ESET Internet Security 13 Owner's manual

Category
Antivirus security software
Type
Owner's manual
ESET Internet Security
User guide
Click here to display the Online help version of this document
Copyright ©2021 by ESET, spol. s r.o.
ESET Internet Security was developed by ESET, spol. s r.o.
For more information visit https://www.eset.com
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without
permission in writing from the author.
ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice.
Technical Support: https://support.eset.com
REV. 1/28/2021
1 ESET Internet Security 1 ............................................................................................................................
1.1 What's new in this version? 2 ...................................................................................................................
1.2 Which product do I have? 3 .......................................................................................................................
1.3 System requirements 4 ..............................................................................................................................
1.3.1 Your version of Windows 7 is outdated 4 ............................................................................................................
1.3.2 Windows 7 is no longer supported by Microsoft 5 .................................................................................................
1.3.3 Windows Vista is no longer supported 5 .............................................................................................................
1.4 Prevention 6 ................................................................................................................................................
1.5 Help pages 6 ................................................................................................................................................
2 Installation 8 .....................................................................................................................................................
2.1 Live installer 8 .............................................................................................................................................
2.2 Offline installation 9 ...................................................................................................................................
2.3 Product activation 10 .................................................................................................................................
2.3.1 Entering your License Key during activation 11 ...................................................................................................
2.3.2 Use License Manager 11 ...............................................................................................................................
2.3.3 Activate Trial License 12 ...............................................................................................................................
2.3.4 Free ESET License key 12 ..............................................................................................................................
2.3.5 Activation failed - common scenarios 13 ............................................................................................................
2.3.6 Activation failed due to leaked license 13 ..........................................................................................................
2.4 Common installation problems 15 ............................................................................................................
2.5 First scan after installation 15 ..................................................................................................................
2.6 Upgrading to a more recent version 15 ..................................................................................................
2.6.1 Legacy product automatic upgrade 16 ..............................................................................................................
2.7 Referring ESET product to a friend 16 .....................................................................................................
3 Beginner's guide 17 ......................................................................................................................................
3.1 The main program window 17 ...................................................................................................................
3.2 Updates 20 ...................................................................................................................................................
3.3 Setup additional ESET security tools 21 .................................................................................................
3.4 Trusted zone setup 21 ................................................................................................................................
3.5 Anti-Theft 22 ................................................................................................................................................
3.6 Parental control tools 23 ...........................................................................................................................
4 Working with ESET Internet Security 23 ...........................................................................................
4.1 Computer protection 25 .............................................................................................................................
4.1.1 Detection engine (13.1 and later) 26 ................................................................................................................
4.1.1.1 Detection engine advanced options 30 ...........................................................................................................
4.1.2 Detection engine (13.0) 30 ............................................................................................................................
4.1.3 An infiltration is detected 31 ..........................................................................................................................
4.1.4 Real-time file system protection 33 ..................................................................................................................
4.1.4.1 Cleaning levels 35 .....................................................................................................................................
4.1.4.2 When to modify real-time protection configuration 36 ........................................................................................
4.1.4.3 Checking real-time protection 36 ..................................................................................................................
4.1.4.4 What to do if real-time protection does not work 36 ...........................................................................................
4.1.4.5 Processes exclusions 36 .............................................................................................................................
4.1.4.5.1 Add or Edit processes exclusions 37 ............................................................................................................
4.1.5 Computer scan 38 .......................................................................................................................................
4.1.5.1 Custom scan launcher 39 ............................................................................................................................
4.1.5.2 Scan progress 41 ......................................................................................................................................
4.1.5.3 Computer scan log 42 ................................................................................................................................
4.1.5.4 Malware scans 43 .....................................................................................................................................
4.1.5.4.1 Idle-state scan 43 ...................................................................................................................................
4.1.5.4.2 Scan profiles 43 .....................................................................................................................................
4.1.5.4.3 Scan targets 44 ......................................................................................................................................
4.1.5.4.4 Advanced scan options 44 ........................................................................................................................
4.1.6 Device control and Webcam protection 45 .........................................................................................................
4.1.6.1 Device control rules editor 46 .......................................................................................................................
4.1.6.1.1 Detected devices 46 ................................................................................................................................
4.1.6.2 Device groups 46 ......................................................................................................................................
4.1.6.3 Adding Device control rules 47 .....................................................................................................................
4.1.6.4 Webcam protection rules editor 49 ................................................................................................................
4.1.7 Host-based Intrusion Prevention System (HIPS) 49 ...............................................................................................
4.1.7.1 HIPS interactive window 51 .........................................................................................................................
4.1.7.1.1 Potential ransomware behavior detected 52 ..................................................................................................
4.1.7.2 HIPS rule management 53 ...........................................................................................................................
4.1.7.2.1 HIPS rule settings 54 ...............................................................................................................................
4.1.7.2.2 Add applicaton/registry path for HIPS 56 .......................................................................................................
4.1.7.3 HIPS advanced setup 56 .............................................................................................................................
4.1.7.3.1 Drivers always allowed to load 57 ...............................................................................................................
