contents 1. ESET NOD32 Antivirus 3.0........................4
1.1 What’s new .................................................................. 4
1.2 System requirements .................................................... 4
2. Installation............................................5
2.1 Typical installation ........................................................ 5
2.2 Custom installation....................................................... 6
2.3 Using original settings ................................................... 7
2.4 Entering User name and password .................................. 7
2.5 On‑demand computer scan............................................ 8
3. Beginner’s guide.....................................9
3.1 Introducing user interface design – modes....................... 9
3.1.1 Checking operation of the system...........................9
3.1.2 What to do if the program doesn’t work properly... 10
3.2 Update setup...............................................................10
3.3 Proxy server setup........................................................10
3.4 Settings protection .......................................................11
4. Work with ESET NOD32 Antivirus ............12
4.1 Antivirus and antispyware protection ............................ 12
4.1.1 Real‑time file system protection ............................12
4.1.1.1 Control setup........................................................12
4.1.1.1.1 Scanning of media ................................................12
4.1.1.1.2 Event‑triggered scanning ......................................12
4.1.1.1.3 Checking of newly created files ..............................12
4.1.1.1.4 Advanced setup ....................................................12
4.1.1.2 Cleaning levels......................................................12
4.1.1.3 When to modify real‑time protection configuration 12
4.1.1.4 Checking real‑time protection ...............................13
4.1.1.5 What to do if the real‑time protection does not work1 3
4.1.2 Email protection ...................................................13
4.1.2.1 POP3 checking......................................................13
4.1.2.1.1 Compatibility .......................................................13
4.1.2.2 Integration with Microsoft Outlook, Outlook Express,
Windows Mail ......................................................14
4.1.2.2.1 Appending tag messages to email body..................14
4.1.2.3 Removing infiltrations ..........................................14
4.1.3 Web access protection ..........................................14
4.1.3.1 HTTP ....................................................................15
4.1.3.1.1 Blocked / excluded addresses.................................15
4.1.3.1.2 Web browsers.......................................................15
4.1.4 Computer scan .....................................................15
4.1.4.1 Type of scan..........................................................16
4.1.4.1.1 Standard scan.......................................................16
4.1.4.1.2 Custom scan.........................................................16
4.1.4.2 Scan targets .........................................................16
4.1.4.3 Scan profiles .........................................................16
4.1.5 ThreatSense engine parameters setup ...................17
4.1.5.1 Objects setup .......................................................17
4.1.5.2 Options................................................................ 17
4.1.5.3 Cleaning...............................................................18
4.1.5.4 Extensions............................................................18
4.1.6 An infiltration is detected ......................................18
4.2 Updating the program ..................................................19
4.2.1 Update setup........................................................19
4.2.1.1 Update profiles .....................................................19
4.2.1.2 Advanced update setup........................................20
4.2.1.2.1 Update mode ......................................................20
4.2.1.2.2 Proxy server.........................................................20
4.2.1.2.3 Connecting to LAN................................................21
4.2.1.2.4 Creating update copies – Mirror.............................21
4.2.1.2.4.1 Updating from the Mirror ......................................21
4.2.1.2.4.2 Troubleshooting Mirror update problems .............. 22
4.2.2 How to create update tasks.................................. 22
Copyright © 2007 by ESET, spol. s r. o.
ESET NOD32 Antivirus was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without a permission in
writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support