App Review ESET Smart Security 2022 (Custom Roboman's Settings)

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
Shadowra

Zorro

Level 9
Verified
Well-known
Jun 11, 2019
408
Do I understand correctly that it doesn't respond to files that are already on the hard drive?
Most likely, the files already on the disk before installing the antivirus are not sent to the cloud sandbox.
 

czesetfan

Level 4
Dec 3, 2021
184
Most likely, the files already on the disk before installing the antivirus are not sent to the cloud sandbox.
The situation from the tests is that the antivirus is installed on a virtual PC where the malware sample package is already prepared. And also, in my opinion, the case of tests where the malware collection is copied to the PC when AV protection is deactivated, so that it doesn't "catch" the samples right away when copying to the HD.
 
Last edited:

Shadowra

Level 36
Thread author
Verified
Top Poster
Content Creator
Malware Tester
Well-known
Sep 2, 2021
2,586
The situation from the tests is that the antivirus is installed on a virtual PC where the malware sample package is already prepared. And also, in my opinion, the case of tests where the malware collection is copied to the PC when AV protection is deactivated, so that it doesn't "catch" the samples right away when copying to the HD.

Real-time protection is disabled only to run the malware pack analysis.
It is re-enabled during runtime.

Especially I show when I proceed to deactivation / activation 😉
 
  • Like
Reactions: Nevi

czesetfan

Level 4
Dec 3, 2021
184
I understand. My comment was directed at the fact that LiveGuard tracks suspicious files coming in, but not those that are already there. If a malware package gets on the disk without LiveGuard checking it, it will no longer be checked.
Proactive protection detects only files from the following sources:

•Files downloaded using a supported web browser
•Downloaded from a mail client
•Files extracted from an unencrypted or encrypted archive using one of the supported archive utilities
•Executed and opened files located on a removable device
 

Shadowra

Level 36
Thread author
Verified
Top Poster
Content Creator
Malware Tester
Well-known
Sep 2, 2021
2,586
I understand. My comment was directed at the fact that LiveGuard tracks suspicious files coming in, but not those that are already there. If a malware package gets on the disk without LiveGuard checking it, it will no longer be checked.

That's right, but I think it should scan all the time, especially if the file is modified.
To be seen in the future
 

Zorro

Level 9
Verified
Well-known
Jun 11, 2019
408
A new test was carried out by Eset Internet Security 15 for comss. The result is sad. Eset did not respond to the harsh uninstaller, which removed almost the entire system. All programs, folders with files from the desktop, some of the system files, even deleted the taskbar and system settings. Deleted everything ... except Eset :) Eset remained intact and fully functional, but the operating system became almost completely inoperative. This result sparked a heated discussion in the comments. In the comments, I gave a link to the file with Roboman's settings, and one of the users ran the file from the test, which damaged the system, on a virtual machine with Eset Internet Security installed with Roboman's configuration. It all depends on how the user answers the HIPS questions. If there is a ban, then the uninstaller will have problems, and if there is permission, then the system is again inoperable, although the antivirus in this configuration tried to independently block some of the program's actions. This file was sent to the Eset laboratory and they entered it into the databases as a potentially unwanted program. But Eset generally has a problem with such uninstallers. This is not the first test where Eset fails so precisely on this kind of programs that remove everything from the system, including the system itself. Until you send the file to the laboratory, they do not add it to the databases, apparently machine learning does not consider such programs to be malicious.
Test Eset IS 15
 

SeriousHoax

Level 49
Verified
Top Poster
Well-known
Mar 16, 2019
3,862
A new test was carried out by Eset Internet Security 15 for comss. The result is sad. Eset did not respond to the harsh uninstaller, which removed almost the entire system. All programs, folders with files from the desktop, some of the system files, even deleted the taskbar and system settings. Deleted everything ... except Eset :) Eset remained intact and fully functional, but the operating system became almost completely inoperative. This result sparked a heated discussion in the comments. In the comments, I gave a link to the file with Roboman's settings, and one of the users ran the file from the test, which damaged the system, on a virtual machine with Eset Internet Security installed with Roboman's configuration. It all depends on how the user answers the HIPS questions. If there is a ban, then the uninstaller will have problems, and if there is permission, then the system is again inoperable, although the antivirus in this configuration tried to independently block some of the program's actions. This file was sent to the Eset laboratory and they entered it into the databases as a potentially unwanted program. But Eset generally has a problem with such uninstallers. This is not the first test where Eset fails so precisely on this kind of programs that remove everything from the system, including the system itself. Until you send the file to the laboratory, they do not add it to the databases, apparently machine learning does not consider such programs to be malicious.
Test Eset IS 15
Can you point us to the comment section where the tested video was discussed?
 
  • Like
Reactions: Gandalf_The_Grey

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top