Custom installation

The Custom installation mode is designed for experienced users who want to modify advanced settings during the installation process.

Proxy Server

If you are using a proxy server, define its parameters by selecting I use a proxy server. In the next window, type the IP address or URL of your proxy server in the Address field. In the Port field, specify the port where the proxy server accepts connections (3128 by default). In the event that the proxy server requires authentication, type the valid Username and Password to grant access to the proxy server. If you do not use a proxy server, select I do not use a proxy server. If you are not sure that  you use a proxy server, select Use system settings (recommended) to use your current system settings.


In this step, you have the option to define privileged users or groups who will be given permissions to edit the program configuration. From the list of users on the left, select the users and Add them to the Privileged Users list. To display all system users, select Show all users. If you leave the Privileged Users list empty, all users are considered privileged.

ESET Live Grid

The Live Grid Early Warning System helps ensure that ESET is immediately and continuously informed of new infiltrations in order to quickly protect our customers. The system allows new threats to be submitted to the ESET Threat Lab, where they are analyzed and processed. We recommend that you enable ESET LiveGrid® (recommended). Click Setup to modify the settings for submitting suspicious files. For more information, see the Live Grid topic. If ESET Live Grid is disabled, ESET Cyber Security displays a security alert.

Potentially Unwanted Applications

The next step of the installation process is to configure the detection of Potentially unwanted applications. Such programs are not necessarily malicious, but can often negatively affect the behavior of your operating system. These applications are often bundled with other programs and may be difficult to notice during the installation process. Although these applications usually display a notification during installation, they can easily be installed without your consent. See the Potentially unwanted applications chapter for more details.

After your first installation of ESET Cyber Security:

1.You will receive the System Extension Blocked notification from your system and the Your computer is not protected notification from ESET Cyber Security. To access all ESET Cyber Security functions, you need to allow kernel extensions on your device. To allow kernel extensions on your device, navigate to System Preferences > Security & Privacy and click Allow to allow system software from the developer ESET, spol. s.r.o. For more detailed information, visit our Knowledgebase article.

2.You will receive Your computer is partially protected notification from ESET Cyber Security. To access all ESET Cyber Security functions, you need to allow Full disc access to ESET Cyber Security. Click Open System preferences > Security & Privacy. Go to the Privacy tab and select the Full disk access option. Click the lock icon to enable editing. Click the plus icon and select the ESET Cyber Security application. Your computer will display a notification to restart your computer. Click Later. Do not restart your computer now. Click Start Again in the ESET Cyber Security notification window or restart your computer. For more detailed information, visit our Knowledgebase article.

After installing ESET Cyber Security, you should scan your computer for malicious code. From the main program window, click Computer scan > Smart scan. For more information about On-demand computer scans, see the On-demand computer scan topic.