[. . . ] NOD32 Antivirus 3. 0
Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware
User Guide
we protect your digital worlds
contents
1. ESET NOD32 Antivirus 3. 0 . . . . . . . . . . . . . . . . . . . . . . . . 4
1. 1 What's new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. 2 System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2. 1 2. 2 2. 3 2. 4 2. 5 Typical installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] This section of the ThreatSense parameter setup lets you define the types of files to scan. Any extension can be added to the list of files excluded from scanning. If the Scan all files option is unchecked, the list changes to show all currently scanned file extensions. Using the Add and Remove buttons, you can enable or prohibit scanning of desired extensions. To enable scanning of files with no extension, select the Scan extensionless files option. Excluding files from scanning has its purpose if the scanning of certain file types prevents the program using the extensions to run properly. For example, it may be advisable to exclude the . edb, . eml and . tmp extensions when using the MS Exchange server.
18
Cleaning and deleting Apply cleaning if a clean file has been attacked by a virus which has attached malicious code to the cleaned file. If this is the case, first attempt to clean the infected file in order to restore it to its original state. If the file consists exclusively of malicious code, it will be deleted. If an infected file is "locked" or in use by a system process, it will usually only be deleted after it is released (normally after a system restart). Deleting files in archives In the Default cleaning mode, the entire archive will be deleted only if it contains infected files and no clean files. In other words, archives are not deleted if they also contain harmless clean files. However, use caution when performing a Strict cleaning scan with Strict cleaning the archive will be deleted if it contains at least one infected file, regardless of the status of other files in the archive.
4. 2 Updating the program Regular updating of the system is the basic premise for obtaining the maximum level of security provided by ESET NOD32 Antivirus. This is done in two ways by updating the virus signature database and by updating all system components. Information about the current update status can be found by clicking Update, including the current version of the virus signature database and whether an update is required. In addition, the option to activate the update process immediately Update virus signature database is available, as well as basic update setup options such as the Username and password to access ESET's update servers. The information window also contains details such as the date and time of the last successful update and the number of the virus signature database. This numeric indication is an active link to ESET's web site, listing all signatures added within the given update. The list of currently existing update servers is accessible via the Update server: dropdown menu. in the Update settings for selected profile section and then click the Add button. Authentication for update servers is granted by the Username and Password which were generated and sent to the user by ESET after purchase of the product license. 4. 2. 1. 1 Update profiles
For various update configurations, it is possible to create userdefined update profiles which can be used for a given update task. [. . . ] If you decide to use a freeware product, please pay particular attention to the installation program. The installer will most probably notify you of the installation of an extra adware program. Often you will be allowed to cancel it and install the program without adware. On the other hand, some programs will not install without adware, or their functionality will be limited. [. . . ]