1 ESET Cyber Security 1 ................................................................................................................................
1.1 Nyheter i version 6 1 ..................................................................................................................................
1.2 Systemkrav 1 ...............................................................................................................................................
2 Installation 1 .....................................................................................................................................................
2.1 Typisk installation 2 ...................................................................................................................................
2.2 Anpassad installation 3 .............................................................................................................................
2.3 Tillåta systemtillägg 4 ................................................................................................................................
2.4 Tillåta fullständig diskåtkomst 4 ..............................................................................................................
3 Produktaktivering 4 ......................................................................................................................................
4 Avinstallation 5 ...............................................................................................................................................
5 Grundläggande översikt 5 ........................................................................................................................
5.1 Tangentbordsgenvägar 5 ..........................................................................................................................
5.2 Kontroll av skyddsstatus 6 ........................................................................................................................
5.3 Vad gör jag om programmet inte fungerar 6 .........................................................................................
6 Datorskydd 6 ....................................................................................................................................................
6.1 Skydd mot virus och spionprogram 7 ......................................................................................................
6.1.1 Allmänt 7 ...................................................................................................................................................
6.1.1.1 Undantag 7 ..............................................................................................................................................
6.1.2 Uppstartsskydd 7 .........................................................................................................................................
6.1.3 Skydd av filsystemet i realtid 8 ........................................................................................................................
6.1.3.1 Avancerade alternativ 8 ..............................................................................................................................
6.1.3.2 När konfigurationen för realtidsskydd bör ändras 8 ............................................................................................
6.1.3.3 Kontrollera realtidsskyddet 9 ........................................................................................................................
6.1.3.4 Vad gör jag om realtidsskyddet inte fungerar? 9 ................................................................................................
6.1.4 Genomsökning av datorn 9 ............................................................................................................................
6.1.4.1 Typ av genomsökning 10 ............................................................................................................................
6.1.4.1.1 Smart genomsökning 10 ...........................................................................................................................
6.1.4.1.2 Anpassad genomsökning 10 ......................................................................................................................
6.1.4.2 Genomsökningsobjekt 11 ............................................................................................................................
6.1.4.3 Genomsökningsprofiler 11 ...........................................................................................................................
6.1.5 Parameterinställningar för ThreatSense-motorn 12 ...............................................................................................
6.1.5.1 Objekt 12 ................................................................................................................................................
6.1.5.2 Alternativ 12 ............................................................................................................................................
6.1.5.3 Rensning 13 ............................................................................................................................................
6.1.5.4 Undantag 13 ............................................................................................................................................
6.1.5.5 Begränsningar 13 .....................................................................................................................................
6.1.5.6 Övriga 14 ................................................................................................................................................
6.1.6 En infiltration identifieras 14 ..........................................................................................................................
6.2 Genomsökning och blockering av flyttbara medier 15 .........................................................................
7 Skydd mot nätfiske 16 .................................................................................................................................
8 Webb- och e-postskydd 16 .......................................................................................................................
8.1 Webbskydd 16 .............................................................................................................................................
8.1.1 Portar 16 ...................................................................................................................................................
8.1.2 URL-listor 16 ..............................................................................................................................................
8.2 E-postskydd 17 ............................................................................................................................................
8.2.1 Kontroll av POP3-protokoll 17 .........................................................................................................................
8.2.2 Kontroll av IMAP-protokoll 17 ..........................................................................................................................
9 Uppdatera 18 ....................................................................................................................................................
9.1 Inställning av uppdateringar 18 ...............................................................................................................
9.1.1 Avancerade alternativ 18 ..............................................................................................................................
9.2 Skapa uppdateringsaktiviteter 19 ...........................................................................................................
9.3 Uppgradera ESET Cyber Security till en ny version 19 .........................................................................