Contents
.................................................41. ESET NOD32 Antivirus
.................................................................4System requirements1.1
.................................................52. Installation
.................................................................5Typical installation2.1
.................................................................5Custom installation2.2
.................................................................6Remote installation2.3
.............................................................................6Creating remote installation package2.3.1
.............................................................................7Remote installation on target computers2.3.2
.............................................................................7Remote uninstallation2.3.3
.............................................................................7Remote upgrade2.3.4
.................................................................7Entering Username and password2.4
.................................................................7On-demand computer scan2.5
.................................................83. Beginners guide
.................................................................8Introducing user interface design - modes3.1
.............................................................................8Checking operation of the system3.1.1
.............................................................................8What to do if the program doesn't work properly3.1.2
.................................................104. Work with ESET NOD32 Antivirus
.................................................................10Antivirus and antispyware protection4.1
.............................................................................10Real-time file system protection4.1.1
.............................................................................10Real-time Protection setup4.1.1.1
...........................................................................10Scan on (Event triggered scanning)4.1.1.1.1
...........................................................................10Advanced scan options4.1.1.1.2
...........................................................................10Exclusions from scanning4.1.1.1.3
.............................................................................11
When to modify Real-time protection
configuration
4.1.1.2
.............................................................................11Checking Real-time protection4.1.1.3
.............................................................................11
What to do if Real-time protection does not
work
4.1.1.4
.............................................................................11On-demand computer scan4.1.2
.............................................................................12Type of scan4.1.2.1
...........................................................................12Smart scan4.1.2.1.1
...........................................................................12Custom scan4.1.2.1.2
.............................................................................12Scan targets4.1.2.2
.............................................................................12Scan profiles4.1.2.3
.............................................................................13ThreatSense engine parameters setup4.1.3
.............................................................................13Objects4.1.3.1
.............................................................................13Options4.1.3.2
.............................................................................14Cleaning4.1.3.3
.............................................................................14Extensions4.1.3.4
.............................................................................14Limits4.1.3.5
.............................................................................14Others4.1.3.6
.............................................................................15An infiltration is detected4.1.4
.................................................................15Updating the program4.2
.............................................................................15Upgrading to a new build4.2.1
.............................................................................16Update setup4.2.2
.............................................................................16How to create update tasks4.2.3
.................................................................17Scheduler4.3
.............................................................................17Purpose of scheduling tasks4.3.1
.............................................................................17Creating new tasks4.3.2
.................................................................18Quarantine4.4
.............................................................................18Quarantining files4.4.1
.............................................................................18Restoring from Quarantine4.4.2
.............................................................................18Submitting file from Quarantine4.4.3
.................................................................18Log files4.5
.............................................................................18Log maintenance4.5.1
.............................................................................19Log filtering4.5.2
.................................................................19User interface4.6
.............................................................................19Alerts and notifications4.6.1
.............................................................................19Alerts and notifications advanced setup4.6.1.1
.............................................................................19Privileges4.6.2
.............................................................................20Context menu4.6.3
.................................................................20ThreatSense.Net4.7
.............................................................................20Suspicious files4.7.1
.................................................225. Advanced user
.................................................................22Import and export settings5.1
.............................................................................22Import settings5.1.1
.............................................................................22Export settings5.1.2
.................................................................22Proxy server setup5.2
.................................................................22Removable media blocking5.3
.................................................................22Remote administration5.4
.................................................246. Glossary
.................................................................24Types of infiltrations6.1
.............................................................................24Viruses6.1.1
.............................................................................24Worms6.1.2
.............................................................................24Trojan horses6.1.3
.............................................................................25Adware6.1.4
.............................................................................25Spyware6.1.5
.............................................................................25Potentially unsafe applications6.1.6
.............................................................................25Potentially unwanted applications6.1.7