Contents
.......................................................5Preface1.
.......................................................7Overview2.
....................................................................................................7Key Features2.1
....................................................................................................8What's new2.2
....................................................................................................8Types of protection2.3
.......................................................9Preparing for installation3.
....................................................................................................10System requirements3.1
....................................................................................................11SHA-2 required compatibility3.2
....................................................................................................12ESET File Security installation steps3.3
..............................................................................15Modifying an existing installation
3.3.1
....................................................................................................16Silent / Unattended installation3.4
..............................................................................17Command line installa tion
3.4.1
....................................................................................................21Product activation3.5
..............................................................................22ESET Business Account
3.5.1
..............................................................................22Activation s uccessful
3.5.2
..............................................................................22Activation failure
3.5.3
..............................................................................22License
3.5.4
....................................................................................................23Upgrading to a newer version3.6
..............................................................................23Upgrading via ESMC
3.6.1
..............................................................................26Upgrading via ESET Cluster
3.6.2
....................................................................................................29Installation in cluster environment3.7
....................................................................................................29Terminal Server3.8
.......................................................30Getting started4.
....................................................................................................30
Managed via ESET Security Management
Center
4.1
....................................................................................................31Monitoring4.2
..............................................................................32Status
4.2.1
..............................................................................33Windows update ava ilable
4.2.2
..............................................................................33Network Is olation
4.2.3
.......................................................35Using ESET File Security5.
....................................................................................................35Scan5.1
..............................................................................37Sca n window a nd scan log
5.1.1
....................................................................................................39Log files5.2
..............................................................................41Log filtering
5.2.1
....................................................................................................43Update5.3
....................................................................................................45Setup5.4
..............................................................................46Server
5.4.1
..............................................................................46Computer
5.4.2
..............................................................................47Network
5.4.3
..................................................................................47Network troubleshooting wizard
5.4.3.1
..............................................................................47Web and email
5.4.4
..............................................................................48Tools - Diagnostic logging
5.4.5
..............................................................................49Import and export settings
5.4.6
....................................................................................................49Tools5.5
..............................................................................51Running process es
5.5.1
..............................................................................52Watch activity
5.5.2
..............................................................................54Protection statistics
5.5.3
..............................................................................55Cluster
5.5.4
..................................................................................56Cluster wizard - Select nodes
5.5.4.1
..................................................................................57Cluster wizard - Cluster s ettings
5.5.4.2
..................................................................................58Cluster wizard - Cluster s etup settings
5.5.4.3
..................................................................................58Cluster wizard - Nodes check
5.5.4.4
..................................................................................61Cluster wizard - Nodes install
5.5.4.5
..............................................................................63ESET Shell
5.5.5
..................................................................................65Usage
5.5.5.1
..................................................................................70Commands
5.5.5.2
..................................................................................72Ba tch files / Scripting
5.5.5.3
..............................................................................73ESET SysInspector
5.5.6
..............................................................................74ESET SysRescue Live
5.5.7
..............................................................................74Scheduler
5.5.8
..................................................................................76Scheduler - Add ta sk
5.5.8.1
........................................................................78Task type
5.5.8.1.1
........................................................................78Task timing
5.5.8.1.2
........................................................................78Event triggered
5.5.8.1.3
........................................................................79Run application
5.5.8.1.4
........................................................................79Skipped task
5.5.8.1.5
........................................................................79Scheduled task overview
5.5.8.1.6
..............................................................................79Submit sa mples for analysis
5.5.9
..................................................................................80Suspicious file
5.5.9.1
..................................................................................80Suspicious site
5.5.9.2
..................................................................................81Fa lse positive file
5.5.9.3
..................................................................................81Fa lse positive site
5.5.9.4
..................................................................................81Other
5.5.9.5
..............................................................................82Quarantine
5.5.10
....................................................................................................83OneDrive scan setup5.6
..............................................................................87Register ESET OneDrive s canner
5.6.1
..............................................................................91Unregister ESET OneDrive scanner
5.6.2
.......................................................97General settings6.
....................................................................................................97Detection engine6.1
..............................................................................99Machine learning protection
6.1.1
..............................................................................101Exclusions
6.1.2
..................................................................................101Performance exclusions
6.1.2.1
..................................................................................103Detection exlusions
6.1.2.2
........................................................................105Create exclusion wizard
6.1.2.2.1
..............................................................................105Adva nced options
6.1.3
..............................................................................105Automatic exclusions
6.1.4
..............................................................................105Shared local cache
6.1.5
..............................................................................106An infiltration is detected
6.1.6
..............................................................................106Real-time file sys tem protection
6.1.7
..................................................................................107ThreatSense parameters
6.1.7.1
........................................................................111Additional ThreatSense pa rameters
6.1.7.1.1
........................................................................111File extenstions excluded from scanning
6.1.7.1.2
..............................................................................111Processes exclusions
6.1.8
..............................................................................112Cloud-ba sed protection
6.1.9
..................................................................................114Exclusion filter
6.1.9.1
..............................................................................115Malware s cans
6.1.10
..................................................................................116Profile ma nager
6.1.10.1