ESET SMART SECURITY Guía de usuario Pagina 31

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 120
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 30
31
4.1.1.6.6 Other
You can configure the following options in the Other section:
Log all objects If this option is selected, the log file will show all the scanned files, even those not infected. For
example, if an infiltration is found within an archive, the log will list also clean files contained within the archive.
Enable Smart optimization With Smart Optimization enabled, the most optimal settings are used to ensure the
most efficient scanning level, while simultaneously maintaining the highest scanning speeds. The various
protection modules scan intelligently, making use of different scanning methods and applying them to specific file
types. If the Smart Optimization is disabled, only the user-defined settings in the ThreatSense core of the particular
modules are applied when performing a scan.
When configuring ThreatSense engine parameters setup for a Computer scan, the following options are also
available:
Scan alternate data streams (ADS) Alternate data streams used by the NTFS file system are file and folder
associations which are invisible to ordinary scanning techniques. Many infiltrations try to avoid detection by
disguising themselves as alternate data streams.
Run background scans with low priority Each scanning sequence consumes a certain amount of system resources. If
you work with programs that place a high load on system resources, you can activate low priority background
scanning and save resources for your applications.
Preserve last access timestamp Select this option to keep the original access time of scanned files instead of
updating them (for example, for use with data backup systems).
Scroll scan log This option allows you to enable/disable log scrolling. If selected, information scrolls upwards
within the display window.
4.1.1.7 An infiltration is detected
Infiltrations can reach the system from various entry points such as webpages, shared folders, via email or from
removable devices (USB, external disks, CDs, DVDs, diskettes, etc.).
Standard behavior
As a general example of how infiltrations are handled by ESET Smart Security, infiltrations can be detected using:
Real-time file system protection
Web access protection
Email client protection
On-demand computer scan
Each uses the standard cleaning level and will attempt to clean the file and move it to Quarantine or terminate the
connection. A notification window is displayed in the notification area at the bottom right corner of the screen. For
more information about cleaning levels and behavior, see Cleaning.
Vista de pagina 30
1 2 ... 26 27 28 29 30 31 32 33 34 35 36 ... 119 120

Comentarios a estos manuales

Sin comentarios