User Manual

9
6.1.2.2 Scan targets
The Scan targets tree structure allows you to select files and
folders to be scanned for viruses. Folders may also be selected
according to a profile's settings.
A scan target can be more precisely defined by entering the
path to the folder or file(s) you wish to include in scanning.
Select targets from the tree structure that lists all available
folders on the computer by selecting the check box that
corresponds to a given file or folder.
6.1.2.3 Scan profiles
Your preferred scan settings can be saved for future scanning.
We recommend that you create a different profile (with
various scan targets, scan methods and other parameters) for
each regularly used scan.
To create a new profile, from the main menu click Setup >
Enter application preferences ... (or press
cmd-,
) > Computer
Scan and click Edit... next to the list of current profiles.
To help you create a scan profile to fit your needs, see the
ThreatSense engine parameters setup section for a
description of each parameter of the scan setup.
Example: Suppose that you want to create your own scan
profile and the Smart scan configuration is partially suitable,
but you do not want to scan runtime packers or potentially
unsafe applications and you also want to apply Strict cleaning.
In the On-demand Scanner Profiles List window, type the
profile name, click the Add button and confirm by clicking OK.
Then adjust the parameters to meet your requirements by
setting ThreatSense Engine and Scan Targets.
6.1.3 Exclusions
This section (Setup > Enter application preferences ... >
Exclusions) enables you to exclude certain files/folders,
applications or IP/IPv6 addresses from scanning.
Files and folders listed in the FileSystem list will be excluded
from all scanners: System (startup), Real-time and On-
Demand.
Path - path to excluded files and folders
Threat - if there is a name of a threat next to an excluded
file, it means that the file is only excluded for the given
threat, but not completely. If that file becomes infected
later with other malware, it will be detected by the antivirus
module.
Add... - excludes objects from detection. Enter the path to
an object (you can also use the wildcards
*
and
?
) or select
the folder or file from the tree structure.
Edit... - enables you to edit selected entries
Delete - removes selected entries
Default - cancels all exclusions.
In the Web and Mail tab, you can exclude certain Applications
or IP/IPv6 addresses from protocol scanning.
6.1.4 ThreatSense engine parameters setup
ThreatSense is a proprietary ESET technology comprised of
several complex threat detection methods. This technology is
proactive, which means it also provides protection during the
early hours of the spread of a new threat. It uses a
combination of several methods (code analysis, code
emulation, generic signatures, virus signatures) that work in
concert to significantly enhance system security. The scanning
engine is capable of controlling several data streams
simultaneously, maximizing the efficiency and detection rate.
ThreatSense technology also successfully prevents rootkits.
The ThreatSense technology setup options allow you to
specify several scan parameters:
File types and extensions that are to be scanned
The combination of various detection methods
Levels of cleaning, etc.
To enter the setup window click Setup > Enter application
preferences ... (or press
cmd-,
) and then click the ThreatSense
Engine Setup... button located in the System Protection, Real-
Time Protection and Computer Scan modules, which all use
ThreatSense technology (see below). Different security
scenarios may require different configurations. With this in
mind, ThreatSense is individually configurable for the
following protection modules:
System Protection - Automatic startup file check
Real-Time Protection - Real-time file system protection
Computer Scan - On-demand computer scan.
The ThreatSense parameters are specifically optimized for
each module, and their modification can significantly influence
system operation. For example, changing settings to always
scan runtime packers, or enabling advanced heuristics in the
9