ESET Internet Security. ESET Internet Security


Add to my manuals
150 Pages

advertisement

ESET Internet Security. ESET Internet Security | Manualzz

6

1. ESET Internet Security

ESET Internet Security represents a new approach to truly integrated computer security. The result is an intelligent system that is constantly on alert for attacks and malicious software that might endanger your computer.

ESET Internet Security is a complete security solution that combines maximum protection and a minimal system footprint. Our advanced technologies use artificial intelligence to prevent infiltration by viruses, spyware, trojan horses, worms, adware, rootkits, and other threats without hindering system performance or disrupting your computer.

Features and benefits

Redesigned user interface

Antivirus and antispyware

Regular updates

ESET LiveGrid®

(Cloud-powered Reputation)

Device control

HIPS functionality

Gamer mode

The user interface in this version has been significantly redesigned and simplified based on the results of usability testing. All GUI wording and notifications have been carefully reviewed and the interface now provides support for right-to-left languages such as Hebrew and Arabic.

Online help is now integrated into ESET Internet Security and offers dynamically updated support content.

Proactively detects and cleans more known and unknown viruses, worms, trojans and rootkits. Advanced heuristics flags even never-before-seen malware, protecting you from unknown threats and neutralizing them before they can do any harm. Web access protection and Anti-Phishing works by monitoring communication between web browsers and remote servers (including SSL). Email client protection provides control of email communication received through the POP3(S) and IMAP(S) protocols.

Regularly updating the detection engine (previously known as "virus signature database") and program modules is the best way to ensure the maximum level of security on your computer.

You can check the reputation of running processes and files directly from

ESET Internet Security.

Automatically scans all USB flash drives, memory cards and CDs/DVDs.

Blocks removable media based on the type of media, manufacturer, size and other attributes.

You can customize the behavior of the system in greater detail; specify rules for the system registry, active processes and programs, and finetune your security posture.

Postpones all pop-up windows, updates or other system-intensive activities to conserve system resources for gaming and other full-screen activities.

A license needs to be active in order for features of ESET Internet Security to be operational. It is recommended that you renew your license several weeks before the license for ESET Internet Security expires.

1.1 What's new in this version?

The new version of ESET Internet Security features the following improvements:

·

One-click logging – You can create advanced logs with just one click.

·

Unified Extensible Firmware Interface (UEFI) Scanner – Adds elevated levels of malware protection by detecting and removing threats that potentially launch before the operating system boots up. For more information click

here .

·

High performance and low system impact – This version is designed for efficient use of system resources, allowing you to enjoy your computer's performance while defending against new types of threats.

·

Reorganized Advanced setup – The ESET LiveGrid® settings were moved to the Detection engine section,

Antispam advanced logging moved to Diagnostic section, etc.

·

Improved screen reader support – ESET Internet Security supports the most popular screen readers (JAWS, NVDA,

Narrator).

·

Drag and drop files scan – You can scan a file or folder by just by dragging it to the marked area.

·

ESET Internet Security is now being installed in a compact format to make the installation faster. After the product is installed and activated, the modules start downloading.

·

ESET Internet Security informs you when you connect to an unprotected wireless network or a network with weak protection.

For more details about the new features in ESET Internet Security please read the following ESET Knowledgebase article:

What's new in this version of ESET home products

1.2 Which product do I have?

ESET offers multiple layers of security with new products from powerful and fast antivirus solution to all-in-one security solution with minimal system footprint:

·

ESET NOD32 Antivirus

·

ESET Internet Security

·

ESET Smart Security Premium

To determine which product you have installed open the main program window (see the Knowledgebase article ) and you will see the name of the product at the top of the window (header).

The table below details features available in each specific product.

Antivirus

Antispyware

Exploit Blocker

Script-Based Attack Protection

Anti-Phishing

Web access protection

HIPS (including Anti-Ransomware protection )

Antispam

Firewall

Connected Home Monitor

Webcam Protection

Network Attack Protection

Botnet Protection

Banking & Payment Protection

Parental Control

Anti-Theft

ESET Password Manager

ESET Secure Data

ESET NOD32 Antivirus ESET Internet Security ESET Smart Security

Premium

7

8

NOTE

Some of the products above may not be available for your language / region.

1.3 System requirements

Your system should meet the following hardware and software requirements for ESET Internet Security to perform optimally:

Processors Supported

Intel® or AMD x86-x64

Supported Operating Systems

Microsoft® Windows® 10

Microsoft® Windows® 8.1

Microsoft® Windows® 8

Microsoft® Windows® 7

Microsoft® Windows® Vista

Microsoft® Windows® Home Server 2011 64-bit

NOTE

ESET Anti-Theft does not support Microsoft Windows Home Servers.

1.4 Prevention

When you work with your computer, and especially when you browse the Internet, please keep in mind that no antivirus system in the world can completely eliminate the risk of

infiltrations and

attacks . To provide maximum

protection and convenience, it is essential that you use your antivirus solution correctly and adhere to several useful rules:

Update regularly

According to statistics from ThreatSense, thousands of new, unique infiltrations are created each day in order to bypass existing security measures and bring profit to their authors – all at the expense of other users. The specialists at the ESET Research Lab analyze these threats on a daily basis and prepare and release updates in order to continually improve the level of protection for our users. To ensure the maximum effectiveness of these updates it is important that updates are configured properly on your system. For more information on how to configure updates, see the

Update setup chapter.

Download security patches

The authors of malicious software often exploit various system vulnerabilities in order to increase the effectiveness of spreading malicious code. With this in mind, software companies watch closely for any vulnerabilities in their applications to appear and release security updates to eliminate potential threats on a regular basis. It is important to download these security updates as they are released. Microsoft Windows and web browsers such as Internet

Explorer are two examples of programs for which security updates are released on a regular schedule.

Back up important data

Malware writers usually do not care about users’ needs, and the activity of malicious programs often leads to total malfunction of an operating system and the loss of of important data. It is important to regularly back up your important and sensitive data to an external source such as a DVD or external hard drive. This will make it far easier and faster to recover your data in the event of system failure.

Regularly scan your computer for viruses

Detection of more known and unknown viruses, worms, trojans and rootkits are handled by the Real-time file system protection module. This means that every time you access or open a file, it is scanned for a malware activity.

We recommend that you run a full Computer scan at least once a month because malware signatures may vary and the detection engine updates itself each day.

Follow basic security rules

This is the most useful and most effective rule of all – always be cautious. Today, many infiltrations require user intervention in order to be executed and distributed. If you are cautious when opening new files, you will save considerable time and effort that would otherwise be spent cleaning infiltrations. Here are some useful guidelines:

·

Do not visit suspicious websites with multiple pop-ups and flashing advertisements.

·

Be careful when installing freeware programs, codec packs, etc. Only use safe programs and only visit safe

Internet websites.

·

Be cautious when opening email attachments, particularly those from mass-mailed messages and messages from unknown senders.

·

Don't use an Administrator account for everyday work on your computer.

9

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

advertisement

Table of contents