1 ESET Cyber Security Pro 1 ........................................................................................................................
1.1 Nyheter i version 6 1 ..................................................................................................................................
1.2 Systemkrav 1 ...............................................................................................................................................
2 Installation 1 .....................................................................................................................................................
2.1 Typisk installation 2 ...................................................................................................................................
2.2 Anpassad installation 3 .............................................................................................................................
2.3 Tillåta systemtillägg 4 ................................................................................................................................
2.4 Tillåta fullständig diskåtkomst 4 ..............................................................................................................
3 Produktaktivering 5 ......................................................................................................................................
4 Avinstallation 5 ...............................................................................................................................................
5 Grundläggande översikt 5 ........................................................................................................................
5.1 Tangentbordsgenvägar 5 ..........................................................................................................................
5.2 Kontroll av skyddsstatus 6 ........................................................................................................................
5.3 Vad gör jag om programmet inte fungerar 6 .........................................................................................
6 Datorskydd 7 ....................................................................................................................................................
6.1 Skydd mot virus och spionprogram 7 ......................................................................................................
6.1.1 Allmänt 7 ...................................................................................................................................................
6.1.1.1 Undantag 7 ..............................................................................................................................................
6.1.2 Uppstartsskydd 8 .........................................................................................................................................
6.1.3 Skydd av filsystemet i realtid 8 ........................................................................................................................
6.1.3.1 Avancerade alternativ 8 ..............................................................................................................................
6.1.3.2 När konfigurationen för realtidsskydd bör ändras 9 ............................................................................................
6.1.3.3 Kontrollera realtidsskyddet 9 ........................................................................................................................
6.1.3.4 Vad gör jag om realtidsskyddet inte fungerar? 9 ................................................................................................
6.1.4 Genomsökning av datorn 9 ............................................................................................................................
6.1.4.1 Typ av genomsökning 10 ............................................................................................................................
6.1.4.1.1 Smart genomsökning 10 ...........................................................................................................................
6.1.4.1.2 Anpassad genomsökning 10 ......................................................................................................................
6.1.4.2 Genomsökningsobjekt 11 ............................................................................................................................
6.1.4.3 Genomsökningsprofiler 11 ...........................................................................................................................
6.1.5 Parameterinställningar för ThreatSense-motorn 12 ...............................................................................................
6.1.5.1 Objekt 12 ................................................................................................................................................
6.1.5.2 Alternativ 12 ............................................................................................................................................
6.1.5.3 Rensning 13 ............................................................................................................................................
6.1.5.4 Undantag 13 ............................................................................................................................................
6.1.5.5 Begränsningar 13 .....................................................................................................................................
6.1.5.6 Övriga 14 ................................................................................................................................................
6.1.6 En infiltration identifieras 14 ..........................................................................................................................
6.2 Genomsökning och blockering av flyttbara medier 15 .........................................................................
7 Skydd mot nätfiske 16 .................................................................................................................................
8 Brandvägg 16 ...................................................................................................................................................
8.1 Filtreringslägen 16 ......................................................................................................................................
8.2 Brandväggsregler 17 ..................................................................................................................................
8.2.1 Skapa nya regler 17 .....................................................................................................................................
8.3 Brandväggszoner 18 ...................................................................................................................................
8.4 Brandväggsprofiler 18 ................................................................................................................................
8.5 Brandväggsloggar 18 .................................................................................................................................
9 Webb- och e-postskydd 18 .......................................................................................................................
9.1 Webbskydd 19 .............................................................................................................................................
9.1.1 Portar 19 ...................................................................................................................................................
9.1.2 URL-listor 19 ..............................................................................................................................................
9.2 E-postskydd 19 ............................................................................................................................................