4.1.8 Gamer mode 57 ..........................................................................................................................................
4.1.9 Startup scan 57 ..........................................................................................................................................
4.1.9.1 Automatic startup file check 58 ....................................................................................................................
4.1.10 Document protection 58 ..............................................................................................................................
4.1.11 Exclusions 58 ...........................................................................................................................................
4.1.11.1 Performance exclusions 59 ........................................................................................................................
4.1.11.1.1 Add or Edit performance exclusion 60 ........................................................................................................
4.1.11.1.2 Path exclusion format 62 ........................................................................................................................
4.1.11.2 Detection exclusions 62 ............................................................................................................................
4.1.11.2.1 Add or Edit detection exclusion 63 .............................................................................................................
4.1.11.3 HIPS exclusions 64 ...................................................................................................................................
4.1.12 ThreatSense parameters 65 .........................................................................................................................
4.1.12.1 File extensions excluded from scanning 67 ....................................................................................................
4.1.12.2 Additional ThreatSense parameters 68 ..........................................................................................................
4.2 Internet protection 68 ................................................................................................................................
4.2.1 Protocol filtering 69 ......................................................................................................................................
4.2.1.1 Excluded applications 69 ............................................................................................................................
4.2.1.2 Excluded IP addresses 70 ............................................................................................................................
4.2.1.2.1 Add IPv4 address 71 ................................................................................................................................
4.2.1.2.2 Add IPv6 address 71 ................................................................................................................................
4.2.1.3 SSL/TLS 71 ..............................................................................................................................................
4.2.1.3.1 Certificates 72 .......................................................................................................................................
4.2.1.3.1 Encrypted network traffic 72 .....................................................................................................................
4.2.1.3.2 List of known certificates 73 ......................................................................................................................
4.2.1.3.3 List of SSL/TLS filtered applications 73 .........................................................................................................
4.2.2 Email client protection 74 ..............................................................................................................................
4.2.2.1 Email protocols 75 ....................................................................................................................................
4.2.2.1.1 POP3, POP3S filter 76 ..............................................................................................................................
4.2.2.2 Email alerts and notifications 76 ...................................................................................................................
4.2.2.3 Integration with email clients 76 ...................................................................................................................
4.2.2.3.1 Microsoft Outlook toolbar 77 ......................................................................................................................
4.2.2.3.2 Outlook Express and Windows Mail toolbar 77 ................................................................................................
4.2.2.3.3 Confirmation dialog 78 .............................................................................................................................
4.2.2.3.4 Rescan messages 78 ...............................................................................................................................
4.2.2.4 Antispam protection 78 ..............................................................................................................................
4.2.2.4.1 Antispam address books 80 .......................................................................................................................
4.2.2.4.2 Blacklist/Whitelist/Exceptions list 81 ............................................................................................................
4.2.2.4.2 Add/Edit Blacklist/Whitelist/Exceptions address 81 ..........................................................................................
4.2.3 Web access protection 81 ..............................................................................................................................
4.2.3.1 Web access protection advanced setup 84 ......................................................................................................
4.2.3.2 Web protocols 84 ......................................................................................................................................
4.2.3.3 URL address management 85 .......................................................................................................................
4.2.3.3.1 URL addresses list 86 ..............................................................................................................................
4.2.3.3.2 Create new URL address list 86 ..................................................................................................................
4.2.3.3.3 How to add URL mask 87 ..........................................................................................................................
4.2.4 Anti-Phishing protection 87 ............................................................................................................................
4.3 Network protection 89 ...............................................................................................................................
4.3.1 Firewall 90 .................................................................................................................................................
4.3.1.1 Learning mode settings 92 ..........................................................................................................................
4.3.2 Firewall profiles 92 ......................................................................................................................................
4.3.2.1 Profiles assigned to network adapters 93 ........................................................................................................
4.3.3 Application modification detection 93 ...............................................................................................................
4.3.3.1 List of applications excluded from detection 94 .................................................................................................
4.3.4 Configuring and using rules 94 ........................................................................................................................
4.3.4.1 Firewall rules list 94 ...................................................................................................................................
4.3.4.2 Adding or editing Firewall rules 95 .................................................................................................................
4.3.4.2.1 Firewall rule - Local 97 .............................................................................................................................
4.3.4.2.2 Firewall rule - Remote 97 ..........................................................................................................................
4.3.5 Configuring zones 98 ....................................................................................................................................
4.3.5.1 Firewall zones 98 ......................................................................................................................................
4.3.6 Network attack protection 99 .........................................................................................................................
4.3.6.1 Allowed services and advanced options 99 ......................................................................................................
4.3.6.2 IDS exceptions 102 ...................................................................................................................................
4.3.6.3 Suspected threat blocked 104 ......................................................................................................................
4.3.6.4 Network protection troubleshooting 104 .........................................................................................................
4.3.7 Connected networks 105 ..............................................................................................................................
4.3.7.1 Network adapters 105 ...............................................................................................................................
4.3.8 Known networks 105 ....................................................................................................................................
