ESET CYBER SECURITY for Mac Installation Manual and User Guide Click here to download the most recent version of this document
ESET CYBER SECURITY Copyright 2013 by ESET, spol. s r.o. ESET Cyber Security was developed by ESET, spol. s r.o. For more information visit www.eset.com. All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without permission in writing from the author. ESET, spol. s r.o.
Contents 1. ESET Cyber ................................................................4 Security 1.1 What's new ..................................................................................4 1.2 System requirements ..................................................................................4 2. Installation ................................................................4 2.1 Typical installation ..................................................................................4 2.
1. ESET Cyber Security 2. Installation ESET Cyber Security represents a new approach to truly integrated computer security. The most recent version of the ThreatSense® scanning engine utilizes speed and precision to keep your computer safe. The result is an intelligent system that is constantly on alert defending your computer against attacks and malicious software. Before you begin the installation process, please close all open programs on your computer.
Grid 17 . Special Applications The last step of the installation process is to configure detection of Potentially unwanted applications. Such programs are not necessarily malicious, but can often negatively affect the behavior of your operating system. These applications are often bundled with other programs and may be difficult to notice during the installation process. Although these applications usually display a notification during installation, they can easily be installed without your consent.
4. Uninstallation 5.2 Checking protection status To uninstall ESET Cyber Security, do one of the following: To view your protection status click Home from the main menu. A status summary about the operation of ESET Cyber Security modules will be displayed in the primary window. insert the ESET Cyber Security installation CD/DVD into your computer, open it from your desktop or Finder window and double-click Uninstall open the ESET Cyber Security installation file ( .
6.1 Antivirus and antispyware protection Antivirus protection guards against malicious system attacks by modifying files that pose potential threats. If a threat with malicious code is detected, the Antivirus module can eliminate it by blocking it and then cleaning it, deleting it or moving it to quarantine. 6.1.1 Real-time file system protection Real-time file system protection checks all types of media and triggers a scan based on various events.
6.1.1.5 What to do if Real-time protection does not work In this chapter we describe problem situations that may arise when using Real-time protection, and how to troubleshoot them. We recommend that you run an On-demand computer scan at least once a month. Scanning can be configured as a scheduled task from Tools > Scheduler. Real-time protection is disabled If Real-time protection is inadvertently disabled by a user, it will need to be reactivated.
6.1.2.2 Scan targets 6.1.3 Exclusions The Scan targets tree structure allows you to select files and folders to be scanned for viruses. Folders may also be selected according to a profile's settings. This section (Setup > Enter application preferences ... > Exclusions) enables you to exclude certain files/folders, applications or IP/IPv6 addresses from scanning. A scan target can be more precisely defined by entering the path to the folder or file(s) you wish to include in scanning.
Real-time file system protection module could result in a slower system. Therefore, we recommend that you leave the default ThreatSense parameters unchanged for all modules except Computer scan. 6.1.4.1 Objects The Objects section allows you to define which files will be scanned for infiltrations. Files – scans all common file types (programs, pictures, audio, video files, database files, etc.).
6.1.4.5 Limits 6.1.5 An infiltration is detected The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned: Infiltrations can reach the system from various entry points: webpages, shared folders, email or removable computer devices (USB, external disks, CDs, DVDs, etc.). Maximum Size: Defines the maximum size of objects to be scanned. Once maximum size is defined, the antivirus module will scan only objects smaller than the size specified.
Deleting files in archives – In the default cleaning mode, the entire archive will be deleted only if it contains infected files and no clean files. In other words, archives are not deleted if they also contain harmless clean files. However, use caution when performing a Strict cleaning scan – with Strict cleaning the archive will be deleted if it contains at least one infected file, regardless of the status of other files in the archive. 6.
you to configure scan targets, detection methods, etc. Click Setup... to display the detailed scanner setup window. After an email has been checked, a notification containing scan results can be appended to the message. You can select Append tag messages to email subject. Tag messages cannot be relied on without question, since they may be omitted in problematic HTML messages and can be forged by some viruses.
9. Tools The Tools menu includes modules that help simplify program administration and offer additional options for advanced users. 9.1 Log files To disable system tray notifications after each successful update, select Do not display notification about successful update. To delete all temporarily stored update data, click Clear next to Clear Update Cache. Use this option if you are experiencing difficulty while updating. 8.
Errors - error messages such as " Error dow nloa ding file" and critical errors Warnings – warning messages Informative records - informative messages including successful updates, alerts, etc. Diagnostic records - information needed for fine-tuning the program as well as all records described above. 9.2 Scheduler The Scheduler can be found in the ESET Cyber Security main menu under Tools.
comma (,) - separates items of a list; e.g. 1,3,7,8 slash (/) - defines increments of ranges; e.g. 3-28/5 in the 3rd field (day of month) means 3rd day of the month and then every 5 days. Day names (Monday-Sunday) and month names (JanuaryDecember) are not supported. NOTE: If you define both day of month and day of week, command will be executed only when both fields match. 9.3 Quarantine The main purpose of the quarantine is to safely store infected files.
Below is an example of a statistical package submitted: 9.5 Live Grid The Live Grid Early Warning System keeps ESET immediately and continuously informed about new infiltrations. The bidirectional Live Grid Early Warning System has a single purpose – to improve the protection that we can offer you. The best way to ensure that we see new threats as soon as they appear is to “link“ to as many of our customers as possible and use them as our threat scouts. There are two options: 1.
displayed by adjusting the Close notifications automatically after X seconds value. To see only notifications requiring user interaction when running applications in full screen, select Enable full screen mode. This is useful when giving presentations, playing games or doing other activities that require the entire screen. 11. Miscellaneous 11.1 Import and export settings Importing and exporting configurations of ESET Cyber Security can be done from the Setup section. 10.1.
12. Glossary 12.1 Types of infiltration An Infiltration is a piece of malicious software that attemtps to enter and/or damage a user’s computer. A worm activated in a system can cause a number of inconveniences: It can delete files, degrade system performance, or even deactivate programs. The nature of a computer worm qualifies it as a “means of transport“ for other types of infiltrations.
Adware itself is not dangerous, users may only be bothered by the advertisements. The danger lies in the fact that adware may also perform tracking functions (as spyware does). If you decide to use a freeware product, pay particular attention to the installation program. The installer will most likely notify you of the installation of an extra adware program. Often you will be allowed to cancel it and install the program without adware.
Still, port scanning is often used by hackers attempting to compromise security. Their first step is to send packets to each port. Depending on the response type, it is possible to determine which ports are in use. The scanning itself causes no damage, but be aware that this activity can reveal potential vulnerabilities and allow attackers to take control of remote computers. 12.2.6 ICMP attacks The ICMP (Internet Control Message Protocol) is a popular and widely-used Internet protocol.
This type of advertising is legitimate, since you may be interested in receiving commercial information about some products. But many companies send unsolicited bulk commercial messages. In such cases, email advertising crosses the line and becomes spam. The amount of unsolicited email has become a problem and it shows no signs of slowing. Authors of unsolicited email often attempt to disguise spam as legitimate messages. 12.3.2 Hoaxes A hoax is misinformation that is spread across the Internet.