ESET Smart Security 6 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Antivirus-Sicherheitssoftware ESET Smart Security 6 herunter. Eset Smart Security 6 Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - ESET SMART SECURITY 6

ESET SMART SECURITY 6User Guide(intended for product version 6.0 and higher) Microsoft Windows 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2

Seite 2 - ESET SMART SECURITY

102.2.1 Typical installationTypical installation mode provides configuration options appropriate for most users. These settings provide excellentsec

Seite 3 - Contents

100introduced into the compilation so you do not need to look for it later.5.7.4.4 Internet protocolThis section allows you to configure basic netwo

Seite 4 - Glossary6

1015.7.5.1 Using ESET SysRescueSuppose that computers in the network have been infected by a virus which modifies executable (.exe) files. ESETSecu

Seite 5 - 1. ESET Smart Security 6

102/no-unsafedo not scan for potentially unsafe applications (default)/unwantedscan for potentially unwanted applications/no-unwanteddo not scan for p

Seite 6 - 1.3 Prevention

1036. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 Viru

Seite 7

1046.1.4 RootkitsRootkits are malicious programs that grant Internet attackers unlimited access to a system, while concealing theirpresence. Rootkit

Seite 8 - 2. Installation

1056.1.8 Potentially unsafe applicationsThere are many legitimate programs whose function is to simplify the administration of networked computers.H

Seite 9 - 2.2 Offline installation

1066.2.4 Port scanningPort scanning is used to determine which computer ports are open on a network host. A port scanner is softwaredesigned to find

Seite 10

1076.3 EmailEmail, or electronic mail, is a modern form of communication with many advantages. It is flexible, fast and direct, andplayed a crucial

Seite 11 - 2.3 Product activation

1086.3.4 Recognizing spam scamsGenerally, there are a few indicators which can help you identify spam (unsolicited emails) in your mailbox. If a mes

Seite 12 - 2.6 Computer scan

1096.3.4.4 Server-side controlServer-side control is a technique for identifying mass spam based on the number of received messages and thereactions

Seite 13 - 3. Beginner's guide

11The next installation window offers the option to set a password to protect your program settings. Select Protectconfiguration settings with a passw

Seite 14

122.5 Upgrading to a more recent versionNew versions of ESET Smart Security are issued to implement improvements or fix issues that cannot be resolv

Seite 15 - 3.2 Updates

133. Beginner's guideThis chapter provides an initial overview of ESET Smart Security and its basic settings.3.1 Introducing user interface des

Seite 16 - 3.3 Trusted zone setup

14change the status of individual modules, click Setup and select the desired module.The red icon signals critical problems – maximum protection of yo

Seite 17 - 3.5 Parental control tools

15will respond quickly to your questions and help find a resolution.3.2 UpdatesUpdating the virus signature database and updating program components

Seite 18

16The Advanced setup window (click Setup in the main menu and then click Enter advanced setup..., or press F5 on yourkeyboard) contains additional upd

Seite 19 - 4.1 Computer

17communication enabled and have remote desktop sharing available.3.4 Anti-TheftTo protect your computer in case of a loss or theft, choose from the

Seite 20

184. Work with ESET Smart SecurityThe ESET Smart Security setup options allow you to adjust the protection levels of your computer and network.The Set

Seite 21

19Web and Email protection setup allows you to enable or disable the following components:Web access protection – If enabled, all traffic through HTTP

Seite 22

ESET SMART SECURITYCopyright 2013 by ESET, spol. s r. o.ESET Smart Security was developed by ESET, spol. s r. o.For more information visit www.eset.c

Seite 23

20confirm.Computer scan setup... – Click to adjust the parameters of the on-demand scanner (manually executed scan).4.1.1 Antivirus and antispywareA

Seite 24

21By default, Real-time file system protection launches at system startup and provides uninterrupted scanning. In specialcases (e.g., if there is a co

Seite 25

22requirements. While the Advanced heuristics on executing files from removable media option is enabled, if you wishto exclude some removable media (U