4.3.8.1 Known networks editor 106 .........................................................................................................................
4.3.8.2 Network authentication - Server configuration 109 ............................................................................................
4.3.9 Temporary IP address blacklist 109 ..................................................................................................................
4.3.10 Firewall log 110 ........................................................................................................................................
4.3.11 Establishing connection - detection 110 ..........................................................................................................
4.3.12 Solving problems with ESET Firewall 111 .........................................................................................................
4.3.12.1 Troubleshooting wizard 112 .......................................................................................................................
4.3.12.2 Logging and creating rules or exceptions from log 112 .....................................................................................
4.3.12.2.1 Create rule from log 112 ........................................................................................................................
4.3.12.3 Creating exceptions from Personal firewall notifications 112 ...............................................................................
4.3.12.4 Advanced PCAP logging 112 ......................................................................................................................
4.3.12.5 Solving problems with protocol filtering 113 ...................................................................................................
4.4 Security tools 114 .......................................................................................................................................
4.4.1 An overview to ESET Anti-Theft 114 .................................................................................................................
4.4.1.1 Sign in with your my.eset.com account 114 .....................................................................................................
4.4.1.1.1 Computer name 115 ...............................................................................................................................
4.4.1.1.2 Adding new device - progress 115 ..............................................................................................................
4.4.1.1.3 Device associaton completed 115 ..............................................................................................................
4.4.1.1.4 Adding new device failed 115 ....................................................................................................................
4.4.1.1.5 Disable Anti-Theft 115 .............................................................................................................................
4.4.2 Banking and Payment protection 115 ...............................................................................................................
4.4.2.1 Banking and Payment protection advanced setup 116 ........................................................................................
4.4.2.2 Protected websites 116 ..............................................................................................................................
4.4.3 Parental control 116 ....................................................................................................................................
4.4.3.1 Website exceptions 118 .............................................................................................................................
4.4.3.2 User accounts 120 ....................................................................................................................................
4.4.3.2.1 Categories 121 ......................................................................................................................................
4.4.3.2.2 Working with user accounts 121 .................................................................................................................
4.5 Updating the program 123 ........................................................................................................................
4.5.1 Update setup 126 .......................................................................................................................................
4.5.1.1 Update rollback 128 ..................................................................................................................................
4.5.1.2 Program component update 129 ..................................................................................................................
4.5.1.3 Connection options 129 ..............................................................................................................................
4.5.2 How to create update tasks 130 ......................................................................................................................
4.6 Tools 130 ......................................................................................................................................................
4.6.1 Connected Home Monitor 131 ........................................................................................................................
4.6.1.1 Network device in Connected Home Monitor 133 ..............................................................................................
4.6.1.2 Notifications | Connected Home Monitor 136 ....................................................................................................
4.6.2 Webcam Protection 136 ................................................................................................................................
4.6.3 Tools in ESET Internet Security 136 .................................................................................................................
4.6.3.1 Log files 137 ...........................................................................................................................................
4.6.3.1.1 Log filtering 138 ....................................................................................................................................
4.6.3.1.2 Logging configuration 139 ........................................................................................................................
4.6.3.2 Running processes 140 ..............................................................................................................................
4.6.3.3 Security report 142 ...................................................................................................................................
4.6.3.4 Watch activity 143 ....................................................................................................................................
4.6.3.5 Network connections 144 ...........................................................................................................................
4.6.3.6 ESET SysInspector 146 ...............................................................................................................................
4.6.3.7 Scheduler 146 .........................................................................................................................................
4.6.3.8 System cleaner 148 ..................................................................................................................................
4.6.3.9 ESET SysRescue Live 150 ...........................................................................................................................
4.6.3.10 Cloud-based protection 150 .......................................................................................................................
4.6.3.10.1 Exclusion filter for Cloud-based protection 152 .............................................................................................
4.6.3.11 Quarantine 152 ......................................................................................................................................
4.6.3.12 Proxy server 154 ....................................................................................................................................
4.6.3.13 Notifications 155 .....................................................................................................................................
4.6.3.13.1 Desktop notifications 156 .......................................................................................................................
4.6.3.13.2 Email notifications 157 ...........................................................................................................................
4.6.3.14 Select sample for analysis 158 ...................................................................................................................
4.6.3.14.1 Select sample for analysis - Suspicious file 159 ............................................................................................
4.6.3.14.2 Select sample for analysis - Suspicious site 160 ............................................................................................
4.6.3.14.3 Select sample for analysis - False positive file 160 .........................................................................................
4.6.3.14.4 Select sample for analysis - False positive site 160 ........................................................................................
4.6.3.14.5 Select sample for analysis - Other 160 .......................................................................................................
4.6.3.15 Microsoft Windows® update 161 ................................................................................................................
4.7 User interface 161 .......................................................................................................................................
4.7.1 User interface elements 161 ..........................................................................................................................
4.7.2 Alerts and message boxes 162 .......................................................................................................................
4.7.2.1 Confirmation messages 163 ........................................................................................................................
