You can also refer to this Eset Knowledgebase article on common installation issues: https://support.eset.com/kb2955/
You can also write in our official forum at https://forum.eset.com and we'll do our best to help you get it sorted.
I received a lower right screen popup in light blue/green? from Eset. I'll call it a general interest notification as I don't have a clue to it's purpose. Eset threat encyclopedia in the Help gives me no information. I'm on line but only doing a quiet scroll of a text message when a Eset popup(internet Security) notifies me that a new device was added/connected. I clicked more info on that popup, and it gives me a company Sagemcom Broadband, with the next line an IP address, and the last line a MAC address. This doesn't seem to be logged in the Eset log file system, so I assume Eset sees it as benign. I have Bell Fibe as standard for everything in this house, including internet BELL(NNN) WiFi, with black boxes for whatever use nailed to the cement wall behind me(My PC is in the basement). So I'm surprised that this company needs to store anything at all of a business nature on my PC. Usually these are hard wired at Fibe install and independent of the software they provide. Or, I could be wrong and Eset is simply notifying me of the traffic it sees. An improvement to Eset would be a "user action" line on the pop up to set the non computer literate to alleviate the their concerns. It could say what Eset action was taken, ie: logged etc, I'm running Win7 64 and the latest Internet Security. Thanks for the help.
First, you should have posted this comment in the Eset subsection in the Antivirus section of the forum. You should also post this comment on the Eset forum: https://forum.eset.com/ . It appears the popup you are receiving is a result of having the "Notify me about newly discovered network devices" option enabled in Basic subsection of the Firewall settings in the Eset GUI. This option is enabled by default. As far as this goes: Eset alerts will indicate what action was taken in the form of "blocked" or "allowed." As far as controlling the level of detail shown in the log files, see the below screen shot. This will control at the highest level what activity is logged and by default is set to "Informative." It can be set to "Diagnostic" will provide the most verbose logging activity and is not recommended for general use since your log files will rapidly fill up with event detail. Finally, finer granularity can be had in event log activity by specification of logging level within rule settings in the Firewall and HIPS sections for example. These settings override the prior Tools section global event logging setting.
May I ask again a question about a site where Eset puts up a warning about https ? Before I do that, just a little bit more info: It's about a city in The Netherlands, The Hague, on which during WWII by mistake bombs were dropped (just only a few kilometers further they may have had destroyed V2-installations); see Wikipedia https://en.wikipedia.org/wiki/Bombing_of_the_Bezuidenhout ). The site involved is https://www.bb45.nl/ I have checked the site at SSL Checker / SSLShopper https://www.sslshopper.com/ssl-checker.html#hostname=https://www.bb45.nl/ but I don't fully understand what it is actually saying there. So, what and why is wrong? Thanks in advance.
Thanks. According to SSL Checker / SSLShopper there is more wrong at that site, as far as I understand it. Sigh ...
Current update from ESET Administration on their forum (as of one hour ago): Today v12.1.31 has been released but since it's a staggered release, not all users will receive it immediately. It may take some time until the product updates to the latest version automatically. A release announcement will be posted later today after an official release.
Version 12.1.31.0 At the moment I don't see it mentioned at Eset News https://support.eset.com/news/ I guess that a news article will be published there soon. For the Changelog go to https://www.eset.com/int/home/internet-security/download/ and look there at the advanced download option. Changelog: Version 12.1.31.0 Added: Behavioral Monitor settings in “Advanced setup” Added: Indonesian localization Added: Customer Experience Improvement Program Added: EULA and Privacy Policy links added to “About” screen Added: Automatic detection of Airplane mode Added: Information about scanned files by Real-time file system protection Improved: Reduced size of installer Improved: Product upgrade process including over-night updates Improved: PUA communication and term use throughout product (“Threat” has been replaced with “Detection” when PUA is detected) Improved: Redesigned Webcam protection rules editor in “Advanced setup” Improved: User is notified if Banking and Payment Protection is running on unsecured WiFi Improved: Updated in-browser page layout of Banking and Payment Protection Improved: Minor user interface improvements on Computer scan screen Improved: Communication of referral across product Improved: Minor user interface improvements on Security Report page Changed: EGUI runs only when it is necessary Fixed: Various functional and localization bugs Post by Marcos at the Eset forum: https://forum.eset.com/topic/18818-eset-version-121310-have-been-released/
Now also at the Eset News: https://support.eset.com/news7217/ And at the Eset forum: https://forum.eset.com/topic/18823-eset-nod32-antivirus-version-121310-has-been-released/ https://forum.eset.com/topic/18822-eset-windows-home-products-version-121310-have-been-released/
The following is speculation on my part until Eset publicly releases further details; if ever. They tend to be a bit "tight lipped" when it comes to the internal workings of their protection processes. It appears two types of alerts will be generated from Deep Behavioral Inspection. The first type will be when one of Eset's behavioral signatures have been triggered and the process characteristics are of suspicious nature; e.g. a PE without a .exe extension, etc.. These factors will provide Eset enough confidence to outright block execution and display the following alert: The second type of alert which I don't have an example of is when nothing specifically malicious has been identified with the process activity but it is being executed in a fashion known to be associated with malware usage. For example, a script being run from a shell process or as a child process. I believe the user will have an option in this case to allow or block the activity with the recommended action being to block unless the initiating process is known to be legit activity.
In addition to what @itman posted, I think Deep Behavioral Inspection will use some rules from DNA detection to spot malicious behavior; it seems to be a evolution of what Advanced Memory Scanner can do.
What are the best settings for Eset internet security 12? Is there some file that you can run so that you have the best settings? I hope someone can help me please. Greats, Darts