Installation manual

77
4.1.8 An infiltration is detected
Infiltrations can reach the system from various entry points; webpages, shared folders, via email or from removable
computer devices (USB, external disks, CDs, DVDs, diskettes, etc.).
If your computer is showing signs of malware infection, e.g., it is slower, often freezes, etc., we recommend that
you do the following:
Open ESET Mail Security and click Computer scan
Click Smart scan (for more information, see section Smart scan )
After the scan has finished, review the log for the number of scanned, infected and cleaned files.
If you only wish to scan a certain part of your disk, click Custom scan and select targets to be scanned for viruses.
As a general example of how infiltrations are handled in ESET Mail Security, suppose that an infiltration is detected
by the real-time file system monitor, which uses the Default cleaning level. It will attempt to clean or delete the file.
If there is no predefined action to take for the real-time protection module, you will be asked to select an option in
an alert window. Usually, the options Clean, Delete and Leave are available. Selecting Leave is not recommended,
since the infected file(s) would be left untouched. The exception to this is when you are sure that the file is harmless
and has been detected by mistake.
Cleaning and deleting – Apply cleaning if a file has been attacked by a virus which has attached malicious code to
the file. If this is the case, first attempt to clean the infected file in order to restore it to its original state. If the file
consists exclusively of malicious code, it will be deleted.
If an infected file is “locked“ or in use by a system process, it will usually only be deleted after it is released (normally
after a system restart).
Deleting files in archivesIn the Default cleaning mode, the entire archive will be deleted only if it contains
infected files and no clean files. In other words, archives are not deleted if they also contain harmless clean files.
However, use caution when performing a Strict cleaning scan – with Strict cleaning the archive will be deleted if it
contains at least one infected file, regardless of the status of other files in the archive.
67