4.7.2.2 Removable media 164 ...............................................................................................................................
4.7.3 Access setup 164 ........................................................................................................................................
4.7.3.1 Password for Advanced setup 165 .................................................................................................................
4.7.4 System tray icon 166 ...................................................................................................................................
4.7.5 Help and support 167 ...................................................................................................................................
4.7.5.1 About ESET Internet Security 168 .................................................................................................................
4.7.5.2 ESET News 168 ........................................................................................................................................
4.7.5.3 Submit system configuration data 168 ...........................................................................................................
4.8 Profiles 169 ..................................................................................................................................................
4.9 Keyboard shortcuts 169 .............................................................................................................................
4.10 Diagnostics 170 .........................................................................................................................................
4.10.1 Import and export settings 171 .....................................................................................................................
4.10.2 Revert all settings in current section 171 .........................................................................................................
4.10.3 Revert to default settings 172 .......................................................................................................................
4.10.4 Error while saving the configuration 172 ..........................................................................................................
4.11 Command line scanner 172 .....................................................................................................................
4.12 ESET CMD 173 ............................................................................................................................................
4.13 Idle-state detection 175 ...........................................................................................................................
5 Common Questions 175 ..............................................................................................................................
5.1 How to update the ESET Internet Security 176 ......................................................................................
5.2 How to remove a virus from my PC 176 ..................................................................................................
5.3 How to allow communication for a certain application 177 .................................................................
5.4 How to enable Parental control for an account 177 ..............................................................................
5.5 How to create a new task in Scheduler 178 ...........................................................................................
5.6 How to schedule a weekly computer scan 179 ......................................................................................
5.7 How to resolve 179 .....................................................................................................................................
5.8 How to resolve incompatibility issues with your operating system 181 ...........................................
5.9 How to unlock Advanced setup 182 .........................................................................................................
6 Customer Experience Improvement Program 182 .......................................................................
7 End User License Agreement 183 ..........................................................................................................
8 Privacy Policy 200 ...........................................................................................................................................
1
ESET Internet Security
ESET Internet Security represents a new approach to truly integrated computer security. The most recent version
of the ESET LiveGrid® scanning engine, combined with our custom Firewall and Antispam modules, utilize speed
and precision to keep your computer safe. The result is an intelligent system that is constantly on alert for attacks
and malicious software that might endanger your computer.
ESET Internet Security is a complete security solution that combines maximum protection and a minimal system
footprint. Our advanced technologies use artificial intelligence to prevent infiltration by viruses, spyware, trojan
horses, worms, adware, rootkits, and other threats without hindering system performance or disrupting your
computer.
Features and benefits
Redesigned user interface
The user interface in this version has been significantly redesigned and
simplified based on the results of usability testing. All GUI wording and
notifications have been carefully reviewed and the interface now provides
support for right-to-left languages such as Hebrew and Arabic. Online Help
is now integrated into ESET Internet Security and offers dynamically
updated support content.
Antivirus and antispyware
Proactively detects and cleans more known and unknown viruses, worms,
trojans and rootkits. Advanced heuristics flags even never-before-seen
malware, protecting you from unknown threats and neutralizing them
before they can do any harm. Web access protection and Anti-Phishing
works by monitoring communication between web browsers and remote
servers (including SSL). Email client protection provides control of email
communication received through the POP3(S) and IMAP(S) protocols.
Regular updates
Regularly updating the detection engine (previously known as "virus
signature database") and program modules is the best way to ensure the
maximum level of security on your computer.
ESET LiveGrid®
(Cloud-powered Reputation)
You can check the reputation of running processes and files directly from
ESET Internet Security.
Device control
Automatically scans all USB flash drives, memory cards and CDs/DVDs.
Blocks removable media based on the type of media, manufacturer, size
and other attributes.
HIPS functionality
You can customize the behavior of the system in greater detail; specify
rules for the system registry, active processes and programs, and fine-tune
your security posture.
Gamer mode
Postpones all pop-up windows, updates or other system-intensive activities
to conserve system resources for gaming and other full-screen activities.
Features in ESET Internet Security
Banking & Payment Protection
Banking & Payment protection provides a secure browser for use when
accessing online banking or online payment gateways to ensure all online
transactions take place in a trusted and secure environment.
Support for Network signatures
Network signatures allow fast identification and block malicious traffic
coming to and from users devices such as bots and exploit packs. The
feature can be considered an enhancement of Botnet Protection.
Intelligent Firewall
Prevents unauthorized users from accessing your computer and taking
advantage of your personal data.
ESET Antispam
Spam represents up to 50 percent of all email communication. Antispam
protection serves to protect against this problem.
ESET Anti-Theft
ESET Anti-Theft expands user-level security in the case of a lost or stolen
computer. Once users install ESET Internet Security and ESET Anti-Theft,
their device will be listed in the web interface. The web interface allows
users to manage their ESET Anti-Theft configuration and administer anti-
theft features on their device.
Parental control
Protects your family from potentially offensive web content by blocking
various website categories.
