App Review ESET Internet Security v19

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
Shadowra
I came to enjoy the availability of the advanced setup, leaving the controls open for whichever kind of user to dial it in. The most sensible settings to change are offset in easier categories for moderately savvy users, e.g. aggressive detections under Protections > Detection responses. The full-featured HIPS and firewall have become rarities today, also suiting advanced users.

For everyone else, the main UI offers the basic setup. The default settings should be comparable to the parameters of an antivirus that leaves them closed off. There were very few settings I wanted to change.
 
Just because ChatGPT (or any large language model) suggests registry keys or path block rules doesn’t mean they’re correct, complete, or safe for your particular setup (home vs enterprise, OS version, ESET version, services used)
Yes, I know the caveats. I did what I could to help her suggest the correct ones for my platform. I asked the question twice, the second time asking her to validate and check for possible hallucinations and missed out items. And most of the registry items suggested were safe and reasonable, I know not to trust her blindly. Had to correct 4 or 5 of them because the Windows Task bar waits 3 mins to show up after boot. I did not tell her I was going to use it for ESET, she gave the answers for the monitoring layer.
 
I presume that it's disabled by default to reduce false positives.

While I'm well aware you can get better protection by tweaking the settings, do you feel that it provides adequate protection when using the default settings, or not?
For everyone else, the main UI offers the basic setup. The default settings should be comparable to the parameters of an antivirus that leaves them closed off. There were very few settings I wanted to change.
Which is pretty much what I thought and did before, I left the settings in default. I'm not downloading the internet everyday and am not they type to be adding things into HIPS, enabling Aggressive mode to a lot of the settings etc.

It's wonderful that Eset has so many options and the ability to fine tune the settings for those who need and appreciate those features, but the only thing I did was to back the PUP's detection down one step as I would get those notices more than any other AV. Maybe that's why on install they have an option to not enable (disable) it?
 
Last edited:
Eset has always been my go to favorite for security on Windows. Between the firewall and it's ability to create custom rules, the network attack protection that acts as an Intrusion Detection/Prevention System (IDS/IPS), which blocks threats identified through dangerous traffic patterns, combined with botnet protection utilizing network signatures and blacklist to block C2 servers, it covers the network incredibly well which is the front door of your hub. Combine this with its other modules and the ability to create custom rules in HIPS and it is quite powerful protection if utilized properly.

I personally used it on my Host to protect it when I was testing in VMware all those years. It did not disappoint or fail me, and that speaks volumes.
 
  • Like
Reactions: roger_m and TuxTalk
I presume that it's disabled by default to reduce false positives.

While I'm well aware you can get better protection by tweaking the settings, do you feel that it provides adequate protection when using the default settings, or not?
fwiw I use default with Eset Ultimate but also have AppGuard running and recently added @danb siriusGPT -- no conflicts that I see, performance very good.
 
operational calculus prioritizes high-value target
No, this is the testing pwn machine to beta test defenses. If a defense measure is good, then it is moved onto production. Then for verification we hire external pen testing.

I know it is not realistic to expect too much from common protection. And at that stage, it was unconfigured running default config.

But just because it is a common defense, unconfigured; it doesnt mean it has to be pwnable. The owner and some big wigs run Qubes like mine. And Qubes does not require too much hardening. And most importantly, it passed our testing. The important documents are kept safe, intrusions manageable. And it works mostly as is out of the box.
 
Last edited:
  • Like
Reactions: Sorrento
Yes, I know the caveats. I did what I could to help her suggest the correct ones for my platform.
hmmm I always think of the chatgpt5 I chat with as a guy, does it even have a gender setting? I don't use sound if it also talks. if it heard it, I'd probably go female :)
 
  • Wow
Reactions: Sorrento
hmmm I always think of the chatgpt5 I chat with as a guy, does it even have a gender setting? I don't use sound if it also talks. if it heard it, I'd probably go female :)
ChatGPT absolutely has voice options for interactive chat. Users can choose from several different voices or rather, a selection of voices in their library which include both male and female options for interacting with the AI.
 
  • Thanks
Reactions: simmerskool
ChatGPT absolutely has voice options for interactive chat. Users can choose from several different voices or rather, a selection of voices in their library which include both male and female options for interacting with the AI.
one weakness when I run linux_VM which is often now, is the sound is often off or intermittent/choppy. But good to know, I'll look into this issue more deeply. thanks.
 
