32 Antivirus
ESET NOD32 Antispyware

User Guide

Advertisement

Table of Contents
loading

Summary of Contents for ESET NOD32 ANTIVIRUS 3.0

  • Page 1: User Guide

    NOD32 Antivirus 3.0 Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware User Guide...
  • Page 2: Table Of Contents

    4.2.1.2.4 Creating update copies – Mirror ......21 writing from the author. 4.2.1.2.4.1 Updating from the Mirror ........21 ESET, spol. s r.o. reserves the right to change any of the 4.2.1.2.4.2 Troubleshooting Mirror update problems ....22 described application software without prior notice.
  • Page 3 4.3 Scheduler ..............23 4.3.1 Purpose of scheduling tasks ........23 4.3.2 Creating new tasks ..........23 4.4 Quarantine ..............23 4.4.1 Quarantining files ..........24 4.4.2 Restoring from Quarantine ........24 4.4.3 Submitting file from Quarantine ......24 4.5 Log files ...............24 4.5.1 Log maintenance ..........
  • Page 4: Eset Nod32 Antivirus 3.0

    1. ESET NOD32 Antivirus 3.0 ESET NOD32 Antivirus 3.0 is the successor to the award‑winning product ESET NOD32 Antivirus 2.*. It utilizes the scanning speed and the precision of ESET NOD32 Antivirus, granted by the most recent version of the ThreatSense® scanning engine.
  • Page 5: Installation

    After purchase, the ESET NOD32 Antivirus installer can be downloaded The next step in the installation is configuration of the ThreatSense. from ESET’s website as an .msi package. Launch the installer and the Net Early Warning System. The ThreatSense.Net Early Warning installation wizard will guide you through the basic setup.
  • Page 6: Custom Installation

    The first step is to select the destination location for the install. By default, the program installs into C:\Program Files\ESET\ESET Smart Security\. Click Browse… to change this location (not recommended). To configure your proxy server settings, select I use a proxy server and click Next.
  • Page 7: Using Original Settings

    The last step shows a window requiring your consent to install. Using original settings If you reinstall ESET NOD32 Antivirus, the Use current settings option is displayed. Select this option to transfer setup parameters from the original installation to the new one.
  • Page 8: On-Demand Computer Scan

    License details window. 2.5 On‑demand computer scan After installation of ESET NOD32 Antivirus, a computer scan for the presence of malicious code should be performed. To quickly launch a scan, select Computer scan from the main menu and then select Standard scan in the main program window.
  • Page 9: Beginner's Guide

    3.1.1 Checking operation of the system Help and support – Select this option to access help files, the ESET Knowledgebase, ESET’s web site and access a Customer Care support To view the Protection status, click this option at the top of the request.
  • Page 10: What To Do If The Program Doesn't Work Properly

    If the User name and Password were entered during the installation of ESET NOD32 Antivirus you will not be prompted for them at this point. If this information is not available, you can attempt to automatically detect proxy server settings for ESET NOD32 Antivirus by clicking the Detect proxy server button.
  • Page 11: Settings Protection

    Setup > Enter entire advanced setup tree... > User interface > Settings protection and click the Enter password... button. Enter a password, confirm it by typing it again, and click OK. This password will be required for any future modifications to ESET NOD32 Antivirus settings.
  • Page 12: Work With Eset Nod32 Antivirus

    4. Work with ESET NOD32 Antivirus Antivirus and antispyware protection 4.1.1.1.3 Checking of newly created files Antivirus protection guards against malicious system attacks by The probability of infection in newly‑created files is comparatively controlling file, email and Internet communication. If a threat with higher than in existing files.
  • Page 13: Checking Real-Time Protection

    Email protection provides control of email communication After installation of ESET NOD32 Antivirus, all settings are optimized received through the POP3 protocol. Using the plug‑in program for to provide the maximum level of system security for users. To restore Microsoft Outlook, ESET NOD32 Antivirus provides control of all the default settings, click the Default button located at the bottom‑...
  • Page 14: Integration With Microsoft Outlook, Outlook Express, Windows Mail

    No information about infected files is added to the subject line or Each email controlled by ESET NOD32 Antivirus can be marked by to the email body of delivered messages and infiltrations are not appending a tag message to the subject or email body.
  • Page 15: Http

