Contents
...............................................................41. ESET Cyber Security
..................................................................................................4What's new in version 61.1
..................................................................................................4System requirements1.2
...............................................................42. Installation
..................................................................................................4Typical installation2.1
..................................................................................................5Custom installation2.2
...............................................................53. Product activation
...............................................................54. Uninstallation
...............................................................55. Basic overview
..................................................................................................6Keyboard shortcuts5.1
..................................................................................................6Checking protection status5.2
..................................................................................................6What to do if the program does not work properly5.3
...............................................................66. Computer protection
..................................................................................................6Antivirus and antispyware protection6.1
.............................................................................6General6.1.1
............................................................................7Exclusions6.1.1.1
.............................................................................7Startup protection6.1.2
.............................................................................7Real-time file system protection6.1.3
............................................................................7Advanced options6.1.3.1
............................................................................7
When to modify Real-time protection
configuration
6.1.3.2
............................................................................8Checking Real-time protection6.1.3.3
............................................................................8
What to do if Real-time protection does not
work
6.1.3.4
.............................................................................8On-demand computer scan6.1.4
............................................................................8Type of scan6.1.4.1
.............................................................................8Smart scan6.1.4.1.1
.............................................................................8Custom scan6.1.4.1.2
............................................................................9Scan targets6.1.4.2
............................................................................9Scan profiles6.1.4.3
.............................................................................9ThreatSense engine parameters setup6.1.5
............................................................................9Objects6.1.5.1
............................................................................10Options6.1.5.2
............................................................................10Cleaning6.1.5.3
............................................................................10Exclusions6.1.5.4
............................................................................10Limits6.1.5.5
............................................................................10Others6.1.5.6
.............................................................................11An infiltration is detected6.1.6
..................................................................................................11Removable media scanning and blocking6.2
...............................................................117. Anti-Phishing
...............................................................118. Web and Email protection
..................................................................................................12Web protection8.1
.............................................................................12Ports8.1.1
.............................................................................12URL lists8.1.2
..................................................................................................12Email protection8.2
.............................................................................12POP3 protocol checking8.2.1
.............................................................................12IMAP protocol checking8.2.2
...............................................................139. Update
..................................................................................................13Update setup9.1
.............................................................................13Advanced options9.1.1
..................................................................................................13How to create update tasks9.2
..................................................................................................13Upgrading ESET Cyber Security to a new version9.3
..................................................................................................13System updates9.4
...............................................................1410.Tools
..................................................................................................14Log files10.1
.............................................................................14Log maintenance10.1.1
.............................................................................14Log filtering10.1.2
..................................................................................................15Scheduler10.2
.............................................................................15Creating new tasks10.2.1
.............................................................................15Creating user-defined tasks10.2.2
..................................................................................................15Quarantine10.3
.............................................................................16Quarantining files10.3.1
.............................................................................16Restoring from Quarantine10.3.2
.............................................................................16Submitting file from Quarantine10.3.3
..................................................................................................16Running processes10.4
..................................................................................................16Live Grid10.5
.............................................................................16Live Grid setup10.5.1
...............................................................1711.User interface
..................................................................................................17Alerts and notifications11.1
.............................................................................17Display alerts11.1.1
.............................................................................17Protection statuses11.1.2
..................................................................................................17Privileges11.2
..................................................................................................18Context menu11.3
...............................................................1812.Miscellaneous
..................................................................................................18Import and export settings12.1
..................................................................................................18Proxy server setup12.2
...............................................................1813.Glossary
..................................................................................................18Types of infiltration13.1
.............................................................................18Viruses13.1.1
.............................................................................18Worms13.1.2
.............................................................................19Trojan horses13.1.3
.............................................................................19Rootkits13.1.4
.............................................................................19Adware13.1.5
.............................................................................19Spyware13.1.6
.............................................................................20Potentially unsafe applications13.1.7
.............................................................................20Potentially unwanted applications13.1.8
..................................................................................................20Types of remote attacks13.2
.............................................................................20DoS attacks13.2.1
.............................................................................20DNS Poisoning13.2.2
.............................................................................20Port scanning13.2.3
.............................................................................20TCP desynchronization13.2.4
.............................................................................20SMB Relay13.2.5
.............................................................................21ICMP attacks13.2.6
..................................................................................................21Email13.3
.............................................................................21Advertisements13.3.1
.............................................................................21Hoaxes13.3.2
.............................................................................21Phishing13.3.3
.............................................................................21Recognizing spam scams13.3.4