Innehåll
.......................................................5ESET Endpoint Antivirus1.
....................................................................................................5Nyheter i version 61.1
....................................................................................................5Systemkrav1.2
.......................................................6
Användare som ansluter via ESET Remote
Administrator
2.
....................................................................................................6ESET-fjärradministratörserver2.1
....................................................................................................7Webbkonsol2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD-sensor2.5
.......................................................9Installation3.
....................................................................................................9Typisk installation3.1
....................................................................................................10Anpassad installation3.2
....................................................................................................10Fjärrinstallation3.3
..............................................................................11Skapa ett fjärrinstallationspa ket
3.3.1
..............................................................................11Fjä rrinstallation på måldatorer
3.3.2
..............................................................................12Fjärravinstallation
3.3.3
..............................................................................12Fjärruppgradering
3.3.4
.......................................................13Produktaktivering4.
.......................................................15Avinstallation5.
.......................................................16Grundläggande översikt6.
....................................................................................................16Tangentbordsgenvägar 6.1
....................................................................................................17Kontrollera systemets funktion6.2
....................................................................................................17
Vad gör jag om programmet inte
fungerar
6.3
.......................................................18Datorskydd7.
....................................................................................................18Skydd mot virus och spionprogram7.1
..............................................................................18Allmänt
7.1.1
..................................................................................18Undantag
7.1.1.1
..............................................................................19Uppstartsskydd
7.1.2
..............................................................................19Skydd av filsystemet i realtid
7.1.3
..................................................................................19Avancerade alternativ
7.1.3.1
..................................................................................20När konfigura tionen för realtidsskydd bör ändras
7.1.3.2
..................................................................................20Kontrollera realtids skyddet
7.1.3.3
..................................................................................20Vad gör jag om realtidsskyddet inte fungerar?
7.1.3.4
..............................................................................21Genomsökning av datorn
7.1.4
..................................................................................21Typ a v genomsökning
7.1.4.1
........................................................................21Smart genomsökning
7.1.4.1.1
........................................................................22Anpass ad genomsökning
7.1.4.1.2
..................................................................................22Genomsökningsobjekt
7.1.4.2
..................................................................................22Genomsökningsprofiler
7.1.4.3
..............................................................................23Pa rameterinställningar för Threa tSense-motorn
7.1.5
..................................................................................23Objekt
7.1.5.1
..................................................................................24Alternativ
7.1.5.2
..................................................................................24Rensning
7.1.5.3
..................................................................................24Undantag
7.1.5.4
..................................................................................25Begränsningar
7.1.5.5
..................................................................................25Övrigt
7.1.5.6
..............................................................................25En infiltration identifieras
7.1.6
....................................................................................................26Webb- och e-postskydd7.2
..............................................................................26Webbåtkomstskydd
7.2.1
..................................................................................26Portar
7.2.1.1
..................................................................................26URL-listor
7.2.1.2
..............................................................................27E-postskydd
7.2.2
..................................................................................27Kontroll av POP3-protokoll
7.2.2.1
..................................................................................28Kontroll av IMAP-protokoll
7.2.2.2
....................................................................................................28Skydd mot nätfiske7.3
.......................................................29Enhetskontroll8.
....................................................................................................29Regelredigerare8.1
.......................................................31Verktyg9.
....................................................................................................31Loggfiler9.1
..............................................................................31Loggunderhåll
9.1.1
..............................................................................32Loggfiltrering
9.1.2
....................................................................................................32Schemaläggaren9.2
..............................................................................33Skapa nya a ktiviteter
9.2.1
..............................................................................33Skapa en användardefinierad a ktivitet
9.2.2
....................................................................................................34Live Grid9.3
..............................................................................34Misstä nkta filer
9.3.1
....................................................................................................35Karantän9.4
..............................................................................35Sätta filer i karantän
9.4.1
..............................................................................35Återställa en fil i kara ntä n
9.4.2
..............................................................................35Skicka en fil från karantän
9.4.3
....................................................................................................35Behörigheter9.5
....................................................................................................36Presentationsläge9.6
....................................................................................................36Processer som körs9.7
.......................................................37Användargränssnitt10.
....................................................................................................37Varningar och meddelanden10.1
..............................................................................37Visa varningar
10.1.1
..............................................................................38Skyddsstatusar
10.1.2
....................................................................................................38Kontextmeny10.2
.......................................................39Uppdatera11.
....................................................................................................39Inställning av uppdateringar11.1
..............................................................................40Avancerade alternativ
11.1.1
....................................................................................................41Skapa uppdateringsaktiviteter11.2
....................................................................................................41Uppgradering till en ny version11.3
....................................................................................................41Systemuppdateringar11.4
.......................................................43Övrigt12.
....................................................................................................43Importera och exportera inställningar12.1
....................................................................................................43Inställning av proxyserver12.2
....................................................................................................44Delad lokal cache12.3