Contents
.......................................................5ESET NOD32 Antivirus1.
....................................................................................................5What's new in this version?1.1
....................................................................................................6Which product do I have?1.2
....................................................................................................7System requirements1.3
....................................................................................................7Prevention1.4
.......................................................9Installation2.
....................................................................................................9Live installer2.1
....................................................................................................10Offline installation2.2
..............................................................................11Enter a License Key
2.2.1
..............................................................................12Use License Manager
2.2.2
..............................................................................12Change installation folder
2.2.3
....................................................................................................12Common installation problems2.3
....................................................................................................13Product activation2.4
....................................................................................................13Entering your License key2.5
....................................................................................................14Upgrading to a more recent version2.6
....................................................................................................14First scan after installation2.7
.......................................................15Beginner's guide3.
....................................................................................................15The main program window3.1
....................................................................................................17Updates3.2
.......................................................19Working with ESET NOD32 Antivirus4.
....................................................................................................20Computer protection4.1
..............................................................................21Detection engine
4.1.1
..................................................................................22Real-time file system protection
4.1.1.1
........................................................................23Additional ThreatSense parameters
4.1.1.1.1
........................................................................23Cleaning levels
4.1.1.1.2
........................................................................24When to modify real-time protection configuration
4.1.1.1.3
........................................................................24Checking real-time protection
4.1.1.1.4
........................................................................24What to do if real-time protection does not work
4.1.1.1.5
..................................................................................24Computer scan
4.1.1.2
........................................................................25Custom scan launcher
4.1.1.2.1
........................................................................27Scan progress
4.1.1.2.2
........................................................................28Scan profiles
4.1.1.2.3
........................................................................28Computer scan log
4.1.1.2.4
..................................................................................28Idle-state scan
4.1.1.3
..................................................................................28Startup scan
4.1.1.4
........................................................................29Automatic startup file check
4.1.1.4.1
..................................................................................29Exclusions
4.1.1.5
..................................................................................30ThreatSense parameters
4.1.1.6
........................................................................36Cleaning
4.1.1.6.1
........................................................................36File extensions excluded from scanning
4.1.1.6.2
..................................................................................36An infiltration is detected
4.1.1.7
..................................................................................38Document protection
4.1.1.8
..............................................................................38Removable media
4.1.2
..............................................................................39Device control
4.1.3
..................................................................................40Device control rules editor
4.1.3.1
..................................................................................41Adding Device control rules
4.1.3.2
..............................................................................42Host-based Intrusion Prevention System (HIPS)
4.1.4
..................................................................................44Advanced setup
4.1.4.1
..................................................................................45HIPS interactive window
4.1.4.2
..................................................................................46Potential ransomware behavior detected
4.1.4.3
..............................................................................46Gamer mode
4.1.5
....................................................................................................47Internet protection4.2
..............................................................................48Web access protection
4.2.1
..................................................................................48Basic
4.2.1.1
..................................................................................49Web protocols
4.2.1.2
..................................................................................49URL address management
4.2.1.3
..............................................................................50Email client protection
4.2.2
..................................................................................50Email clients
4.2.2.1
..................................................................................51Email protocols
4.2.2.2
..................................................................................52Alerts and notifications
4.2.2.3
..................................................................................53Integration with email clients
4.2.2.4
........................................................................53Email client protection configuration
4.2.2.4.1
..................................................................................53POP3, POP3S filter
4.2.2.5
..............................................................................54Protocol filtering
4.2.3
..................................................................................54Web and email clients
4.2.3.1
..................................................................................55Excluded applications
4.2.3.2
..................................................................................56Excluded IP addresses
4.2.3.3
........................................................................56Add IPv4 address
4.2.3.3.1
........................................................................56Add IPv6 address
4.2.3.3.2
..................................................................................57SSL/TLS
4.2.3.4
........................................................................58Certificates
4.2.3.4.1
........................................................................58Encrypted network traffic
4.2.3.4.1.1
........................................................................58List of known certificates
4.2.3.4.2
........................................................................59List of SSL/TLS filtered applications
4.2.3.4.3
..............................................................................59Anti-Phishing protection
4.2.4
....................................................................................................60Updating the program4.3
..............................................................................63Update settings
4.3.1
..................................................................................65Advanced update setup
4.3.1.1
........................................................................65Update mode
4.3.1.1.1
........................................................................65Connection options
4.3.1.1.2
..............................................................................66Update rollback
4.3.2
..............................................................................67How to create update tasks
4.3.3
....................................................................................................68Tools4.4
..............................................................................68Tools in ESET NOD32 Antivirus
4.4.1
..................................................................................69Log files
4.4.1.1
........................................................................70Logging configuration
4.4.1.1.1
..................................................................................71Running processes
4.4.1.2
..................................................................................72Security report
4.4.1.3
..................................................................................73Watch activity
4.4.1.4
..................................................................................74ESET SysInspector
4.4.1.5
..................................................................................74Scheduler
4.4.1.6
..................................................................................76System cleaner
4.4.1.7
..................................................................................76ESET SysRescue
4.4.1.8
..................................................................................76Cloud-based protection
4.4.1.9
........................................................................78Suspicious files
4.4.1.9.1
..................................................................................78Quarantine
4.4.1.10
..................................................................................79Proxy server
4.4.1.11
..................................................................................80Email notifications
4.4.1.12
........................................................................81Message format
4.4.1.12.1