An infiltration is detected

Infiltrations can reach the system from various entry points: webpages, shared folders, email or removable computer devices (USB, external disks, CDs, DVDs, etc.).

If your computer is showing signs of malware infection, for example it runs slower, often freezes, etc., we recommend that you take the following steps:

1.Click Computer scan.

2.Click Smart scan (for more information, see the Smart scan section).

3.After the scan has finished, review the log for the number of scanned, infected and cleaned files.

If you only wish to scan a certain part of your disk click Custom scan and select targets to be scanned for viruses.

As a general example of how infiltrations are handled by ESET Cyber Security Pro, suppose that an infiltration is detected by the Real-time file system monitor using the default cleaning level. Real-time protection will attempt to clean or delete the file. If there is no predefined action available for the Real-time protection module, you will be asked to select an option in an alert window. Usually, the options Clean, Delete and No action are available. Selecting No action is not recommended, since the infected file(s) is left in its infected state. This option is intended for situations when you are sure that the file is harmless and has been detected by mistake.

Cleaning and deleting – Apply cleaning if a file has been attacked by a virus that has attached malicious code to it. If this is the case, first attempt to clean the infected file in order to restore it to its original state. If the file consists exclusively of malicious code, it will be deleted.


Deleting files in archives – In the default cleaning mode, the entire archive will be deleted only if it contains infected files and no clean files. In other words, archives are not deleted if they also contain harmless clean files. However, use caution when performing a Strict cleaning scan – with Strict cleaning the archive will be deleted if it contains at least one infected file, regardless of the status of other files in the archive.