2
A license needs to be active in order for features of ESET Internet Security to be operational. It is recommended
that you renew your license several weeks before the license for ESET Internet Security expires.
What's new in this version?
What's new in ESET Internet Security 13.0
Connected Home Monitor improvements
Improved device detection – Reveal what is happening on your Wi-Fi network and get the most from your
connected devices and smart home set-up. Recognize all devices - Get IP address, MAC address, device name,
model, vendor.
Improved troubleshooting – Connected Home Monitor will provide guidance for detected network or device
issues as well guidance for most common problems e.g. weak password on a router.
Find more in our help pages
HIPS improvements and extended detection
New HIPS program module includes Deep Behavioral Inspection, which analyzes the behavior of all programs
running on the computer and warns you if the behavior of the process is malicious.
Find more about HIPS in our help pages
Advanced Machine Learning
Advanced machine learning is an advanced layer of protection which improves detection based on machine
learning. Read more about this type of protection in the glossary.
In-product What's new
A way of in-product communication that will enable ESET to present key features and changes to end-users when
upgrading to a new product version.
Higher performance and lower system impact
ESET Internet Security is designed for efficient use of system resources, allowing you to enjoy your computer's
performance while defending against new types of threats.
3
Anti-phishing protection improvement
New program modules are based on protection against homoglyph attacks. A homoglyph attack is a method of
deception where an attacker tries to fool end-users by replacing characters in addresses with different but
similar looking characters. For example, emails that appear to come from your bank may try and direct you to a
spoof website.
Find more about Anti-phishing in our help pages
What's new in ESET Internet Security 13.1
Advanced machine learning
• Advanced machine learning is an advanced layer of protection that improves detection based on machine
learning. Read more about this type of protection in the Glossary. The Detection engine setup no longer provides
ON/OFF switches as for version 13.0 and below. ON/OFF buttons are replaced with four thresholds - "Aggressive",
"Balanced", "Cautious" and "Off".
Exclusions
• Changes to exclusions. Performance exclusions allow you to exclude files and folders from scanning. Detection
exclusions allow you to exclude objects from cleaning using the detection name, path or its hash.
Banking & Payment protection
• Banking & Payment protection improvements
For additional information and screenshots about the new features in ESET Internet Security please read the
following ESET Knowledgebase article:
What's new in this version of ESET home products
Which product do I have?
ESET offers multiple layers of security with new products from powerful and fast antivirus solution to all-in-one
security solution with minimal system footprint:
• ESET NOD32 Antivirus
• ESET Internet Security
• ESET Smart Security Premium
To determine which product you have installed open the main program window (see the Knowledgebase article)
and you will see the name of the product at the top of the window (header).
The table below details features available in each specific product.
ESET NOD32 Antivirus ESET Internet Security ESET Smart Security Premium
Detection engine
Advanced Machine Learning
Exploit Blocker
Script-Based Attack Protection
Anti-Phishing
Web access protection
4
HIPS (including Ransomware shield)
Antispam
Firewall
Connected Home Monitor
Webcam Protection
Network Attack Protection
Botnet Protection
Banking & Payment Protection
Parental Control
Anti-Theft
ESET Password Manager
ESET Secure Data
Note
Some of the products above may not be available for your language / region.
System requirements
Your system should meet the following hardware and software requirements for ESET Internet Security to perform
optimally:
Processors Supported
Intel or AMD processor, 32-bit (x86) with SSE2 instruction set or 64bit (x64), 1 GHz or higher
Supported Operating Systems
Microsoft® Windows® 10
Microsoft® Windows® 8.1
Microsoft® Windows® 8
Microsoft® Windows® 7 SP1 with latest Windows updates
Microsoft® Windows® Home Server 2011 64-bit
Important
Always keep your operating system up to date.
ESET Anti-Theft does not support Microsoft Windows Home Server.
Other
An internet connection is required for activation and ESET Internet Security updates to function properly.
Your version of Windows 7 is outdated
Issue
You are running an outdated version of the operating system. To remain protected, always try to keep your
operating system up to date.
Solution
You have installed ESET Internet Security running on {GET_OSNAME} {GET_BITNESS}.
Verify you have installed Windows 7 Service Pack 1 (SP1) with latest Windows updates (at least KB4474419 and
KB4490628).
5
If your Windows 7 is not configured to update automatically, click Start menu > Control Panel > System and
Security > Windows Update > Check for updates and then click Install updates.
See also Windows 7 is no longer supported by Microsoft.
Windows 7 is no longer supported by Microsoft
Issue
Microsoft support for Windows 7 ended on January 14, 2020. What does this mean?
If you continue to use Windows 7 after support has ended, your PC will still work, but it may become more
vulnerable to security risks and viruses. Your PC will no longer receive Windows updates (including security
updates).
Solution
Upgrading from Windows 7 to Windows 10? Update your ESET product
The upgrade process is relatively easy, and in many cases, you can do it without losing your files. Before upgrading
to Windows 10:
1.Check/update your ESET product
2.Back up important data
3.Read Microsoft's Upgrade to Windows 10 FAQs and update your Windows OS
Getting a new computer or device? Transfer ESET product
If you are going to or have purchased a new computer or device - learn how to transfer your existing ESET product
to a new device.
