
19
4.1.6.1 Objects setup
The Objects section allows you to define which computer
components and files will be scanned for infiltrations.
Operating memory – Scans for threats that attack the operating
memory of the system.
Boot sectors – Scans boot sectors for the presence of viruses in the
master boot record.
Files – Provides scanning of all common file types (programs, pictures,
audio, video files, database files, etc.).
Email files – Scans special files where email messages are contained.
Archives – Provides scanning of files compressed in archives (.rar, .zip,
.arj, .tar, etc.).
Self‑extracting archives – Scans files which are contained in
self‑extracting archive files, but typically presented with an .exe file
extension
Runtime packers – Runtime packers (unlike standard archive types)
decompress in memory, in addition to standard static packers (UPX,
yoda, ASPack, FGS, etc.).
4.1.6.2 Options
In the Options section, you can select the methods to be used when
scanning the system for infiltrations. The following options are
available:
Signatures – Signatures can exactly and reliably detect and identify
infiltrations by their name using virus signatures.
Heuristics – Heuristics use an algorithm that analyses the (malicious)
activity of programs. The main advantage of heuristic detection is
the ability to detect new malicious software which did not previously
exist, or was not included in the list of known viruses (virus signatures
database).
Advanced heuristics – Advanced heuristics comprise a unique
heuristic algorithm, developed by ESET, optimized for detecting
computer worms and trojan horses written in high‑level programming
languages. Due to advanced heuristics, the detection intelligence of
the program is significantly higher.
Adware/Spyware/Riskware – This category includes software which
collects various sensitive information about users without their
informed consent. This category also includes software which displays
advertising material.
Potentially unwanted applications – Potentially unwanted
applications are not necessarily intended to be malicious, but may
aect the performance of your computer in a negative way. Such
applications usually require consent for installation. If they are
present on your computer, your system behaves dierently (compared
to the state before their installation). The most significant changes
include unwanted pop‑up windows, activation and running of hidden
processes, increased usage of system resources, changes in search
results, and applications communicating with remote servers.
Potentially unsafe applications – Potentially unsafe applications is
the classification used for commercial, legitimate software. It includes
programs such as remote access tools, which is why this option is
disabled by default.
4.1.6.3 Cleaning
The cleaning settings determine the behavior of the scanner during
the cleaning of infected files. There are 3 levels of cleaning:
No cleaning – Infected files are not cleaned automatically. The
program will display a warning window and allow you to choose an
action.
Standard cleaning – The program will attempt to automatically clean
or delete an infected file. If it is not possible to select the correct action
automatically, the program will oer a choice of follow‑up actions.
The choice of follow‑up actions will also be displayed if a predefined
action could not be completed.
Strict cleaning – The program will clean or delete all infected files
(including archives). The only exceptions are system files. If it is not
possible to clean them, you will be oered an action to take in a
warning window.
Comentarios a estos manuales