The detection engine protects against malicious system attacks by scanning files, emails, and network communications. When it detects an object classified as malware, it initiates a remediation process. The engine can eliminate the threat by first blocking it and then taking further actions, such as cleaning, deleting, or moving the malware to quarantine.
|

|
Incorrectly configuring settings may reduce the level of protection.
|
Malware detections (powered by machine learning)
A computer virus is a malicious code prepended or appended to existing files on your computer. However, the term "virus" is often misused. "Malware" (malicious software) is a more accurate term. Malware detection is performed by the detection engine module combined with the Machine learning component. Read more about these types of applications in the ESET Glossary.
Potentially unwanted applications
A Potentially unwanted application is a software with an intent not unequivocally malicious, however; it may install additional unwanted software, change the behavior of the digital device, perform activities not approved or expected by the user or has unclear objectives.
This category includes advertising display software, download wrappers, various browser toolbars, software with misleading behavior, bundleware, trackware, etc. Read more about these types of applications in the ESET Glossary.
Suspicious applications
Is a software compressed with packers or protectors frequently used to deter reverse engineering or to obfuscate the content of the executable (for example, to hide the presence of malware) by proprietary methods of compression and/or encryption.
This category includes: all unknown applications that are compressed with a packer or protector frequently used to compress malware.
Potentially unsafe applications
This classification is given for commercial, legitimate software that might be misused for malicious purposes. An unsafe application refers to legitimate commercial software that has the potential to be misused for malicious purposes.
This category includes: cracking tools, license key generators, hacking tools, remote access or control tools, password-cracking applications and keyloggers (programs that record each keystroke typed by a user). This option is disabled by default. Read more about these types of applications in the ESET Glossary.
Read the following before modifying a threshold (or level) for category Reporting or Protection:
Reporting is performed by the detection engine and machine learning component. You can set the reporting threshold to better suit your environment and needs. There is not a single correct configuration. Therefore, we recommend that you monitor the behavior within your environment and decide whether a different Reporting setting is more suitable.
Reporting does not take action with objects, it passes information to a respective protection layer, and the protection layer takes action accordingly.
Aggressive
|
Reporting configured to maximum sensitivity. More detections are reported. While the Aggressive setting may appear to be the safest, it can often be too sensitive, which might even be counterproductive.
|

|
The aggressive setting may falsely identify objects as malicious, and action will be taken with such objects (depending on Protection settings).
|
|
Balanced
|
This setting is an optimal balance between performance and accuracy of detection rates and the number of falsely reported objects.
|
Cautious
|
Reporting configured to minimize falsely identified objects while maintaining a sufficient level of protection. Objects are reported only when the probability is evident and matches malicious behavior.
|
Off
|
Reporting is not active. Detections are not found, reported or cleaned.
|

|
Malware reporting cannot be deactivated; therefore, the Off setting is not available for Malware.
|
|
If you want to Revert settings in this section to their default values, click the "U-turn" arrow next to the section header. Any changes you have made in this section will be lost.
|
When an object is reported based on the configuration above and the machine learning results, it is blocked and and action is taken (cleaned, deleted or moved to Quarantine).
Aggressive
|
Reported aggressive (or lower) level detections are blocked, and automatic remediation (i.e., cleaning) is started.
|
Balanced
|
Reported balanced (or lower) level detections are blocked, and automatic remediation (i.e., cleaning) is started.
|
Cautious
|
Reported cautious level detections are blocked, and automatic remediation (i.e., cleaning) is started.
|
Off
|
Reporting is not active, no detections are not found, reported or cleaned.
|

|
Malware reporting cannot be deactivated, therefore the Off setting is not available for Malware.
|
|
If you want to Revert settings in this section to their default values, click the "U-turn" arrow next the to section header. Any changes you have made in this section will be lost.
|
|

|
By default, the above machine learning protection settings apply to On-demand computer scan as well. If required, you can configure On-demand & detection responses settings separately. Click the switch icon to disable Use real-time protection settings and proceed with configuration.
|
Reporting
Performed by detection engine and the machine learning component. Reporting does not take an action with objects (this is done by respective protection layer).
Protection
Configure parameters in OneDrive section to affect what action is taken with reported objects.
If you want to Revert settings in this section to their default values, click the "U-turn" arrow next the to section header. Any changes you have made in this section will be lost.
Configure Machine learning protection using eShell. The Context name in eShell is MLP. Open eShell in interactive mode and navigate to MLP:
computer onedrive mlp
See what is the current reporting setting for Suspicious applications:
get suspicious-reporting
If you want less strict reporting, change the setting to Cautious:
set suspicious-reporting cautious
|
Reporting
Performed by detection engine and the machine learning component. Reporting does not take an action with objects (this is done by respective protection layer).
Protection
Configure parameters in Hyper-V scan section to affect what action is taken with reported objects.
If you want to Revert settings in this section to their default values, click the "U-turn" arrow next the to section header. Any changes you have made in this section will be lost.
Configure Machine learning protection using eShell. The Context name in eShell is MLP. Open eShell in interactive mode and navigate to MLP:
computer hyperv mlp
See what is the current reporting setting for Suspicious applications:
get suspicious-reporting
If you want less strict reporting, change the setting to Cautious:
set suspicious-reporting cautious
|