Installation manual

124
4.11.1 Suspicious files
The Suspicious files tab allows you to configure the manner in which threats are submitted to ESET‘s Threat Lab for
analysis.
If you find a suspicious file, you can submit it for analysis to our ThreatLabs. If it is a malicious application, its
detection will be added to the next virus signature update.
File submission can be set to occur automatically, or select the Ask before submitting option if you wish to know
which files have been sent for analysis and confirm the submission.
If you do not want any files to be submitted, select the Do not submit for analysis option. Selecting not to submit
files for analysis does not affect submission of statistical information which is configured in its own setup (see
section Statistics ).
When to submitBy default, the As soon as possible option is selected for suspicious files to be sent to ESET‘s
Threat Lab. This is recommended if a permanent Internet connection is available and suspicious files can be
delivered without delay. Select the During update option for suspicious files to uploaded to ThreatSense.Net during
the next update.
Exclusion filterThe Exclusion filter allows you to exclude certain files/folders from submission. For example, it
may be useful to exclude files which may carry confidential information, such as documents or spreadsheets. The
most common file types are excluded by default (.doc, etc.). You can add to the list of excluded files if desired.
Contact email – Your Contact email [optional] can sent with any suspicious files and may be used to contact you
if further information is required for analysis. Please note that you will not receive a response from ESET unless
more information is needed.
125