Innehåll
.......................................................6ESET Smart Security1.
....................................................................................................7Nyheter i version 91.1
....................................................................................................7Systemkrav1.2
....................................................................................................7Skydd1.3
.......................................................9Installation2.
....................................................................................................9Live installer2.1
....................................................................................................10Offline-installation2.2
..............................................................................11Avancerade inställningar
2.2.1
....................................................................................................12Vanliga installationsproblem2.3
....................................................................................................12Produktaktivering2.4
....................................................................................................12Ange licensnyckel2.5
....................................................................................................13Uppgradering till en nyare version2.6
....................................................................................................13
Första genomsökningen efter
installation
2.7
.......................................................14Nybörjarguide3.
....................................................................................................14Programmets huvudfönster3.1
....................................................................................................16Uppdateringar3.2
....................................................................................................18Inställning av tillförlitliga platser3.3
....................................................................................................19Stöldskydd3.4
....................................................................................................19Verktyg för barnlåskontroll3.5
.......................................................20Arbeta med ESET Smart Security4.
....................................................................................................21Datorskydd4.1
..............................................................................22Antivirus
4.1.1
..................................................................................23Skydd av filsystemet i realtid
4.1.1.1
........................................................................24Ytterligare ThreatSense-parametrar
4.1.1.1.1
........................................................................24Rensningsnivåer
4.1.1.1.2
........................................................................25Ändring av konfiguration för realtidsskydd
4.1.1.1.3
........................................................................25Kontroll av realtidsskyddet
4.1.1.1.4
........................................................................25Vad gör jag om realtidsskyddet inte fungerar?
4.1.1.1.5
..................................................................................25Genomsökning av datorn
4.1.1.2
........................................................................26Starta anpassad genomsökning
4.1.1.2.1
........................................................................27Genomsökningsförlopp
4.1.1.2.2
........................................................................28Genomsökningsprofiler
4.1.1.2.3
..................................................................................29Startskanner
4.1.1.3
........................................................................29Kontroll av filer som startas automatiskt
4.1.1.3.1
..................................................................................29Genomsökning vid inaktivitet
4.1.1.4
..................................................................................30Exkluderade objekt
4.1.1.5
..................................................................................31ThreatSense-parametrar
4.1.1.6
........................................................................35Rensning
4.1.1.6.1
........................................................................35Filändelser som är undantagna från genomsökning
4.1.1.6.2
..................................................................................36En infiltration identifieras
4.1.1.7
..................................................................................38Dokumentskydd
4.1.1.8
..............................................................................38Flyttbara medier
4.1.2
..............................................................................39Enhetskontroll
4.1.3
..................................................................................39Regelredigerare för enhetskontroll
4.1.3.1
..................................................................................40Lägga till regler för enhetskontroll
4.1.3.2
..............................................................................42Självskyddet HIPS (Host Intrusion Prevention System)
4.1.4
..................................................................................44Avancerade inställningar
4.1.4.1
..................................................................................44HIPS interaktivt fönster
4.1.4.2
..............................................................................44Spelläge
4.1.5
....................................................................................................45Internetskydd4.2
..............................................................................46Webbåtkomstskydd
4.2.1
..................................................................................47Grundläggande
4.2.1.1
..................................................................................47Webbprotokoll
4.2.1.2
..................................................................................47URL-adressbehandling
4.2.1.3
..............................................................................48Skydd av e-postklient
4.2.2
..................................................................................48E-postklienter
4.2.2.1
..................................................................................49E-postprotokoll
4.2.2.2
..................................................................................50Varningar och meddelanden
4.2.2.3
..................................................................................51Integrering med e-postklienter
4.2.2.4
........................................................................51Konfigurering av skydd för e-postklient
4.2.2.4.1
..................................................................................51POP3-, POP3S-filter
4.2.2.5
..................................................................................52Antispammodul
4.2.2.6
..............................................................................53Protokollfiltrering
4.2.3
..................................................................................53Webbläsare och e-postklienter
4.2.3.1
..................................................................................54Undantagna program
4.2.3.2
..................................................................................55Undantagna IP-adresser
4.2.3.3
........................................................................55Lägg till IPv4-adress
4.2.3.3.1
........................................................................55Lägg till IPv6-adress
4.2.3.3.2
..................................................................................56SSL/TLS
4.2.3.4
........................................................................57Certifikat
4.2.3.4.1
........................................................................57Lista över kända certifikat
4.2.3.4.2
........................................................................58Lista över SSL-filtrerade program
4.2.3.4.3
..............................................................................58Skydd mot nätfiske
4.2.4
....................................................................................................60Nätverksskydd4.3
..............................................................................61Personlig brandvägg
4.3.1
..................................................................................62Inställningar för inlärningsläge
4.3.1.1
..............................................................................63Brandväggsprofiler
4.3.2
..................................................................................64Profiler som tilldelats till nätverkskort
4.3.2.1
..............................................................................64Konfigurera och använda regler
4.3.3
..................................................................................65Regler för brandvägg
4.3.3.1
..................................................................................66Arbeta med regler
4.3.3.2
..............................................................................66Konfigurera zoner
4.3.4
..............................................................................67Kända nätverk
4.3.5
..................................................................................67Redigerare för kända nätverk
4.3.5.1
..................................................................................70Nätverksautentisering – serverkonfiguration
4.3.5.2
..............................................................................70Loggning
4.3.6
..............................................................................71Etablera en anslutning - identifiering
4.3.7
..............................................................................72Lösa problem med ESET Personlig brandvägg
4.3.8
..................................................................................72Felsökningsguide
4.3.8.1
..................................................................................72Logga och skapa regler eller undantag från logg
4.3.8.2
........................................................................72Skapa regel från logg
4.3.8.2.1
..................................................................................72Skapa undantag från brandväggsmeddelanden
4.3.8.3
..................................................................................73Avancerad PCAP-loggning
4.3.8.4
..................................................................................73Lösa problem med protokollfiltrering
4.3.8.5
....................................................................................................74Säkerhetsverktyg4.4
..............................................................................74Föräldrakontroll
4.4.1
..................................................................................76Kategorier
4.4.1.1
..................................................................................77Webbplatsundantag
4.4.1.2