advertisement
6
1. ESET Internet Security
ESET Internet Security represents a new approach to truly integrated computer security. The result is an intelligent system that is constantly on alert for attacks and malicious software that might endanger your computer.
ESET Internet Security is a complete security solution that combines maximum protection and a minimal system footprint. Our advanced technologies use artificial intelligence to prevent infiltration by viruses, spyware, trojan horses, worms, adware, rootkits, and other threats without hindering system performance or disrupting your computer.
Features and benefits
Redesigned user interface
Antivirus and antispyware
Regular updates
ESET LiveGrid®
(Cloud-powered Reputation)
Device control
HIPS functionality
Gamer mode
The user interface in this version has been significantly redesigned and simplified based on the results of usability testing. All GUI wording and notifications have been carefully reviewed and the interface now provides support for right-to-left languages such as Hebrew and Arabic.
Online help is now integrated into ESET Internet Security and offers dynamically updated support content.
Proactively detects and cleans more known and unknown viruses, worms, trojans and rootkits. Advanced heuristics flags even never-before-seen malware, protecting you from unknown threats and neutralizing them before they can do any harm. Web access protection and Anti-Phishing works by monitoring communication between web browsers and remote servers (including SSL). Email client protection provides control of email communication received through the POP3(S) and IMAP(S) protocols.
Regularly updating the detection engine (previously known as "virus signature database") and program modules is the best way to ensure the maximum level of security on your computer.
You can check the reputation of running processes and files directly from
ESET Internet Security.
Automatically scans all USB flash drives, memory cards and CDs/DVDs.
Blocks removable media based on the type of media, manufacturer, size and other attributes.
You can customize the behavior of the system in greater detail; specify rules for the system registry, active processes and programs, and finetune your security posture.
Postpones all pop-up windows, updates or other system-intensive activities to conserve system resources for gaming and other full-screen activities.
A license needs to be active in order for features of ESET Internet Security to be operational. It is recommended that you renew your license several weeks before the license for ESET Internet Security expires.
1.1 What's new in this version?
The new version of ESET Internet Security features the following improvements:
·
One-click logging – You can create advanced logs with just one click.
·
Unified Extensible Firmware Interface (UEFI) Scanner – Adds elevated levels of malware protection by detecting and removing threats that potentially launch before the operating system boots up. For more information click
·
High performance and low system impact – This version is designed for efficient use of system resources, allowing you to enjoy your computer's performance while defending against new types of threats.
·
Reorganized Advanced setup – The ESET LiveGrid® settings were moved to the Detection engine section,
Antispam advanced logging moved to Diagnostic section, etc.
·
Improved screen reader support – ESET Internet Security supports the most popular screen readers (JAWS, NVDA,
Narrator).
·
Drag and drop files scan – You can scan a file or folder by just by dragging it to the marked area.
·
ESET Internet Security is now being installed in a compact format to make the installation faster. After the product is installed and activated, the modules start downloading.
·
ESET Internet Security informs you when you connect to an unprotected wireless network or a network with weak protection.
For more details about the new features in ESET Internet Security please read the following ESET Knowledgebase article:
What's new in this version of ESET home products
1.2 Which product do I have?
ESET offers multiple layers of security with new products from powerful and fast antivirus solution to all-in-one security solution with minimal system footprint:
·
ESET NOD32 Antivirus
·
ESET Internet Security
·
ESET Smart Security Premium
To determine which product you have installed open the main program window (see the Knowledgebase article ) and you will see the name of the product at the top of the window (header).
The table below details features available in each specific product.
Antivirus
Antispyware
Exploit Blocker
Script-Based Attack Protection
Anti-Phishing
Web access protection
HIPS (including Anti-Ransomware protection )
Antispam
Firewall
Connected Home Monitor
Webcam Protection
Network Attack Protection
Botnet Protection
Banking & Payment Protection
Parental Control
Anti-Theft
ESET Password Manager
ESET Secure Data
ESET NOD32 Antivirus ESET Internet Security ESET Smart Security
Premium
7
8
NOTE
Some of the products above may not be available for your language / region.
1.3 System requirements
Your system should meet the following hardware and software requirements for ESET Internet Security to perform optimally:
Processors Supported
Intel® or AMD x86-x64
Supported Operating Systems
Microsoft® Windows® 10
Microsoft® Windows® 8.1
Microsoft® Windows® 8
Microsoft® Windows® 7
Microsoft® Windows® Vista
Microsoft® Windows® Home Server 2011 64-bit
NOTE
ESET Anti-Theft does not support Microsoft Windows Home Servers.
