ESET SMART SECURITY 4 - FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 User Manual

Hide thumbs Also See for SMART SECURITY 4 - FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008:
Table of Contents

Advertisement

Quick Links

User Guide
Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SMART SECURITY 4 - FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 and is the answer not in the manual?

Questions and answers

Summary of Contents for ESET SMART SECURITY 4 - FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008

  • Page 1 User Guide Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008...
  • Page 2: Table Of Contents

    4.1.3.1 HTTP, HTTPs ............16 4.1.3.1.1 Address management ...........16 ESET, spol. s r.o. reserves the right to change any of the 4.1.3.1.2 Web browsers ............16 described application software without prior notice. 4.1.4 On‑demand computer scan ........17 4.1.4.1...
  • Page 3 5.4.1.3 Compare ............. 38 4.2.1 Filtering modes ............ 21 5.4.1.4 SysInspector as part of ESET Smart Security 4 ..38 4.2.2 Block all network traffic: disconnect network ..22 4.2.3 Disable filtering: allow all traffic ......22 5.5 ESET SysRescue ............39 4.2.4...
  • Page 4: Eset Smart Security 4

    1. ESET Smart Security 4 ESET Smart Security 4 is the first representative of a new approach to • Personal firewall truly integrated computer security. It utilizes the speed and precision of ESET NOD32 Antivirus, which is guaranteed by the most recent The Personal firewall monitors all traffic between a protected version of the ThreatSense®...
  • Page 5: System Requirements

    Antispam System requirements ESET Antispam filters unsolicited email and therefore increases the For seamless operation of ESET Smart Security and ESET Smart security and comfort of electronic communication. Security Business Edition, your system should meet the following hardware and software requirements:...
  • Page 6: Installation

    The system package. Launch the installer and the installation wizard will guide allows for submission of new threats to ESET‘s Threat Lab, where they you through the basic setup. There are two types of installation are analyzed, processed and added to the virus signature database.
  • Page 7: Custom Installation

    After selecting the installation mode and clicking Next, you will be prompted to select a destination location for the installation. By default, the program installs in C:\Program Files\ESET\ESET Smart Security\. Click Browse… to change this location (not recommended). To configure your proxy server settings, select I use a proxy server and click Next.
  • Page 8 NOTE: After a program component update, a restart is usually required. We recommend selecting the If necessary, restart computer without notifying option. The next installation window is the option to set a password to protect your program settings. Select the Protect configuration settings with a password option and choose a password to enter in the New password and Confirm new password fields.
  • Page 9: Using Original Settings

    Using original settings about On‑demand computer scan, see section 4.1.4, “On‑demand computer scan”. If you reinstall ESET Smart Security, the Use current settings option will display. Select this option to transfer setup parameters from the original installation to the new one.
  • Page 10: Beginner's Guide

    Introducing user interface design – modes The main program window of ESET Smart Security is divided into two main sections. The primary window on the right displays information that corresponds to the option selected from the main menu on the left.
  • Page 11: Update Setup

    If the username and password were entered during installation of ESET Smart Security you will not be prompted for them at this point. Trusted zone detection occurs after ESET Smart Security installation and whenever your computer connects to a new network. Therefore, there is usually no need to define the Trusted zone.
  • Page 12: Proxy Server Setup

    Advanced Setup by clicking Update from the Advanced Setup tree. Settings protection ESET Smart Security settings can be very important for your organization’s security. Unauthorized modifications can endanger network stability and protection. To password protect the settings, from the main menu click Setup >...
  • Page 13: Work With Eset Smart Security

    4. Work with ESET Smart Security 4.1.1.1.2 Scan on (Event‑triggered scanning) Antivirus and antispyware protection Antivirus protection guards against malicious system attacks by By default, all files are scanned upon opening, creation or execution. controlling file, email and Internet communication. If a threat with...
  • Page 14: When To Modify Real-Time Protection Configuration

    If real‑time protection is not initiated at system startup (and the Automatic real‑time file system protection startup option is After installation of ESET Smart Security, all settings are optimized to enabled), it may be due to conflicts with other programs. If this is the provide the maximum level of system security for users.
  • Page 15: Compatibility

