ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Antivirus-Sicherheitssoftware ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 herunter. ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - ESET ENDPOINT SECURITY

ESET ENDPOINT SECURITYUser Guide Microsoft® Windows® 7 / Vista / XP / 2000 / Home Server / 2003 / 2008Click here to download the most recent version o

Seite 2

102.2 Custom installationCustom installation mode is designed for users who have experience with fine-tuning programs and who wish tomodify advanced

Seite 3 - Contents

1004.7.5 Program menuSome of the most important setup options and features are available in the main program menu.Frequently used – Displays the mos

Seite 4 - Glossary6

101the operating system and system resources.4.7.6 Context menuThe context menu is displayed after right-clicking on the selected object. The menu l

Seite 5 - 1. ESET Endpoint Security

1025. Advanced user5.1 Proxy server setupIn large LAN networks, the connection of your computer to the Internet can be mediated by a proxy server. I

Seite 6

1035.3 Keyboard shortcutsKey shortcuts that can be used when working with the ESET Endpoint Security include:Ctrl+Gdisables GUI in the productCtrl+I

Seite 7 - 2. Installation

104/max-sfx-size=SIZEonly scan the files in a self-extracting archive if they are smaller than SIZE megabytes(default 0 = unlimited)/mailscan email fi

Seite 8 - 2.1 Typical installation

1055.5.1.1 Starting ESET SysInspectorTo start ESET SysInspector, simply run the SysInspector.exe executable you downloaded from ESET's website.

Seite 9

106HelpContains information about the application and its functions.DetailThis setting influences the information displayed in the Main window to make

Seite 10 - 2.2 Custom installation

107Network connectionsThe Description window contains a list of processes and applications communicating over the network using theprotocol selected i

Seite 11

1088risky, risk level 8-9 items are displayed9risky, risk level 9 items are displayed-decreases risk level+increases risk levelCtrl+9filtering mode, e

Seite 12

109NOTE: If you compare two log files, select File > Save log to save it as a ZIP file; both files are saved. If you open this filelater, the conta

Seite 13

11To configure your proxy server settings, select I use a proxy server and click Next. Enter the IP address or URL of yourproxy server in the Address

Seite 14

1105.5.4 Service ScriptService script is a tool that provides help to customers that use ESET SysInspector by easily removing unwanted objectsfrom t

Seite 15 - 2.5 Computer scan

111Example:02) Loaded modules:- c:\windows\system32\svchost.exe- c:\windows\system32\kernel32.dll+ c:\windows\system32\khbekhb.dll- c:\windows\system3

Seite 16 - 3. Beginner's guide

112Example:06) Important registry entries:* Category: Standard Autostart (3 items) HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run- HotKeysCmds = C

Seite 17

1135.5.4.3 Executing Service scriptsMark all desired items, then save and close the script. Run the edited script directly from the ESET SysInspecto

Seite 18 - 3.3 Update setup

114What is Anti-Stealth technology ?Anti-Stealth technology provides effective rootkit detection.If the system is attacked by malicious code that beha

Seite 19 - 3.4 Proxy server setup

1155.6.1 Minimum requirementsESET SysRescue works in the Microsoft Windows Preinstallation Environment (Windows PE) version 2.x, which is basedon Wi

Seite 20 - 3.5 Settings protection

1165.6.4.1 FoldersTemporary folder is a working directory for files required during ESET SysRescue compilation.ISO folder is a folder, where the res

Seite 21 - 3.6 Trusted zone setup

1175.6.4.5 Bootable USB deviceIf you have selected a USB device as your target medium, you can select one of the available USB devices on the Bootab

Seite 22

1186. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 Viru

Seite 23

1196.1.4 RootkitsRootkits are malicious programs that grant Internet attackers unlimited access to a system, while concealing theirpresence. Rootkit

Seite 24 - 4.1 Computer

12This installation step allows you to designate how automatic program updates will be handled on your system. Click Change... to access the advanced

Seite 25

1206.1.8 Potentially unwanted applicationsPotentially unwanted applications (PUAs) are not necessarily intended to be malicious, but may affect thep

Seite 26

1216.2.5 TCP desynchronizationTCP desynchronization is a technique used in TCP Hijacking attacks. It is triggered by a process in which the sequenti

Seite 27

1226.3 EmailEmail, or electronic mail, is a modern form of communication with many advantages. It is flexible, fast and direct, andplayed a crucial

Seite 28

1236.3.4 Recognizing spam scamsGenerally, there are a few indicators which can help you identify spam (unsolicited emails) in your mailbox. If a mes

