Installation manual

108
Possible exit codes of the scan:
0
– no threat found
1
– threat found but not cleaned
10
– some infected files remained
101
– archive error
102
– access error
103
– internal error
NOTE: Exit codes greater than 100 mean that the file was not scanned and thus can be infected.
4.10 Import and export settings
Importing and exporting configurations of ESET Mail Security is available under Setup by clicking on Import and
export settings.
Both import and export use the .xml file type. Import and export are useful if you need to backup the current
configuration of ESET Mail Security to be able to use it later. The export settings option is also convenient for users
who wish to use their preferred configuration of ESET Mail Security on multiple systems - they can easily import an .
xml file to transfer the desired settings.
4.11 ThreatSense.Net
The ThreatSense.Net Early Warning System keeps ESET immediately and continuously informed about new
infiltrations. The bidirectional ThreatSense.Net Early Warning System has a single purpose – to improve the
protection that we can offer you. The best way to ensure that we see new threats as soon as they appear is to “link“
to as many to as many of our customers as possible and use them as our Threat Scouts. There are two options:
1. You can decide not to enable the ThreatSense.Net Early Warning System. You will not lose any functionality in
the software, and you will still receive the best protection that we offer.
2. You can configure the ThreatSense.Net Early Warning System to submit anonymous information about new
threats and where the new threatening code is contained. This file can be sent to ESET for detailed analysis.
Studying these threats will help ESET update its threat detection capabilities.
The ThreatSense.Net Early Warning System will collect information about your computer related to
newly-detected threats. This information may include a sample or copy of the file in which the threat appeared, the
path to that file, the filename, the date and time, the process by which the threat appeared on your computer and
information about your computer‘s operating system.
While there is a chance that this may occasionally disclose some information about you or your computer
(usernames in a directory path, etc.) to ESET’s Threat Lab, this information will not be used for ANY purpose other
than to help us respond immediately to new threats.
By default, ESET Mail Security is configured to ask before submitting suspicious files for detailed analysis to ESET‘s
Threat Lab. Files with certain extensions such as .doc or .xls are always excluded. You can also add other extensions
if there are particular files that you or your organization wants to avoid sending.