Innehåll
.......................................................5ESET Endpoint Antivirus 6.61.
....................................................................................................5Nyheter i version 6.61.1
....................................................................................................5Systemkrav1.2
....................................................................................................6Skydd1.3
.......................................................7
Dokumentation för användare anslutna via
ESET Remote Administrator
2.
....................................................................................................8ESET-fjärradministratörserver2.1
....................................................................................................8Webbkonsol2.2
....................................................................................................9Proxy2.3
....................................................................................................9Agent2.4
....................................................................................................9RD-sensor2.5
.......................................................10Använda enbart ESET Endpoint Antivirus3.
....................................................................................................10Installation med ESET AV Remover3.1
..............................................................................11ESET AV Remover
3.1.1
..............................................................................13
Ett fel uppstod under avinstallationen med ESET AV
Remover
3.1.2
....................................................................................................14Installation3.2
..............................................................................16Avancerad installation
3.2.1
....................................................................................................18Produktinstallation via ERA (kommandorad)3.3
....................................................................................................20Produktaktivering3.4
....................................................................................................20Genomsökning av datorn3.5
....................................................................................................20Uppgradering till en nyare version3.6
....................................................................................................21Nybörjarguide3.7
..............................................................................21Användargränssnitt
3.7.1
..............................................................................23Inställning av uppdateringar
3.7.2
....................................................................................................24Vanliga frågor3.8
..............................................................................25Uppdatera ESET Endpoint Antivirus
3.8.1
..............................................................................25Aktivera ESET Endpoint Antivirus
3.8.2
..............................................................................26
Så använder du aktuella uppgifter för att aktivera en
ny produkt
3.8.3
..............................................................................26Ta bort ett virus från datorn
3.8.4
..............................................................................26Skapa en ny aktivitet i Schemaläggare
3.8.5
..............................................................................27
Schemalägga en genomsökningsaktivitet (var 24:e
timme)
3.8.6
..............................................................................27
Så ansluter du ESET Endpoint Antivirus till ESET
Remote Administrator
3.8.7
..............................................................................27Så konfigurerar du en spegling
3.8.8
..............................................................................28
Hur uppgraderar jag till Windows 10 med ESET
Endpoint Antivirus
3.8.9
..............................................................................28Använda åsidosättningsläge
3.8.10
..............................................................................30Aktivera fjärrövervakning och fjärrhantering
3.8.11
....................................................................................................32Arbeta med ESET Endpoint Antivirus3.9
..............................................................................33Dator
3.9.1
..................................................................................34Antivirus
3.9.1.1
........................................................................35En infiltration identifieras
3.9.1.1.1
..................................................................................36Delad lokal cache
3.9.1.2
..................................................................................37Skydd av filsystemet i realtid
3.9.1.3
........................................................................38Ytterligare ThreatSense-parametrar
3.9.1.3.1
........................................................................38Rensningsnivåer
3.9.1.3.2
........................................................................39Kontroll av realtidsskyddet
3.9.1.3.3
........................................................................39Ändring av konfiguration för realtidsskydd
3.9.1.3.4
........................................................................39Vad gör jag om realtidsskyddet inte fungerar?
3.9.1.3.5
..................................................................................39Genomsökning av datorn på begäran
3.9.1.4
........................................................................40Starta anpassad genomsökning
3.9.1.4.1
........................................................................42Genomsökningsförlopp
3.9.1.4.2
........................................................................43Logg för genomsökning av datorn
3.9.1.4.3
..................................................................................43Enhetskontroll
3.9.1.5
........................................................................44Regelredigerare för enhetskontroll
3.9.1.5.1
........................................................................45Lägga till regler för enhetskontroll
3.9.1.5.2
..................................................................................46Flyttbara medier
3.9.1.6
..................................................................................47Genomsökning vid inaktivitet
3.9.1.7
..................................................................................47Självskyddet HIPS (Host Intrusion Prevention System)
3.9.1.8
........................................................................50Avancerade inställningar
3.9.1.8.1
........................................................................51HIPS interaktivt fönster
3.9.1.8.2
..................................................................................51Presentationsläge
3.9.1.9
..................................................................................52Startskanner
3.9.1.10
........................................................................52Kontroll av filer som startas automatiskt
3.9.1.10.1
..................................................................................52Dokumentskydd
3.9.1.11
..................................................................................53Exkluderade objekt
3.9.1.12
..................................................................................54ThreatSense-motorns parameterinställningar
3.9.1.13
........................................................................59Undantag
3.9.1.13.1
..............................................................................59Webb och e-post
3.9.2
..................................................................................60Protokollfiltrering
3.9.2.1
........................................................................60Webbläsare och e-postklienter
3.9.2.1.1
........................................................................61Undantagna program
3.9.2.1.2
........................................................................62Undantagna IP-adresser
3.9.2.1.3
........................................................................62SSL/TLS
3.9.2.1.4
........................................................................63Krypterad SSL-kommunikation
3.9.2.1.4.1
........................................................................63Lista över kända certifikat
3.9.2.1.4.2
........................................................................64Lista över SSL/TLS-filtrerade program
3.9.2.1.4.3
..................................................................................64Skydd av e-postklient
3.9.2.2
........................................................................64E-postklienter
3.9.2.2.1
........................................................................65E-postprotokoll
3.9.2.2.2
........................................................................66Varningar och meddelanden
3.9.2.2.3
..................................................................................67Webbåtkomstskydd
3.9.2.3
........................................................................68Webbprotokoll
3.9.2.3.1
........................................................................68URL-adressbehandling
3.9.2.3.2
..................................................................................69Skydd mot nätfiske
3.9.2.4
..............................................................................70Uppdatera programmet
3.9.3
..................................................................................74Inställning av uppdateringar
3.9.3.1
........................................................................76Uppdateringsprofiler
3.9.3.1.1
........................................................................76Ångra uppdatering
3.9.3.1.2
........................................................................77Uppdateringsläge
3.9.3.1.3
........................................................................77HTTP-proxy
3.9.3.1.4
........................................................................78Anslut till LAN som
3.9.3.1.5
........................................................................78Spegling
3.9.3.1.6
........................................................................81Uppdatera från speglingen
3.9.3.1.6.1
........................................................................83Felsöka problem med uppdatering via spegling
3.9.3.1.6.2
..................................................................................83Skapa uppdateringsaktiviteter
3.9.3.2
..............................................................................84Verktyg
3.9.4
..................................................................................85Loggfiler
3.9.4.1