for Mac
Quick Start Guide
ESET Cybersecurity provides state-of-the-art protection for your computer against
malicious code. Based on the ThreatSense® scanning engine first introduced in the
award-winning NOD32 antivirus system, ESET Cybersecurity continues to deliver
unprecedented protection against zero-day threats, without the need for constant
signature updates to recognize the threats. This manual will guide you step‑by-step
through the quick setup and configuration of the product.
Antivirus: Proactively detects and disables
more known and even unknown new
malware threats than any other security
Antispyware: Protects you from hidden
backdoors, downloaders, exploits, crackers,
hijackers, password stealers, key loggers
and proxies.
Protection status informs you about the current
protection level of your computer and security.
Setup options allow you to adjust the protection levels
of your computer.
A computer scan is an important part of each
antivirus solution. It is used to perform a scan of the
files and folders on your computer’s disk(s).
The Tools section, available in extended mode, allows
you to enter advanced features: log files, quarantine and
The Update section contains important information
about the program updates. It is vitally important
for the program to update regularly to provide the
maximum level of protection against the latest
Comprehensive help and support for ESET Cybersecurity.
You can also contact ESET technical support directly
from here.
Before you begin the installation
process, please close all open programs
on your computer. ESET Cybersecurity
contains components that may
conflict with other antivirus programs
that may already be installed on your
computer. ESET strongly recommends
that you remove any other program(s)
to prevent potential problems. You
can install ESET Cybersecurity from an
installation CD or from a file available
on the ESET website.
To launch the installer wizard, do one
of the following:
• If you are installing from the
installation CD, insert the CD into the
CD-ROM drive and the menu screen
will appear. Double-click on the ESET
Cybersecurity Installation icon to
launch the installer.
• I f you are installing from a down­
loaded file, double-click the file you
downloaded to launch the installer.
dditional features including
manuals, training and uninstalling
can be accessed by double-clicking on
the appropriate icon from the menu
After launching the installer and
accepting the license agreement,
the installer will offer two types of
installation options:
Typical – only the most important
parameters will be configured during
installation. Other parameters will be
pre-set to their recommended settings.
This mode provides our recommended
comprehensive protection and is
suitable for most users.
Custom – enables configuration
of all advanced parameters during
This guide describes typical installation.
Detection of potentially
unwanted applications
Installation location
ThreatSense.Net plays an important
role in our research regarding new
detection technologies that enable
us to proactively capture malware
and thus provide you with better
protection. We recommend that
you leave the ThreatSense.Net Early
Warning System enabled.
Since some potentially unwanted
applications are used legitimately and
might not necessarily pose a security
risk, the user‘s consent is required to
enable detection. We recommend
selecting the Enable detection of
potentially unwanted applications
Select a disk where you want to install
ESET Cybersecurity and click Continue.
Click Continue to proceed to the next
Click Continue to proceed to the next
Completing the installation
Product Activation
When all necessary parameters
have been configured, start the final
installation by clicking the Install
button. The installation progress will
be indicated by a progress bar. After
installation is complete, you must
restart your computer. Simply click
the Restart button on the Installation
Completed screen.
When you restart your machine, you
will see the Product Activation Type
If you purchased ESET Cybersecurity
online, you have already received
a username and password. Select
Activate using a Username and
Password and click Next. Enter your
username (including the hyphon) and
password carefully. Click Activate to
complete the activation process.
If you purchased a retail copy of ESET
Cybersecurity, select Activate using
an Activation Key. The Activation
key is usually supplied on the back of
the product package and inside your
CD case and consists of 12, 13 or 20
characters. Ensure that your email
address is entered correctly, as the
username and password required
for updating ESET Cybersecurity
will be sent to this address. After
clicking Activate, your username
and password will be entered for you
automatically. If you choose not to
activate at this time, click Activate
later. If you selected activate later, the
Product Activation window will appear
the next time you start your system.
The method for entering a username
and password manually is described in
the following section.
ESET Cybersecurity
ESET Cybersecurity starts protecting
your computer immediately after
activation. At any time you may open
ESET Cybersecurity to check your
protection status or to perform various
scanning and maintenance tasks.