Note
See also Support for Windows 7 has ended.
Windows Vista is no longer supported
Issue
Due to technical limitations on Windows Vista, ESET Internet Security cannot provide protection after February
2021. ESET product will become non-functional. This may cause your system to be vulnerable to infiltrations.
Microsoft support for Windows Vista ended on April 11, 2017. What does this mean?
If you continue to use Windows Vista after support has ended, your PC will still work, but it may become more
vulnerable to security risks and viruses. Your PC will no longer receive Windows updates (including security
updates).
Solution
Upgrading from Windows Vista to Windows 10? Get a new computer or device and
transfer ESET product
Before upgrading to Windows 10:
1.Back up important data
2.Read Microsoft's Upgrade to Windows 10 FAQs and update your Windows OS
3.Install or transfer your existing ESET product to a new device.
6
Note
See also Support for Windows Vista has ended.
Prevention
When you work with your computer, and especially when you browse the Internet, please keep in mind that no
antivirus system in the world can completely eliminate the risk of detections and remote attacks. To provide
maximum protection and convenience, it is essential that you use your antivirus solution correctly and adhere to
several useful rules:
Update regularly
According to statistics from ESET LiveGrid®, thousands of new, unique infiltrations are created each day in order to
bypass existing security measures and bring profit to their authors – all at the expense of other users. The
specialists at the ESET Research Lab analyze these threats on a daily basis and prepare and release updates in
order to continually improve the level of protection for our users. To ensure the maximum effectiveness of these
updates it is important that updates are configured properly on your system. For more information on how to
configure updates, see the Update setup chapter.
Download security patches
The authors of malicious software often exploit various system vulnerabilities in order to increase the effectiveness
of spreading malicious code. With this in mind, software companies watch closely for any vulnerabilities in their
applications to appear and release security updates to eliminate potential threats on a regular basis. It is important
to download these security updates as they are released. Microsoft Windows and web browsers such as Internet
Explorer are two examples of programs for which security updates are released on a regular schedule.
Back up important data
Malware writers usually do not care about users’ needs, and the activity of malicious programs often leads to total
malfunction of an operating system and the loss of of important data. It is important to regularly back up your
important and sensitive data to an external source such as a DVD or external hard drive. This will make it far easier
and faster to recover your data in the event of system failure.
Regularly scan your computer for viruses
Detection of more known and unknown viruses, worms, trojans and rootkits are handled by the Real-time file
system protection module. This means that every time you access or open a file, it is scanned for a malware
activity. We recommend that you run a full Computer scan at least once a month because malware signatures may
vary and the detection engine updates itself each day.
Follow basic security rules
This is the most useful and most effective rule of all – always be cautious. Today, many infiltrations require user
intervention in order to be executed and distributed. If you are cautious when opening new files, you will save
considerable time and effort that would otherwise be spent cleaning infiltrations. Here are some useful guidelines:
• Do not visit suspicious websites with multiple pop-ups and flashing advertisements.
• Be careful when installing freeware programs, codec packs, etc. Only use safe programs and only visit safe
Internet websites.
• Be cautious when opening email attachments, particularly those from mass-mailed messages and
messages from unknown senders.
• Don't use an Administrator account for everyday work on your computer.
Help pages
7
Welcome to the ESET Internet Security user guide. The information provided here will familiarize you with your
product and help you make your computer more secure.
Getting started
Before using ESET Internet Security, we recommend that you familiarize yourself with the various types of
detections and remote attacks you might encounter when using your computer.
We have also compiled a list of new features introduced in ESET Internet Security, and a guide to help you
configure basic settings.
How to use ESET Internet Security Help pages
Help topics are divided into several chapters and sub-chapters. Press F1 to view information about the window you
are currently in.
The program allows you to search for a help topic by keyword(s), or search content by typing words or phrases.
The difference between these two methods is that a keyword may be logically related to help pages which do not
contain that particular keyword in the text. Searching by words and phrases will search the content of all pages
and display only those containing the searched word or phrase in the actual text.
For consistency and to help prevent confusion, terminology used in this guide is based on the ESET Internet
Security parameter names. We also use a uniform set of symbols to highlight topics of particular interest or
significance.
Note
A note is just a short observation. Although you can omit it, notes can provide valuable
information, such as specific features or a link to some related topic.
Important
This requires your attention that we encourage you not to skip over. Usually, it provides non-
critical but significant information.
Warning
This is information that requires extra attention and caution. Warnings are placed specifically to
deter you from committing potentially harmful mistakes. Please read and understand text placed
in warning brackets, as it references highly sensitive system settings or something risky.
Example
This is a use case or a practical example that aims to help you understand how a certain function
or feature can be used.
Convention Meaning
Bold type Names of interface items such as boxes and option buttons.
Italic type Placeholders for information you provide. For example, file name or path means you type the
actual path or a name of file.
Courier New Code samples or commands.
