ESET SMART SECURITY Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Antivirus-Sicherheitssoftware ESET SMART SECURITY herunter. Eset Smart Security 4, PC/Mac, 1U Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 46
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
User Guide
(intended for product version 4.2 and higher)
Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008
ESET Smart Security 4
Seitenansicht 0
1 2 3 4 5 6 ... 45 46

Inhaltsverzeichnis

Seite 1 - ESET Smart Security 4

User Guide(intended for product version 4.2 and higher)Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008ESET Smart Security 4

Seite 2

103. Beginner’s guideThis chapter provides an initial overview of ESET Smart Security and its basic settings. 3.1 Introducing user interface design

Seite 3

11If you are unable to solve a problem using the suggested solutions, click Help and support to access the help files or search the Knowledgebase. If y

Seite 4 - 1. ESET Smart Security 4

12Warning: An incorrect trusted zone configuration may pose a security risk to your computer.NOTE: By default, workstations from a Trusted zone are gra

Seite 5

134. Work with ESET Smart Security4.1 Antivirus and antispyware protectionAntivirus protection guards against malicious system attacks by controllin

Seite 6 - 2. Installation

144.1.1.3 When to modify real‑time protection configuration Real‑time protection is the most essential component of maintaining a secure system. There

Seite 7

154.1.2.1.1 CompatibilityCertain email programs may experience problems with POP3 filtering (e.g., if receiving messages with a slow Internet connecti

Seite 8

164.1.3 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the main medium fo

Seite 9

17monitored gradually in batches. This decreases the eectiveness of the data verification process, but also provides higher compatibility for listed a

Seite 10 - 3. Beginner’s guide

18to scan runtime packers or potentially unsafe applications and you also want to apply Strict cleaning. From the Configuration profiles window, click t

Seite 11

194.1.6.1 Objects setupThe Objects section allows you to define which computer components and files will be scanned for infiltrations.Operating memory –

Seite 12

Contents1. ESET Smart Security 4 ...41.1 What’s new ... 41.

Seite 13

20Warning: In the Default mode, the entire archive file is deleted only if all files in the archive are infected. If the archive also contains legitimat

Seite 14

21If an infected file is “locked“ or in use by a system process, it will usually only be deleted after it is released (normally after a system restart)

Seite 15

22When the Personal firewall switches to another profile, a notification will appear in the lower right corner near the system clock.4.2.3 Block all net

Seite 16

23• Remote: This tab contains information about the remote port (port range). It also allows you to define a list of remote IP addresses or zones for

Seite 17

24authentication – Server configuration”). • Encoded public key• Public key certificate (.crt)To test your settings, press the Test button. If authent

Seite 18

254.2.7 Establishing connection – detectionThe Personal firewall detects each newly‑created network connection. The active firewall mode determines whi

Seite 19

26One important principle in spam detection is the ability to recognize unsolicited email based on predefined trusted addresses (whitelist) and spam ad

Seite 20

27purchasing ESET Smart Security. 4.4.1 Update setupThe update setup section specifies update source information such as the update servers and authen

Seite 21

28Selecting the Use global proxy server settings option will use the proxy server configuration options already specified within the Miscellaneous >

Seite 22

29The first step in configuring the Mirror is to select the Create update mirror option. Selecting this option activates other Mirror configuration optio

Seite 23

4.1.6.3 Cleaning ...194.1.6.4 Extensions ...

Seite 24

304.4.1.2.4.2 Troubleshooting Mirror update problemsIn most cases, problems during an update from a Mirror server are caused by one or more of the fo

Seite 25

31Since Update is one of the most frequently used scheduled tasks, we will explain how to add a new update task. From the Scheduled task: drop‑down me

Seite 26

324.7 Log filesThe Log files contain information about all important program events that have occurred and provide an overview of detected threats. Log

Seite 27

33At the top of the ESET Smart Security main program window is a Standard menu which can be activated or disabled based on the Use standard menu optio

Seite 28

34about your computer related to newly‑detected threats. This information may include a sample or copy of the file in which the threat appeared, the pa

Seite 29

354.9.3 SubmissionYou can select how files and statistical information will be submitted to ESET. Select the By means of Remote Administrator or direc

Seite 30

365. Advanced userThis chapter describes features of ESET Smart Security which may be useful for more advanced users. Setup options for these feature

Seite 31

37General options:– help show help and quit– version show version information and quit– base‑dir = FOLDER load modules from FOLDER– quar‑dir =

Seite 32

38List – Contains functions for easier navigation within the program as well as various other functions like finding information online. NOTE: Items hi

Seite 33

39 tree structure section contains removed values value / file has been changed tree structure section contains modified values / files the risk level ha

Seite 34

41. ESET Smart Security 4ESET Smart Security 4 is the first representative of a new approach to truly integrated computer security. It utilizes the sp

Seite 35

40‑ c:\windows\system32\advapi32.dll [...]In this example the module khbekhb.dll was marked by a “+”. When the script runs, it will recognize the proc

Seite 36 - 5. Advanced user

41The selected items will either be deleted or reset to their original values.5.4.1.5.3 How to execute Service scriptsMark all desired items, then s

Seite 37

425.5.2.4 Bootable USB deviceIf you have selected USB device as your target medium, you can select one of the available USB media on the Bootable USB

Seite 38

436. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 VirusesA

Seite 39

44to be safe than sorry.If there is a file detected as adware on your computer, it is advisable to delete it, since there is a high probability that it

Seite 40

456.2.6 SMB RelaySMBRelay and SMBRelay2 are special programs that are capable of carrying out attacks against remote computers. The programs take ad

Seite 41

46small sum first• You are asked to enter, under various pretenses (data verification, Financial operations), some of your personal data – bank account

Seite 42

5Interactive, Policy‑based, Learning, Automatic and Automatic mode with exceptionsUsers can select whether the Personal firewall actions will be execut

Seite 43 - 6. Glossary

62. InstallationAfter purchase, the ESET Smart Security installer can be downloaded from the ESET website. It comes as awn ess_nt**_***.msi (ESET Sma

Seite 44

72.2 Custom installationCustom installation is designed for users who have experience fine‑tuning programs and who wish to modify advanced settings du

Seite 45

8Click Next to proceed to Configure automatic update settings. This step allows you to designate how automatic program component updates will be handle

Seite 46

9computer scan”.defined for a communication, ESET Smart Security prompts you to allow or deny the communication. Policy‑based mode – Evaluates communic

Kommentare zu diesen Handbüchern

Keine Kommentare