To start ESET Cybersecurity:
• Click on the ESET Cybersecurity
located in your menu bar
(top of the screen) and choose
Open window.
Check for new version
For maximum protection, it is
important to use the latest build
of ESET Cybersecurity. To check for
a new version, click Update from
the main menu on the left. If a new
build is available, a message that says
“A new version of ESET Cybersecurity
is available” will be displayed at the
bottom of the window. Click Learn
more… to display a new window
containing the version number of the
new build and the list of changes in the
new version or other important info.
Click Download to download the latest
build. Click OK to close the window and
download the upgrade later.
If you clicked Download, the file will
be downloaded to your downloads
folder (or the default folder set by your
browser). When the file has finished
downloading, launch the file and
follow the installation directions.
Your username and password will
be automatically transferred to the
new installation. It is recommended
to check for upgrades regularly, and
especially after a recent installation.
Entering Username and Password for update
If you purchased ESET Cybersecurity
online, you must enter the username
and password you received with your
license email. You will also need to
enter the username and password if
you are renewing or reinstalling the
Enter the username and password to
the appropriate fields and click OK to
confirm. The username and password
are both case sensitive. Enter them
carefully and precisely. Copying and
pasting from the license email is
In the left pane of the
ESET Cybersecurity screen, select
Update and then click Username and
password setup… on the right.
Your username and password must be
correctly entered to receive updates
and ensure that your computer is
continually protected against newly
emerging threats.
By default, ESET Cybersecurity is
set to receive regular updates (once
every 60 minutes). If you entered
your username and password after
the installation and no update has
been performed yet, we recommend
starting the update manually:
elect Update in the left pane of the
main ESET Cybersecurity screen
lick Update virus signature
The update module will connect to the
Internet, contact an available ESET
update server and download digitally
signed update files, which contain the
most recent malware signatures as
well as new definitions for advanced
heuristics and other program modules.
As soon as a newer update has been
installed, ESET Cybersecurity displays
the new version of the virus signature
database in the Mac OS menu bar.
Computer scanning
After successful installation and
update, we recommend that you
perform a complete computer scan
to check for existing threats. To do
this, click Computer scan in the main
ESET Cybersecurity screen and select
Smart scan. ESET Cybersecurity will
begin scanning all local hard drives. As
long as the scan continues, the status
window shows the progress bar as
well as the current statistics about
scanned and infected files found. If a
threat is detected, ESET Cybersecurity
will quarantine the file and display an
alert. You should be able to continue
working as normal while the scan
takes place.
Protection Status indication
ESET Cybersecurity’s current
protection status is indicated in the
following ways:
• The menu bar icon
• A report in the Protection status
In the event that any protection
module is disabled, the Protection
status window will show the name of
the disabled module, along with a link
allowing you to re-enable it.
The individual protection statuses are
indicated by 3 colors:
green – Antivirus protection is
working properly; your computer is
protected against malicious software
and network attacks. This status
indicates that all protection modules
are enabled and the virus signature
database is up-to-date.
yellow – Real-time file system
protection is enabled, but the
maximum level of protection is not
ensured. The yellow icon is displayed
if ESET Cybersecurity requires your
red – The Real-time file-system
protection is disabled. Since the proper
functioning of these modules is vital to
your system’s security, we recommend
enabling the inactive module
Resolving Issues
ESET’s technical support specialists
are ready to assist you in resolving
potential problems. Before contacting
technical support, we strongly
recommend searching for a solution
on the ESET website first. This will help
you to resolve the problem quickly
within a couple of minutes.
Answers to the most frequently asked
questions can be found at:
For various problem solutions,
directions and hints, read our
To contact ESET’s technical support,
please fill in the support form:
Copyright © 2010 ESET, spol. s r. o. ESET, logo of ESET, NOD32, ThreatSense, ThreatSense.Net
and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o.
Other companies mentioned here or products, may be registered trademarks of its proprietors.
Produced according to quality standards of ISO 9001:2000.
Download PDF