Contents
.......................................................5ESET Smart Security1.
....................................................................................................6What's new in version 71.1
....................................................................................................6System requirements1.2
....................................................................................................7Prevention1.3
.......................................................8Installation2.
....................................................................................................8Live installer2.1
....................................................................................................9Offline installation2.2
..............................................................................10Advanced settings
2.2.1
....................................................................................................10Product activation2.3
....................................................................................................11Entering username and password2.4
....................................................................................................11Upgrading to a more recent version2.5
....................................................................................................12First scan after installation2.6
.......................................................13Beginner's guide3.
....................................................................................................13The main program window3.1
....................................................................................................15Updates3.2
....................................................................................................16Trusted zone setup3.3
....................................................................................................17Anti-Theft3.4
....................................................................................................17Parental control tools3.5
.......................................................18Work with ESET Smart Security4.
....................................................................................................19Computer4.1
..............................................................................20Antivirus and antispyware
4.1.1
..................................................................................20Real-time file system protection
4.1.1.1
........................................................................21Advanced scan options
4.1.1.1.1
........................................................................22Cleaning levels
4.1.1.1.2
........................................................................23When to modify real-time protection configuration
4.1.1.1.3
........................................................................23Checking real-time protection
4.1.1.1.4
........................................................................23What to do if real-time protection does not work
4.1.1.1.5
..................................................................................23Computer scan
4.1.1.2
........................................................................24Custom scan launcher
4.1.1.2.1
........................................................................25Scan progress
4.1.1.2.2
........................................................................26Scan profiles
4.1.1.2.3
..................................................................................26Startup scan
4.1.1.3
........................................................................27Automatic startup file check
4.1.1.3.1
..................................................................................27Idle-state scanning
4.1.1.4
..................................................................................27Exclusions
4.1.1.5
..................................................................................29ThreatSense engine parameters setup
4.1.1.6
........................................................................29Objects
4.1.1.6.1
........................................................................29Options
4.1.1.6.2
........................................................................30Cleaning
4.1.1.6.3
........................................................................30Extensions
4.1.1.6.4
........................................................................30Limits
4.1.1.6.5
........................................................................31Other
4.1.1.6.6
..................................................................................31An infiltration is detected
4.1.1.7
..................................................................................33Document protection
4.1.1.8
..............................................................................33Removable media
4.1.2
..............................................................................33Device control
4.1.3
..................................................................................34Device control rules
4.1.3.1
..................................................................................35Adding Device control rules
4.1.3.2
..............................................................................36HIPS
4.1.4
..............................................................................38Gamer mode
4.1.5
....................................................................................................39Network4.2
..............................................................................40Filtering modes
4.2.1
..................................................................................41Learning mode
4.2.1.1
..............................................................................42Firewall profiles
4.2.2
..............................................................................42Configuring and using rules
4.2.3
..................................................................................43Rules setup
4.2.3.1
........................................................................44Detailed view of all rules
4.2.3.1.1
..................................................................................45Editing rules
4.2.3.2
..............................................................................45Configuring zones
4.2.4
..................................................................................46Network authentication
4.2.4.1
........................................................................46Zone authentication - Client configuration
4.2.4.1.1
........................................................................48Zone authentication - Server configuration
4.2.4.1.2
..............................................................................49Establishing connection - detection
4.2.5
..............................................................................50Logging
4.2.6
..............................................................................50System integration
4.2.7
....................................................................................................51Web and email4.3
..............................................................................52Email client protection
4.3.1
..................................................................................52Integration with email clients
4.3.1.1
........................................................................53Email client protection configuration
4.3.1.1.1
..................................................................................53IMAP, IMAPS scanner
4.3.1.2
..................................................................................54POP3, POP3S filter
4.3.1.3
..................................................................................55Antispam protection
4.3.1.4
........................................................................56Adding addresses to whitelist and blacklist
4.3.1.4.1
........................................................................56Marking messages as spam
4.3.1.4.2
..............................................................................57Web access protection
4.3.2
..................................................................................57HTTP, HTTPs
4.3.2.1
..................................................................................58URL address management
4.3.2.2
..............................................................................59Protocol filtering
4.3.3
..................................................................................59Web and email clients
4.3.3.1
..................................................................................60Excluded applications
4.3.3.2
..................................................................................61Excluded IP addresses
4.3.3.3
........................................................................61Add IPv4 address
4.3.3.3.1
........................................................................61Add IPv6 address
4.3.3.3.2
..................................................................................62SSL protocol checking
4.3.3.4
........................................................................62Certificates
4.3.3.4.1
........................................................................62Trusted certificates
4.3.3.4.1.1
........................................................................63Excluded certificates
4.3.3.4.1.2
........................................................................63Encrypted SSL communication
4.3.3.4.1.3
..............................................................................63Anti-Phishing protection
4.3.4
....................................................................................................64Parental control4.4
..............................................................................67Web page content filtering
4.4.1
..............................................................................68Blocked and allowed web pages
4.4.2
....................................................................................................68Updating the program4.5
..............................................................................71Update settings
4.5.1
..................................................................................72Update profiles
4.5.1.1
..................................................................................72Advanced update setup
4.5.1.2
........................................................................72Update mode
4.5.1.2.1
........................................................................73Proxy server
4.5.1.2.2
........................................................................73Connecting to the LAN
4.5.1.2.3