Hyperlink Provides quick and easy access to cross-referenced topics or external web location. Hyperlinks
are highlighted in blue and may be underlined.
%ProgramFiles%The Windows system directory where programs installed on Windows are stored.
Online Help is the primary source of help content. The latest version of Online Help will automatically be
displayed when you have a working internet connection.
8
Installation
There are several methods for installing ESET Internet Security on your computer. Installation methods may vary
depending on country and means of distribution:
Live installer can be downloaded from the ESET website. The installation package is universal for all
languages (choose a desired language). Live installer itself is a small file; additional files required to install
ESET Internet Security will be downloaded automatically.
Offline installation – This type of installation is used when installing from a product CD/DVD. It uses an .exe
file that is larger than the Live installer file and does not require an internet connection or additional files for
the completion of installation.
Important
Make sure that no other antivirus programs are installed on your computer before you install ESET
Internet Security. If two or more antivirus solutions are installed on a single computer, they may
conflict with each other. We recommend that you uninstall any other antivirus programs on your
system. See our ESET Knowledgebase article for a list of uninstaller tools for common antivirus
software (available in English and several other languages).
Live installer
Once you have downloaded the Live installer installation package, double-click the installation file and follow the
step-by-step instructions in the Installer Wizard.
Important
For this type of installation you must be connected to Internet.
1.Select your desired language from the drop-down menu and click Continue. Allow a few moments for
installation files to download.
2.Read and accept the End-User License Agreement.
3.The next step is to choose an activation option. If you are installing a more recent version over the previous
one, your license key will be entered automatically.
9
4.Select your preference for ESET LiveGrid® feedback system and Detection of potentially unwanted
applications. Grayware or Potentially Unwanted Application (PUA) is a broad category of software, whose intent
is not as unequivocally malicious as with other types of malware, such as viruses or trojan horses. See the
Potentially unwanted applications chapter for more details.
5.Select your preference for participation in Customer Experience Improvement Program. By joining the
Customer Experience Improvement Program you provide ESET with anonymous information relating to the use
of our products. The collected data will help us to improve the experience for you and will never be shared with
third parties. What information do we collect?
6.Click Install to start the installation process. It may take a few moments.
7.Click Done to exit the Installation Wizard.
Note
After the product is installed and activated, the modules start downloading. Protection is being
initialized and some features may not be fully functional unless the download is complete.
Note
If you have a license that allows you to install other versions of a product, then you can select
product according to your preferences. More information about features in each specific product.
Offline installation
Once you launch the offline installation (.exe), the Installation Wizard will guide you through the setup process.
1.Select your desired language from the drop-down menu and click Continue. Allow a few moments for
installation files to download.
2.Read and accept the End-User License Agreement.
3.The next step is to choose an activation option. If you are installing a more recent version over the previous
one, your license key will be entered automatically.
4.Select your preference for ESET LiveGrid® feedback system and Detection of potentially unwanted
applications. Grayware or Potentially Unwanted Application (PUA) is a broad category of software, whose intent
is not as unequivocally malicious as with other types of malware, such as viruses or trojan horses. See the
10
Potentially unwanted applications chapter for more details.
5.Select your preference for participation in Customer Experience Improvement Program. By joining the
Customer Experience Improvement Program you provide ESET with anonymous information relating to the use
of our products. The collected data will help us to improve the experience for you and will never be shared with
third parties. What information do we collect?
6.Click Install to start the installation process. It may take a few moments.
7.Click Done to exit the Installation Wizard.
Note
After the product is installed and activated, the modules start downloading. Protection is being
initialized and some features may not be fully functional unless the download is complete.
Note
If you have a license that allows you to install other versions of a product, then you can select
product according to your preferences. More information about features in each specific product.
Product activation
There are several methods available to activate your product. Availability of a particular activation scenario in the
activation window may vary depending on country and means of distribution (CD/DVD, ESET web page, etc.):
• If you purchased a retail boxed version of the product, activate your product by clicking Enter a License
Key. The License Key is usually located inside or on the back side of the product package. The License Key
must be entered as supplied for activation to be successful. License Key – a unique string in the format XXXX-
XXXX-XXXX-XXXX-XXXX or XXXX-XXXXXXXX which is used for identification of the license owner and for
activation of the license.
• After selecting Use License Manager you will be asked for your my.eset.com credentials in a new window.
• If you would like to evaluate ESET Internet Security before making a purchase, select Free trial. Enter your
email address and country to activate ESET Internet Security for a limited time. Your trial license will be
emailed to you. Trial licenses can only be activated once per customer.
• If you do not have a license and would like to buy one, click Purchase license. This will redirect you to the
website of your local ESET distributor. ESET Windows home product full licenses are not free.
You can change your product license at any time. To do so, click Help and support > Change license in the
main program window. You will see the public license ID used to identify your license to ESET Support.
If you have a Username and Password used for activation of older ESET products and do not know how to activate
ESET Internet Security, convert your legacy credentials to a License key.
Failed product activation?