1.4 Prevention
When you work with your computer, and especially when you browse the Internet, please keep in mind that no antivirus system in the world can completely eliminate the risk of
protection and convenience, it is essential that you use your antivirus solution correctly and adhere to several useful rules:
Update regularly
According to statistics from ThreatSense, thousands of new, unique infiltrations are created each day in order to bypass existing security measures and bring profit to their authors – all at the expense of other users. The specialists at the ESET Research Lab analyze these threats on a daily basis and prepare and release updates in order to continually improve the level of protection for our users. To ensure the maximum effectiveness of these updates it is important that updates are configured properly on your system. For more information on how to configure updates, see the
Download security patches
The authors of malicious software often exploit various system vulnerabilities in order to increase the effectiveness of spreading malicious code. With this in mind, software companies watch closely for any vulnerabilities in their applications to appear and release security updates to eliminate potential threats on a regular basis. It is important to download these security updates as they are released. Microsoft Windows and web browsers such as Internet
Explorer are two examples of programs for which security updates are released on a regular schedule.
Back up important data
Malware writers usually do not care about users’ needs, and the activity of malicious programs often leads to total malfunction of an operating system and the loss of of important data. It is important to regularly back up your important and sensitive data to an external source such as a DVD or external hard drive. This will make it far easier and faster to recover your data in the event of system failure.
Regularly scan your computer for viruses
Detection of more known and unknown viruses, worms, trojans and rootkits are handled by the Real-time file system protection module. This means that every time you access or open a file, it is scanned for a malware activity.
We recommend that you run a full Computer scan at least once a month because malware signatures may vary and the detection engine updates itself each day.
Follow basic security rules
This is the most useful and most effective rule of all – always be cautious. Today, many infiltrations require user intervention in order to be executed and distributed. If you are cautious when opening new files, you will save considerable time and effort that would otherwise be spent cleaning infiltrations. Here are some useful guidelines:
·
Do not visit suspicious websites with multiple pop-ups and flashing advertisements.
·
Be careful when installing freeware programs, codec packs, etc. Only use safe programs and only visit safe
Internet websites.
·
Be cautious when opening email attachments, particularly those from mass-mailed messages and messages from unknown senders.
·
Don't use an Administrator account for everyday work on your computer.
9
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 3 Contents
- 6 ESET Internet Security
- 6 What's new in this version?
- 7 Which product do I have?
- 8 System requirements
- 8 Prevention
- 10 Installation
- 10 Live installer
- 11 Offline installation
- 12 Enter a License Key
- 13 Use License Manager
- 13 Change installation folder
- 13 Common installation problems
- 14 Product activation
- 14 Entering your License key
- 15 Upgrading to a more recent version
- 15 First scan after installation
- 16 Beginner's guide
- 16 The main program window
- 18 Updates
- 19 Trusted zone setup
- 20 Anti-Theft
- 21 Parental control tools
- 22 Working with ESET Internet Security
- 24 Computer protection
- 25 Detection engine
- 26 Real-time file system protection
- 27 Additional ThreatSense parameters
- 27 Cleaning levels
- 28 When to modify real-time protection configuration
- 28 Checking real-time protection
- 28 What to do if real-time protection does not work
- 28 Computer scan
- 29 Custom scan launcher
- 31 Scan progress
- 32 Scan profiles
- 32 Computer scan log
- 32 Idle-state scan
- 32 Startup scan
- 33 Automatic startup file check
- 33 Exclusions
- 34 ThreatSense parameters
- 40 Cleaning
- 40 File extensions excluded from scanning
