Work with ESET Endpoint Antivirus

The ESET Endpoint Antivirus setup options allow you to adjust the level of protection for your computer, web and email.

icon_details_hoverNOTE

When creating a policy from ESET Remote Administrator Web Console you can select the flag for each setting. Settings with the Force flag have priority and cannot be overwritten by a later policy (even if the later policy has a Force flag). This assures that this setting will not be changed (e.g. by user or by later policies during merging). For more information see Flags in ERA Online help.

PAGE_SETUP

The Setup menu contains the following sections:

Computer
Web and Email

Computer protection setup allows you to enable or disable the following components:

Real-time file system protection – All files are scanned for malicious code when they are opened, created or run on your computer.
Document protectionThe document protection feature scans Microsoft Office documents before they are opened, as well as files downloaded automatically by Internet Explorer, such as Microsoft ActiveX elements.
HIPS – The HIPS system monitors events that occur within the operating system and reacts to them according to a customized set of rules.
Presentation modeA feature for users that demand uninterrupted usage of their software, do not want to be disturbed by pop-up windows, and want to minimize CPU usage. You will receive a warning message (potential security risk) and the main program window will turn orange after enabling Presentation mode.
Anti-Stealth protection – Provides detection of dangerous programs, such as rootkits, which are able to hide themselves from the operating system. This means it is not possible to detect them using ordinary testing techniques.

Web and email protection setup allows you to enable or disable the following components:

Web access protection – If enabled, all traffic through HTTP or HTTPS is scanned for malicious software.
Email client protection – Monitors communication received through the POP3 and IMAP protocol.
Anti-Phishing protection Protects you from attempts to acquire passwords, banking data and other sensitive information by illegitimate websites disguised as legitimate ones.

To temporarily disable individual modules, click the green switch MODULE_ENABLED next to the desired module. Note that this may decrease the protection level of your computer.

To re-enable the protection of a disabled security component, click the red switch MODULE_DISABLED to return a component to its enabled state.

When ERA policy is applied, you will see the lock icon MODULE_LOCKED next to a specific component. The policy applied by ESET Remote Administrator can be overridden locally after authentication by logged user (e.g. administrator). For more information see the ESET Remote Administrator Online help.

icon_details_hoverNOTE

All protective measures disabled this way will be re-enabled after a computer restart.

To access detailed settings for a particular security component, click the gear wheel GEAR next to any component.

There are additional options at the bottom of the setup window. To load setup parameters using an .xml configuration file, or to save the current setup parameters to a configuration file, use Import/Export settings. Please see Import/Export settings for more detailed information.

For more detailed options, click Advanced Setup or press F5.