Antivirus

Previous  Next

Scan Device
 
The Scan Device option can be used to check your mobile device for infiltrations.
 
Certain predefined file types are scanned by default. A complete device scan checks the memory, running processes, their dependent dynamic link libraries and files that are part of internal and removable storage. A brief summary of the scan will display after the scan is completed (i.e. number of infected files, number of scanned files, duration of the scan etc.).
 
If you wish to abort a scan in progress, tap Cancel.

 

Scan Folder
 
To scan particular folders on your device, tap Scan Folder. Find the folders you wish to scan, tap their check boxes in the right column and tap Scan.

 

Scan Logs
 
The Scan Logs section contains logs providing comprehensive data about completed scan tasks. Logs are created after each manually triggered (On-demand) scan or when an infiltration is detected by the Real-time scan.
 
Each log contains:

  • date and time of the event,
  • number of scanned files,
  • number of infected files,
  • full path name of infected files,
  • duration of the scan,
  • actions performed or errors encountered during the scan.

 

Quarantine
 
The main task of the quarantine is to safely store infected files. Files should be quarantined if they cannot be cleaned, if it is not safe or advisable to delete them or if they are being falsely detected by ESET Mobile Security.
 
Files stored in the quarantine can be viewed in a log that displays the name and original location of the infected file, date and time of quarantine.
 
If you wish to restore a quarantined file to its original location, tap the file and select Restore. This option is not recommended.
 
To permanently remove a quarantined file from your device, tap the file and select Delete. To remove all files stored in the quarantine, press the MENU button and tap Delete All.

 

Settings
 
The On-demand settings allow you to modify scanning parameters of a manually triggered (On-demand) scan.
 
The Show alert dialog option displays threat alert notifications every time a new threat is detected by the On-demand scanner.
 
If you wish to scan all applications (.apk files) installed on your device, select the Scan applications option.
 
Proactive protection is an algorithm-based detection method that analyzes code and searches for typical virus behavior. Its main advantage is the ability to identify malicious software not yet recognized in the current virus signature database. Additional time will be required to complete the scan if Proactive protection is enabled.
 
The Archive scanning depth option allows you to specify the depth of nested archives (.zip files) to be scanned. The higher the number, the deeper the scan.
 
The Stored logs option allows you to define the maximum number of logs to be stored in the Scan Logs section.
 
You can specify a Default action that will be performed automatically when infected files are detected. You can choose from the following options:

  • Ignore - no action will be performed on the infected file (this option is not recommended),
  • Delete - the infected file will be removed,
  • Quarantine - (default) the infected file will be moved to the Quarantine.

 
The Extensions settings show the most common file types exposed to infiltrations on the Android platform. Select the file types you wish to scan or deselect the extensions to exclude them from scanning. These settings apply to both On-demand and Real-time scan:

  • Extension sensitive - if you deselect this option, all file types will be scanned. Files will also be checked if they were not masqueraded as another file type. This results in longer scan time.
  • DEX (applications code file) - executable file format that contains compiled code written for the Android OS,
  • SO (libraries) - shared libraries saved to designated places in the file system and linked by programs that require their functions,
  • Archives (zipped files) - files compressed using the Zip compression,
  • Others - other known file types.

 
In the Real-time settings, you can configure the scanning parameters of the On-access scanner. The On-access scanner checks files that you interact with in real time. It automatically scans Download folder on the SD card, files from the .apk installation files and files on the SD card after it is mounted (if the Scan mounted SD card option is enabled). The On-access scanner launches automatically at system startup.

  • Real-time protection - if enabled (default), the On-access scanner runs in the background.
  • Show alert dialog - displays threat alert notifications every time a new threat is detected by the On-access scanner.
  • Scan mounted SD card - scans the files prior to opening or saving them to the SD card.
  • Proactive protection - select this option to apply heuristic scanning techniques. Heuristics proactively identify new malware not yet detected by the virus signature database by analyzing code and recognizing typical virus behavior. Additional time is required to complete the scan if Proactive protection is enabled.
  • Archive scanning depth - this option allows you to specify the depth of nested archives (.zip files) to be scanned. The higher the number, the deeper the scan.
  • Default action - you can specify a default action that will be performed automatically when infected files are detected by the On-access scanner. If you select Ignore, no action will be performed upon the infected file (this option is not recommended). If you select Delete, the infected file will be removed. If you select Quarantine, the infected file will be moved to the Quarantine.

 

ESET Mobile Security displays its notification icon in the top left corner of the screen (Android status bar). If you do not wish this icon to be displayed, go to the ESET Mobile Security main screen, press the MENU button, tap Notifications and deselect the Show notification icon option. Please note, this will not turn off a red warning icon with an exclamation mark notifying you about a security risk (e.g. Real-time virus scanning disabled, SIM matching disabled etc.).

Previous  Next