ESET SMART SECURITY User Manual page 3

Integrated components: nod32 antivirus, antispyware, personal firewall, antispam
Hide thumbs Also See for SMART SECURITY:
Table of Contents

Advertisement

4.3 Antispam protection ..................................................... 21
4.3.1
Self-learning Antispam ......................................... 22
4.3.1.1
Adding addresses to whitelist ............................... 22
4.3.1.2
Marking messages as spam .................................. 22
4.4 Updating the program ..................................................22
4.4.1
Update setup ....................................................... 22
4.4.1.1
Update profiles .................................................... 23
4.4.1.2
Advanced update setup ........................................ 23
4.4.1.2.1
Update mode ...................................................... 23
4.4.1.2.2 Proxy server ......................................................... 24
4.4.1.2.3 Connecting to LAN ............................................... 24
4.4.1.2.4 Creating update copies - Mirror ............................ 24
4.4.1.2.4.1 Updating from the Mirror ..................................... 25
4.4.2
How to create update tasks .................................. 26
4.5 Scheduler ................................................................... 26
4.5.1
Purpose of scheduling tasks .................................. 26
4.5.2
Creating new tasks .............................................. 27
4.6 Quarantine .................................................................. 27
4.6.1
Quarantining files ................................................ 27
4.6.2
Restoring from Quarantine .................................. 27
4.6.3
Submitting file from Quarantine ........................... 27
4.7 Log files ...................................................................... 28
4.7.1
Log maintenance ................................................. 28
4.8 User interface ............................................................. 28
4.8.1
Alerts and notifications ........................................ 29
4.9 ThreatSense.Net ......................................................... 29
4.9.1
Suspicious files ....................................................30
4.9.2
Statistics .............................................................30
4.9.3
Submission ...........................................................31
4.10 Remote administration ................................................ 31
4.11 License .......................................................................32
5. Advanced user ..................................... 33
5.1
Proxy server setup ........................................................33
5.2 Export / import settings ................................................33
5.2.1
Export settings .................................................... 33
5.2.2
Import settings .................................................... 33
5.3 Command Line .............................................................33
6. Glossary .............................................. 35
6.1
Types of infiltrations .....................................................35
6.1.1
Viruses ................................................................ 35
6.1.2
Worms ................................................................ 35
6.1.3
Trojan horses ....................................................... 35
6.1.4
Rootkits .............................................................. 35
6.1.5
Adware ............................................................... 35
6.1.6
Spyware .............................................................. 36
6.1.7
Potentially unsafe applications ............................. 36
6.1.8
Potentially unwanted applications ....................... 36
6.2 Types of remote attacks ................................................36
6.2.1
DoS attacks ......................................................... 36
6.2.2
DNS Poisoning ..................................................... 36
6.2.3
Worm attacks ...................................................... 36
6.2.4
Port scanning ...................................................... 36
6.2.5
TCP desynchronization ......................................... 36
6.2.6
SMB Relay ........................................................... 37
6.2.7
ICMP attacks ....................................................... 37
6.3 E-mail ......................................................................... 37
6.3.1
Advertisements ................................................... 37
6.3.2
Hoaxes ................................................................ 37
6.3.3
Phishing .............................................................. 37
6.3.4
Recognizing spam scams ..................................... 38
6.3.4.1
Rules ................................................................... 38
6.3.4.1
Bayesian filter ...................................................... 38
6.3.4.2
Whitelist ............................................................. 38
6.3.4.3
Blacklist .............................................................. 38
6.3.4.5
The server-side control ......................................... 38

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SMART SECURITY and is the answer not in the manual?

Questions and answers

Table of Contents