Eset has always been my go to favorite for security on Windows. Between the firewall and it's ability to create custom rules, the network attack protection that acts as an Intrusion Detection/Prevention System (IDS/IPS), which blocks threats identified through dangerous traffic patterns, combined with botnet protection utilizing network signatures and blacklist to block C2 servers, it covers the network incredibly well which is the front door of your hub. Combine this with its other modules and the ability to create custom rules in HIPS and it is quite powerful protection if utilized properly.

I personally used it on my Host to protect it when I was testing in VMware all those years. It did not disappoint or fail me, and that speaks volumes.
It took me a whole 6 months to find and trial a security software suite that is similar to Kaspersky after ban. LOL. Believe me, I try almost all of them. Eset fit the bill in performance and features.
 
ESET is a Slovakian antivirus program that is very popular with gamers.
Version 19 continues to build on its success by improving on what it already does: antimalware, cloud, and sophisticated malware detection.
Let's see how it performs.



Interface :

The interface hasn't changed but remains consistent. Eset offers several approaches: suitable for novices and geeks alike with its numerous settings.
The suite remains very lightweight.

Web protection: 7/7
All links are blocked.
3 link dead

Fake crack : 1/1
Blocked

Malware Pack : Remaining 8 threats out of 71
Eset does an excellent job, all attacks have been blocked!
Whether it's JS attacks, unknown malware, or anything else, everything has been successfully blocked!
There's just one trace left at the end.

Final scan :
Eset : 0
NPE : 1
KVRT : 1


Final opinion:

ESET proves once again its performance and effectiveness.
Its anti-malware engine is very powerful and well optimized to effectively protect a machine or a family.
Recommended.

@TuxTalk request

Thank you @Shadowra for your test. ESET is my all time favourite Antivirus and I'm currently using ESET NOD32 Antivirus.
 
ESET is a Slovakian antivirus program that is very popular with gamers.
Version 19 continues to build on its success by improving on what it already does: antimalware, cloud, and sophisticated malware detection.
Let's see how it performs.



Interface :

The interface hasn't changed but remains consistent. Eset offers several approaches: suitable for novices and geeks alike with its numerous settings.
The suite remains very lightweight.

Web protection: 7/7
All links are blocked.
3 link dead

Fake crack : 1/1
Blocked

Malware Pack : Remaining 8 threats out of 71
Eset does an excellent job, all attacks have been blocked!
Whether it's JS attacks, unknown malware, or anything else, everything has been successfully blocked!
There's just one trace left at the end.

Final scan :
Eset : 0
NPE : 1
KVRT : 1


Final opinion:

ESET proves once again its performance and effectiveness.
Its anti-malware engine is very powerful and well optimized to effectively protect a machine or a family.
Recommended.

@TuxTalk request

Awesome job as always!

I do not know if it's been asked before but would it be possible to test the new ransomware recovery module that's supposedly part of v19?
 
For everyone who has wrote BAN rules for things like Powershell:

The source application should = ALL APPLICATIONS ( for things like the Explorer shell to start Powershell )
The Target applications is for the one you wish to block.

Test your rules !! If your rule is correct, Windows Terminal window will start but contain an error message.
 
Last edited:
You’ve already conquered ESET like a cybersecurity gladiator . now it’s time to enter the K-drama of antivirus: AhnLab V3 Lite! Please test it out.
 
I think I have made some inroads with the HIPS rules for ESET. The core idea I stick with is Writable + Executable folders.
The reason why Writable + Executable folders are important is because when an attacker can put his malware/hackware into them and have them run, then all hell will break loose.
You do an SysInterneal's AccessChk for users "Users", "Everyone", "Authenticated Users" and "Interactive". For the directories "Program Files" , "Program files (x86)" and "Windows".
Then you will arrive at quite a few problematic folders.
The thing to do is to deny execution for all those problematic folders, taking care to use 'base' folders in each case. Of course you have to let Chrome run, so use the full path for the ones ending with "SetupMetrics".
Then deny execution for \ProgramData\* and \users\*\AppData\* . Hackers love to put things in those dirs because everybody has access to them and there are plenty of subdirs to hide things.
The last thing is to make a separate deny execution rule for \Windows\Temp\* . This rule you will need to temporarily disable when you are installing something because installers write to it and run things from within.


.
 
Last edited: