ESET SMART SECURITY User Manual

Integrated components: nod32 antivirus, antispyware, personal firewall, antispam
Hide thumbs Also See for SMART SECURITY:
Table of Contents

Advertisement

Quick Links

Integrated components:
ESET NOD32 Antivirus
ESET NOD32 Antispyware
ESET Personal Firewall
ESET Antispam
New generation
of NOD32 technology

User Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SMART SECURITY and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ESET SMART SECURITY

  • Page 1: User Guide

    Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware ESET Personal Firewall ESET Antispam New generation of NOD32 technology User Guide...
  • Page 2: Table Of Contents

    Block all traffic: disconnect network ......19 writing from the author. 4.2.3 Disable filtering: allow all traffic ......19 ESET, spol. s r.o. reserves the right to change any of the 4.2.4 Configuring and using rules ........19 described application software without prior notice.
  • Page 3 4.3 Antispam protection ............. 21 4.3.1 Self‑learning Antispam ......... 22 4.3.1.1 Adding addresses to whitelist ....... 22 4.3.1.2 Marking messages as spam ........22 4.4 Updating the program ..........22 4.4.1 Update setup ............22 4.4.1.1 Update profiles ............ 23 4.4.1.2 Advanced update setup ........
  • Page 4: Eset Smart Security

    1. ESET Smart Security ESET Smart Security is the first representative of the new approach to Integrated file scanning into the HTTP File scanning truly integrated computer security. It utilizes the speed and precision and POP3 application protocols. Users are...
  • Page 5: Installation

    Select the Enable detection of potentially unwanted applications Enter your User name and Password, i.e. the authentication data option to allow ESET Smart Security to detect this type of threat you received after the purchase or registration of the product, into the (recommended).
  • Page 6: Custom Installation

    The first step is to select the destination location for the install. By default, the program installs into C:\Program Files\ESET\ESET Smart Security\. Click Browse… to change this location (not recommended). To configure your proxy server settings, select I use a proxy server and click Next.
  • Page 7 To The last step in Custom mode is to select the ESET Personal firewall enable automatic program component upgrades without prompting, filtering mode. Three modes are available: select the option Perform program component upgrade if available.
  • Page 8: Using Original Settings

    After installation of ESET Smart Security, a computer scan for the presence of malicious code should be performed. To quickly launch The last step shows a window requiring your consent to install.
  • Page 9: Beginner's Guide

    It does not display any advanced options. Introducing user interface design – modes The main window of ESET Smart Security is divided into two main sections. The left column provides access to the user‑friendly main menu. The main program window on the right predominantly serves to display information corresponding to the option selected in the main menu.
  • Page 10: What To Do If The Program Doesn't Work Properly

    If the User name and Password were entered during the installation of ESET Smart Security you will not be prompted for them at this point. Trusted Zone detection is performed after installation of ESET Smart Security and whenever the computer is connected to a new network.
  • Page 11: Proxy Server Setup

    3.4 Proxy server setup If you use a proxy server to mediate connection to the Internet on a system using ESET Smart Security, it must be specified in Advanced Setup (F5). To access the Proxy server configuration window, click Miscellaneous > Proxy server from the Advanced Setup tree. Select the Use proxy server check box, and enter the IP address and port of the proxy server, along with its authentication data.
  • Page 12: Work With Eset Smart Security

    4. Work with ESET Smart Security Antivirus and antispyware protection 4.1.1.1.3 Additional ThreatSense parameters for newly created files Antivirus protection guards against malicious system attacks by controlling file, email and Internet communication. If a threat with The probability of infection in newly‑created files is comparatively higher than in existing files.
  • Page 13: When To Modify The Real-Time Protection Configuration

    4.1.2 Email protection After installation of ESET Smart Security, all settings are optimized to provide the maximum level of system security for users. To restore the Email protection provides control of email communication received default settings, click the Default button located at the bottom‑right...
  • Page 14: Integration With Microsoft Outlook, Outlook Express, And Windows Mail

    Append tag messages to sent mail. Users also have the ability to decide whether tag messages should be appended to all email, to infected email only, or not at all. ESET Smart Security also allows the user to append messages to the original subject of infected messages.
  • Page 15: Blocked / Excluded Addresses

    Web browsers real‑time scanner at the time they were saved to the disk. This can ESET Smart Security also contains the Web browsers feature, which happen if the real‑time scanner was disabled at the time of infection, allows the user to define whether the given application is a browser or if the virus signature database is obsolete.
  • Page 16: Type Of Scan

    Network drives – all mapped drives 4.1.4.1 Type of scan Two types are available. The Standard scan quickly scans the system with no need for further configuration of the scan parameters. The Custom scan… allows the user to select any of the predefined scan profiles, as well as choose scan objects from the tree structure.
  • Page 17: Objects Setup

    ▪ System startup file check Advanced heuristics – Advanced heuristics comprise a unique heuristic algorithm developed by ESET optimized for detecting ▪ Email protection computer worms and trojan horses written in high level programming languages. Due to advanced heuristics, the detection intelligence ▪...
  • Page 18: Cleaning

    As a general example of how infiltrations are handled in ESET Smart Security, suppose that an infiltration is detected by the real‑time file Strict cleaning system monitor, which uses the Default cleaning level.
  • Page 19: Personal Firewall

