ESET Online Help

Search English
Select the topic

Protections

Detection Responses are defined as part of protection settings. For each category of infiltrations you can set the level of Reporting and Protection ranging from Aggressive to Balanced, Cautious or you can turn Off the detection completely. Types of infiltrations for which you can modify detection responses are listed below:

Malware Detections

Malware are pieces of malicious code that are a part of existing files on your computer.

Potentially Unwanted Applications

Grayware or potentially unwanted applications (PUAs) is a broad software category whose intent is not as unequivocally malicious as other malware types, such as viruses or trojans. However, these applications could install additional unwanted software, change the behavior of the digital device or perform unapproved or unexpected activities. See the Glossary for more about these applications.

Suspicious Applications

These include programs compressed with packers or protectors. These protectors are often exploited by malware authors to evade detection. A packer is a runtime self-extracting executable that rolls up several kinds of malware into a single package. The most common packers are UPX, PE_Compact, PKLite and ASPack. The same malware may be detected differently when compressed using a different packer. Packers can also make their "signatures" mutate over time, making malware more difficult to detect and remove.

Potentially Unsafe Applications

These applications are commercial, legitimate software that can be abused by attackers if installed without user consent. This classification includes programs such as remote access tools. This option is disabled by default.