User Manual

13
you to configure scan targets, detection methods, etc. Click
Setup... to display the detailed scanner setup window.
After an email has been checked, a notification containing
scan results can be appended to the message. You can select
Append tag messages to email subject. Tag messages cannot
be relied on without question, since they may be omitted in
problematic HTML messages and can be forged by some
viruses. The following options are available:
Never – no tag messages will be added at all,
To infected email only – only messages containing malicious
software will be marked as checked,
To all scanned email – the program will append messages to
all scanned email.
Template added to the subject of infected email – edit this
template to modify the subject prefix format of an infected
email.
Append tag message to the email footnote - select this
checkbox if you want email protection to include a virus
warning in the infected email. This feature allows for simple
filtering of infected emails. It also increases the level of
credibility for the recipient and, if an infiltration is detected, it
provides valuable information about the threat level of a given
email or sender.
7.2.1 POP3 protocol checking
The POP3 protocol is the most widespread protocol used to
receive email communication in an email client application.
ESET Cyber Security provides protection for this protocol
regardless of the email client used.
The protection module providing this control is automatically
initiated at system startup and is then active in memory. Make
sure the module is enabled for protocol filtering to work
correctly, POP3 protocol checking is performed automatically
with no need to reconfigure your email client. By default, all
communication on port 110 is scanned, but other
communication ports can be added if necessary. Port numbers
must be delimited by a comma.
If Enable POP3 protocol checking option is selected, all POP3
traffic is monitored for malicious software.
7.2.2 IMAP protocol checking
The Internet Message Access Protocol (IMAP) is another
Internet protocol for e-mail retrieval. IMAP has some
advantages over POP3, for example multiple clients can
simultaneously connect to the same mailbox and maintain
message state information such as whether or not the
message has been read, replied to or deleted. ESET Cyber
Security provides protection for this protocol, regardless of
the email client used.
The protection module providing this control is automatically
initiated at system startup and is then active in memory. Make
sure that IMAP protocol checking is enabled for the module to
work correctly; IMAP protocol control is performed
automatically with no need to reconfigure your email client.
By default, all communication on port 143 is scanned, but
other communication ports can be added if necessary. Port
numbers must be delimited by a comma.
If Enable IMAP protocol checking is selected, all traffic
through IMAP is monitored for malicious software.
8. Update
Regularly updating ESET Cyber Security is necessary to
maintain the maximum level of security. The Update module
ensures that the program is always up to date by downloading
the most recent virus signature database.
Click Update from the main menu to view the current update
status of ESET Cyber Security, including the date and time of
the last successful update and if an update is needed. To begin
the update process manually, click Update virus signature
database.
Under normal circumstances, when updates are downloaded
properly, the message Virus signature database is up to date
will appear in the Update window. If the virus signature
database cannot be updated, we recommend that you check
the update settings - the most common reason for this
error is incorrectly entered authentication data (Username
and Password) or incorrectly configured connection settings
.
The Update window also contains information about the virus
signature database version. This numeric indicator is an active
link to ESET’s website, listing all signatures added during the
given update.
NOTE: Your Username and Password are provided by ESET
after purchasing ESET Cyber Security.
8.1 Update setup
Authentication for the ESET update server is based on the
Username and Password generated and sent to you after
purchase.
To enable the use of test mode (downloads pre-release
updates) click Setup > Enter application preferences ... (or
press
cmd-,
) > Update, click Setup... next to Advanced
Options and then select the Enable pre-release updates
checkbox. We recommend the use of test mode only in
situations where a pre-release update is available to fix an
issue you are having with ESET Cyber Security.
13
18