Seite 29

1246.3.4.4 Server-side controlServer-side control is a technique for identifying mass spam based on the number of received messages and thereactions

Seite 30

13The next installation window offers the option to set a password to protect your program settings. Select the Protectconfiguration settings with a p

Seite 31

142.3 Entering username and passwordFor optimal functionality, it is important that the program is automatically updated. This is only possible if t

Seite 32

152.5 Computer scanAfter installing ESET Endpoint Security, you should perform a computer scan to check for malicious code. In the mainprogram windo

Seite 33

163. Beginner's guideThis chapter provides an initial overview of ESET Endpoint Security and its basic settings.3.1 Introducing user interface

Seite 34

173.2 What to do if the program doesn't work properlyIf the modules enabled are working properly, they are assigned a green check. If not, a re

Seite 35

18If you are unable to solve a problem using the suggested solutions, click Help and support to access the help files orsearch the ESET Knowledgebase.

Seite 36

19The Advanced setup window (click Setup in the main menu and then click Enter advanced setup..., or press F5 on yourkeyboard) contains additional upd

Seite 37

ESET ENDPOINT SECURITYCopyright ©2012 by ESET, spol. s r. o.ESET Endpoint Security was developed by ESET, spol. s r. o.For more information visit www.

Seite 38

203.5 Settings protectionESET Endpoint Security settings can be very important from the perspective of your security policy. Unauthorizedmodificatio

Seite 39

213.6 Trusted zone setupIt is necessary to configure the Trusted zone to protect your computer in a network environment. You can allow otherusers to

Seite 40

224. Work with ESET Endpoint SecurityThe ESET Endpoint Security setup options allow you to adjust the protection levels of your computer and network.T

Seite 41

23The Web and Email protection setup allows you to enable or disable the following components:Web access protection – If enabled, all traffic through

Seite 42

244.1 ComputerThe Computer module can be found in the Setup pane after clicking on the Computer title. It shows an overview of allprotection modules

Seite 43 - 4.2 Network

25database update. This behavior is configured using Smart optimization. If this is disabled, all files are scanned eachtime they are accessed. To mod

Seite 44

264.1.1.1.3 Advanced scan optionsMore detailed setup options can be found under Computer > Antivirus and antispyware > Real-time systemprotect

Seite 45

274.1.1.1.5 When to modify real-time protection configurationReal-time protection is the most essential component of maintaining a secure system. Al

Seite 46

284.1.1.3 Computer scanThe on-demand scanner is an important part of your antivirus solution. It is used to perform scans of files and folderson you

Seite 47

294.1.1.3.1.2 Custom scanCustom scan is an optimal solution if you wish to specify scanning parameters such as scan targets and scanningmethods. The

Seite 48

Contents...5ESET Endpoint Security1...

Seite 49

304.1.1.3.4 Scan progressThe scan progress window shows the current status of the scan and information about the number of files found thatcontain m

Seite 50

31To background – You can run another parallel scan. The running scan will be minimized to the background.Click Bring to foreground to bring a scan to

Seite 51

32Lists of files to be scanned are fixed for each group.Scan priority – A level of priority to use for the scan start:Normal – at an average system lo

Seite 52

33ExamplesIf you wish to exclude all files in a folder, type the path to the folder and use the mask “*.*”. To exclude an entire drive including all f

Seite 53 - 4.3 Web and email

344.1.1.6.2 OptionsUse the Options section to select the methods used when scanning the system for infiltrations. The following optionsare available

Seite 54

354.1.1.6.4 ExtensionAn extension is a part of a file name delimited by a period. An extension defines the type and content of a file. Thissection o

Seite 55

364.1.1.6.6 OtherYou can configure the following options in the Other section:Log all objects – If this option is selected, the log file will show a

Seite 56

37Cleaning and deletingIf there is no predefined action to take for Real-time file system protection, you will be asked to select an option in analert

Seite 57

384.1.2 Removable mediaESET Endpoint Security provides automatic removable media (CD/DVD/USB/...) scanning. This module allows you toscan an inserte

Seite 58

394.1.3.1 Device control rulesThe Device control rules editor window displays existing rules and allows for precise control of external devices that

Seite 59

...87ESET Live Grid4.6.6...

