Installation manual
.........................................................................66On-demand computer scan4.1.4
........................................................................67Type of scan4.1.4.1
..........................................................................67Smart scan4.1.4.1.1
..........................................................................67Custom scan4.1.4.1.2
........................................................................68Scan targets4.1.4.2
........................................................................68Scan profiles4.1.4.3
........................................................................69Command Line4.1.4.4
.........................................................................71Performance4.1.5
.........................................................................71Protocol filtering4.1.6
........................................................................71SSL4.1.6.1
..........................................................................72Trusted certificates4.1.6.1.1
..........................................................................72Excluded certificates4.1.6.1.2
.........................................................................72ThreatSense engine parameters setup4.1.7
........................................................................73Objects setup4.1.7.1
........................................................................73Options4.1.7.2
........................................................................74Cleaning4.1.7.3
........................................................................75Extensions4.1.7.4
........................................................................76Limits4.1.7.5
........................................................................76Other4.1.7.6
.........................................................................77An infiltration is detected4.1.8
........................................................................78Updating the program4.2
.........................................................................79Update setup4.2.1
........................................................................80Update profiles4.2.1.1
........................................................................80Advanced update setup4.2.1.2
..........................................................................81Update mode4.2.1.2.1
..........................................................................82Proxy server4.2.1.2.2
..........................................................................84Connecting to the LAN4.2.1.2.3
..........................................................................85Creating update copies - Mirror4.2.1.2.4
.........................................................................86Updating from the Mirror4.2.1.2.4.1
.........................................................................87Troubleshooting Mirror update problems4.2.1.2.4.2
.........................................................................87How to create update tasks4.2.2
........................................................................88Scheduler4.3
.........................................................................88Purpose of scheduling tasks4.3.1
.........................................................................89Creating new tasks4.3.2
........................................................................90Quarantine4.4
.........................................................................90Quarantining files4.4.1
.........................................................................90Restoring from Quarantine4.4.2
.........................................................................91Submitting file from Quarantine4.4.3
........................................................................92Log files4.5
.........................................................................96Log filtering4.5.1
.........................................................................97Find in log4.5.2
.........................................................................98Log maintenance4.5.3
........................................................................99ESET SysInspector4.6
.........................................................................99Introduction to ESET SysInspector4.6.1
........................................................................99Starting ESET SysInspector4.6.1.1
.........................................................................100User Interface and application usage4.6.2
........................................................................100Program Controls4.6.2.1
........................................................................101Navigating in ESET SysInspector4.6.2.2
..........................................................................102Keyboard shortcuts4.6.2.2.1
........................................................................104Compare4.6.2.3
.........................................................................105Command line parameters4.6.3
.........................................................................105Service Script4.6.4
........................................................................105Generating Service script4.6.4.1
........................................................................106Structure of the Service script4.6.4.2
........................................................................108Executing Service scripts4.6.4.3
.........................................................................108FAQ4.6.5
.........................................................................109ESET SysInspector as part of ESET Mail Security4.6.6
........................................................................110ESET SysRescue4.7
.........................................................................110Minimum requirements4.7.1
.........................................................................110How to create rescue CD4.7.2
.........................................................................111Target selection4.7.3
.........................................................................111Settings4.7.4
........................................................................111Folders4.7.4.1
........................................................................111ESET Antivirus4.7.4.2
........................................................................112Advanced settings4.7.4.3
........................................................................112Internet protocol4.7.4.4
........................................................................112Bootable USB device4.7.4.5
........................................................................112Burn4.7.4.6
.........................................................................113Working with ESET SysRescue4.7.5
........................................................................113Using ESET SysRescue4.7.5.1
........................................................................113User interface options4.8
.........................................................................115Alerts and notifications4.8.1
.........................................................................116Disable GUI on Terminal Server4.8.2
........................................................................116eShell4.9
.........................................................................117Usage4.9.1
.........................................................................120Commands4.9.2
........................................................................122Import and export settings4.10
........................................................................122ThreatSense.Net4.11
.........................................................................124Suspicious files4.11.1
.........................................................................125Statistics4.11.2
.........................................................................126Submission4.11.3
........................................................................127Remote administration4.12
........................................................................128Licenses4.13
..................................................129
Glossary5.
........................................................................129Types of infiltration5.1
.........................................................................129Viruses5.1.1
.........................................................................129Worms5.1.2
.........................................................................129Trojan horses5.1.3
.........................................................................130Rootkits5.1.4
.........................................................................130Adware5.1.5
.........................................................................130Spyware5.1.6
.........................................................................131Potentially unsafe applications5.1.7
.........................................................................131Potentially unwanted applications5.1.8
........................................................................131Email5.2
.........................................................................132Advertisements5.2.1
.........................................................................132Hoaxes5.2.2
.........................................................................132Phishing5.2.3
.........................................................................132Recognizing spam scams5.2.4
........................................................................133Rules5.2.4.1
........................................................................133Bayesian filter5.2.4.2
........................................................................133Whitelist5.2.4.3
........................................................................133Blacklist5.2.4.4
........................................................................134Server-side control5.2.4.5