ESET SMART SECURITY Guía de usuario Pagina 19

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 46
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 18
19
4.1.6.1 Objects setup
The Objects section allows you to define which computer
components and files will be scanned for infiltrations.
Operating memory Scans for threats that attack the operating
memory of the system.
Boot sectors Scans boot sectors for the presence of viruses in the
master boot record.
Files Provides scanning of all common file types (programs, pictures,
audio, video files, database files, etc.).
Email files Scans special files where email messages are contained.
Archives Provides scanning of files compressed in archives (.rar, .zip,
.arj, .tar, etc.).
Self‑extracting archives Scans files which are contained in
self‑extracting archive files, but typically presented with an .exe file
extension
Runtime packers Runtime packers (unlike standard archive types)
decompress in memory, in addition to standard static packers (UPX,
yoda, ASPack, FGS, etc.).
4.1.6.2 Options
In the Options section, you can select the methods to be used when
scanning the system for infiltrations. The following options are
available:
Signatures – Signatures can exactly and reliably detect and identify
infiltrations by their name using virus signatures.
Heuristics Heuristics use an algorithm that analyses the (malicious)
activity of programs. The main advantage of heuristic detection is
the ability to detect new malicious software which did not previously
exist, or was not included in the list of known viruses (virus signatures
database).
Advanced heuristics Advanced heuristics comprise a unique
heuristic algorithm, developed by ESET, optimized for detecting
computer worms and trojan horses written in high‑level programming
languages. Due to advanced heuristics, the detection intelligence of
the program is significantly higher.
Adware/Spyware/Riskware This category includes software which
collects various sensitive information about users without their
informed consent. This category also includes software which displays
advertising material.
Potentially unwanted applications Potentially unwanted
applications are not necessarily intended to be malicious, but may
aect the performance of your computer in a negative way. Such
applications usually require consent for installation. If they are
present on your computer, your system behaves dierently (compared
to the state before their installation). The most significant changes
include unwanted pop‑up windows, activation and running of hidden
processes, increased usage of system resources, changes in search
results, and applications communicating with remote servers.
Potentially unsafe applications Potentially unsafe applications is
the classification used for commercial, legitimate software. It includes
programs such as remote access tools, which is why this option is
disabled by default.
4.1.6.3 Cleaning
The cleaning settings determine the behavior of the scanner during
the cleaning of infected files. There are 3 levels of cleaning:
No cleaning Infected files are not cleaned automatically. The
program will display a warning window and allow you to choose an
action.
Standard cleaning The program will attempt to automatically clean
or delete an infected file. If it is not possible to select the correct action
automatically, the program will oer a choice of follow‑up actions.
The choice of follow‑up actions will also be displayed if a predefined
action could not be completed.
Strict cleaning The program will clean or delete all infected files
(including archives). The only exceptions are system files. If it is not
possible to clean them, you will be oered an action to take in a
warning window.
Vista de pagina 18
1 2 ... 14 15 16 17 18 19 20 21 22 23 24 ... 45 46

Comentarios a estos manuales

Sin comentarios