
Reporting threshold is configured for each category (referred to as "CATEGORY"): When a detection occurs (e.g., a threat is found and classified as malware), information is recorded to the Detections log, and Desktop notifications occur if configured in ESET Endpoint Security.
When enabled, relevant On-demand scan settings are inherited from the Real-time & Machine Learning protection section. By default, Use real-time protection settings is enabled. Scanner settings can be configured separately for the real-time scanner and the on-demand scanner. Read more about this type of protection in the Glossary. These types of protectors are often exploited by malware authors to evade detection.Īdvanced machine learning is now a part of detection engine as an advanced layer of protection which improves detection based on machine learning.
Suspicious applications include programs compressed with packers or protectors. Examples of potentially unsafe applications (PUAs) include remote access tools, password-cracking applications, and keyloggers (programs recording each keystroke typed by a user). Potentially unsafe applications – Refers to legitimate commercial software that has the potential to be misused for malicious purposes. However, it could install additional unwanted software, change the behavior of the digital device, or perform activities not approved or expected by the user. Potentially unwanted applications – Grayware or Potentially Unwanted Applications (PUAs) is a broad category of software, whose intent is not as unequivocally malicious as with other types of malware, such as viruses or trojan horses.
Read more about these types of applications in the Glossary. Malware detection is performed by the detection engine module combined with the machine learning component. "Malware” (malicious software) is a more accurate term. However, the term “virus” is often misused.
Malware – A computer virus is a piece of malicious code that is prepended or appended to existing files on your computer. ) allows you to configure reporting and protection levels of the following categories: Real-time & Machine learning protection for all protection modules (for example, Real-time file system protection, Web access protection. Real-time & Machine learning protection categories ON/OFF buttons are replaced with four thresholds - Aggressive, Balanced, Cautious and Off. Starting in version 7.2, the Detection engine section no longer provides ON/OFF switches as for version 7.1 and below. Changes to the detection engine scanner configuration