User Manual

12
Deleting files in archives – In the default cleaning mode, the
entire archive will be deleted only if it contains infected files
and no clean files. In other words, archives are not deleted if
they also contain harmless clean files. However, use caution
when performing a Strict cleaning scan – with Strict cleaning
the archive will be deleted if it contains at least one infected
file, regardless of the status of other files in the archive.
6.2 Removable media scanning and blocking
ESET Cyber Security can run an on-demand scan of inserted
removable media devices (CD, DVD, USB, iOS device etc.).
Removable media may contain malicious code and put your
computer at risk. To block removable media, click Media
blocking setup (see the picture above) or from the main menu
click Setup > Enter application preferences ... > Media from
the main program window and select Enable removable
media blocking. To allow access to certain types of media,
deselect your desired media volumes.
NOTE: To allow access to external CD-ROM drive connected to
your computer via USB cable, deselect the CD-ROM option.
7. Web and mail protection
To access Web and Mail protection from the main menu, click
Setup > Web and Mail. From here you can also access detailed
settings for each module.
Web access and phishing protection - if enabled
(recommended), Real-time file system protection constantly
monitors all antivirus related events.
Email client protection - provides control of email
communication received through POP3 and IMAP protocols.
7.1 Web protection
Web access protection monitors communication between web
browsers and remote servers for compliance with HTTP
(Hypertext Transfer Protocol) rules.
7.1.1 Ports
In the Ports tab you can define the port numbers used for
HTTP communication. By default the port numbers 80, 8080
and 3128 are predefined.
7.1.2 Active mode
ESET Cyber Security also contains the Active Mode submenu,
which defines the checking mode for web browsers. Active
mode examines transferred data from applications accessing
the Internet as a whole, regardless of whether they are
marked as web browsers or not. If it is not enabled,
communications from applications are monitored gradually in
batches. This decreases the effectiveness of the data
verification process, but also provides higher compatibility for
listed applications. If no problems occur while using it, we
recommend that you enable active checking mode by
selecting the checkbox next to the desired application.
When a controlled application downloads data, it is first saved
to a temporary file created by ESET Cyber Security. Data is not
available for the given application at that time. Once
downloading is complete, it is checked for malicious code. If
no infiltration is found, data is sent to the original application.
This process provides complete control of the communications
made by a controlled application. If passive mode is activated,
data is trickle-fed to the original application to avoid timeouts.
7.1.3 URL lists
The URL Lists section enables you to specify HTTP addresses to
block, allow or exclude from checking. Websites in the list of
blocked addresses will not be accessible. Websites in the list of
excluded addresses are accessed without being scanned for
malicious code.
To allow access only to the URL addresses listed in the
Allowed URL list, select the Restrict URL addresses option.
To activate a list, select Enabled next to the list name. If you
want to be notified when entering an address from the
current list, select Notified.
In any list, the special symbols
*
(asterisk) and
?
(question
mark) can be used. The asterisk substitutes any character
string, and the question mark substitutes any symbol.
Particular care should be taken when specifying excluded
addresses, because the list should only contain trusted and
safe addresses. Similarly, it is necessary to ensure that the
symbols * and ? are used correctly in this list.
7.2 Email protection
Email protection provides control of email communication
received through POP3 and IMAP protocols. When examining
incoming messages, the program uses all the advanced
scanning methods included in the ThreatSense scanning
engine. This means that detection of malicious programs takes
place even before being matched against the virus signature
database. Scanning of POP3 and IMAP protocol
communications is independent of the email client used.
ThreatSense Engine - advanced virus scanner setup enables