- 40 An infiltration is detected
- 42 Document protection
- 42 Removable media
- 43 Device control
- 44 Device control rules editor
- 45 Adding Device control rules
- 46 Webcam protection rules editor
- 46 Host-based Intrusion Prevention System (HIPS)
- 49 Advanced setup
- 49 HIPS interactive window
- 50 Potential ransomware behavior detected
- 50 Gamer mode
- 51 Internet protection
- 52 Web access protection
- 53 Basic
- 53 Web protocols
- 53 URL address management
- 54 Email client protection
- 54 Email clients
- 55 Email protocols
- 56 Alerts and notifications
- 57 Integration with email clients
- 57 Email client protection configuration
- 57 POP3, POP3S filter
- 58 Antispam protection
- 59 Protocol filtering
- 59 Web and email clients
- 60 Excluded applications
- 60 Excluded IP addresses
- 61 Add IPv4 address
- 61 Add IPv6 address
- 61 SSL/TLS
- 62 Certificates
- 62 Encrypted network traffic
- 63 List of known certificates
- 63 List of SSL/TLS filtered applications
- 64 Anti-Phishing protection
- 65 Network protection
- 66 Firewall
- 67 Learning mode settings
- 68 Network attack protection
- 68 Firewall profiles
- 69 Profiles assigned to network adapters
- 69 Configuring and using rules
- 70 Firewall rules
- 71 Working with rules
- 71 Configuring zones
- 72 Known networks
- 72 Known networks editor
- 75 Network authentication - Server configuration
- 75 Logging
- 76 Establishing connection - detection
- 77 Solving problems with ESET Personal firewall
- 77 Troubleshooting wizard
- 77 Logging and creating rules or exceptions from log
- 77 Create rule from log
- 77 Creating exceptions from Personal firewall notifications
- 78 Advanced PCAP logging
- 78 Solving problems with protocol filtering
- 79 Security tools
- 79 Parental control
- 81 Categories
- 82 Website exceptions
- 83 Updating the program
- 86 Update settings
- 88 Advanced update setup
- 88 Update mode
- 88 Connection options
- 89 Update rollback
- 90 How to create update tasks
- 91 Tools
- 91 Connected Home Monitor
- 92 Network device
- 93 Webcam Protection
- 93 Tools in ESET Internet Security
- 94 Log files
- 95 Logging configuration
- 96 Running processes
- 98 Security report
- 99 Watch activity
- 100 Network connections
- 101 ESET SysInspector
- 101 Scheduler
- 103 System cleaner
- 103 ESET SysRescue
- 104 Cloud-based protection
- 105 Suspicious files
- 106 Quarantine
- 107 Proxy server
- 108 Email notifications
- 109 Message format
- 109 Select sample for analysis
- 110 Microsoft Windows® update
- 110 ESET CMD
- 112 User interface
- 112 User interface elements
- 113 Alerts and notifications
- 114 Advanced setup
- 115 Access setup
- 116 Program menu
- 118 Advanced user
- 118 Profiles
- 118 Keyboard shortcuts
- 119 Diagnostics
- 120 Import and export settings
- 120 ESET SysInspector
- 120 Introduction to ESET SysInspector
- 121 Starting ESET SysInspector
- 121 User Interface and application usage
- 121 Program Controls
- 123 Navigating in ESET SysInspector
- 124 Keyboard shortcuts
- 125 Compare
- 126 Command line parameters
- 127 Service Script
- 127 Generating Service script
- 127 Structure of the Service script
- 130 Executing Service scripts
- 131 FAQ
- 132 Command Line
- 134 Glossary
- 134 Types of infiltration
- 134 Viruses
- 134 Worms
- 134 Trojans
- 135 Rootkits
- 135 Adware
- 135 Spyware
- 136 Packers
- 136 Potentially unsafe applications
- 136 Potentially unwanted applications
- 139 Botnet
- 139 Types of remote attacks
- 139 DoS attacks
- 139 DNS Poisoning
- 139 Worm attacks
- 139 Port scanning
- 140 TCP desynchronization
- 140 SMB Relay
- 140 ICMP attacks
- 141 ESET Technology
- 141 Exploit Blocker
- 141 Advanced Memory Scanner
- 141 Network Attack Protection
- 141 ESET LiveGrid®
- 142 Botnet protection
- 142 Java Exploit Blocker
- 142 Banking & Payment protection
- 143 Script-Based Attacks Protection
- 143 Ransomware Shield
- 143 UEFI Scanner
- 144 Email
- 144 Advertisements
- 144 Hoaxes
- 145 Phishing
- 145 Recognizing spam scams
- 145 Rules
- 146 Whitelist
- 146 Blacklist
- 146 Exception list
- 146 Server-side control
- 147 Common Questions
- 147 How to update the ESET Internet Security
- 147 How to remove a virus from my PC
- 148 How to allow communication for a certain application
- 148 How to enable Parental control for an account
- 149 How to create a new task in Scheduler
- 150 How to schedule a weekly computer scan
- 150 How to unlock Advanced setup