Innehåll
.......................................................5ESET Cyber Security Pro1.
....................................................................................................5Nyheter i version 61.1
....................................................................................................5Systemkrav1.2
.......................................................6Installation2.
....................................................................................................6Typisk installation2.1
....................................................................................................7Anpassad installation2.2
.......................................................8Produktaktivering3.
.......................................................9Avinstallation4.
.......................................................10Grundläggande översikt5.
....................................................................................................10Tangentbordsgenvägar5.1
....................................................................................................10Kontroll av skyddsstatus5.2
....................................................................................................11
Vad gör jag om programmet inte
fungerar
5.3
.......................................................12Datorskydd6.
....................................................................................................12Skydd mot virus och spionprogram6.1
..............................................................................12Allmänt
6.1.1
..................................................................................12Undantag
6.1.1.1
..............................................................................12Uppstartsskydd
6.1.2
..............................................................................13Skydd av filsystemet i realtid
6.1.3
..................................................................................13Avancerade alternativ
6.1.3.1
..................................................................................13När konfigurationen för realtidsskydd bör ändra s
6.1.3.2
..................................................................................13Kontrollera realtids skyddet
6.1.3.3
..................................................................................14Vad gör jag om realtidsskyddet inte fungerar?
6.1.3.4
..............................................................................14Genomsökning av datorn
6.1.4
..................................................................................15Typ a v genomsökning
6.1.4.1
........................................................................15Smart genomsökning
6.1.4.1.1
........................................................................15Anpassa d genomsökning
6.1.4.1.2
..................................................................................15Genomsökningsobjekt
6.1.4.2
..................................................................................15Genomsökningsprofiler
6.1.4.3
..............................................................................16Pa rameterinställningar för Threa tSense-motorn
6.1.5
..................................................................................16Objekt
6.1.5.1
..................................................................................16Alternativ
6.1.5.2
..................................................................................17Rensning
6.1.5.3
..................................................................................17Undantag
6.1.5.4
..................................................................................17Begränsningar
6.1.5.5
..................................................................................17Övriga
6.1.5.6
..............................................................................18En infiltration identifiera s
6.1.6
....................................................................................................19
Genomsökning och blockering av
flyttbara medier
6.2
.......................................................20Skydd mot nätfiske7.
.......................................................21Brandvägg8.
....................................................................................................21Filtreringslägen8.1
....................................................................................................21Brandväggsregler8.2
..............................................................................22Skapa nya regler
8.2.1
....................................................................................................22Brandväggszoner8.3
....................................................................................................22Brandväggsprofiler8.4
....................................................................................................22Brandväggsloggar8.5
.......................................................23Webb- och e-postskydd9.
....................................................................................................23Webbskydd9.1
..............................................................................23Portar
9.1.1
..............................................................................23URL-listor
9.1.2
....................................................................................................23E-postskydd9.2
..............................................................................24Kontroll av POP3-protokoll
9.2.1
..............................................................................24Kontroll av IMAP-protokoll
9.2.2
.......................................................25Föräldrakontroll10.
.......................................................26Uppdatera11.
....................................................................................................26Inställning av uppdateringar11.1
..............................................................................26Avancerade a lternativ
11.1.1
....................................................................................................26Skapa uppdateringsaktiviteter11.2
....................................................................................................27
Uppgradera ESET Cyber Security Pro till
en ny version
11.3
....................................................................................................27Systemuppdateringar11.4
.......................................................28Verktyg12.
....................................................................................................28Loggfiler12.1
..............................................................................28Loggunderhåll
12.1.1
..............................................................................28Loggfiltrering
12.1.2
....................................................................................................29Schemaläggaren12.2
..............................................................................29Skapa nya a ktiviteter
12.2.1
..............................................................................30Skapa användardefinierade aktiviteter
12.2.2
....................................................................................................30Karantän12.3
..............................................................................30Sätta filer i karantän
12.3.1
..............................................................................30Återställa från ka rantän
12.3.2
..............................................................................31Skicka en fil från ka rantän
12.3.3
....................................................................................................31Processer som körs12.4
....................................................................................................31Live Grid12.5
..............................................................................32Live Grid-inställninga r
12.5.1
.......................................................33Användargränssnitt13.
....................................................................................................33Varningar och meddelanden13.1
..............................................................................33Visa varningar
13.1.1
..............................................................................33Skyddsstatusar
13.1.2
....................................................................................................34Behörigheter13.2
....................................................................................................34Kontextmeny13.3
.......................................................35Övrigt14.
....................................................................................................35Importera och exportera inställningar14.1
....................................................................................................35Inställning av proxyserver14.2
.......................................................36Ordlista15.
....................................................................................................36Typer av infiltreringar15.1
..............................................................................36Virus
15.1.1