User guide
6
Rollback previous virus signature database
If you suspect that a virus signature database or product module update may be unstable or corrupt, you can roll back
to the previous version and disable updates for a set period of time.
Improved Anti-Phishing protection
ESET Smart Security will display a warning notification with several options when a web browser attempts to access
websites or domains catalogued in the ESET malware database.
Regular full scan
For increased security, ESET Smart Security version 6 can regularly perform a full scan of your computer during idle
time. The scan is optimized not to run when the computer is operating on battery power.
Regular full scans help detect inactive threats on the computer and improve ESET cloud information about known and
unknown threats or files.
Scanning improvements of downloaded files
In previous versions, files downloaded from the internet were scanned by ESET only after they were completely
downloaded. ESET Smart Security version 6 scans specific file types (e.g. archives) during the download process so that
the user does not have to wait until after the download process for files to be scanned.
Unified application notifications
The design and layout of all notification windows has been unified across version 6.
1.2 System requirements
For seamless operation of ESET Smart Security, your system should meet the following hardware and software
requirements:
Microsoft® Windows® XP
400 MHz 32-bit (x86) / 64-bit (x64)
128MB RAM of system memory
320 MB available space
Super VGA (800 x 600)
Microsoft® Windows® 8, 7, Vista, Home Server
1 GHz 32-bit (x86) / 64-bit (x64)
512MB RAM of system memory
320 MB available space
Super VGA (800 x 600)
1.3 Prevention
When you work with your computer, and especially when you browse the Internet, please keep in my mind that no
antivirus system in the world can completely eliminate the risk of infiltrations and attacks. To provide maximum
protection and convenience, it is essential that you use your antivirus solution correctly and adhere to several useful
rules:
Update regularly
According to statistics from ESET Live Grid, thousands of new, unique infiltrations are created each day in order to
bypass existing security measures and bring profit to their authors – all at the expense of other users. The specialists at
the ESET Virus Lab analyze these threats on a daily basis and prepare and release updates in order to continually
improve the level of protection for our users. To ensure the maximum effectiveness of these updates it is important that
updates are configured properly on your system. For more information on how to configure updates, see the Update
setup chapter.
Download security patches
The authors of malicious software often exploit various system vulnerabilities in order to increase the effectiveness of
spreading malicious code. With this in mind, software companies watch closely for any vulnerabilities in their










