Blocked / Excluded Addresses; Web Browsers; Computer Scan - ESET SMART SECURITY User Manual

Integrated components: nod32 antivirus, antispyware, personal firewall, antispam
Hide thumbs Also See for SMART SECURITY:
Table of Contents

Advertisement

setup options can be partially modified in the section Web access
protection > HTTP. In the HTTP filter Setup window, you can enable
or disable HTTP checking with the option Enable HTTP checking. You
can also define the port numbers which are used by the system for the
HTTP communication. By default, the port numbers 80, 8080 and 3128
are used. HTTP traffic on any port can be automatically detected and
scanned, by adding additional port numbers, separated by a comma.
4.1.3.1.1

Blocked / excluded addresses

The HTTP checking setup allows you to create user‑defined lists of
Blocked and Excluded URL (Uniform Resource Locator) addresses.
Both dialog windows contain the buttons Add, Edit, Remove and
Export, allowing you to easily manage and maintain the lists of
specified addresses. If an address requested by the user is in the list of
blocked addresses, it will not be possible to access the address. On the
other hand, addresses in the list of excluded addresses are accessed
with no checking for malicious code. In both lists, the special symbols
* (asterisk) and ? (question mark) can be used. The asterisk substitutes
any character string, and the question mark any symbol. Particular
care should be taken when specifying excluded addresses, because
the list should only contain trusted and safe addresses. Similarly, it is
necessary to make sure that the symbols * and ? are used correctly in
this list.
4.1.3.1.2

Web browsers

ESET Smart Security also contains the Web browsers feature, which
allows the user to define whether the given application is a browser
or not. If an application is marked as a browser by the user, all
communication from this application is monitored regardless of the
port numbers involved in the communication.
The Web browsers feature complements the HTTP checking feature,
as HTTP checking only takes place on predefined ports. However,
many Internet services utilize dynamically changing or unknown
port numbers. To account for this, the Web browser feature can
establish control of port communications regardless of the connection
parameters.
The list of applications marked as browsers is accessible directly
from the Web browsers submenu of the HTTP branch. This section
also contains the submenu Active mode, which defines the
checking mode for Internet browsers. The Active mode is useful
because it examines transferred data as a whole. If it is not enabled,
communication of applications is monitored gradually in batches.
This decreases the effectiveness of the data verification process, but
it also provides higher compatibility for the listed applications. If no
problems occur while using it, we recommend that you enable the
active checking mode by selecting the check box next to the desired
application.
4.1.4

Computer scan

If you suspect that your computer is infected (it behaves abnormally),
run an On‑demand computer scan to examine your computer
for infiltrations. From a security point of view, it is essential that
computer scans are not just run when an infection is suspected, but
regularly as part of routine security measures. Regular scanning
provides detection of infiltrations which were not detected by the
real‑time scanner at the time they were saved to the disk. This can
happen if the real‑time scanner was disabled at the time of infection,
or if the virus signature database is obsolete.
We recommend that you run an On‑demand scan at least once or
twice a month. Scanning can be configured as a scheduled task
through Tools > Scheduler.
15

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SMART SECURITY and is the answer not in the manual?

Questions and answers

Table of Contents