    If your email client is supported, this integration can be enabled in ESET Smart Security. If integration is activated, the ESET Smart Security Antispam toolbar is inserted directly into the email client, allowing for more efficient email protection.
  • Page 16: Removing Infiltrations

    Internet browsers and remote servers, and complies with HTTP (Hypertext Transfer Protocol) and HTTPs (encrypted communication) rules. By default, ESET Smart Security is configured to use the standards of most Internet browsers. However, the HTTP scanner setup options can be modified in Advanced Setup (F5) > Antivirus and antispyware >...
  • Page 17: On-Demand Computer Scan

    The list of applications marked as web browsers is accessible directly from the Web browsers submenu of the HTTP branch. This section also contains the Active mode submenu, which defines the checking mode for Internet browsers. 4.1.4.1.1 Smart scan Active mode is useful because it examines transferred data as a whole.
  • Page 18: Scan Profiles

    Server 2008, a new communication filtering method is used. As a result, the Protocol filtering section is not available. 4.1.5.1 ESET Smart Security enables you to check protocols encapsulated in SSL protocol. You can use various scanning modes for SSL protected communications using trusted certificates, unknown certificates, or certificates that are excluded from SSL‑protected communication...
  • Page 19: Objects Setup

    • Web access protection Advanced heuristics – Advanced heuristics comprise a unique heuristic algorithm, developed by ESET, optimized for detecting • On‑demand computer scan computer worms and trojan horses written in high‑level programming languages. Due to advanced heuristics, the detection intelligence of The ThreatSense parameters are highly optimized for each module, the program is significantly higher.
  • Page 20: Cleaning

    ThreatSense parameter setup lets you define the types of files to scan. 4.1.6.3 Cleaning By default, all files are scanned regardless of their extension. Any The cleaning settings determine the behavior of the scanner during extension can be added to the list of files excluded from scanning. the cleaning of infected files.
  • Page 21: An Infiltration Is Detected

    It also provides antivirus protection As a general example of how infiltrations are handled in ESET Smart for HTTP and POP3 protocols. This functionality represents a very Security, suppose that an infiltration is detected by the real‑time file important element of computer security.
  • Page 22: Block All Network Traffic: Disconnect Network

    Personal firewall. No user interaction is required, because ESET Smart Security saves rules To access the rule filtering setup, navigate to Advanced Setup according to predefined parameters. Learning mode is not secure, and (F5) >...
  • Page 23: Editing Rules

    4.2.4.2 Editing rules To modify an existing rule, click the Edit button. All parameters (see section 4.2.4.1, “Creating new rules” for descriptions) can be modified. Modification is required each time any of the monitored parameters are changed. In this case, the rule cannot fulfill the conditions and the specified action cannot be applied.
  • Page 24: Logging

    Click ESET Smart Security 4.0 supports Antispam protection for Microsoft Tools > Log files and then select ESET Personal firewall log from the Outlook, Outlook Express, Windows Mail, Windows Live Mail and Log drop‑down menu.
  • Page 25: Marking Messages As Spam

    Marking messages as spam Any message viewed in your email client can be marked as spam. To do so, right‑click the message and click ESET Smart Security > Reclassify selected messages as spam, or click Spam address in the ESET Smart Security Antispam toolbar located in the upper section of your email client.
  • Page 26: Advanced Update Setup

    In the profile setup you can specify the update server from a list of available servers, or a new server can be added. The list of existing update servers is accessible via the Update server: drop‑down menu. To add a new update server, click Edit… in the Update settings for selected profile section and then click the Add button.
  • Page 27: Connecting To The Lan

    The Connection through a proxy server option should be selected if a proxy server should be used to update ESET Smart Security and To ensure that the program authenticates using a currently logged‑in is different from the proxy server specified in the global settings user account, select Current user.
  • Page 28: Updating From The Mirror

    When creating the folder for the Mirror, you must provide “write” passwords. access for the user who will save update files to the folder and “read” access for all users who will update ESET Smart Security from the When configuring the Mirror, you can also specify the language Mirror folder.
  • Page 29: Troubleshooting Mirror Update Problems