11
Entering your License Key during activation
Automatic updates are important for your security. ESET Internet Security will only receive updates once activated
using your License Key.
If you did not enter your License Key after installation, your product will not be activated. You can change your
license in the main program window. To do so, click Help and support > Activate License and enter the license
data you received with your ESET Security product into the Product activation window.
ESET Windows home product full licenses are not free.
When entering your License Key, it is important to type it exactly as it is written:
• Your License Key is a unique string in the format XXXX-XXXX-XXXX-XXXX-XXXX which is used for
identification of the the license owner and activation of the license.
We recommend that you copy and past your License Key from your registration email to ensure accuracy.
Use License Manager
After selecting Use License Manager you will be asked for your my.eset.com credentials in a new window. Enter
your my.eset.com credentials and click Sign in to use a license in ESET License Manager. Choose a license for
activation, click Continue and your ESET Internet Security will be activated.
Note
If you do not have a my.eset.com account yet, register by clicking the Create account button.
Note
If you forgot your password click I forgot my password and follow the steps on the web page you
will be redirected to.
12
ESET License Manager helps you manage all your ESET licenses. You can easily renew, upgrade or extend your
license and see the important license details. First, enter your License Key. After that, you will see the product,
associated device, the number of available seats and the expiration date. You can deactivate or rename specific
devices. When you click Renew you will be redirected to the online store where you can confirm the purchase and
buy the renewal.
If you want to upgrade your license (for example from ESET NOD32 Antivirus to ESET Smart Security Premium) or
would like to install an ESET Security product on another device, you will be redirected to the online store to
complete the purchase.
In ESET License Manager, you can also add different licenses, download products to your devices, or share licenses
through email. ESET License Manager is available online after logging into your account at my.eset.com
Activate Trial License
Enter your name and email address to activate your ESET Internet Security trial version. The trial can only be
activated once.
Select your country from the Country drop-down menu to register ESET Internet Security with your local
distributor, who will provide technical support.
Enter a valid email address into the Email address field. After activation, your Username and Password required
for updating ESET Internet Security will be generated and sent to your email. This email address will also be used
for product expiration notifications and other communication with ESET.
Free ESET License key
ESET Windows home product full licenses are not free.
ESET License key is unique sequence of symbols, letters, numbers or special signs provided by ESET in order to
allow the legal use of ESET Internet Security in compliance with End User License Agreement. Every End User is
entitled to use the License key only to the extent in which has the right to use ESET Internet Security based on the
number of licenses granted by ESET. The License key is deemed confidential and cannot be shared.
There are sources on the Internet which might provide you a "free" ESET license keys, but remember:
• Clicking on a "Free ESET license" ad can compromise your computer or device and can lead to becoming
infected with malware. Malware can be hidden in unofficial YouTube videos, websites that display ads to earn
money based on your visits, etc. Usually, these are a trap.
• ESET can and does disable pirated licenses.
• Having a pirated license key is not in alignment with the End User License Agreement that you must accept
in order to install ESET Internet Security.
• Buy ESET licenses only through official channels such as www.eset.com, ESET distributors or resellers (do
not buy licenses from unofficial third-party websites like eBay or shared licenses from a third-party).
Downloading an ESET Windows home product is free, but activation during installation requires a valid ESET
license key (you can download and install it, but without activation, it will not work)
• Do not share your license on the Internet or social media (it might become widespread).
To identify and report a pirated ESET license, visit our Knowledgebase article for instructions.
13
If you are uncertain about buying an ESET Security product, you can use a trial version while you decide:
1.Activate ESET Internet Security using a free trial license
2.Participate in ESET Beta Program
3.Install ESET Mobile Security if you are using Android mobile device, it is freemium.
To gain a discount / prolong your license:
Refer ESET Internet Security to your friend
Renew your ESET (if you had an active license before) or activate for a longer period
Activation failed - common scenarios
In the case activation of ESET Internet Security was not successful, the most-common possible scenarios are:
• License key already in use
• Invalid License key. Product activation form error
• Additional information necessary for activation is missing or invalid
• Communication with the activation database failed. Please try to activate again in 15 minutes
• No or disabled connection to ESET activation servers
Make sure you have entered the proper License key and attempt to activate again.
If you are unable to activate, our welcome package will walk you through to common questions, errors, problems
about activation and licensing (available in English and several other languages).
Start ESET product activation troubleshooting
Activation failed due to leaked license
Issue
• Your license may be leaked or abused
• Activation failed due to leaked license
Solution
There are more devices using this license than it allows. You may be a victim of software piracy or counterfeiting.
The license cannot be used to activate any other ESET product. You can solve this problem directly if you are
allowed to manage the license in your my.eset.com account or purchased the license from a legitimate source. If
you do not yet have an account, create one.
If you are a license owner and you were not prompted to enter your email address:
1.To manage your ESET license, remove or deactivate seats, or access ESET License Manager, open a web
browser and navigate to https://my.eset.com. For more information, see the How to deactivate ESET on devices
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209

ESET Internet Security 13 Owner's manual

Category
Antivirus security software
Type
Owner's manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI