Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

Similar documents
ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 ANTIVIRUS 8

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

ESET NOD32 ANTIVIRUS 9

ESET SMART SECURITY 6

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET SMART SECURITY 9

ESET NOD32 Antivirus. Table of contents

ESET MOBILE SECURITY FOR ANDROID

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

ESET ENDPOINT SECURITY FOR ANDROID

ESET Mobile Security Windows Mobile

ESET NOD32 Antivirus 4

ESET NOD32 Antivirus 4

ESET Mobile Security Business Edition for Windows Mobile

Quick Start Guide. www. K7Computing.com

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

Using Windows Update for Windows XP

NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds

ES Exchange Server - How to Remove XMON

TrustPort USB Antivirus

ESET NOD32 Antivirus 4

Easy Setup Guide for the Sony Network Camera

User's Guide. Copyright 2010 BitDefender

Parallels Transporter Agent

Malwarebytes Anti-Malware 1.42

Sophos Endpoint Security and Control standalone startup guide

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

How To Install & Use Metascan With Policy Patrol

How To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa (

Protect your laptop with ESET Anti-Theft

McAfee Internet Security Suite Quick-Start Guide

How to install and use the File Sharing Outlook Plugin

Antivirus. Quick Start Guide. Antivirus

Total Protection Service

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Sophos Anti-virus Basic Level Handout

ESET Cybersecurity. Installation Manual and User Guide. Click here to download the most recent version of this document

Total Protection Service

Kaspersky Endpoint Security 10 for Mac Administrator's Guide

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

MALWAREBYTES PLUGIN DOCUMENTATION

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: Rev 6

Virtual Office Remote Installation Guide

Introduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1

Stellar Phoenix Exchange Server Backup

User guide. Business

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Connecting To SOM Network Drives With Windows XP

Driver Upgrade Instructions

owncloud Configuration and Usage Guide

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

w e p r o t e c t d i g i t a l w o r l d s ESET NOD32 Antivirus for IBM Lotus Domino Installation

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

Contents. McAfee Internet Security 3

Configuring Trend Micro Content Security

Using Windows Update for Windows Me

Sentral servers provide a wide range of services to school networks.

Malwarebytes Anti-Malware User Guide Version March 2016

Norton. AntiVirus. Product Manual

SecuraLive ULTIMATE SECURITY

ESET NOD32 Antivirus for IBM Lotus Domino. Installation

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

contents 1. ESET Smart Security Installation Beginner s guide Work with ESET Smart Security...12

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Chief Architect X6. Download & Installation Instructions. Chief Architect, Inc N. Mineral Dr. Coeur d Alene, Idaho

Lotus Foundations Start Getting Started

ESET REMOTE ADMINISTRATOR. Migration guide

1. Installing the client module on the phone

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

Laplink PCmover Windows Upgrade Assistant

ESET NOD32 Antivirus. for Kerio. Installation manual

SonicWALL Security Quick Start Guide. Version 4.6

Sophos Anti-Virus for NetApp Storage Systems startup guide

SecuraLive ULTIMATE SECURITY

ESET Endpoint Protection Advanced

Online Backup and Recovery Manager Setup for Microsoft Windows.

Remote Access - Mac OS X

AVG AntiVirus for Mac

Dial-up Installation for CWOPA Users (Windows Operating System)

Symantec Virtual Machine Management 7.1 User Guide

Bitdefender Antivirus Plus 2016 User's Guide

Hallpass Instructions for Connecting to Mac with a Mac

How to use Backitup Modify Existing Schedule jobs

You may have been given a download link on your trial software . Use this link to download the software.

Microsoft Security Essentials Installation and Configuration Guide

Home Agent Installation Manual Windows 8 v1.0

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.

PPC S SMART PRACTICE AIDS

Wimba Create. Version 2.6. Installation Guide

CMS Server Installation Guide

Kaspersky PURE User Guide

Document authored by: Native Instruments GmbH Hardware version: Traktor Kontrol X1 MK2 (01/2013)

Migrating MSDE to Microsoft SQL 2005 Express SP4

Steps for Basic Configuration

Sophos Computer Security Scan startup guide

Transcription:

Quick Start Guide

ESET Cybersecurity provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the award-winning NOD32 antivirus system, ESET Cybersecurity continues to deliver unprecedented protection against zero-day threats, without the need for constant signature updates to recognize the threats. This manual will guide you step by-step through the quick setup and configuration of the product. Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product. Antispyware: Protects you from hidden backdoors, downloaders, exploits, crackers, hijackers, password stealers, key loggers and proxies.

Protection status informs you about the current protection level of your computer and security. Setup options allow you to adjust the protection levels of your computer. A computer scan is an important part of each antivirus solution. It is used to perform a scan of the files and folders on your computer s disk(s). The Tools section, available in extended mode, allows you to enter advanced features: log files, quarantine and scheduler. The Update section contains important information about the program updates. It is vitally important for the program to update regularly to provide the maximum level of protection against the latest threats. Comprehensive help and support for ESET Cybersecurity. You can also contact ESET technical support directly from here.

Installation Before you begin the installation process, please close all open programs on your computer. ESET Cybersecurity contains components that may conflict with other antivirus programs that may already be installed on your computer. ESET strongly recommends that you remove any other program(s) to prevent potential problems. You can install ESET Cybersecurity from an installation CD or from a file available on the ESET website. To launch the installer wizard, do one of the following: If you are installing from the installation CD, insert the CD into the CD-ROM drive and the menu screen will appear. Double-click on the ESET Cybersecurity Installation icon to launch the installer. If you are installing from a downloaded file, double-click the file you downloaded to launch the installer. After launching the installer and accepting the license agreement, the installer will offer two types of installation options: Typical only the most important parameters will be configured during installation. Other parameters will be pre-set to their recommended settings. This mode provides our recommended comprehensive protection and is suitable for most users. Custom enables configuration of all advanced parameters during installation. This guide describes typical installation.

ThreatSense.Net ThreatSense.Net plays an important role in our research regarding new detection technologies that enable us to proactively capture malware and thus provide you with better protection. We recommend that you leave the ThreatSense.Net Early Warning System enabled. Detection of potentially unwanted applications Since some potentially unwanted applications are used legitimately and might not necessarily pose a security risk, the user s consent is required to enable detection. We recommend selecting the Enable detection of potentially unwanted applications option. Installation location Select a disk where you want to install ESET Cybersecurity and click Continue. Click Continue to proceed to the next step. Click Continue to proceed to the next step.

Completing the installation When all necessary parameters have been configured, start the final installation by clicking the Install button. The installation progress will be indicated by a progress bar. After installation is complete, you must restart your computer. Simply click the Restart button on the Installation Completed screen. Product Activation When you restart your machine, you will see the Product Activation Type window. 1. If you purchased a retail boxed version of the product, it already contains an Activation Key along with step-by-step activation instructions. The Activation Key is usually located inside or on the back side of the product package. For a successful activation, the Activation Key must be entered as supplied. 2. If you received a Username and Password, select the Activate using a Username and Password option and enter the license data in the appropriate fields. This option is equivalent to the Username and Password setup... in the program Update window. 3. If you would like to evaluate ESET Cybersecurity before making a purchase, select the Activate Trial License option. Fill in your name and Email address. Your test license will be sent to this address. ESET Cybersecurity will be activated for a limited period of time. Trial licenses can only be activated once per customer. If you choose not to activate at this time, click Activate later. If you selected Activate later you can activate ESET Cybersecurity directly from the program by clicking the ESET Cybersecurity icon located in your menu bar (top of the screen) and then click Product activation. If you do not have a license and would like to buy one, click the Purchase License option. This will redirect you to the website of your local ESET distributor.

Starting ESET Cybersecurity Check for new version ESET Cybersecurity starts protecting your computer immediately after activation. At any time you may open ESET Cybersecurity to check your protection status or to perform various scanning and maintenance tasks. To start ESET Cybersecurity: Click on the ESET Cybersecurity icon located in your menu bar (top of the screen) and choose Open window. For maximum protection, it is important to use the latest build of ESET Cybersecurity. To check for a new version, click Update from the main menu on the left. If a new build is available, a message that says A new version of ESET Cybersecurity is available will be displayed at the bottom of the window. Click Learn more to display a new window containing the version number of the new build and the list of changes in the new version or other important info. Click Download to download the latest build. Click OK to close the window and download the upgrade later. If you clicked Download, the file will be downloaded to your downloads folder (or the default folder set by your browser). When the file has finished downloading, launch the file and follow the installation directions. Your username and password will be automatically transferred to the new installation. It is recommended to check for upgrades regularly, and especially after a recent installation.

Entering Username and Password for update If you have not entered your username and password after the installation, you can do so directly in the program menu. In the left pane of the ESET Cybersecurity screen, select Update and then click Username and password setup on the right. Enter the username and password to the appropriate fields and click OK to confirm. The username and password are both case sensitive. Enter them carefully and precisely. Copying and pasting from the license email is recommended. Your username and password must be correctly entered to receive updates and ensure that your computer is continually protected against newly emerging threats. You will also need to enter the username and password if you are renewing or reinstalling the software. Update By default, ESET Cybersecurity is set to receive regular updates (once every 60 minutes). If you entered your username and password after the installation and no update has been performed yet, we recommend starting the update manually: Select Update in the left pane of the main ESET Cybersecurity screen Click Update virus signature database The update module will connect to the Internet, contact an available ESET update server and download digitally signed update files, which contain the most recent malware signatures as well as new definitions for advanced heuristics and other program modules. As soon as a newer update has been installed, ESET Cybersecurity displays the new version of the virus signature database in the Mac OS menu bar.

Computer scanning After successful installation and update, we recommend that you perform a complete computer scan to check for existing threats. To do this, click Computer scan in the main ESET Cybersecurity screen and select Smart scan. ESET Cybersecurity will begin scanning all local hard drives. As long as the scan continues, the status window shows the progress bar as well as the current statistics about scanned and infected files found. If a threat is detected, ESET Cybersecurity will quarantine the file and display an alert. You should be able to continue working as normal while the scan takes place.

Protection Status indication ESET Cybersecurity s current protection status is indicated in the following ways: The menu bar icon A report in the Protection status window In the event that any protection module is disabled, the Protection status window will show the name of the disabled module, along with a link allowing you to re-enable it. The individual protection statuses are indicated by 3 colors: yellow Real-time file system protection is enabled, but the maximum level of protection is not ensured. The yellow icon is displayed if ESET Cybersecurity requires your attention. red The Real-time file-system protection is disabled. Since the proper functioning of these modules is vital to your system s security, we recommend enabling the inactive module immediately. green Antivirus protection is working properly; your computer is protected against malicious software and network attacks. This status indicates that all protection modules are enabled and the virus signature database is up-to-date.

Resolving Issues ESET s technical support specialists are ready to assist you in resolving potential problems. Before contacting technical support, we strongly recommend searching for a solution on the ESET website first. This will help you to resolve the problem quickly within a couple of minutes. Answers to the most frequently asked questions can be found at: http://www.eset.eu/support/faq For various problem solutions, directions and hints, read our knowledgebase: http://kb.eset.eu To contact ESET s technical support, please fill in the support form: http://www.eset.eu/support/form

Copyright 2010 ESET, spol. s r. o. ESET, logo of ESET, NOD32, ThreatSense, ThreatSense.Net and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Other companies mentioned here or products, may be registered trademarks of its proprietors. Produced according to quality standards of ISO 9001:2000. www.eset.com