1 ESET Endpoint Security for macOS 1 .................................................................................................
1.1 Nyheter i version 6 1 ..................................................................................................................................
1.2 Systemkrav 2 ...............................................................................................................................................
2 Introduktion till ESET PROTECT 2 .........................................................................................................
3 Introduktion till ESET PROTECT CLOUD 3 ........................................................................................
4 Fjärrinstallation 3 ...........................................................................................................................................
4.1 Skapa ett fjärrinstallationspaket 6 ..........................................................................................................
5 Lokal installation 8 ........................................................................................................................................
5.1 Typisk installation 9 ...................................................................................................................................
5.2 Anpassad installation 10 ...........................................................................................................................
5.3 Tillåta systemtillägg lokalt 11 ..................................................................................................................
5.4 Tillåta fullständig diskåtkomst lokalt 12 ................................................................................................
6 Produktaktivering 12 ....................................................................................................................................
7 Avinstallation 14 .............................................................................................................................................
8 Grundläggande översikt 14 ......................................................................................................................
8.1 Tangentbordsgenvägar 14 ........................................................................................................................
8.2 Kontrollera systemets funktion 15 ..........................................................................................................
8.3 Vad gör jag om programmet inte fungerar 15 .......................................................................................
9 Datorskydd 15 ..................................................................................................................................................
9.1 Skydd mot virus och spionprogram 16 ....................................................................................................
9.1.1 Allmänt 16 .................................................................................................................................................
9.1.1.1 Undantag 16 ............................................................................................................................................
9.1.2 Uppstartsskydd 17 .......................................................................................................................................
9.1.3 Skydd av filsystemet i realtid 17 ......................................................................................................................
9.1.3.1 Avancerade alternativ 17 ............................................................................................................................
9.1.3.2 När konfigurationen för realtidsskydd bör ändras 18 ..........................................................................................
9.1.3.3 Kontrollera realtidsskyddet 18 ......................................................................................................................
9.1.3.4 Vad gör jag om realtidsskyddet inte fungerar? 18 ..............................................................................................
9.1.4 Genomsökning av datorn 19 ..........................................................................................................................
9.1.4.1 Typ av genomsökning 19 ............................................................................................................................
9.1.4.1.1 Smart genomsökning 19 ...........................................................................................................................
9.1.4.1.2 Anpassad genomsökning 20 ......................................................................................................................
9.1.4.2 Genomsökningsobjekt 20 ............................................................................................................................
9.1.4.3 Genomsökningsprofiler 20 ...........................................................................................................................
9.1.5 Parameterinställningar för ThreatSense-motorn 21 ...............................................................................................
9.1.5.1 Objekt 22 ................................................................................................................................................
9.1.5.2 Alternativ 22 ............................................................................................................................................
9.1.5.3 Rensning 22 ............................................................................................................................................
9.1.5.4 Undantag 23 ............................................................................................................................................
9.1.5.5 Begränsningar 23 .....................................................................................................................................
9.1.5.6 Övriga 24 ................................................................................................................................................
9.1.6 En infiltration identifieras 24 ..........................................................................................................................
9.2 Webb- och e-postskydd 25 ........................................................................................................................
9.2.1 Webbåtkomstskydd 25 .................................................................................................................................
9.2.1.1 Portar 25 ................................................................................................................................................
9.2.1.2 URL-listor 25 ............................................................................................................................................
9.2.2 E-postskydd 25 ...........................................................................................................................................
9.2.2.1 Kontroll av POP3-protokoll 26 .......................................................................................................................
9.2.2.2 Kontroll av IMAP-protokoll 27 .......................................................................................................................
9.3 Skydd mot nätfiske 27 ...............................................................................................................................
10 Brandvägg 27 ................................................................................................................................................
10.1 Filtreringslägen 27 ...................................................................................................................................