    4.2.1 Filtering modes Three filtering modes are available for the ESET Smart Security Personal firewall. The behavior of the firewall changes based on the selected mode. Filtering modes also influence the level of user interaction required.
  • Page 20: Creating New Rules

    shortened view. The lower section displays details about the rule currently selected in the upper section. At the very bottom are the buttons New, Edit, and Delete, which allow the user to configure rules. If taking into account the direction of communication, connections can be divided into incoming and outgoing connections.
  • Page 21: Logging

    Click firewall. If the firewall recognizes the same connection in the future, Tools > Log files and then select ESET Personal firewall log from the it will apply the existing rule.
  • Page 22: Self-Learning Antispam

    To add a new address to the whitelist, right‑click on the given email message and select Add to Whitelist under the ESET Smart Security context menu option, or click Trusted address in the ESET Smart Security Antispam toolbar in the upper section of your email program.
  • Page 23: Update Profiles

    Ask before downloading program components Selecting the option Never update program components ensures that after a new program component update has been issued by ESET, it will not be downloaded and no program component update will actually take place on the given workstation. The Always update...
  • Page 24: Proxy Server

    The Connection through a proxy server option should be chosen (if it is a workgroup, enter workgroup_name\name) and the user’s if a proxy server is to be used for updating ESET Smart Security and password. When updating from the HTTP version of the local server, is different from the proxy server specified in the global settings no authentication is required.
  • Page 25: Updating From The Mirror

    Configuration options for the local server Mirror are accessible (after of authentication used for accessing the update files. The following adding a valid license key in the license manager, located in the ESET options are available: NONE, Basic, and NTLM. Select Basic to use the Smart Security Business Edition Advanced setup section) in the base64 encoding with basic user name and password authentication.
  • Page 26: Troubleshooting Mirror Update Problems

    “Scheduler”. 4.5 Scheduler Scheduler is available if the Advanced mode in ESET Smart Security is activated. Scheduler can be found in the ESET Smart Security main menu under Tools. Scheduler contains a summary list of all scheduled tasks and their configuration properties such as the predefined date, time, and scanning profile used.
  • Page 27: Creating New Tasks

    Add... from the context menu. Five types of scheduled should be quarantined if they cannot be cleaned, if it is not safe or tasks are available: advisable to delete them, or if they are being falsely detected by ESET Smart Security. ▪...
  • Page 28: Log Files

    ESET‘s virus lab. To submit a file from quarantine, 4. ESET Personal firewall log – Contains records of all facts detected right‑click the file and select Submit for analysis from the context by and related to the Personal firewall. Analysis of the firewall menu.
  • Page 29: Alerts And Notifications

    Show splash‑screen at startup option. The first item is Display alerts. Disabling this option will cancel all At the top of the ESET Smart Security main program window, there is alert windows and is only suitable for a limited amount of specific a Standard menu which can be activated or disabled based on the Use situations.
  • Page 30: Suspicious Files

    You can configure the Early Warning System to submit anonymous information about new threats and where the new threatening code is contained, in a single file. This file can be sent to ESET for detailed analysis. Studying these threats will help ESET update its threat detection capabilities.
  • Page 31: Submission

    ▪ Server address – Network address of the server where the remote to ESET’s virus labs. If the option Directly to ESET is selected, all administration server is installed. suspicious files and statistical information are sent to ESET’s virus lab directly from the program.
  • Page 32: License

    4.11 License The License branch allows you to manage the license keys for ESET Smart Security and other ESET products such as ESET Remote Administrator, ESET NOD32 for Microsoft Exchange, etc. After purchase, license keys are delivered along with your User name and Password.
  • Page 33: Advanced User

    Both export and import utilize the .xml file type. Export and import are useful if you need to back up the current configuration of ESET Smart Security in order to be able to use it later (for whatever reason). The export settings option will also be appreciated by those who want to use their favorite configuration of ESET Smart Security on multiple systems ‑...
  • Page 34 The following parameters and switches can be used while running Logs: the on‑demand scanner from the command line: – log‑file=FILE log output to FILE – log‑rewrite overwrite output file General options: (default – append) – help show help and quit –...
  • Page 35: Glossary

    Internet, they can spread across the globe within hours of their release – in some cases, even in minutes. 2. When they are hidden from the usual testing. Users of the ESET This ability to replicate independently and rapidly makes them more antivirus system have the advantage of Anti‑Stealth technology,...
  • Page 36: Spyware

    Port scanning administration of networked computers. However, in the wrong hands, they may be misused for malicious purposes. This is why ESET Port scanning controls whether there are open computer ports on has created this special category. Our clients now have the option to a network host.
  • Page 37: Smb Relay

    dismiss received packets. This is the point when remote attackers are your email address, the higher the possibility of it ending up in a spam able to infiltrate and supply packets with a correct sequential number. engine database. Some hints for prevention: The attackers can even manipulate the communication with their commands, or modify it some other way.
  • Page 38: Recognizing Spam Scams

    Access is usually achieved by sending email masquerading as a The functionality is based on the following principle: The learning trustworthy person or business (financial institution, insurance process takes place in the first phase. The user manually marks a company). The email can look very genuine, and will contain graphics sufficient number of messages as legitimate messages or as spam and content which may have originally come from the source that it (normally 200/200).

Table of Contents