........................................................................78Skapa regel från logg
4.3.8.2.1
..................................................................................78Skapa undantag från brandväggsmeddelanden
4.3.8.3
..................................................................................79Avancerad PCAP-loggning
4.3.8.4
..................................................................................79Lösa problem med protokollfiltrering
4.3.8.5
....................................................................................................80Säkerhetsverktyg4.4
..............................................................................80Föräldrakontroll
4.4.1
..................................................................................82Kategorier
4.4.1.1
..................................................................................83Webbplatsundantag
4.4.1.2
....................................................................................................84Uppdatera programmet4.5
..............................................................................87Uppdateringsinställningar
4.5.1
..................................................................................89Avancerade uppdateringsinställningar
4.5.1.1
........................................................................89Uppdateringsläge
4.5.1.1.1
........................................................................89Anslutningsalternativ
4.5.1.1.2
..............................................................................90Ångra uppdatering
4.5.2
..............................................................................91Skapa uppdateringsaktiviteter
4.5.3
....................................................................................................92Verktyg4.6
..............................................................................92Övervakning av uppkopplat hem
4.6.1
..................................................................................93Nätverksenhet
4.6.1.1
..............................................................................94Webbkameraskydd
4.6.2
..............................................................................94Verktyg i ESET Internet Security
4.6.3
..................................................................................95Loggfiler
4.6.3.1
........................................................................96Loggfiler
4.6.3.1.1
..................................................................................97Processer som körs
4.6.3.2
..................................................................................99Säkerhetsrapport
4.6.3.3
..................................................................................100Se aktivitet
4.6.3.4
..................................................................................101Nätverksanslutningar
4.6.3.5
..................................................................................102ESET SysInspector
4.6.3.6
..................................................................................102Schemaläggare
4.6.3.7
..................................................................................104Systemrensare
4.6.3.8
..................................................................................104ESET SysRescue
4.6.3.9
..................................................................................105Molnbaserat skydd
4.6.3.10
........................................................................106Misstänkta filer
4.6.3.10.1
..................................................................................107Karantän
4.6.3.11
..................................................................................108Proxyserver
4.6.3.12
..................................................................................109Meddela via e-post
4.6.3.13
........................................................................110Meddelandeformat
4.6.3.13.1
..................................................................................110Välj prov för analys
4.6.3.14
..................................................................................111Microsoft Windows®-uppdatering
4.6.3.15
..................................................................................111ESET CMD
4.6.3.16
....................................................................................................113Användargränssnitt4.7
..............................................................................113Element i användargränssnitt
4.7.1
..............................................................................114Varningar och meddelanden
4.7.2
..................................................................................115Avancerade inställningar
4.7.2.1
..............................................................................116Inställningar för åtkomst
4.7.3
..............................................................................117Programmeny
4.7.4
.......................................................119Avancerade användare5.
....................................................................................................119Profiler5.1
....................................................................................................119Tangentbordsgenvägar5.2
....................................................................................................120Diagnostik5.3
....................................................................................................121Importera och exportera inställningar5.4
....................................................................................................121ESET SysInspector5.5
..............................................................................121Introduktion till ESET SysInspector
5.5.1
..................................................................................122Starta ESET SysInspector
5.5.1.1
..............................................................................122Användargränssnitt och programanvändning
5.5.2
..................................................................................122Programkontroller
5.5.2.1
..................................................................................124Navigera i ESET SysInspector
5.5.2.2
........................................................................125Tangentbordsgenvägar
5.5.2.2.1
..................................................................................126Jämför
5.5.2.3
..............................................................................127Kommandoradsparametrar
5.5.3
..............................................................................128Tjänsteskript
5.5.4
..................................................................................128Generera tjänsteskript
5.5.4.1
..................................................................................128Tjänsteskriptets struktur
5.5.4.2
..................................................................................131Köra tjänsteskript
5.5.4.3
..............................................................................132FAQ
5.5.5
....................................................................................................133Kommandorad5.6
.......................................................135Ordlista6.
....................................................................................................135Typer av infiltreringar6.1
..............................................................................135Virus
6.1.1
..............................................................................135Maskar
6.1.2
..............................................................................135Trojaner
6.1.3
..............................................................................136Rootkit
6.1.4
..............................................................................136Reklamprogram
6.1.5
..............................................................................136Spionprogram
6.1.6
..............................................................................137Komprimeringsprogram
6.1.7
..............................................................................137Potentiellt farliga program
6.1.8
..............................................................................137Potentiellt oönskade program
6.1.9
..............................................................................140Botnet
6.1.10
....................................................................................................140Typer av fjärrangrepp6.2
..............................................................................140DOS-attacker
6.2.1
..............................................................................140DNS-förgiftning
6.2.2
..............................................................................140Maskattacker
6.2.3
..............................................................................140Portgenomsökning
6.2.4
..............................................................................141TCP-desynkronisering
6.2.5
..............................................................................141SMB-relä
6.2.6
..............................................................................141ICMP-attacker
6.2.7
....................................................................................................142ESET Technology6.3
..............................................................................142Kryphålsblockering
6.3.1
..............................................................................142Avancerad minnesskanner
6.3.2
..............................................................................142Skydd mot nätverksattacker
6.3.3
..............................................................................142ESET LiveGrid®
6.3.4
..............................................................................143Botnätsskydd
6.3.5
..............................................................................143Java-kryphålsblockering
6.3.6
..............................................................................143Bank- och betalningsskydd
6.3.7
..............................................................................144Skydd mot skriptbaserade attacker
6.3.8
..............................................................................144Sköld mot ransomware
6.3.9
..............................................................................144UEFI-skanner
6.3.10
....................................................................................................145E-post6.4
..............................................................................145Annonser
6.4.1
..............................................................................145Bluffar
6.4.2
..............................................................................146Nätfiske
6.4.3
..............................................................................146Känna igen spambedrägerier
6.4.4