Seite 26

234.1.1.1.4 Checking real-time protectionTo verify that real-time protection is working and detecting viruses, use a test file from eicar.com. This

Seite 27

24malware and other potential threats.This type of scan can be also initiated by clicking Custom scan, and then selecting Removable media from the Sca

Seite 28

25currently logged user doesn't have enough privileges to access the appropriate files to be scanned. Note that thisbutton is not available if cu

Seite 29

264.1.1.2.3 Scan profilesYour preferred scan parameters can be saved for future scanning. We recommend that you create a different profile(with vari

Seite 30

274.1.1.4 Idle-state scanningIdle scanner can be configured and enabled in Advanced setup under Computer > Antivirus and antispyware > Idle-st

Seite 31

28Path – Path to excluded files and folders.Threat – If there is a name of a threat next to an excluded file, it means that the file is only excluded

Seite 32

294.1.1.6.2 OptionsUse the Options section to select the methods used when scanning the system for infiltrations. The following optionsare available

Seite 33

Contents...5ESET Smart Security 61...

Seite 34

304.1.1.6.5 LimitsThe Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned:Maximum object si

Seite 35

31Each uses the standard cleaning level and will attempt to clean the file and move it to Quarantine or terminate theconnection. A notification window

Seite 36 - 4.2 Network

324.1.1.8 Document protectionThe Document protection feature scans Microsoft Office documents before they are opened, as well as filesdownloaded aut

Seite 37

334.1.2.1 Filtering rulesThe Filter device access window displays existing extended rules for removable media.Category – Removable media type (CD/DV

Seite 38

34Note: Filtering parameters in all text fields are handled case-sensitive and no wildcards (*, ?) are supported. They haveto be written exactly as de

Seite 39

35 If you select Ask as the default action, ESET Smart Security will display a dialog window every time an operation is run.You can choose to Deny or

Seite 40

364.2 NetworkThe Personal firewall controls all network traffic to and from the system. This is accomplished by allowing or denyingindividual networ

Seite 41

374.2.1 Filtering modesFive filtering modes are available for the ESET Smart Security Personal firewall. Filtering modes can be found in Advanced se

Seite 42

38deny a specific service associated with a standard port number (HTTP – 80, POP3 – 110, etc.) Add remote IP address / Trusted zone – A remote IP addr

Seite 43

39your computer. Many infiltrations try to obtain and send private data, or download other malicious applications to hostworkstations. The Personal fi

Seite 44

...79Proxy server setup4.6.10...

Seite 45

404.2.3.1.1 Detailed view of all rulesTo see the following information in the Zone and rule setup window, click Toggle detailed view of all rules.Na

Seite 46 - 4.3 Web and email

414.2.3.2 Editing rulesModification is required each time any of the monitored parameters are changed. In this case, the rule cannot fulfill thecond

Seite 47

424.2.4.1.1 Zone authentication - Client configurationIn the Zone and rule setup window, click the Zones tab and create a new zone using the name of

Seite 48

43To test your settings, click the Test button. If authentication is successful, a Server authentication successful notificationwill appear. If authen

Seite 49

444.2.4.1.2 Zone authentication - Server configurationThe authentication process can be executed by any computer/server connected to the network tha

Seite 50

454.2.5 Establishing connection - detectionThe Personal firewall detects each newly-created network connection. The active firewall mode determines

Seite 51

464.2.7 System integrationThe ESET Smart Security Personal firewall can operate at several levels:All features active – The Personal firewall is ful

Seite 52

47It is possible to disable the web/email/antispam protection module temporarily by clicking Enabled.Configure ... – Opens web/email/antispam protecti

Seite 53

484.3.1.1.1 Email client protection configurationThe Email client protection module supports the following email clients: Microsoft Outlook, Outlook

Seite 54

494.3.1.3 POP3, POP3S filterThe POP3 protocol is the most widespread protocol used to receive email communication in an email client application.ESE

Seite 55

51. ESET Smart Security 6ESET Smart Security 6 represents a new approach to truly integrated computer security. The most recent version of theThreatSe

Seite 56

50methods) and the resulting index value determines whether a message is spam or not.Antispam protection in ESET Smart Security allows you to set diff

Seite 57

514.3.2 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the main mediumfo

Seite 58 - 4.4 Parental control

524.3.2.1.1 Active mode for web browsersESET Smart Security also contains the Active mode submenu, which defines the checking mode for web browsers.