Seite 60

404.1.3.2 Adding Device control rulesA Device control rule defines the action that will be taken when a device meeting the rule criteria is connecte

Seite 61

41Rules can be limited to certain users or user groups by adding them to the User list:Add – Opens the Object type: Users or Groups dialog window that

Seite 62

42A dialog window is shown every time if Ask is the default action. It allows the user to choose to Deny or Allow theoperation. If the user does not c

Seite 63

434.2 NetworkThe Personal firewall controls all network traffic to and from the system. This is accomplished by allowing or denyingindividual networ

Seite 64

444.2.1 Filtering modesFive filtering modes are available for the ESET Endpoint Security Personal firewall. Filtering modes can be found in Advanced

Seite 65

454.2.2 Firewall profilesProfiles can be used to control the behavior of the ESET Endpoint Security Personal firewall.. When creating or editing aPe

Seite 66 - 4.4 Web control

464.2.3 Configuring and using rulesRules represent a set of conditions used to meaningfully test all network connections and all actions assigned to

Seite 67

474.2.3.1 Rules setupRules setup allows you to view all rules applied on the traffic generated by individual applications within trusted zonesand th

Seite 68 - 4.5 Updating the program

48remote IP addresses or zones for a given rule.Protocol represents the transfer protocol used for the rule. Click Select protocol... to open the Prot

Seite 69

494.2.4 Configuring zonesIn the Zone setup window you can specify the zone name, description, network address list and zone authentication(see Zone

Seite 70

51. ESET Endpoint SecurityESET Endpoint Security represents a new approach to truly integrated computer security. The most recent version ofthe Threat

Seite 71

50There are two authentication types available:1) Using ESET authentication serverZone authentication searches for a specific server in the network an

Seite 72

51Server configuration).The name of the authentication zone does not match the server zone.The configured zone name does not correspond with the authe

Seite 73

524.2.5 Establishing connection - detectionThe Personal firewall detects each newly-created network connection. The active firewall mode determines

Seite 74

53A thorough analysis of this data can help detect attempts to compromise system security. Many other factors indicatepotential security risks and all

Seite 75

54the email client (POP3, MAPI, IMAP, HTTP).The Antispam protection filters unsolicited email messages.Disable – Deactivates web/email/antispam protec

Seite 76

55Use HTTPS protocol checking for selected ports – HTTPS checking only for ports defined in Ports used by HTTPSprotocol.Use HTTPS protocol checking fo

Seite 77

56addresses, because the list should only contain trusted and safe addresses. Similarly, it is necessary to ensure that thesymbols * and ? are used co

Seite 78

57Template added to the subject of infected email – Edit this template if you wish to modify the subject prefix formatof an infected email. This funct

Seite 79 - 4.6 Tools

584.3.2.2 IMAP, IMAPS protocol controlThe Internet Message Access Protocol (IMAP) is another Internet protocol for email retrieval. IMAP has someadv

Seite 80

59Even if integration is not enabled, email communication is still protected by the email client protection module (POP3,IMAP).4.3.2.3.1 Email clien

Seite 81

6Regularly scan your computer for virusesA regular automatic scan of your computer with the proper settings can remove infiltrations that may have bee

Seite 82

604.3.3 Antispam protectionUnsolicited email, called spam, ranks among the greatest problems of electronic communication. Spam represents upto 80 pe

Seite 83

61Start email client antispam protection automatically – When enabled, antispam protection will be automaticallyactivated at system startup.Enable adv

Seite 84

624.3.4.2 Excluded applicationsTo exclude communication of specific network-aware applications from content filtering, select them in the list. HTTP

Seite 85

634.3.4.3 Excluded IP addressesThe entries in the addresses list will be excluded from the protocol content filtering. HTTP/POP3/IMAP communicationf

Seite 86

644.3.4.4 SSL protocol checkingESET Endpoint Security enables you to check protocols encapsulated in SSL protocol. You can use various scanningmodes

Seite 87

654.3.4.4.1.2 Excluded certificatesThe Excluded certificates section contains certificates that are considered safe. The content of encryptedcommuni

Seite 88

66not be checked at all.4.4 Web controlThe Web control section allows you to configure settings that prevent your company from risk of legal liabili

Seite 89

674.4.2 Adding Web control rulesThe Web control rules window allows you to manually create or modify the existing Web control filtering rule.Enter a

Seite 90

684.4.3 Group editorThe Group Editor window is divided into two parts. The right part of the window contain a list of categories andsubcategories. S

Seite 91

69Last successful update – The date of the last update. Make sure it refers to a recent date, which means that the virussignature database is current.

