User guide

Table Of Contents
Contents
..................................................5
ESET NOD32 Antivirus 61.
........................................................................5What's new1.1
........................................................................6System requirements1.2
........................................................................6Prevention1.3
..................................................8
Installation2.
........................................................................8Live installer2.1
........................................................................9Offline installation2.2
.................................................................................10Typical installation2.2.1
.................................................................................10Custom installation2.2.2
........................................................................11Product activation2.3
........................................................................11Entering username and password2.4
........................................................................12Upgrading to a more recent version2.5
........................................................................12Computer scan2.6
..................................................13
Beginner's guide3.
........................................................................13Introducing user interface design3.1
........................................................................15Updates3.2
..................................................16
Work with ESET NOD32 Antivirus4.
........................................................................17Computer4.1
.................................................................................18Antivirus and antispyware4.1.1
.............................................................................18Real-time file system protection4.1.1.1
...............................................................................19Advanced scan options4.1.1.1.1
...............................................................................20Cleaning levels4.1.1.1.2
...............................................................................20
When to modify real-time protection
configuration
4.1.1.1.3
...............................................................................21Checking real-time protection4.1.1.1.4
...............................................................................21What to do if real-time protection does not work4.1.1.1.5
.............................................................................21Computer scan4.1.1.2
...............................................................................22Custom scan launcher4.1.1.2.1
...............................................................................23Scan progress4.1.1.2.2
...............................................................................24Scan profiles4.1.1.2.3
.............................................................................24Startup scan4.1.1.3
...............................................................................24Automatic startup file check4.1.1.3.1
.............................................................................25Idle-state scanning4.1.1.4
.............................................................................25Exclusions4.1.1.5
.............................................................................26ThreatSense engine parameters setup4.1.1.6
...............................................................................26Objects4.1.1.6.1
...............................................................................27Options4.1.1.6.2
...............................................................................27Cleaning4.1.1.6.3
...............................................................................27Extensions4.1.1.6.4
...............................................................................28Limits4.1.1.6.5
...............................................................................28Other4.1.1.6.6
.............................................................................28An infiltration is detected4.1.1.7
.............................................................................30Document protection4.1.1.8
.................................................................................30Removable media4.1.2
.............................................................................31Filtering rules4.1.2.1
.............................................................................31Edit filtering rule4.1.2.2
.................................................................................32Host-based Intrusion Prevention System (HIPS)4.1.3
........................................................................34Web and email4.2
.................................................................................34Email client protection4.2.1
.............................................................................35Integration with email clients4.2.1.1
...............................................................................35Email client protection configuration4.2.1.1.1
.............................................................................36IMAP, IMAPS scanner4.2.1.2
.............................................................................36POP3, POP3S filter4.2.1.3
.................................................................................37Web access protection4.2.2
.............................................................................37HTTP, HTTPs4.2.2.1
...............................................................................38Active mode for web browsers4.2.2.1.1
.............................................................................38URL address management4.2.2.2
.................................................................................39Protocol filtering4.2.3
.............................................................................39Web and email clients4.2.3.1
.............................................................................40Excluded applications4.2.3.2
.............................................................................41Excluded IP addresses4.2.3.3
...............................................................................41Add IPv4 address4.2.3.3.1
...............................................................................41Add IPv6 address4.2.3.3.2
.............................................................................42SSL protocol checking4.2.3.4
...............................................................................42Certificates4.2.3.4.1
............................................................................42Trusted certificates4.2.3.4.1.1
............................................................................43Excluded certificates4.2.3.4.1.2
............................................................................43Encrypted SSL communication4.2.3.4.1.3
.................................................................................43Anti-Phishing protection4.2.4
........................................................................44Updating the program4.3
.................................................................................47Update setup4.3.1
.............................................................................48Update profiles4.3.1.1
.............................................................................48Advanced update setup4.3.1.2
...............................................................................48Update mode4.3.1.2.1
...............................................................................49Proxy server4.3.1.2.2
...............................................................................49Connecting to the LAN4.3.1.2.3
.............................................................................50Update rollback4.3.1.3
.................................................................................51How to create update tasks4.3.2
........................................................................51Tools4.4
.................................................................................52Log files4.4.1
.............................................................................53Log maintenance4.4.1.1
.................................................................................53Scheduler4.4.2
.................................................................................54Protection statistics4.4.3
.................................................................................55Watch activity4.4.4
.................................................................................55ESET SysInspector4.4.5
.................................................................................56ESET Live Grid4.4.6
.............................................................................56Suspicious files4.4.6.1
.................................................................................57Running processes4.4.7
.................................................................................58Quarantine4.4.8
.................................................................................59Proxy server setup4.4.9
.................................................................................60Alerts and notifications4.4.10
.............................................................................61Message format4.4.10.1
.................................................................................61Submission of files for analysis4.4.11
.................................................................................62System updates4.4.12
........................................................................62User interface4.5
.................................................................................62Graphics4.5.1
.................................................................................63Alerts and notifications4.5.2
.............................................................................63Advanced setup4.5.2.1
.................................................................................63Hidden notification windows4.5.3
.................................................................................63Access setup4.5.4
.................................................................................64Program menu4.5.5
.................................................................................65Context menu4.5.6
.................................................................................65Gamer mode4.5.7
..................................................66
Advanced user5.
........................................................................66Profile manager5.1
........................................................................66Keyboard shortcuts5.2
........................................................................67Diagnostics5.3
........................................................................67Import and export settings5.4
........................................................................67Idle state detection5.5
........................................................................68ESET SysInspector5.6
.................................................................................68Introduction to ESET SysInspector5.6.1
.............................................................................68Starting ESET SysInspector5.6.1.1