4.1.6.3 Cleaning ...............................................................19
4.1.6.4 Extensions ...........................................................20
4.1.6.5 Limits ..................................................................20
4.1.6.6 Other ..................................................................20
4.1.7 An infiltration is detected .....................................20
4.2 Personal firewall .......................................................... 21
4.2.1 Filtering modes ....................................................21
4.2.2 Profiles .................................................................21
4.2.2.1 Profile management .............................................21
4.2.3 Block all network trac: disconnect network ........ 22
4.2.4 Disable filtering: allow all trac ........................... 22
4.2.5 Configuring and using rules .................................. 22
4.2.5.1 Creating a new rule .............................................. 22
4.2.5.2 Editing rules ........................................................ 23
4.2.6 Configuring zones ................................................ 23
4.2.6.1 Network authentication ...................................... 23
4.2.6.1.1 Zone authentication ‑ Client configuration ............ 23
4.2.6.1.2 Zone authentication ‑ Server configuration ........... 24
4.2.7 Establishing connection – detection ..................... 25
4.2.8 Logging ............................................................... 25
4.3 Antispam protection ....................................................25
4.3.1 Self‑learning Antispam ......................................... 26
4.3.1.1 Adding addresses to whitelist and blacklist............26
4.3.1.2 Marking messages as spam .................................. 26
4.4 Updating the program ................................................. 26
4.4.1 Update setup ....................................................... 27
4.4.1.1 Update profiles .................................................... 27
4.4.1.2 Advanced update setup ........................................ 27
4.4.1.2.1 Update mode ...................................................... 27
4.4.1.2.2 Proxy server ......................................................... 27
4.4.1.2.3 Connecting to the LAN ......................................... 28
4.4.1.2.4 Creating update copies – Mirror ............................ 28
4.4.1.2.4.1 Updating from the Mirror ..................................... 29
4.4.1.2.4.2 Troubleshooting Mirror update problems ..............30
4.4.2 How to create update tasks ..................................30
4.5 Scheduler ................................................................... 30
4.5.1 Purpose of scheduling tasks ..................................30
4.5.2 Creating new tasks ..............................................30
4.6 Quarantine .................................................................. 31
4.6.1 Quarantining files .................................................31
4.6.2 Restoring from Quarantine ...................................31
4.6.3 Submitting file from Quarantine ............................31
4.7 Log files .......................................................................32
4.7.1 Log maintenance ................................................. 32
4.8 User interface ..............................................................32
4.8.1 Alerts and notifications ........................................ 33
4.9 ThreatSense.Net ..........................................................33
4.9.1 Suspicious files .................................................... 34
4.9.2 Statistics ............................................................. 34
4.9.3 Submission .......................................................... 35
4.10 Remote administration ................................................35
4.11 Licenses ......................................................................35
5. Advanced user ..................................... 36
5.2 Import and export settings ...........................................36
5.2.1 Import settings ....................................................36
5.2.2 Export settings .................................................... 36
5.3 Command Line .............................................................36
5.4 ESET SysInspector ........................................................37
5.4.1 User Interface and application usage .................... 37
5.4.1.1 Program Controls................................................. 37
5.4.1.2 Navigating in ESET SysInspector ........................... 38
5.4.1.3 Compare .............................................................38
5.4.1.4 SysInspector as part of ESET Smart Security 4 ........ 39
5.4.1.5 Service script ....................................................... 39
5.4.1.5.1 Generating Service scripts .................................... 39
5.4.1.5.2 Structure of the Service script ............................... 39
5.4.1.5.3 How to execute Service scripts ..............................41
5.5 ESET SysRescue ...........................................................41
5.5.1 Minimum requirements ........................................41
5.5.2 How to create rescue CD .......................................41
5.5.2.1 Folders .................................................................41
5.5.2.2 ESET Antivirus.......................................................41
5.5.2.3 Advanced .............................................................41
5.5.2.4 Bootable USB device ............................................ 42
5.5.2.5 Burn .................................................................... 42
5.5.3 Working with ESET SysRescue .............................. 42
5.5.3.1 Using ESET SysRescue .......................................... 42
6. Glossary .............................................. 43
6.1 Types of infiltration ......................................................43
6.1.1 Viruses ................................................................ 43
6.1.2 Worms ................................................................ 43
6.1.3 Trojan horses ....................................................... 43
6.1.4 Rootkits .............................................................. 43
6.1.5 Adware ............................................................... 43
6.1.6 Spyware ..............................................................44
6.1.7 Potentially unsafe applications .............................44
6.1.8 Potentially unwanted applications .......................44
6.2 Types of remote attacks ............................................... 44
6.2.1 DoS attacks .........................................................44
6.2.2 DNS Poisoning .....................................................44
6.2.3 Worm attacks ......................................................44
6.2.4 Port scanning ......................................................44
6.2.5 TCP desynchronization .........................................44
6.2.6 SMB Relay ...........................................................45
6.2.7 ICMP attacks ....................................................... 45
6.3 Email ......................................................................... 45
6.3.1 Advertisements ...................................................45
6.3.2 Hoaxes ................................................................ 45
6.3.3 Phishing ..............................................................45
6.3.4 Recognizing spam scams .....................................45
6.3.4.1 Rules ...................................................................46
6.3.4.1 Bayesian filter ......................................................46
6.3.4.2 Whitelist .............................................................46
6.3.4.3 Blacklist ..............................................................46
6.3.4.5 Server‑side control ...............................................46