1 ESET Cyber Security Pro 1 ........................................................................................................................
1.1 What's new in version 6 1 .........................................................................................................................
1.2 System requirements 1 ..............................................................................................................................
2 Installation 1 .....................................................................................................................................................
2.1 Typical installation 2 ..................................................................................................................................
2.2 Custom installation 3 .................................................................................................................................
2.3 Allow system extensions 4 ........................................................................................................................
2.4 Allow Full disk access 4 .............................................................................................................................
3 Product activation 5 .....................................................................................................................................
4 Uninstallation 5 ...............................................................................................................................................
5 Basic overview 6 ............................................................................................................................................
5.1 Keyboard shortcuts 6 .................................................................................................................................
5.2 Checking protection status 6 ....................................................................................................................
5.3 What to do if the program does not work properly 7 ...........................................................................
6 Computer protection 7 ...............................................................................................................................
6.1 Antivirus and antispyware protection 7 ..................................................................................................
6.1.1 General 7 ..................................................................................................................................................
6.1.1.1 Exclusions 8 .............................................................................................................................................
6.1.2 Startup protection 8 .....................................................................................................................................
6.1.3 Real-time file system protection 8 ....................................................................................................................
6.1.3.1 Advanced options 9 ...................................................................................................................................
6.1.3.2 When to modify Real-time protection configuration 9 ..........................................................................................
6.1.3.3 Checking Real-time protection 9 ....................................................................................................................
6.1.3.4 What to do if Real-time protection does not work 10 ..........................................................................................
6.1.4 On-demand computer scan 10 ........................................................................................................................
6.1.4.1 Type of scan 11 ........................................................................................................................................
6.1.4.1.1 Smart scan 11 .......................................................................................................................................
6.1.4.1.2 Custom scan 11 .....................................................................................................................................
6.1.4.2 Scan targets 12 ........................................................................................................................................
6.1.4.3 Scan profiles 12 ........................................................................................................................................
6.1.5 ThreatSense engine parameters setup 12 ..........................................................................................................
6.1.5.1 Objects 13 ..............................................................................................................................................
6.1.5.2 Options 13 ..............................................................................................................................................
6.1.5.3 Cleaning 14 .............................................................................................................................................
6.1.5.4 Exclusions 14 ...........................................................................................................................................
6.1.5.5 Limits 14 ................................................................................................................................................
6.1.5.6 Others 15 ...............................................................................................................................................
6.1.6 An infiltration is detected 15 ..........................................................................................................................
6.2 Removable media scanning and blocking 16 .........................................................................................
7 Anti-Phishing 17 ..............................................................................................................................................
8 Firewall 17 ..........................................................................................................................................................
8.1 Filtering modes 17 ......................................................................................................................................
8.2 Firewall rules 18 ..........................................................................................................................................
8.2.1 Creating new rules 18 ...................................................................................................................................
8.3 Firewall zones 19 ........................................................................................................................................
8.4 Firewall profiles 19 .....................................................................................................................................
8.5 Firewall logs 19 ...........................................................................................................................................
9 Web and Email protection 19 ..................................................................................................................
9.1 Web protection 20 ......................................................................................................................................
9.1.1 Ports 20 ....................................................................................................................................................
9.1.2 URL lists 20 ...............................................................................................................................................
9.2 Email protection 20 .....................................................................................................................................