Professional Documents
Culture Documents
A Threat Is Detected - ESET Endpoint Security - ESET Online Help
A Threat Is Detected - ESET Endpoint Security - ESET Online Help
A Threat Is Detected - ESET Endpoint Security - ESET Online Help
A Threat is detected
Infiltrations can reach the system from various entry points such as web pages, shared folders, via email or
from removable devices (USB, external disks, CDs, DVDs, etc.).
Standard behavior
As a general example of how infiltrations are handled by ESET Endpoint Security, infiltrations can be detected
using:
Real-time file system protection
Web access protection
Email client protection
On-demand computer scan
Each uses the standard cleaning level and will attempt to clean the file and move it to Quarantine or terminate
the connection. A notification window is displayed in the notification area at the bottom right corner of the
screen. For detailed information about the detected/cleaned objects, see Log files. For more information about
cleaning levels and behavior, see Cleaning.
https://help.eset.com/ees/10.1/en-US/idh_scan_clean.html 1/2
9/22/23, 8:49 AM A Threat is detected | ESET Endpoint Security | ESET Online Help
Apply cleaning if a file has been attacked by a virus that has attached malicious code to the file. If this is the
case, first attempt to clean the infected file to restore it to its original state. If the file consists exclusively of
malicious code, it will be deleted.
If an infected file is “locked“ or in use by a system process, it will usually only be deleted after it is released
(normally after a system restart).
Multiple threats
If any infected files were not cleaned during Computer scan (or the Cleaning level was set to No Cleaning), an
alert window prompting you to select action for those files is displayed.
https://help.eset.com/ees/10.1/en-US/idh_scan_clean.html 2/2