User Guide(intended for product version 4.2 and higher)Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008ESET Smart Security 4
103. Beginner’s guideThis chapter provides an initial overview of ESET Smart Security and its basic settings. 3.1 Introducing user interface design
11If you are unable to solve a problem using the suggested solutions, click Help and support to access the help files or search the Knowledgebase. If y
12Warning: An incorrect trusted zone configuration may pose a security risk to your computer.NOTE: By default, workstations from a Trusted zone are gra
134. Work with ESET Smart Security4.1 Antivirus and antispyware protectionAntivirus protection guards against malicious system attacks by controllin
144.1.1.3 When to modify real‑time protection configuration Real‑time protection is the most essential component of maintaining a secure system. There
154.1.2.1.1 CompatibilityCertain email programs may experience problems with POP3 filtering (e.g., if receiving messages with a slow Internet connecti
164.1.3 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the main medium fo
17monitored gradually in batches. This decreases the eectiveness of the data verification process, but also provides higher compatibility for listed a
18to scan runtime packers or potentially unsafe applications and you also want to apply Strict cleaning. From the Configuration profiles window, click t
194.1.6.1 Objects setupThe Objects section allows you to define which computer components and files will be scanned for infiltrations.Operating memory –
Contents1. ESET Smart Security 4 ...41.1 What’s new ... 41.
20Warning: In the Default mode, the entire archive file is deleted only if all files in the archive are infected. If the archive also contains legitimat
21If an infected file is “locked“ or in use by a system process, it will usually only be deleted after it is released (normally after a system restart)
22When the Personal firewall switches to another profile, a notification will appear in the lower right corner near the system clock.4.2.3 Block all net
23• Remote: This tab contains information about the remote port (port range). It also allows you to define a list of remote IP addresses or zones for
24authentication – Server configuration”). • Encoded public key• Public key certificate (.crt)To test your settings, press the Test button. If authent
254.2.7 Establishing connection – detectionThe Personal firewall detects each newly‑created network connection. The active firewall mode determines whi
26One important principle in spam detection is the ability to recognize unsolicited email based on predefined trusted addresses (whitelist) and spam ad
27purchasing ESET Smart Security. 4.4.1 Update setupThe update setup section specifies update source information such as the update servers and authen
28Selecting the Use global proxy server settings option will use the proxy server configuration options already specified within the Miscellaneous >
29The first step in configuring the Mirror is to select the Create update mirror option. Selecting this option activates other Mirror configuration optio
4.1.6.3 Cleaning ...194.1.6.4 Extensions ...
304.4.1.2.4.2 Troubleshooting Mirror update problemsIn most cases, problems during an update from a Mirror server are caused by one or more of the fo
31Since Update is one of the most frequently used scheduled tasks, we will explain how to add a new update task. From the Scheduled task: drop‑down me
324.7 Log filesThe Log files contain information about all important program events that have occurred and provide an overview of detected threats. Log
33At the top of the ESET Smart Security main program window is a Standard menu which can be activated or disabled based on the Use standard menu optio
34about your computer related to newly‑detected threats. This information may include a sample or copy of the file in which the threat appeared, the pa
354.9.3 SubmissionYou can select how files and statistical information will be submitted to ESET. Select the By means of Remote Administrator or direc
365. Advanced userThis chapter describes features of ESET Smart Security which may be useful for more advanced users. Setup options for these feature
37General options:– help show help and quit– version show version information and quit– base‑dir = FOLDER load modules from FOLDER– quar‑dir =
38List – Contains functions for easier navigation within the program as well as various other functions like finding information online. NOTE: Items hi
39 tree structure section contains removed values value / file has been changed tree structure section contains modified values / files the risk level ha
41. ESET Smart Security 4ESET Smart Security 4 is the first representative of a new approach to truly integrated computer security. It utilizes the sp
40‑ c:\windows\system32\advapi32.dll [...]In this example the module khbekhb.dll was marked by a “+”. When the script runs, it will recognize the proc
41The selected items will either be deleted or reset to their original values.5.4.1.5.3 How to execute Service scriptsMark all desired items, then s
425.5.2.4 Bootable USB deviceIf you have selected USB device as your target medium, you can select one of the available USB media on the Bootable USB
436. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 VirusesA
44to be safe than sorry.If there is a file detected as adware on your computer, it is advisable to delete it, since there is a high probability that it
456.2.6 SMB RelaySMBRelay and SMBRelay2 are special programs that are capable of carrying out attacks against remote computers. The programs take ad
46small sum first• You are asked to enter, under various pretenses (data verification, Financial operations), some of your personal data – bank account
5Interactive, Policy‑based, Learning, Automatic and Automatic mode with exceptionsUsers can select whether the Personal firewall actions will be execut
62. InstallationAfter purchase, the ESET Smart Security installer can be downloaded from the ESET website. It comes as awn ess_nt**_***.msi (ESET Sma
72.2 Custom installationCustom installation is designed for users who have experience fine‑tuning programs and who wish to modify advanced settings du
8Click Next to proceed to Configure automatic update settings. This step allows you to designate how automatic program component updates will be handle
9computer scan”.defined for a communication, ESET Smart Security prompts you to allow or deny the communication. Policy‑based mode – Evaluates communic
Kommentare zu diesen Handbüchern