Any archive container format it knows how to read would be considered an archive to the software, including the ones you listed. There are also...
Directories full of installers and jar files tend to bog things down because they need to be decompressed before being analyzed, so you're...
A system that has a file sitting unactivated in an email or file is not a compromised system. Compromise happens either during or after malicious...
You always need to set up exclusions for the db and log files, so that would be the best place to start....
If you're installing for the first time, it will go through and clean up old messages that have malicious attachments which can't happen with the...
Make sure when you are doing a manual scan from the right-click menu that you go to Advanced Options, Clean files... instead of just scanning....
I appreciate the update to the documentation, but is it possible to do something that is a bit more automated to warn users when they are...
I'm sure plenty of other people have seen malware hosted in dynamic DNS websites. Lots of malicious dropper agents end up referencing them since...
Would it be possible to include detection for Seti@Home/Folding@Home, Bitcoin hashing programs, and other applications that consume all free CPU...
Back in the v3 days you could export the registry keys for the setting you wanted and merged them with other systems to apply it. However, the...
You're working with a lot of flawed assumptions and blatantly incorrect information here. As it turns out, the Eset guys really do know what they...
Archive scanning in general is CPU intensive because it has to run the decompression before it can scan contents. Archives themselves generally...
Setting file size and nesting limits on the archive scanning module would give you the most noticeable reduction in CPU consumption without...
Exclude scanning of C:\Windows\CSC and disable scanning for network drives on real-time scanning. That generally should take care of it.
Business edition enables the remote administration features, basically. As for specifying specific update targets, you should be able to hit edit...
You're going to need to use a tool like InstEdit to build a transform for the MSI package. Specifically you will need to modify the APPDIR row in...
NTLM v1 vs v2 is more a function of the OS you are using. If you're using 2003 then by default it is doing everything with NTLM v1. If it is...
I'd do a scan with a memory diagnostic tool. Intermittent process crashes and the like can be caused by hardware issues.
A firewall blocks ports. What you're seeing is http/https scanning. When you enable the https scanning functionality, the AV software basically...
As I have been unfortunate enough to discover recently, it is possible to get malicious content pushed down from the Windows Update servers....
This is generally caused by a file receiving a lot of disk writes that forces it to be re-scanned multiple times (or a file that simply gets...
Yeah, that confused me initially as well because if you watch file activity on the process you see ekrn doing reads on everything. Turns out that...
I would turn off the Computer Browser service if you don't need it and make a habit of turning off NetBIOS on the network adapters when the...
The scan priority is already set to "lowest" for the default scan tasks. This means that any normal user process requests for CPU or disk...
The self-defense feature is going to stop you from directly modifying the registry keys where you specify the target RA server, so doing it...
Separate names with a comma.