Contents
..................................................5
ESET Smart Security 61.
........................................................................5What's new1.1
........................................................................6System requirements1.2
........................................................................6Prevention1.3
..................................................8
Installation2.
........................................................................8Live installer2.1
........................................................................9Offline installation2.2
.................................................................................10Typical installation2.2.1
.................................................................................10Custom installation2.2.2
........................................................................11Product activation2.3
........................................................................11Entering username and password2.4
........................................................................12Upgrading to a more recent version2.5
........................................................................12Computer scan2.6
..................................................13
Beginner's guide3.
........................................................................13Introducing user interface design3.1
........................................................................15Updates3.2
........................................................................16Trusted zone setup3.3
........................................................................17Anti-Theft3.4
........................................................................17Parental control tools3.5
..................................................18
Work with ESET Smart Security4.
........................................................................19Computer4.1
.................................................................................20Antivirus and antispyware4.1.1
.............................................................................20Real-time file system protection4.1.1.1
...............................................................................21Advanced scan options4.1.1.1.1
...............................................................................22Cleaning levels4.1.1.1.2
...............................................................................22
When to modify real-time protection
configuration
4.1.1.1.3
...............................................................................23Checking real-time protection4.1.1.1.4
...............................................................................23What to do if real-time protection does not work4.1.1.1.5
.............................................................................23Computer scan4.1.1.2
...............................................................................24Custom scan launcher4.1.1.2.1
...............................................................................25Scan progress4.1.1.2.2
...............................................................................26Scan profiles4.1.1.2.3
.............................................................................26Startup scan4.1.1.3
...............................................................................26Automatic startup file check4.1.1.3.1
.............................................................................27Idle-state scanning4.1.1.4
.............................................................................27Exclusions4.1.1.5
.............................................................................28ThreatSense engine parameters setup4.1.1.6
...............................................................................28Objects4.1.1.6.1
...............................................................................29Options4.1.1.6.2
...............................................................................29Cleaning4.1.1.6.3
...............................................................................29Extensions4.1.1.6.4
...............................................................................30Limits4.1.1.6.5
...............................................................................30Other4.1.1.6.6
.............................................................................30An infiltration is detected4.1.1.7
.............................................................................32Document protection4.1.1.8
.................................................................................32Removable media4.1.2
.............................................................................33Filtering rules4.1.2.1
.............................................................................33Edit filtering rule4.1.2.2
.................................................................................34Host-based Intrusion Prevention System (HIPS)4.1.3
........................................................................36Network4.2
.................................................................................37Filtering modes4.2.1
.............................................................................37Learning mode4.2.1.1
.................................................................................38Firewall profiles4.2.2
.................................................................................38Configuring and using rules4.2.3
.............................................................................39Rules setup4.2.3.1
...............................................................................40Detailed view of all rules4.2.3.1.1
.............................................................................41Editing rules4.2.3.2
.................................................................................41Configuring zones4.2.4
.............................................................................41Network authentication4.2.4.1
...............................................................................42Zone authentication - Client configuration4.2.4.1.1
...............................................................................44Zone authentication - Server configuration4.2.4.1.2
.................................................................................45Establishing connection - detection4.2.5
.................................................................................45Logging4.2.6
.................................................................................46System integration4.2.7
........................................................................46Web and email4.3
.................................................................................47Email client protection4.3.1
.............................................................................47Integration with email clients4.3.1.1
...............................................................................48Email client protection configuration4.3.1.1.1
.............................................................................48IMAP, IMAPS scanner4.3.1.2
.............................................................................49POP3, POP3S filter4.3.1.3
.............................................................................49Antispam protection4.3.1.4
...............................................................................50Adding addresses to whitelist and blacklist4.3.1.4.1
...............................................................................50Marking messages as spam4.3.1.4.2
.................................................................................51Web access protection4.3.2
.............................................................................51HTTP, HTTPs4.3.2.1
...............................................................................52Active mode for web browsers4.3.2.1.1
.............................................................................52URL address management4.3.2.2
.................................................................................53Protocol filtering4.3.3
.............................................................................53Web and email clients4.3.3.1
.............................................................................54Excluded applications4.3.3.2
.............................................................................55Excluded IP addresses4.3.3.3
...............................................................................55Add IPv4 address4.3.3.3.1
...............................................................................55Add IPv6 address4.3.3.3.2
.............................................................................56SSL protocol checking4.3.3.4
...............................................................................56Certificates4.3.3.4.1
............................................................................56Trusted certificates4.3.3.4.1.1
............................................................................57Excluded certificates4.3.3.4.1.2
............................................................................57Encrypted SSL communication4.3.3.4.1.3
.................................................................................57Anti-Phishing protection4.3.4
........................................................................58Parental control4.4
.................................................................................61Web page content filtering4.4.1
.................................................................................62Blocked and allowed web pages4.4.2
........................................................................62Updating the program4.5
.................................................................................65Update setup4.5.1
.............................................................................66Update profiles4.5.1.1
.............................................................................66Advanced update setup4.5.1.2
...............................................................................66Update mode4.5.1.2.1
...............................................................................67Proxy server4.5.1.2.2
...............................................................................67Connecting to the LAN4.5.1.2.3
.............................................................................68Update rollback4.5.1.3
.................................................................................69How to create update tasks4.5.2
........................................................................69Tools4.6
.................................................................................70Log files4.6.1
.............................................................................71Log maintenance4.6.1.1
.................................................................................71Scheduler4.6.2
.................................................................................72Protection statistics4.6.3
.................................................................................73Watch activity4.6.4
.................................................................................73ESET SysInspector4.6.5
.................................................................................74ESET Live Grid4.6.6
.............................................................................74Suspicious files4.6.6.1
.................................................................................75Running processes4.6.7
.................................................................................76Network connections4.6.8
.................................................................................78Quarantine4.6.9