Seite 92

72. InstallationOnce you launch the installer, the installation wizard will guide you through the setup process.Important: Make sure that no other ant

Seite 93

70Important: Under normal circumstances, when updates are downloaded properly the message Update is notnecessary – Virus signature database is up to d

Seite 94

712. An error occurred while downloading update files – A possible cause of the error is incorrect Internet connectionsettings. We recommend that you

Seite 95

72The currently used update profile is displayed in the Selected profile drop-down menu. Click Profiles... to create a newprofile.The list of availabl

Seite 96 - 4.7 User interface

734.5.1.2.1 Update modeThe Update mode tab contains options related to the program component update. The program enables you topredefine its behavio

Seite 97

74proxy server.4.5.1.2.3 Connecting to the LANWhen updating from a local server with an NT-based operating system, authentication for each network c

Seite 98

75The first step in configuring the Mirror is to select the Create update mirror option. Selecting this option activatesother Mirror configuration opt

Seite 99

76Append your Certificate chain file, or generate a self-signed certificate if you wish to run HTTP server with HTTPS (SSL)support. The following type

Seite 100

77mode for more information about program component updates.4.5.1.2.4.2 Troubleshooting Mirror update problemsIn most cases, problems during an upda

Seite 101

78used to update other workstations located in the network. If a newer version of EULA is available when updating, adialog window with 60 seconds time

Seite 102 - 5. Advanced user

794.6 ToolsThe Tools menu includes modules that help simplify program administration and offer additional options for advancedusers.This menu includ

Seite 103 - 5.4 Command Line

82.1 Typical installationTypical installation mode provides configuration options appropriate for most users. These settings provide excellentsecuri

Seite 104 - 5.5 ESET SysInspector

804.6.1 Log filesLog files contain information about all important program events that have occurred and provide an overview ofdetected threats. Log

Seite 105

81how the filtering rules were applied.Device control – Contains records of removable media or devices that were connected to the computer. Onlydevice

Seite 106

824.6.2 SchedulerScheduler manages and launches scheduled tasks with predefined configuration and properties.The Scheduler can be accessed from the

Seite 107

833. Enter a name of the task and select one of the timing options:Once – The task will be performed only once, at the predefined date and time.Repeat

Seite 108

844.6.2.1 Creating new tasksTo create a new task in Scheduler, click the Add... button or right-click and select Add... from the context menu. Fivet

Seite 109

854.6.3 Protection statisticsTo view a graph of statistical data related to ESET Endpoint Security's protection modules, click Tools > Prote

Seite 110

864.6.4 Watch activityTo see the current File system activity in graph form, click Tools > Watch activity. At the bottom of the graph is atimelin

Seite 111

87The following actions are available:Compare – Compares two existing logs.Create... – Creates a new log. Please wait until the ESET SysInspector log

Seite 112

88you if further information is required for analysis. Please note that you will not receive a response from ESET unlessmore information is needed.In

Seite 113

89Time of discovery – Period of time since the application was discovered by ESET Live Grid technology.NOTE: When an application is marked as Unknown

Seite 114 - 5.6 ESET SysRescue

9By default, the I agree to participate in ESET Live Grid option is selected, which will activate this feature.The next step in the installation proce

Seite 115

90Application/Local IP – Name of application, local IP addresses and communication ports.Remote IP – IP address and port number of the particular remo

Seite 116

914.6.9 QuarantineThe main function of the quarantine is to safely store infected files. Files should be quarantined if they cannot becleaned, if it

Seite 117

924.6.10 Submission of files for analysisThe file submission dialog enables you to send a file to ESET for analysis and can be found in Tools > S

Seite 118 - 6. Glossary

93Send event notifications to LAN computers by means of Messenger service – Select this checkbox to send messagesto LAN computers via the Windows® mes

Seite 119

944.6.13 DiagnosticsDiagnostics provides application crash dumps of ESET's processes (e.g. ekrn). If an application crashes, a dump will begene

Seite 120 - 6.2 Types of remote attacks

954.6.15 Remote administrationESET Remote Administrator (ERA) is a powerful tool to manage security policy and to obtain an overview of the overalls

Seite 121

964.7 User interfaceThe User interface section allows you to configure the behavior of the program's Graphical user interface (GUI).Using the G

Seite 122 - 6.3 Email

974.7.2 Alerts and notificationsThe Alerts and notifications section under User interface allows you to configure how threat alerts and systemnotifi

Seite 123

98The Display only notifications requiring user’s interaction option allows you to toggle alerts and notifications thatrequire no user interaction. Se

Seite 124

994.7.4 Access setupIn order to provide maximum security for your system, it is essential for ESET Endpoint Security to be correctlyconfigured. Any

Kommentare zu diesen Handbüchern

Keine Kommentare