
34
4.1.1.6.2 Options
Use the Options section to select the methods used when scanning the system for infiltrations. The following options
are available:
Heuristics – A heuristic is an algorithm analyzing the (malicious) activity of programs. The main advantage is the ability
to identify malicious software which did not exist, or was not known by the previous virus signatures database. The
disadvantage is a (very small) probability of false alarms.
Advanced heuristics/DNA/Smart signatures – Advanced heuristics consist of a unique heuristic algorithm developed
by ESET, optimized for detecting computer worms and trojan horses and written in high level programming languages.
Thanks to advanced heuristics, the detecting capabilities of the program are significantly higher. Signatures can reliably
detect and identify viruses. Utilizing the automatic update system, new signatures are available within a few hours of a
threat discovery. The disadvantage of signatures is that they only detect viruses they know (or their slightly modified
versions).
Potentially unwanted applications (PUAs) are not necessarily intended to be malicious, but may affect the
performance of your computer in a negative way. Such applications usually require consent for installation. If they are
present on your computer, your system behaves differently (compared to the state before their installation). The most
significant changes are:
New windows you haven’t seen previously (pop-ups, ads),
Activating and running of hidden processes,
Increased usage of system resources,
Changes in search results,
Application communicates with remote servers.
Potentially unsafe applications – Potentially unsafe applications is the classification used for commercial, legitimate
software. It includes programs such as remote access tools, password-cracking applications, and keyloggers (programs
recording each keystroke typed by a user). This option is disabled by default.
ESET Live Grid – Thanks to ESET's reputation technology, information about scanned files is verified against data from
the cloud-based ESET Live Grid to improve detection and scanning speed.
4.1.1.6.3 Cleaning
The cleaning settings determine the behavior of the scanner while cleaning infected files. There are 3 levels of cleaning:
No cleaning – Infected files will not be cleaned automatically. The program will display a warning window and allow the
user to choose an action. This level is designed for more advanced users who know which steps to take in the event of
an infiltration.
Standard cleaning – The program will attempt to automatically clean or delete an infected file based on a predefined
action (depending on the type of infiltration). Detection and deletion of an infected file is signaled by an information
message located in the bottom-right corner of the screen. If it is not possible to select the correct action automatically,
the program offers a selection of follow-up actions. The same happens when a predefined action cannot be completed.
Strict cleaning – The program will clean or delete all infected files. The only exceptions are the system files. If it is not
possible to clean them, the user is prompted to select an action by a warning window.
Warning: If an archive contains a file or files which are infected, there are two options for dealing with the archive. In
standard mode (Standard cleaning), the whole archive would be deleted if all the files it contains are infected files. In
Strict cleaning mode, the archive would be deleted if it contains at least one infected file, regardless of the status of the
other files in the archive.
Comentarios a estos manuales