Detection engine
Detection engine guards against malicious system attacks by controlling file, email and internet communication. For example, if an object classified as malware is detected, remediation will start. The detection engine can eliminate it by first blocking it and then cleaning, deleting or moving it to quarantine.
To configure the detection engine settings in detail, click Advanced Setup or press F5.
In this section:
- Real-time & Machine learning protection categories
- Malware scans
- Reporting setup
- Protection setup
- Best practices
Real-time & Machine learning protection categories
Real-time & Machine learning protection for all protection modules (for example, Real-time file system protection, Web access protection, ...) enables you to configure reporting and protection levels of the following categories:
- Malware—A computer virus is a piece of malicious code that is prepended or appended to existing files on your computer. However, the term “virus” is often misused. "Malware” (malicious software) is a more accurate term. Malware detection is performed by the detection engine module combined with the machine learning component.
Read more about these types of applications in the Glossary.
- Potentially unwanted applications—Grayware or Potentially Unwanted Applications (PUAs) is a broad category of software, whose intent is not as unequivocally malicious as with other types of malware, such as viruses or trojan horses. However, it could install additional unwanted software, change the behavior of the digital device, or perform activities not approved or expected by the user.
Read more about these types of applications in the Glossary. - Potentially unsafe applications—Refers to legitimate commercial software that has the potential to be misused for malicious purposes. Examples of potentially unsafe applications (PUAs) include remote access tools, password-cracking applications, and keyloggers (programs recording each keystroke typed by a user).
Read more about these types of applications in the Glossary.
- Suspicious applications include programs compressed with packers or protectors. These types of protectors are often exploited by malware authors to evade detection.
Advanced machine learning is now a part of detection engine as an advanced layer of protection which improves detection based on machine learning. Read more about this type of protection in the Glossary. |
Malware scans
Scanner settings can be configured separately for the real-time scanner and the on-demand scanner. By default, Use real-time protection settings is enabled. When enabled, relevant On-demand scan settings are inherited from the Real-time & Machine Learning protection section.
Reporting setup
When a detection occurs (e.g., a threat is found and classified as malware), information is recorded to the Detections log, and Desktop notifications occur if configured in ESET Endpoint Security.
Reporting threshold is configured for each category (referred to as "CATEGORY"):
- Malware
- Potentially unwanted applications
- Potentially unsafe
- Suspicious applications
Reporting performed with the detection engine, including the machine learning component. You can set a higher reporting threshold than the current protection threshold. These reporting settings do not influence blocking, cleaning or deleting objects.
Read the following before modifying a threshold (or level) for CATEGORY reporting:
Threshold |
Explanation |
---|---|
Aggressive |
CATEGORY reporting configured to maximum sensitivity. More detections are reported. The Aggressive setting can falsely identify objects as CATEGORY. |
Balanced |
CATEGORY reporting configured as balanced. This setting is optimized to balance the performance and accuracy of detection rates and the number of falsely reported objects. |
Cautious |
CATEGORY reporting configured to minimize falsely identified objects while maintaining a sufficient level of protection. Objects are reported only when the probability is evident and matches CATEGORY behavior. |
Off |
Reporting for CATEGORY is not active, and detections of this type are not found, reported or cleaned. As a result, this setting disables protection from this detection type. |
Availability of ESET Endpoint Security protection modules
Determine product version, program module versions and build dates
Keynotes
Several keynotes when setting up an appropriate threshold for your environment:
- The Balanced threshold is recommended for most of the setups.
- The Cautious threshold is recommended for environments where the priority focuses on minimizing false identified objects by security software.
- The higher reporting threshold, the higher detection rate but a higher chance of falsely identified objects.
- From the real-world perspective, there is no guaranty of a 100% detection rate as well as a 0% chance to avoid incorrect categorization of clean objects as malware.
- Keep ESET Endpoint Security and its modules up-to-date to maximize the balance between performance and accuracy of detection rates and the number of falsely reported objects.
Protection setup
If an object classified as CATEGORY is reported, the program blocks the object and then cleans, deletes or moves it to Quarantine.
Read the following before modifying a threshold (or level) for CATEGORY protection:
Threshold |
Explanation |
---|---|
Aggressive |
Reported aggressive (or lower) level detections are blocked, and automatic remediation (i.e., cleaning) is started. This setting is recommended when all endpoints have been scanned with aggressive settings and falsely reported objects have been added to detection exclusions. |
Balanced |
Reported balanced (or lower) level detections are blocked, and automatic remediation (i.e., cleaning) is started. |
Cautious |
Reported cautious level detections are blocked, and automatic remediation (i.e., cleaning) is started. |
Off |
Useful to identify and exclude falsely reported objects. |
Best practices
UNMANAGED (Individual client workstation)
Keep the default recommended values as is.
MANAGED ENVIRONMENT
These settings are usually applied to workstations via a policy.
1. Initial phase
This phase might take up to a week.
- Set up all Reporting thresholds to Balanced.
NOTE: If needed, set up to Aggressive. - Set up or keep Protection for malware as Balanced.
- Set up Protection for other CATEGORIES to Cautious.
NOTE: It is not recommended to set up the Protection threshold to Aggressive in this phase because all found detections would be remediated, including the falsely identified ones. - Identify falsely identified objects from Detections log and add them to Detection exclusions first.
2. Transition phase
- Implement the "Production phase" to some of the workstations as a test (not for all workstations on the network).
3. Production phase
- Set up all Protection thresholds to Balanced.
- When managed remotely, use an appropriate antivirus pre-defined policy for ESET Endpoint Security.
- Aggressive protection threshold can be set if the highest detection rates are required and falsely identified objects are accepted.
- Check Detection log or ESET PROTECT reports for possible missing detections.