Summary Report 2020 www.av-comparatives.org
36
When we ran an on-demand scan of malware samples on a USB drive, ESET displayed the number of
detected threats, and noted that these had all been cleaned, in the program window. By clicking on
Show Log, we were able to see the file names, paths and detection names, along with other scan
details such as date and time.
Scan options
The default scan, accessible from the home page, is a “Smart Scan”. The scope of this can be configured
in the settings. The scan page, opened by clicking the Computer scan menu, has a number of options.
You can run a complete system scan, removable media scan, or custom scan. The latter provides very
granular options, including operating memory, boot sectors/UEFI, WMI database and registry. There
is also an option to repeat the last scan. You can scan a file, folder or drive by dragging it to the
Computer scan page, or using Windows File Explorer’s right-click menu. Malware found in an on-demand
scan is automatically quarantined. Under Advanced Setup\Detection Engine\Real-Time & Machine
Learning Protection, you can choose whether to detect potentially unwanted applications, potentially
unsafe applications (e.g. hacker tools), and suspicious applications (e.g. those using typical malware
obfuscation packing). Scan exceptions can be set in the Exclusions section. Real-time file system
protection lets you choose to detect malware on file open, creation, execution or removable media
access (all on by default). Overall, ESET provides a very wide range of scanning and other options,
letting users fine-tune the program to their requirements.
Quarantine
The Quarantine page can be found under the Tools menu\More tools. It shows the date and time of
detection, file name and path, file size, detection name, number of occurrences, and name of the user
that was active at the time. To delete a quarantined file, you have to right-click it and then click
Delete from Quarantine. There is a Restore button, and also a Move to quarantine button. The latter
allows you to browse the file system for any suspicious files that have not been detected yet. Once
they are in quarantine, you can submit them for analysis, or delete them, using the right-click menu.
Logs
The Logs page is under the Tools menu\More tools. It provides records of detections, events (such as
updates), and scan results, along with events relating to the program’s other features, such as anti-
spam and parental control.
Help
The Help and support page includes links to Open help and Search ESET Knowledgebase. The former
opens an online manual, with topics such as System requirements, Installation and Beginner’s guide in
a menu column on the left-hand side of the page. Each page opens detailed explanations and
instructions, very clearly laid out, and well illustrated with annotated screenshots. The Knowledgebase
lets you search for specific queries, such as exclusions.
Access control
Standard Windows users cannot disable protection features, or uninstall the program. This is as it
should be, in our opinion. Additionally, you can password protect the settings (Setup\Advanced
setup\User interface\Access setup). If this is set up, any other users can operate all the features of the
program, but not disable protection in any way.