Innehåll
.......................................................5ESET Cyber Security1.
....................................................................................................5Nyheter i version 61.1
....................................................................................................5Systemkrav1.2
.......................................................6Installation2.
....................................................................................................6Typisk installation2.1
....................................................................................................7Anpassad installation2.2
.......................................................8Produktaktivering3.
.......................................................9Avinstallation4.
.......................................................10Grundläggande översikt5.
....................................................................................................10Tangentbordsgenvägar5.1
....................................................................................................10Kontroll av skyddsstatus5.2
....................................................................................................11
Vad gör jag om programmet inte
fungerar
5.3
.......................................................12Datorskydd6.
....................................................................................................12Skydd mot virus och spionprogram6.1
..............................................................................12Allmänt
6.1.1
..................................................................................12Undantag
6.1.1.1
..............................................................................12Uppstartsskydd
6.1.2
..............................................................................13Skydd av filsystemet i realtid
6.1.3
..................................................................................13Avancerade alternativ
6.1.3.1
..................................................................................13När konfigurationen för realtidsskydd bör ändra s
6.1.3.2
..................................................................................13Kontrollera realtids skyddet
6.1.3.3
..................................................................................14Vad gör jag om realtidsskyddet inte fungerar?
6.1.3.4
..............................................................................14Genomsökning av datorn
6.1.4
..................................................................................15Typ a v genomsökning
6.1.4.1
........................................................................15Smart genomsökning
6.1.4.1.1
........................................................................15Anpassa d genomsökning
6.1.4.1.2
..................................................................................15Genomsökningsobjekt
6.1.4.2
..................................................................................15Genomsökningsprofiler
6.1.4.3
..............................................................................16Pa rameterinställningar för Threa tSense-motorn
6.1.5
..................................................................................16Objekt
6.1.5.1
..................................................................................16Alternativ
6.1.5.2
..................................................................................17Rensning
6.1.5.3
..................................................................................17Undantag
6.1.5.4
..................................................................................17Begränsningar
6.1.5.5
..................................................................................17Övriga
6.1.5.6
..............................................................................18En infiltration identifiera s
6.1.6
....................................................................................................19
Genomsökning och blockering av
flyttbara medier
6.2
.......................................................20Skydd mot nätfiske7.
.......................................................21Webb- och e-postskydd8.
....................................................................................................21Webbskydd8.1
..............................................................................21Portar
8.1.1
..............................................................................21URL-listor
8.1.2
....................................................................................................21E-postskydd8.2
..............................................................................22Kontroll av POP3-protokoll
8.2.1
..............................................................................22Kontroll av IMAP-protokoll
8.2.2
.......................................................23Uppdatera9.
....................................................................................................23Inställning av uppdateringar9.1
..............................................................................23Avancerade a lternativ
9.1.1
....................................................................................................23Skapa uppdateringsaktiviteter9.2
....................................................................................................24
Uppgradera ESET Cyber Security till en
ny version
9.3
....................................................................................................24Systemuppdateringar9.4
.......................................................25Verktyg10.
....................................................................................................25Loggfiler10.1
..............................................................................25Loggunderhåll
10.1.1
..............................................................................25Loggfiltrering
10.1.2
....................................................................................................26Schemaläggaren10.2
..............................................................................26Skapa nya a ktiviteter
10.2.1
..............................................................................27Skapa användardefinierade aktiviteter
10.2.2
....................................................................................................27Karantän10.3
..............................................................................27Sätta filer i karantän
10.3.1
..............................................................................27Återställa från ka rantän
10.3.2
..............................................................................28Skicka en fil från ka rantän
10.3.3
....................................................................................................28Processer som körs10.4
....................................................................................................28Live Grid10.5
..............................................................................29Live Grid-inställninga r
10.5.1
.......................................................30Användargränssnitt11.
....................................................................................................30Varningar och meddelanden11.1
..............................................................................30Visa varningar
11.1.1
..............................................................................30Skyddsstatusar
11.1.2
....................................................................................................31Behörigheter11.2
....................................................................................................31Kontextmeny11.3
.......................................................32Övrigt12.
....................................................................................................32Importera och exportera inställningar12.1
....................................................................................................32Inställning av proxyserver12.2
.......................................................33Ordlista13.
....................................................................................................33Typer av infiltreringar13.1
..............................................................................33Virus
13.1.1
..............................................................................33Maskar
13.1.2
..............................................................................33Trojanska hästar
13.1.3
..............................................................................34Rootkits
13.1.4
..............................................................................34Reklamprogram
13.1.5
..............................................................................34Spionprogram
13.1.6
..............................................................................34Potentiellt fa rliga progra m
13.1.7
..............................................................................34Potentiellt oönskade program
13.1.8
....................................................................................................35Typer av fjärrattacker13.2
..............................................................................35DoS-attacker
13.2.1
..............................................................................35DNS-förgiftning
13.2.2