    HTTP (Hypertext Transfer Protocol) browser or not. If an application is marked as a browser by the user, all protocol. ESET NOD32 Antivirus is by default configured to use the communication from this application is monitored regardless of the HTTP standards of most Internet browsers.
  • Page 16: Type Of Scan

    provides detection of infiltrations which were not detected by the 4.1.4.2 Scan targets real‑time scanner at the time they were saved to the disk. This can happen if the real‑time scanner was disabled at the time of infection, The Scan targets drop‑down menu allows you to select files, folders or if the virus signature database is obsolete.
  • Page 17: Threatsense Engine Parameters Setup

    Advanced heuristics – Advanced heuristics comprise a unique heuristic algorithm developed by ESET optimized for detecting Boot sectors – Scans boot sectors for the presence of viruses in the computer worms and trojan horses written in high level programming master boot record languages.
  • Page 18: Cleaning

    If you only wish to scan a certain part of your disk, click Custom scan and select targets to be scanned for viruses. As a general example of how infiltrations are handled in ESET Smart Security, suppose that an infiltration is detected by the real‑time file system monitor, which uses the Default cleaning level.
  • Page 19: Updating The Program

    Authentication for update servers is granted by the User name and Information about the current update status can be found by clicking Password which were generated and sent to the user by ESET after Update, including the current version of the virus signature database purchase of the product license.
  • Page 20: Advanced Update Setup

    ESET Smart Security. The Connection through a proxy server option should be chosen if a proxy server is to be used for updating ESET NOD32 Antivirus and is different from the proxy server specified in the global settings (Miscellaneous >...
  • Page 21: Connecting To Lan

    Connecting to LAN Configuration options for the local server Mirror are accessible (after adding a valid license key in the license manager, located in the ESET When updating from a local server with an NT‑based operating Smart Security Business Edition Advanced setup section) in the...
  • Page 22: Troubleshooting Mirror Update Problems

    UNC path. Updates from mapped drives may not work. If you want to allow access to the update files via the HTTP server, the Mirror folder must be located on the same computer as the ESET 4.2.1.2.4.2 Troubleshooting Mirror update problems NOD32 Antivirus instance creating it.
  • Page 23: Scheduler

    Add... from the context menu. Five types of scheduled should be quarantined if they cannot be cleaned, if it is not safe or tasks are available: advisable to delete them, or if they are being falsely detected by ESET Smart Security. ▪...
  • Page 24: Quarantining Files

    (e.g. by heuristic analysis of the code) and subsequently quarantined, please send the file to ESET‘s virus lab. To submit a file from quarantine, right‑click the file and select Submit for analysis from the context menu.
  • Page 25: Log Maintenance

    The first item is Display alerts. Disabling this option will cancel all alert windows and is only suitable for a limited amount of specific At the top of the ESET NOD32 Antivirus main program window, there situations. For most users, we recommend that this option be left to is a Standard menu which can be activated or disabled based on the its default setting (enabled).
  • Page 26: Threatsense.net

    They are displayed in the code is contained, in a single file. This file can be sent to ESET for notification area at the bottom right corner of the screen. To activate detailed analysis.
  • Page 27: Statistics

    ESET. Statistical information is configured in its own setup section, described in the next chapter. When to submit Suspicious files will be sent to ESET‘s labs for analysis as soon as possible. This is recommended if a permanent Internet connection is 4.7.3 Submission available and suspicious files can be delivered without delay.
  • Page 28: Remote Administration

    Click this button if you wish to immediately submit files and statistical information. The License branch allows you to manage the license keys for ESET NOD32 Antivirus and other ESET products. After purchase, license Select the Enable logging check box to enable recording of file keys are delivered along with your User name and Password.
  • Page 29: Advanced User

    Antivirus is available in Advanced mode under Setup. Both export and import utilize the .xml file type. Export and import are useful if you need to back up the current configuration of ESET NOD32 Antivirus in order to be able to use it later (for whatever reason).
  • Page 30 The following parameters and switches can be used while running Logs: the on‑demand scanner from the command line: – log‑file=FILE log output to FILE – log‑rewrite overwrite output file General options: (default – append) – help show help and quit –...
  • Page 31: Glossary

    Internet, they can spread across the globe within hours of their release – in some cases, even in minutes. 2. When they are hidden from the usual testing. Users of the ESET This ability to replicate independently and rapidly makes them more antivirus system have the advantage of Anti‑Stealth technology,...
  • Page 32: Adware

    However, in the wrong applications often automatically open a new pop‑up window hands, they may be misused for malicious purposes. This is why ESET containing advertisements in an Internet browser, or change has created this special category. Our clients now have the option to the brower’s homepage.

Table of Contents