Contents
.......................................................5ESET NOD32 Antivirus1.
....................................................................................................5What's new in this version?1.1
....................................................................................................6Which product do I have?1.2
....................................................................................................7System requirements1.3
....................................................................................................7Prevention1.4
.......................................................9Installation2.
....................................................................................................9Live installer2.1
....................................................................................................10Offline installation2.2
....................................................................................................11Product activation2.3
..............................................................................12Entering your License Key during activation
2.3.1
..............................................................................12Use License Manager
2.3.2
..............................................................................13Activate Trial License
2.3.3
....................................................................................................13Common installation problems2.4
..............................................................................13Activation failed
2.4.1
....................................................................................................14First scan after installation2.5
....................................................................................................14Upgrading to a more recent version2.6
....................................................................................................15Referring ESET product to a friend2.7
.......................................................16Beginner's guide3.
....................................................................................................16The main program window3.1
....................................................................................................18Updates3.2
.......................................................20Working with ESET NOD32 Antivirus4.
....................................................................................................21Computer protection4.1
..............................................................................22Detection engine
4.1.1
..................................................................................23Real-time file system protection
4.1.1.1
........................................................................24Additional ThreatSense parameters
4.1.1.1.1
........................................................................24Cleaning levels
4.1.1.1.2
........................................................................25When to modify real-time protection configuration
4.1.1.1.3
........................................................................25Checking real-time protection
4.1.1.1.4
........................................................................25What to do if real-time protection does not work
4.1.1.1.5
........................................................................26Processes exclusions
4.1.1.1.6
..................................................................................27Computer scan
4.1.1.2
........................................................................28Custom scan launcher
4.1.1.2.1
........................................................................29Scan progress
4.1.1.2.2
........................................................................30Computer scan log
4.1.1.2.3
........................................................................31Malware scans
4.1.1.2.4
........................................................................31Idle-state scan
4.1.1.2.4.1
........................................................................31Scan profiles
4.1.1.2.4.2
........................................................................32Scan targets
4.1.1.2.4.3
........................................................................32Advanced scan options
4.1.1.2.4.4
..................................................................................32Startup scan
4.1.1.3
........................................................................33Automatic startup file check
4.1.1.3.1
..................................................................................33Exclusions
4.1.1.4
........................................................................34Add or Edit exclusion
4.1.1.4.1
........................................................................35Exclusion format
4.1.1.4.2
..................................................................................36ThreatSense parameters
4.1.1.5
........................................................................38Cleaning
4.1.1.5.1
........................................................................38File extensions excluded from scanning
4.1.1.5.2
..................................................................................39An infiltration is detected
4.1.1.6
..................................................................................41Removable media
4.1.1.7
..................................................................................41Document protection
4.1.1.8
..............................................................................42Device control and Webcam protection
4.1.2
..................................................................................43Device control rules editor
4.1.2.1
........................................................................43Detected devices
4.1.2.1.1
..................................................................................44Device groups
4.1.2.2
..................................................................................45Adding Device control rules
4.1.2.3
..............................................................................46Host-based Intrusion Prevention System (HIPS)
4.1.3
..................................................................................48HIPS interactive window
4.1.3.1
........................................................................50Potential ransomware behavior detected
4.1.3.1.1
..................................................................................50HIPS rule management
4.1.3.2
........................................................................51HIPS rule settings
4.1.3.2.1
........................................................................53Add applicaton/registry path for HIPS
4.1.3.2.2
..................................................................................54HIPS exclusions
4.1.3.3
..................................................................................54HIPS advanced setup
4.1.3.4
........................................................................54Drivers always allowed to load
4.1.3.4.1
..............................................................................54Gamer mode
4.1.4
....................................................................................................55Internet protection4.2
..............................................................................55Protocol filtering
4.2.1
..................................................................................56Web and email clients
4.2.1.1
..................................................................................56Excluded applications
4.2.1.2
..................................................................................57Excluded IP addresses
4.2.1.3
........................................................................57Add IPv4 address
4.2.1.3.1
........................................................................57Add IPv6 address
4.2.1.3.2
..................................................................................58SSL/TLS
4.2.1.4
........................................................................59Certificates
4.2.1.4.1
........................................................................59Encrypted network traffic
4.2.1.4.1.1
........................................................................59List of known certificates
4.2.1.4.2
........................................................................60List of SSL/TLS filtered applications
4.2.1.4.3
..............................................................................60Email client protection
4.2.2
..................................................................................61Email protocols
4.2.2.1
..................................................................................62Email alerts and notifications
4.2.2.2
..................................................................................63Integration with email clients
4.2.2.3
........................................................................63Email client protection configuration
4.2.2.3.1
..................................................................................63POP3, POP3S filter
4.2.2.4
..............................................................................64Web access protection
4.2.3
..................................................................................64Basic
4.2.3.1
..................................................................................65Web protocols
4.2.3.2
..................................................................................65URL address management
4.2.3.3
........................................................................66URL addresses list
4.2.3.3.1
........................................................................67Create new URL address list
4.2.3.3.2
........................................................................68How to add URL mask
4.2.3.3.3
..............................................................................68Anti-Phishing protection
4.2.4
....................................................................................................70Updating the program4.3
..............................................................................72Update settings
4.3.1
..................................................................................74Advanced update setup
4.3.1.1
........................................................................74Update mode
4.3.1.1.1
........................................................................74Connection options
4.3.1.1.2
..............................................................................75Update rollback
4.3.2
..............................................................................76How to create update tasks
4.3.3
....................................................................................................77Tools4.4