1 ESET Cyber Security 1 ................................................................................................................................
1.1 What's new in version 6 1 .........................................................................................................................
1.2 System requirements 1 ..............................................................................................................................
2 Installation 1 .....................................................................................................................................................
2.1 Typical installation 2 ..................................................................................................................................
2.2 Custom installation 3 .................................................................................................................................
2.3 Allow system extensions 4 ........................................................................................................................
2.4 Allow Full disk access 4 .............................................................................................................................
3 Product activation 5 .....................................................................................................................................
4 Uninstallation 5 ...............................................................................................................................................
5 Basic overview 5 ............................................................................................................................................
5.1 Keyboard shortcuts 6 .................................................................................................................................
5.2 Checking protection status 6 ....................................................................................................................
5.3 What to do if the program does not work properly 7 ...........................................................................
6 Computer protection 7 ...............................................................................................................................
6.1 Antivirus and antispyware protection 7 ..................................................................................................
6.1.1 General 7 ..................................................................................................................................................
6.1.1.1 Exclusions 8 .............................................................................................................................................
6.1.2 Startup protection 8 .....................................................................................................................................
6.1.3 Real-time file system protection 8 ....................................................................................................................
6.1.3.1 Advanced options 9 ...................................................................................................................................
6.1.3.2 When to modify Real-time protection configuration 9 ..........................................................................................
6.1.3.3 Checking Real-time protection 9 ....................................................................................................................
6.1.3.4 What to do if Real-time protection does not work 10 ..........................................................................................
6.1.4 On-demand computer scan 10 ........................................................................................................................
6.1.4.1 Type of scan 11 ........................................................................................................................................
6.1.4.1.1 Smart scan 11 .......................................................................................................................................
6.1.4.1.2 Custom scan 11 .....................................................................................................................................
6.1.4.2 Scan targets 12 ........................................................................................................................................
6.1.4.3 Scan profiles 12 ........................................................................................................................................
6.1.5 ThreatSense engine parameters setup 12 ..........................................................................................................
6.1.5.1 Objects 13 ..............................................................................................................................................
6.1.5.2 Options 13 ..............................................................................................................................................
6.1.5.3 Cleaning 14 .............................................................................................................................................
6.1.5.4 Exclusions 14 ...........................................................................................................................................
6.1.5.5 Limits 14 ................................................................................................................................................
6.1.5.6 Others 15 ...............................................................................................................................................
6.1.6 An infiltration is detected 15 ..........................................................................................................................
6.2 Removable media scanning and blocking 16 .........................................................................................
7 Anti-Phishing 17 ..............................................................................................................................................
8 Web and Email protection 17 ..................................................................................................................
8.1 Web protection 17 ......................................................................................................................................
8.1.1 Ports 17 ....................................................................................................................................................
8.1.2 URL lists 17 ...............................................................................................................................................
8.2 Email protection 18 .....................................................................................................................................
8.2.1 POP3 protocol checking 18 .............................................................................................................................
8.2.2 IMAP protocol checking 19 .............................................................................................................................
9 Update 19 ...........................................................................................................................................................
9.1 Update setup 19 ..........................................................................................................................................
9.1.1 Advanced options 19 ....................................................................................................................................
9.2 How to create update tasks 20 .................................................................................................................
9.3 Upgrading ESET Cyber Security to a new version 20 ............................................................................