1 ESET Endpoint Security for macOS 1 .................................................................................................
1.1 Nyheter i version 6 1 ..................................................................................................................................
1.2 Systemkrav 2 ...............................................................................................................................................
2 Användare som ansluter via ESET Security Management Center 2 .................................
3 Installation 3 .....................................................................................................................................................
3.1 Typisk installation 4 ...................................................................................................................................
3.2 Anpassad installation 4 .............................................................................................................................
3.3 Fjärrinstallation 7 .......................................................................................................................................
4 Produktaktivering 7 ......................................................................................................................................
5 Avinstallation 9 ...............................................................................................................................................
6 Grundläggande översikt 9 ........................................................................................................................
6.1 Tangentbordsgenvägar 9 ..........................................................................................................................
6.2 Kontrollera systemets funktion 10 ..........................................................................................................
6.3 Vad gör jag om programmet inte fungerar 10 .......................................................................................
7 Datorskydd 11 ..................................................................................................................................................
7.1 Skydd mot virus och spionprogram 11 ....................................................................................................
7.1.1 Allmänt 11 .................................................................................................................................................
7.1.1.1 Undantag 11 ............................................................................................................................................
7.1.2 Uppstartsskydd 12 .......................................................................................................................................
7.1.3 Skydd av filsystemet i realtid 12 ......................................................................................................................
7.1.3.1 Avancerade alternativ 13 ............................................................................................................................
7.1.3.2 När konfigurationen för realtidsskydd bör ändras 13 ..........................................................................................
7.1.3.3 Kontrollera realtidsskyddet 13 ......................................................................................................................
7.1.3.4 Vad gör jag om realtidsskyddet inte fungerar? 14 ..............................................................................................
7.1.4 Genomsökning av datorn 14 ..........................................................................................................................
7.1.4.1 Typ av genomsökning 15 ............................................................................................................................
7.1.4.1.1 Smart genomsökning 15 ...........................................................................................................................
7.1.4.1.2 Anpassad genomsökning 15 ......................................................................................................................
7.1.4.2 Genomsökningsobjekt 16 ............................................................................................................................
7.1.4.3 Genomsökningsprofiler 16 ...........................................................................................................................
7.1.5 Parameterinställningar för ThreatSense-motorn 17 ...............................................................................................
7.1.5.1 Objekt 18 ................................................................................................................................................
7.1.5.2 Alternativ 18 ............................................................................................................................................
7.1.5.3 Rensning 18 ............................................................................................................................................
7.1.5.4 Undantag 19 ............................................................................................................................................
7.1.5.5 Begränsningar 19 .....................................................................................................................................
7.1.5.6 Övriga 20 ................................................................................................................................................
7.1.6 En infiltration identifieras 20 ..........................................................................................................................
7.2 Webb- och e-postskydd 21 ........................................................................................................................
7.2.1 Webbåtkomstskydd 21 .................................................................................................................................
7.2.1.1 Portar 21 ................................................................................................................................................
7.2.1.2 URL-listor 21 ............................................................................................................................................
7.2.2 E-postskydd 22 ...........................................................................................................................................
7.2.2.1 Kontroll av POP3-protokoll 23 .......................................................................................................................
7.2.2.2 Kontroll av IMAP-protokoll 23 .......................................................................................................................
7.3 Skydd mot nätfiske 23 ...............................................................................................................................
8 Brandvägg 24 ...................................................................................................................................................
8.1 Filtreringslägen 24 ......................................................................................................................................
8.2 Brandväggsregler 25 ..................................................................................................................................
8.2.1 Skapa nya regler 26 .....................................................................................................................................
8.3 Brandväggszoner 26 ...................................................................................................................................
8.4 Brandväggsprofiler 26 ................................................................................................................................
8.5 Brandväggsloggar 26 .................................................................................................................................