Seite 59

53Remove/Remove all – Click Remove to delete the selected address from the list. To delete all addresses, selectRemove all.Export... – Save addresses

Seite 60

544.3.3.2 Excluded applicationsTo exclude communication of specific network-aware applications from content filtering, select them in the list. HTTP

Seite 61

554.3.3.3 Excluded IP addressesThe entries in the list will be excluded from the protocol content filtering. HTTP/POP3/IMAP communication from/tothe

Seite 62 - 4.5 Updating the program

564.3.3.4 SSL protocol checkingESET Smart Security enables you to check protocols encapsulated in SSL protocol. You can use various scanning modesfo

Seite 63

574.3.3.4.1.2 Excluded certificatesThe Excluded certificates section contains certificates that are considered safe. The content of encryptedcommuni

Seite 64

58NOTE: Potential phishing websites that have been whitelisted will expire after several hours by default. To allow awebsite permanently, you can use

Seite 65

59If you click Parental control in the Setup pane from the main product window of ESET Smart Security, you will see thatthe main window is divided int

Seite 66

6Rollback previous virus signature databaseIf you suspect that a virus signature database or product module update may be unstable or corrupt, you can

Seite 67

601. Open User Accounts by clicking the Start button (located at the bottom left side of your desktop), clicking ControlPanel and then clicking User A

Seite 68

614.4.1 Web page content filteringIf the check box next to a category is selected, it is allowed. Deselect the check box next to a specific category

Seite 69 - 4.6 Tools

624.4.2 Blocked and allowed web pagesEnter a URL address into the blank field under the list, select Allow or Block and click Add to add it to the l

Seite 70

63Last successful update – The date of the last update. If you do not see a recent date, your virus signature databasemay not be current.Virus signatu

Seite 71

64Important: Under normal circumstances, when updates are downloaded properly the message Update is notnecessary – Virus signature database is up to d

Seite 72

654.5.1 Update setupUpdate setup options are available from the Advanced setup tree (F5 key) by clicking Update > Update. This sectionspecifies u

Seite 73

66Pre-release updates (the Pre-release update option) are updates which have gone through thorough internal testingand will be generally available soo

Seite 74

67will display a notification.The Regularly check for latest product version option will enable the Regular checking for latest product versionschedul

Seite 75

684.5.1.3 Update rollbackIf you suspect that a new update of the virus database and/or program modules may be unstable or corrupt, you canroll back

Seite 76

694.5.2 How to create update tasksUpdates can be triggered manually by clicking Update virus signature database in the primary window displayed afte

Seite 77

7applications to appear and release security updates to eliminate potential threats on a regular basis. It is important todownload these security upda

Seite 78

70Submit file for analysis – Allows you to submit a suspicious file for analysis to the ESET Virus Lab. The dialog windowdisplayed after clicking this

Seite 79

714.6.1.1 Log maintenanceThe Logging configuration of ESET Smart Security is accessible from the main program window. Click Setup > Enteradvanced

Seite 80

724. Depending on the timing option you choose in the previous step, one of the following dialog windows will bedisplayed:Once – The task will be perf

Seite 81 - 4.7 User interface

734.6.4 Watch activityTo see the current File system activity in graph form, click Tools > Watch activity. At the bottom of the graph is atimelin

Seite 82

74The following actions are available:Compare – Compares two existing logs.Create... – Creates a new log. Please wait until the ESET SysInspector log

Seite 83

75you if further information is required for analysis. Please note that you will not receive a response from ESET unlessmore information is needed.Sel

