User Manual

11
6.1.4.5 Limits
The Limits section allows you to specify the maximum size of
objects and levels of nested archives to be scanned:
Maximum Size: Defines the maximum size of objects to be
scanned. Once maximum size is defined, the antivirus
module will scan only objects smaller than the size
specified. This option should only be changed by advanced
users who have specific reasons for excluding larger objects
from scanning.
Maximum Scan Time: Defines the maximum time allotted
for scanning an object. If a user-defined value has been
entered here, the antivirus module will stop scanning an
object when that time has elapsed, whether or not the scan
has finished.
Maximum Nesting Level: Specifies the maximum depth of
archive scanning. We do not recommend changing the
default value of 10; under normal circumstances there
should be no reason to modify it. If scanning is prematurely
terminated due to the number of nested archives, the
archive will remain unchecked.
Maximum File Size: This option allows you to specify the
maximum file size for files contained in archives (when they
are extracted) that are to be scanned. If scanning is
prematurely terminated as a result of this limit, the archive
will remain unchecked.
6.1.4.6 Others
Enable Smart optimization
With Smart Optimization enabled, settings are optimized to
ensure the most efficient level of scanning without
compromising scanning speed. The various protection
modules scan intelligently, making use of different scanning
methods. Smart Optimization is not rigidly defined within the
product. The ESET Development Team is continuously
implementing new changes which are then integrated into
ESET Cyber Security through regular updates. If Smart
Optimization is disabled, only the user-defined settings in the
ThreatSense core of the particular module are applied when
performing a scan.
Scan alternative data stream (On-demand scanner only)
Alternate data streams (resource/data forks) used by the file
system are file and folder associations which are invisible to
ordinary scanning techniques. Many infiltrations try to avoid
detection by disguising themselves as alternative data
streams.
6.1.5 An infiltration is detected
Infiltrations can reach the system from various entry points:
webpages, shared folders, email or removable computer
devices (USB, external disks, CDs, DVDs, etc.).
If your computer is showing signs of malware infection, for
example it runs slower, often freezes, etc., we recommend
that you take the following steps:
1. Click Computer scan.
2. Click Smart scan (for more information, see the Smart scan
section).
3. After the scan has finished, review the log for the number
of scanned, infected and cleaned files.
If you only wish to scan a certain part of your disk click Custom
scan and select targets to be scanned for viruses.
As a general example of how infiltrations are handled by ESET
Cyber Security, suppose that an infiltration is detected by the
Real-time file system monitor using the default cleaning level.
Real-time protection will attempt to clean or delete the file. If
there is no predefined action available for the Real-time
protection module, you will be asked to select an option in an
alert window. Usually, the options Clean, Delete and No
action are available. Selecting No action is not recommended,
since the infected file(s) is left in its infected state. This option
is intended for situations when you are sure that the file is
harmless and has been detected by mistake.
Cleaning and deleting – Apply cleaning if a file has been
attacked by a virus that has attached malicious code to it. If
this is the case, first attempt to clean the infected file in order
to restore it to its original state. If the file consists exclusively
of malicious code, it will be deleted.
8