    Below is an overview of the most frequent problems which may occur during an update from the Mirror: ESET Smart Security reports an error connecting to Mirror server – Likely caused by incorrect specification of the update server (network path to the Mirror folder) from which local workstations download updates.
  • Page 30: Quarantine

    NOTE: If the program quarantined a harmless file by mistake, please profile, which is used in case the task cannot be completed using exclude the file from scanning after restoring and send the file to ESET the primary profile. Confirm by clicking OK in the Update profiles Customer Care.
  • Page 31: Log Files

    Information is recorded based on the current log verbosity settings. It is possible to view text messages and logs – Errors – Only “Error downloading file” messages are recorded, directly from the ESET Smart Security environment, as well as to plus critical errors archive logs. –...
  • Page 32: Alerts And Notifications

    For most users, we recommend that this option be left to its default setting (enabled). At the top of the ESET Smart Security main program window is a Standard menu which can be activated or disabled based on the Use To close pop‑up windows automatically after a certain period of time,...
  • Page 33: Suspicious Files

    This file can be sent to ESET for detailed analysis. Studying these threats will help ESET update its threat detection capabilities. The ThreatSense.Net Early Warning System will collect information about your computer related to newly‑detected threats.
  • Page 34: Submission

    ESET. Select the By means of Remote Administrator or directly Port – This field contains a predefined server port used for connection. to ESET option for files and statistics to be submitted by any available We recommend that you leave the default port setting of 2222 means.
  • Page 35 content of a license key using the Add… button – the information contained is displayed in the manager. To delete license files from the list, click Remove. If a license key has expired and you are interested in purchasing a renewal, click the Order…...
  • Page 36: Advanced User

    Change... in the bottom left corner of the main program window, or press CTRL + M on your keyboard. Proxy server setup In ESET Smart Security, proxy server setup is available in two different sections within the Advanced Setup tree. First, proxy server settings can be configured under Miscellaneous >...
  • Page 37: Eset Sysinspector

    You can access SysInspector two ways: From the integrated version – max‑arch‑size=SIZE scan only the first SIZE bytes in in ESET Smart Security or by downloading the standalone version archives (default 0 = unlimited) (SysInspector.exe) for free from ESET’s website. To open SysInspector, –...
  • Page 38: Compare

    Microsoft Windows®operating system. system with the ESET Online scanner after the program has found any high‑risk items. ESET Online scanner is a free service and can be found System information – Contains detailed information about hardware http://www.eset.com/onlinescan/.
  • Page 39: Eset Sysrescue

    CD are met, it is quite an easy task to accomplish. To launch the ESR wizard, click Start > Programs > ESET > ESET Smart Security 4 > The same result can be achieved if you use the following command ESET SysRescue.
  • Page 40: Bootable Usb Device

    Burn tab. External applications – Allows you to specify additional programs Delete ISO file – Select this option to delete .iso files after the ESET that will be run or installed after booting from a SysRescue medium.
  • Page 41: Glossary

    Internet, they can spread across the globe within hours or even minutes of their release. This ability to replicate 2. When they are hidden from the usual testing. ESET NOD32 independently and rapidly makes them more dangerous than other Antivirus users have the advantage of Anti‑Stealth technology,...
  • Page 42: Spyware

    However, in the wrong 6.2.4 Port scanning hands, they may be misused for malicious purposes. ESET Smart Security provides the option to detect such threats. Port scanning is used to determine which computer ports are open on a network host.
  • Page 43: Smb Relay

    TCP Hijacking attacks aim to interrupt server‑client, or peer‑to‑peer • If possible, don’t use common aliases – with more complicated communications. Many attacks can be avoided by using aliases, the probability of tracking is lower authentication for each TCP segment. It is also advised to use the recommended configurations for your network devices.
  • Page 44: Recognizing Spam Scams

    6.3.4 Recognizing spam scams relative fields of study will generally receive a lower probability index. If a message includes words that would normally qualify it as Generally, there are a few indicators which can help you identify spam unsolicited, but it is sent by someone from the user’s contact list, (unsolicited emails) in your mailbox.

This manual is also suitable for:

Smart security 4

Table of Contents