4.1.5 On‑demand computer scan ...................................16
4.1.5.1 Type of scan ..........................................................16
4.1.5.1.1 Smart scan ...........................................................16
4.1.5.1.2 Custom scan.........................................................16
4.1.5.2 Scan targets .........................................................16
4.1.5.3 Scan profiles ......................................................... 17
4.1.6 Protocol filtering ................................................... 17
4.1.6.1 SSL ....................................................................... 17
4.1.6.1.1 Trusted certificates ...............................................17
4.1.6.1.2 Excluded certificates ............................................. 17
4.1.7 ThreatSense engine parameters setup ................... 17
4.1.7.1 Objects setup .......................................................18
4.1.7.2 Options ................................................................18
4.1.7.3 Cleaning ...............................................................18
4.1.7.4 Extensions ............................................................19
4.1.7.5 Limits ...................................................................19
4.1.7.6 Other ...................................................................19
4.1.8 An infiltration is detected ......................................19
4.2 Updating the program ................................................. 20
4.2.1 Update setup .......................................................20
4.2.1.1 Update profiles ....................................................20
4.2.1.2 Advanced update setup ......................................... 21
4.2.1.2.1 Update mode ....................................................... 21
4.2.1.2.2 Proxy server ..........................................................21
4.2.1.2.3 Connecting to the LAN ..........................................21
4.2.1.2.4 Creating update copies – Mirror ............................ 22
4.2.1.2.4.1 Updating from the Mirror ..................................... 22
4.2.1.2.4.2 Troubleshooting Mirror update problems .............. 23
4.2.2 How to create update tasks .................................. 23
4.3 Scheduler ....................................................................23
4.3.1 Purpose of scheduling tasks .................................. 24
4.3.2 Creating new tasks .............................................. 24
4.4 Quarantine ..................................................................24
4.4.1 Quarantining files ................................................ 25
4.4.2 Restoring from Quarantine .................................. 25
4.4.3 Submitting file from Quarantine ........................... 25
4.5 Log files .......................................................................25
4.5.1 Log maintenance ................................................. 25
4.6 User interface ............................................................. 26
4.6.1 Alerts and notifications ........................................ 26
4.7 ThreatSense.Net ..........................................................27
4.7.1 Suspicious files .................................................... 27
4.7.2 Statistics ............................................................. 28
4.7.3 Submission .......................................................... 28
4.8 Remote administration ............................................... 28
4.9 Licenses ..................................................................... 29
5. Advanced user .....................................30
5.1 Proxy server setup ....................................................... 30
5.2 Export / import settings............................................... 30
5.2.1 Import settings ....................................................30
5.2.2 Export settings ....................................................30
5.3 Command Line ............................................................ 30
5.4 ESET SysInspector ........................................................ 31
5.4.1 User Interface and application usage .....................31
5.4.1.1 Program Controls..................................................31
5.4.1.2 Navigating in ESET SysInspector ........................... 32
5.4.1.3 Compare ............................................................. 32
5.4.1.4 SysInspector as a part of ESET NOD32 Antivirus 4 ... 33
5.4.1.5 Service script ....................................................... 33
5.4.1.5.1 Generating Service scripts .................................... 33
5.4.1.5.2 Structure of the Service script ............................... 33
5.4.1.5.3 How to execute Service scripts ............................. 35
5.5 ESET SysRescue ...........................................................35
5.5.1 Minimum requirements ....................................... 35
5.5.2 How to create a rescue CD .................................... 35
5.5.2.1 Folders ................................................................ 35
5.5.2.2 ESET Antivirus...................................................... 35
5.5.2.3 Advanced ............................................................ 35
5.5.2.4 Bootable USB device ............................................ 36
5.5.2.5 Burn .................................................................... 36
5.5.3 Working with ESET SysRescue .............................. 36
5.5.3.1 Using ESET SysRescue .......................................... 36
6. Glossary .............................................. 37
6.1 Types of infiltrations .....................................................37
6.1.1 Viruses ................................................................ 37
6.1.2 Worms ................................................................ 37
6.1.3 Trojan horses ....................................................... 37
6.1.4 Rootkits .............................................................. 37
6.1.5 Adware ............................................................... 37
6.1.6 Spyware ..............................................................38
6.1.7 Potentially unsafe applications ............................. 38
6.1.8 Potentially unwanted applications ....................... 38