Seite 84

76By clicking a given application at the bottom, the following information will appear at the bottom of the window:File – Location of an application o

Seite 85 - 5. Advanced user

77Open in a new window – Displays information in a separate window.The Configure connection view... option in the Network connections screen enters th

Seite 86 - 5.5 Idle state detection

784.6.9 QuarantineThe main function of the quarantine is to safely store infected files. Files should be quarantined if they cannot becleaned, if it

Seite 87 - 5.6 ESET SysInspector

794.6.10 Proxy server setupIn large LAN networks, the connection of your computer to the Internet can be mediated by a proxy server. If this is thec

Seite 88

82. InstallationThere are several methods for installing ESET Smart Security on your computer. Installation methods may varydepending on country and m

Seite 89

80receive notifications via the Windows® messaging service.Interval between sending messages (sec.) – To change the length of the interval between not

Seite 90

814.6.13 System updatesThe Windows update feature is an important component of protecting users from malicious software. For this reason,it is vital

Seite 91

824.7.2 Alerts and notificationsThe Alerts and notifications section under User interface allows you to configure how threat alerts and systemnotifi

Seite 92

834.7.5 Program menuSome of the most important setup options and features are available in the main program menu.Frequently used – Displays the most

Seite 93

844.7.6 Context menuThe context menu is displayed after right-clicking an object. The menu lists all options available to perform on theobject.It is

Seite 94

855. Advanced user5.1 Profile managerProfile manager is used in two places within ESET Smart Security – in the Computer scan section and in the Upda

Seite 95

865.3 DiagnosticsDiagnostics provides application crash dumps of ESET's processes (e.g. ekrn). If an application crashes, a dump will begenerat

Seite 96

875.6 ESET SysInspector5.6.1 Introduction to ESET SysInspectorESET SysInspector is an application that thoroughly inspects your computer and displ

Seite 97 - 5.7 ESET SysRescue

885.6.2 User Interface and application usageFor clarity the main program window is divided into four major sections – Program Controls located on th

Seite 98

89with. In "Basic" mode, you have access to information used to find solutions for common problems in your system. Inthe "Medium"

Seite 99

92.2 Offline installationOnce you launch the offline installation (.msi) package, the installation wizard will guide you through the setup process.F

Seite 100

90its hash.Important Registry EntriesContains a list of selected registry entries which are often related to various problems with your system like th

Seite 101 - 5.8 Command Line

91ViewCtrl+5view by vendor, all vendorsCtrl+6view by vendor, only MicrosoftCtrl+7view by vendor, all other vendorsCtrl+3displays full detailCtrl+2disp

Seite 102

92marked by a were present only in the opened log and are missing in the active one. Description of all symbols that can be displayed next to items:

Seite 103 - 6. Glossary

935.6.4 Service ScriptService script is a tool that provides help to customers that use ESET SysInspector by easily removing unwanted objectsfrom th

Seite 104

94Example:02) Loaded modules:- c:\windows\system32\svchost.exe- c:\windows\system32\kernel32.dll+ c:\windows\system32\khbekhb.dll- c:\windows\system32

Seite 105 - 6.2 Types of remote attacks

95Example:06) Important registry entries:* Category: Standard Autostart (3 items) HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run- HotKeysCmds = C:

Seite 106

965.6.4.3 Executing Service scriptsMark all desired items, then save and close the script. Run the edited script directly from the ESET SysInspector

Seite 107 - 6.3 Email

97What is Anti-Stealth technology ?Anti-Stealth technology provides effective rootkit detection.If the system is attacked by malicious code that behav

Seite 108

985.7.1 Minimum requirementsESET SysRescue works in the Microsoft Windows Preinstallation Environment (Windows PE) version 2.x, which is basedon Win

Seite 109

995.7.4 SettingsBefore initiating ESET SysRescue creation, the install wizard displays compilation parameters. These can be modified byclicking the

Kommentare zu diesen Handbüchern

Keine Kommentare