........................................................................77Skapa regel från logg
4.3.8.2.1
..................................................................................78Skapa undantag från brandväggsmeddelanden
4.3.8.3
..................................................................................78Avancerad PCAP-loggning
4.3.8.4
..................................................................................78Lösa problem med protokollfiltrering
4.3.8.5
....................................................................................................79Säkerhetsverktyg4.4
..............................................................................79Föräldrakontroll
4.4.1
..................................................................................81Kategorier
4.4.1.1
..................................................................................82Webbplatsundantag
4.4.1.2
....................................................................................................83Uppdatera programmet4.5
..............................................................................86Uppdateringsinställningar
4.5.1
..................................................................................88Avancerade uppdateringsinställningar
4.5.1.1
........................................................................88Uppdateringsläge
4.5.1.1.1
........................................................................88Anslutningsalternativ
4.5.1.1.2
..............................................................................89Ångra uppdatering
4.5.2
..............................................................................90Skapa uppdateringsaktiviteter
4.5.3
....................................................................................................91Verktyg4.6
..............................................................................91Övervakning av uppkopplat hem
4.6.1
..................................................................................92Nätverksenhet
4.6.1.1
..............................................................................93Webbkameraskydd
4.6.2
..............................................................................93Verktyg i ESET Internet Security
4.6.3
..................................................................................94Loggfiler
4.6.3.1
........................................................................95Loggfiler
4.6.3.1.1
..................................................................................96Processer som körs
4.6.3.2
..................................................................................98Säkerhetsrapport
4.6.3.3
..................................................................................99Se aktivitet
4.6.3.4
..................................................................................100Nätverksanslutningar
4.6.3.5
..................................................................................101ESET SysInspector
4.6.3.6
..................................................................................101Schemaläggare
4.6.3.7
..................................................................................103Systemrensare
4.6.3.8
..................................................................................103ESET SysRescue
4.6.3.9
..................................................................................104Molnbaserat skydd
4.6.3.10
........................................................................105Misstänkta filer
4.6.3.10.1
..................................................................................106Karantän
4.6.3.11
..................................................................................107Proxyserver
4.6.3.12
..................................................................................108Meddela via e-post
4.6.3.13
........................................................................109Meddelandeformat
4.6.3.13.1
..................................................................................109Välj prov för analys
4.6.3.14
..................................................................................110Microsoft Windows®-uppdatering
4.6.3.15
..................................................................................110ESET CMD
4.6.3.16
....................................................................................................112Användargränssnitt4.7
..............................................................................112Element i användargränssnitt
4.7.1
..............................................................................113Varningar och meddelanden
4.7.2
..................................................................................114Avancerade inställningar
4.7.2.1
..............................................................................115Inställningar för åtkomst
4.7.3
..............................................................................116Programmeny
4.7.4
.......................................................118Avancerade användare5.
....................................................................................................118Profiler5.1
....................................................................................................118Tangentbordsgenvägar5.2
....................................................................................................119Diagnostik5.3
....................................................................................................120Importera och exportera inställningar5.4
....................................................................................................120ESET SysInspector5.5
..............................................................................120Introduktion till ESET SysInspector
5.5.1
..................................................................................121Starta ESET SysInspector
5.5.1.1
..............................................................................121Användargränssnitt och programanvändning
5.5.2
..................................................................................121Programkontroller
5.5.2.1
..................................................................................123Navigera i ESET SysInspector
5.5.2.2
........................................................................124Tangentbordsgenvägar
5.5.2.2.1
..................................................................................125Jämför
5.5.2.3
..............................................................................126Kommandoradsparametrar
5.5.3
..............................................................................127Tjänsteskript
5.5.4
..................................................................................127Generera tjänsteskript
5.5.4.1
..................................................................................127Tjänsteskriptets struktur
5.5.4.2
..................................................................................130Köra tjänsteskript
5.5.4.3
..............................................................................131FAQ
5.5.5
....................................................................................................132Kommandorad5.6
.......................................................134Ordlista6.
....................................................................................................134Typer av infiltreringar6.1
..............................................................................134Virus
6.1.1
..............................................................................134Maskar
6.1.2
..............................................................................134Trojaner
6.1.3
..............................................................................135Rootkit
6.1.4
..............................................................................135Reklamprogram
6.1.5
..............................................................................135Spionprogram
6.1.6
..............................................................................136Komprimeringsprogram
6.1.7
..............................................................................136Potentiellt farliga program
6.1.8
..............................................................................136Potentiellt oönskade program
6.1.9
..............................................................................139Botnet
6.1.10
....................................................................................................139Typer av fjärrangrepp6.2
..............................................................................139DOS-attacker
6.2.1
..............................................................................139DNS-förgiftning
6.2.2
..............................................................................139Maskattacker
6.2.3
..............................................................................139Portgenomsökning
6.2.4
..............................................................................140TCP-desynkronisering
6.2.5
..............................................................................140SMB-relä
6.2.6
..............................................................................140ICMP-attacker
6.2.7
....................................................................................................141ESET Technology6.3
..............................................................................141Kryphålsblockering
6.3.1
..............................................................................141Avancerad minnesskanner
6.3.2
..............................................................................141Skydd mot nätverksattacker
6.3.3
..............................................................................141ESET LiveGrid®
6.3.4
..............................................................................142Botnätsskydd
6.3.5
..............................................................................142Java-kryphålsblockering
6.3.6
..............................................................................142Bank- och betalningsskydd
6.3.7
..............................................................................143Skydd mot skriptbaserade attacker
6.3.8
..............................................................................143Sköld mot ransomware
6.3.9
..............................................................................143UEFI-skanner
6.3.10
....................................................................................................144E-post6.4
..............................................................................144Annonser
6.4.1
..............................................................................144Bluffar
6.4.2
..............................................................................145Nätfiske
6.4.3
..............................................................................145Känna igen spambedrägerier
6.4.4