User Manual
18
displayed by adjusting the Close notifications automatically
after X seconds value.
To see only notifications requiring user interaction when
running applications in full screen, select Enable full screen
mode. This is useful when giving presentations, playing games
or doing other activities that require the entire screen.
10.1.1 Alerts and notifications advanced setup
ESET Cyber Security displays alert dialog windows informing
you of new program versions, operating system updates, the
disabling of certain program components, the deletion of logs
etc. You can suppress each notification individually by
selecting Do not show this dialog again.
List of Dialogs (Setup > Enter application preferences ... >
Alerts and notifications > Setup...) shows the list of all alert
dialogs triggered by ESET Cyber Security. To enable or
suppress each notification, select the check box left of the
Notification Name. Additionally, you can define Display
Conditions under which notifications about new program
versions and operating system updates will be displayed.
10.2 Privileges
ESET Cyber Security settings can be very important to your
organization’s security policy. Unauthorized modifications may
endanger the stability and protection of your system. For this
reason, you can define which users have permission to edit
the program configuration.
To specify privileged users, click Setup > Enter application
preferences ... (or press
cmd-,
) > Privileges.
In order to provide maximum security for your system, it is
essential that the program be correctly configured.
Unauthorized modifications can result in the loss of important
data. To set a list of privileged users, select them from the
Users list on the left and click Add. To display all users, select
Show all users. To remove a user, select their name from the
Privileged Users list on the right and click Remove.
NOTE: If the list of privileged users is empty, all users of the
system will have permission to edit the program settings.
10.3 Context menu
Context menu integration can be enabled by clicking Setup >
Enter application preferences ... (or press
cmd-,
) > Context
Menu section by selecting the Integrate into the context
menu option. Logging out or restarting the computer is
required for changes to take effect. Context menu options will
be available in the Finder window when you CTRL+click on any
file.
11. Miscellaneous
11.1 Import and export settings
Importing and exporting configurations of ESET Cyber Security
can be done from the Setup section.
Import and export are useful if you need to backup your
current configuration of ESET Cyber Security for use at a later
date. Export settings is also convenient for users who want to
use their preferred configuration of ESET Cyber Security on
multiple systems. You can easily import a configuration file to
transfer your desired settings.
11.1.1 Import settings
To import a configuration click Setup > Import and export
settings ... from the main menu and then select Import
settings. Enter the name of your configuration file or click
Browse... to browse for the configuration file you want to
import.
11.1.2 Export settings
To export a configuration, click Setup > Import and export
settings ... from the main menu. Select Export settings and
enter the name of your configuration file. Use the browser to
select a location on your computer to save the configuration
file.
11.2 Proxy server setup
Proxy server settings can be configured in Setup > Enter
application preferences ... (or press
cmd-,
) > Proxy Server.
Specifying the proxy server at this level defines global proxy
server settings for all ESET Cyber Security functions.
Parameters defined here will be used by all modules that
require a connection to the Internet.
To specify proxy server settings for this level select Use proxy
server and enter the IP address or URL of your proxy server in
the Proxy Server field. In the Port field, specify the port where
the proxy server accepts connections (3128 by default).
If communication with the proxy server requires
authentication, select Proxy server requires authentication
and enter a valid Username and Password into the respective
fields.