Detection engine
The default setup of detection behavior provides the essential level of security which includes:
•Real-time file system protection
•Machine learning protection
•Smart optimization (most efficient combination of system protection and scanning speed)
•ESET LiveGrid reputation system
To turn on additional protection features, click Setup > Detection engine:
•Detection of potentially unwanted applications
•Detection of potentially unsafe applications (for example key loggers, password-cracking tools)
•Enable submission of suspicious or infected samples
•Configure exclusions (files, directories left out of scan) to speed up scan
•Adjust cleaning level
Every threat detected and action taken against it is logged in the Detections screen.
Real-time & Machine learning protection
Advanced Machine learning is now a part of the detection engine as an advanced layer of protection, which improves detection based on Machine learning. Read more about this type of protection in the Glossary.
You can configure Reporting and Protection levels of the following categories:
•Malware—A computer virus is a piece of malicious code that is prepended or appended to existing files on your computer. However, the term “virus” is often misused. "Malware” (malicious software) is a more accurate term. Malware detection is performed by the detection engine module combined with the machine learning component.
Read more about these types of applications in the Glossary.
•Potentially unwanted applications—Grayware or Potentially Unwanted Applications (PUAs) is a broad category of software, whose intent is not as unequivocally malicious as with other types of malware, such as viruses or trojan horses. However, it could install additional unwanted software, change the behavior of the digital device, or perform activities not approved or expected by the user.
Read more about these types of applications in the Glossary.
•Suspicious applications—Include programs compressed with packers or protectors. These types of protectors are often exploited by malware authors to evade detection.
•Potentially unsafe applications—Refers to legitimate commercial software that has the potential to be misused for malicious purposes. Examples of potentially unsafe applications (PUAs) include remote access tools, password-cracking applications, and keyloggers (programs recording each keystroke typed by a user).
Read more about these types of applications in the Glossary.