Innehåll
.......................................................5ESET Endpoint Security1.
....................................................................................................5Nyheter i version 61.1
....................................................................................................5Systemkrav1.2
.......................................................6
Användare som ansluter via ESET Remote
Administrator
2.
....................................................................................................6ESET-fjärradministratörserver2.1
....................................................................................................7Webbkonsol2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD-sensor2.5
.......................................................9Installation3.
....................................................................................................9Typisk installation3.1
....................................................................................................10Anpassad installation3.2
....................................................................................................11Fjärrinstallation3.3
..............................................................................11Skapa ett fjärrinstallationspa ket
3.3.1
..............................................................................12Fjä rrinstallation på måldatorer
3.3.2
..............................................................................12Fjärravinstallation
3.3.3
..............................................................................12Fjärruppgradering
3.3.4
.......................................................13Produktaktivering4.
.......................................................15Avinstallation5.
.......................................................16Grundläggande översikt6.
....................................................................................................16Tangentbordsgenvägar 6.1
....................................................................................................17Kontrollera systemets funktion6.2
....................................................................................................17
Vad gör jag om programmet inte
fungerar
6.3
.......................................................18Datorskydd7.
....................................................................................................18Skydd mot virus och spionprogram7.1
..............................................................................18Allmänt
7.1.1
..................................................................................18Undantag
7.1.1.1
..............................................................................19Uppstartsskydd
7.1.2
..............................................................................19Skydd av filsystemet i realtid
7.1.3
..................................................................................19Avancerade alternativ
7.1.3.1
..................................................................................20När konfigura tionen för realtidsskydd bör ändras
7.1.3.2
..................................................................................20Kontrollera realtids skyddet
7.1.3.3
..................................................................................20Vad gör jag om realtidsskyddet inte fungerar?
7.1.3.4
..............................................................................21Genomsökning av datorn
7.1.4
..................................................................................21Typ a v genomsökning
7.1.4.1
........................................................................21Smart genomsökning
7.1.4.1.1
........................................................................22Anpass ad genomsökning
7.1.4.1.2
..................................................................................22Genomsökningsobjekt
7.1.4.2
..................................................................................22Genomsökningsprofiler
7.1.4.3
..............................................................................23Pa rameterinställningar för Threa tSense-motorn
7.1.5
..................................................................................23Objekt
7.1.5.1
..................................................................................24Alternativ
7.1.5.2
..................................................................................24Rensning
7.1.5.3
..................................................................................24Undantag
7.1.5.4
..................................................................................25Begränsningar
7.1.5.5
..................................................................................25Övrigt
7.1.5.6
..............................................................................25En infiltration identifieras
7.1.6
....................................................................................................26Webb- och e-postskydd7.2
..............................................................................26Webbåtkomstskydd
7.2.1
..................................................................................26Portar
7.2.1.1
..................................................................................26URL-listor
7.2.1.2
..............................................................................27E-postskydd
7.2.2
..................................................................................27Kontroll av POP3-protokoll
7.2.2.1
..................................................................................28Kontroll av IMAP-protokoll
7.2.2.2
....................................................................................................28Skydd mot nätfiske7.3
.......................................................29Brandvägg8.
....................................................................................................29Filtreringslägen8.1
....................................................................................................30Brandväggsregler8.2
..............................................................................30Skapa nya regler
8.2.1
....................................................................................................30Brandväggszoner8.3
....................................................................................................30Brandväggsprofiler8.4
....................................................................................................31Brandväggsloggar8.5
.......................................................32Enhetskontroll9.
....................................................................................................32Regelredigerare9.1
.......................................................34Webbkontroll10.
.......................................................35Verktyg11.
....................................................................................................35Loggfiler11.1
..............................................................................35Loggunderhåll
11.1.1
..............................................................................36Loggfiltrering
11.1.2
....................................................................................................36Schemaläggaren11.2
..............................................................................37Skapa nya a ktiviteter
11.2.1
..............................................................................37Skapa en användardefinierad a ktivitet
11.2.2
....................................................................................................38Live Grid11.3
..............................................................................38Misstä nkta filer
11.3.1
....................................................................................................39Karantän11.4
..............................................................................39Sätta filer i karantän
11.4.1
..............................................................................39Återställa en fil i kara ntä n
11.4.2
..............................................................................39Skicka en fil från karantän
11.4.3
....................................................................................................40Behörigheter11.5
....................................................................................................40Presentationsläge11.6
....................................................................................................41Processer som körs11.7
.......................................................42Användargränssnitt12.
....................................................................................................42Varningar och meddelanden12.1
..............................................................................42Visa varningar
12.1.1
..............................................................................43Skyddsstatusar
12.1.2
....................................................................................................43Kontextmeny12.2
.......................................................44Uppdatera13.
....................................................................................................44Inställning av uppdateringar13.1