4.4 ESET SysInspector 47 ....................................................................................................................
4.4 Scheduler 48 .............................................................................................................................
4.4 Scheduled scan options 50 ..............................................................................................................
4.4 Scheduled task overview 51 .............................................................................................................
4.4 Task details 51 ...........................................................................................................................
4.4 Task timing 52 ............................................................................................................................
4.4 Task timing - Once 52 ....................................................................................................................
4.4 Task timing - Daily 52 ....................................................................................................................
4.4 Task timing - Weekly 52 .................................................................................................................
4.4 Task timing - Event triggered 52 ........................................................................................................
4.4 Skipped task 53 ..........................................................................................................................
4.4 Task details - Update 53 .................................................................................................................
4.4 Task details - Run application 53 ........................................................................................................
4.4 System cleaner 54 .......................................................................................................................
4.4 Quarantine 55 ............................................................................................................................
4.4 Select sample for analysis 57 ............................................................................................................
4.4 Select sample for analysis - Suspicious file 58 ..........................................................................................
4.4 Select sample for analysis - Suspicious site 58 .........................................................................................
4.4 Select sample for analysis - False positive file 59 ......................................................................................
4.4 Select sample for analysis - False positive site 59 ......................................................................................
4.4 Select sample for analysis - Other 59 ...................................................................................................
4.5 Setup 59 ......................................................................................................................................
4.5 Computer protection 60 ..................................................................................................................
4.5 An infiltration is detected 61 .............................................................................................................
4.5 Internet protection 64 ....................................................................................................................
4.5 Anti-Phishing protection 65 ..............................................................................................................
4.5 Import and export settings 66 ...........................................................................................................
4.6 Help and support 67 ......................................................................................................................
4.6 About ESET NOD32 Antivirus 68 .........................................................................................................
4.6 ESET News 69 ............................................................................................................................
4.6 Submit system configuration data 70 ...................................................................................................
4.6 Technical support 70 .....................................................................................................................
4.7 ESET HOME account 70 ..................................................................................................................
4.7 Connect to ESET HOME 72 ...............................................................................................................
4.7 Log in to ESET HOME 73 .................................................................................................................
4.7 Login failed – common errors 74 ........................................................................................................
4.7 Add device in ESET HOME 74 ............................................................................................................
5 Advanced setup 75 ..............................................................................................................................
5.1 Detection engine 76 ......................................................................................................................
5.1 Exclusions 76 .............................................................................................................................
5.1 Performance exclusions 76 ..............................................................................................................
5.1 Add or Edit performance exclusion 77 ..................................................................................................
5.1 Path exclusion format 79 ................................................................................................................
5.1 Detection exclusions 80 ..................................................................................................................
5.1 Add or Edit detection exclusion 81 ......................................................................................................
5.1 Create detection exclusion wizard 82 ...................................................................................................
5.1 Detection engine advanced options 83 .................................................................................................
5.1 Network traffic scanner 83 ...............................................................................................................
5.1 Cloud-based protection 83 ...............................................................................................................
5.1 Exclusion filter for Cloud-based protection 86 ..........................................................................................
5.1 Malware scans 86 ........................................................................................................................