ESET Online Help

Search English
Select the topic

Detection engine

The default setup of detection behavior provides the essential level of security which includes:

Real-time file system protection

Machine learning protection

Smart optimization (most efficient combination of system protection and scanning speed)

ESET LiveGrid reputation system

To turn on additional protection features, click Setup > Detection engine:

Detection of potentially unwanted applications

Detection of potentially unsafe applications (for example key loggers, password-cracking tools)

Enable submission of suspicious or infected samples

Configure exclusions (files, directories left out of scan) to speed up scan

Adjust cleaning level

Every threat detected and action taken against it is logged in the Detections screen.


Real-time & Machine learning protection

Advanced Machine learning is now a part of the detection engine as an advanced layer of protection, which improves detection based on Machine learning. Read more about this type of protection in the Glossary.

You can configure Reporting and Protection levels of the following categories:

Malware—A computer virus is a piece of malicious code that is prepended or appended to existing files on your computer. However, the term “virus” is often misused. "Malware” (malicious software) is a more accurate term. Malware detection is performed by the detection engine module combined with the machine learning component.
Read more about these types of applications in the Glossary.

Potentially unwanted applications—Grayware or Potentially Unwanted Applications (PUAs) is a broad category of software, whose intent is not as unequivocally malicious as with other types of malware, such as viruses or trojan horses. However, it could install additional unwanted software, change the behavior of the digital device, or perform activities not approved or expected by the user.
Read more about these types of applications in the Glossary.

Suspicious applications—Include programs compressed with packers or protectors. These types of protectors are often exploited by malware authors to evade detection.

Potentially unsafe applications—Refers to legitimate commercial software that has the potential to be misused for malicious purposes. Examples of potentially unsafe applications (PUAs) include remote access tools, password-cracking applications, and keyloggers (programs recording each keystroke typed by a user).
Read more about these types of applications in the Glossary.

arrow_down_businessReporting

arrow_down_businessProtection