ESET SMART SECURITY Betriebsanweisung Seite 18

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 46
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 17
18
to scan runtime packers or potentially unsafe applications and you
also want to apply Strict cleaning. From the Configuration profiles
window, click the Add... button. Enter the name of your new profile
in the Profile name field, and select Smart scan from the Copy
settings from profile: drop‑down menu. Then adjust the remaining
parameters to meet your requirements.
4.1.5 Protocol filtering
Antivirus protection for the application protocols POP3 and HTTP
is provided by the ThreatSense scanning engine, which seamlessly
integrates all advanced malware scanning techniques. The control
works automatically regardless of the Internet browser or email client
used. The following options are available for protocol filtering (if the
Enable application protocol content filtering option is selected):
HTTP and POP3 ports ‑ Limits scanning of communication to known
HTTP and POP3 ports.
Applications marked as Internet browsers and email clients
Enable this option to only filter communication of application marked
as browsers (Web access protection > HTTP, HTTPS > Web browsers)
and email clients (Email client protection > POP3, POP3s > Email
clients).
Ports and applications marked as Internet browsers or email
clients – Both ports and browsers are checked for malware
NOTE: Starting with Windows Vista Service Pack 1 and Windows
Server 2008, a new communication filtering method is used. As a
result, the Protocol filtering section is not available.
4.1.5.1 SSL
ESET Smart Security enables you to check protocols encapsulated in
SSL protocol. You can use various scanning modes for SSL protected
communications using trusted certificates, unknown certificates,
or certificates that are excluded from SSL‑protected communication
checking.
Always scan SSL protocol – Select this option to scan all SSL
protected communications except communications protected
by certificates excluded from checking. If a new communication
using an unknown, signed certificate is established, you will not be
notified about the fact and the communication will automatically be
filtered. When you access a server with an untrusted certificate that
is marked by you as trusted (it is added to the trusted certificates
list), communication to the server is allowed and the content of the
communication channel is filtered.
Ask about non‑visited sites (exclusions can be set) ‑ If you enter
a new SSL protected site (with an unknown certificate), an action
selection dialog is displayed. This mode enables you to create a list of
SSL certificates that will be excluded from scanning.
Do not scan SSL protocol ‑ If selected, the program will not scan
communications over SSL.
If the certificate cannot be verified using the Trusted Root
Certification Authorities store (protocol filtering > SSL >
Certificates):
Ask about certificate validity – Prompts you to select an action to
take.
Block communication that uses the certificateTerminates
connection to the site that uses the certificate.
If the certificate is invalid or corrupt (protocol filtering > SSL >
Certificates):
Ask about certificate validity – Prompts you to select an action to
take.
Block communication that uses the certificateTerminates
connection to the site that uses the certificate.
4.1.5.1.1 Trusted certificates
In addition to the integrated Trusted Root Certification Authorities
store, where ESET Smart Security stores trusted certificates, you
can create a custom list of trusted certificates that can be viewed
in Advanced Setup (F5) > Protocol filtering > SSL > Certificates >
Trusted certificates.
4.1.5.1.2 Excluded certificates
The Excluded certificates section contains certificates that are
considered to be safe. The program will not check the content
of encrypted communications which use certificates in this list.
We recommend installing only those web certificates which are
guaranteed to be safe and have no need for content filtering.
4.1.6 ThreatSense engine parameters setup
ThreatSense is the name of the technology consisting of complex
threat detection methods. This technology is proactive, which means
it also provides protection during the early hours of the spread of a
new threat. It uses a combination of several methods (code analysis,
code emulation, generic signatures, virus signatures) which work
in concert to significantly enhance system security. The scanning
engine is capable of controlling several data streams simultaneously,
maximizing the eciency and detection rate. ThreatSense technology
also successfully eliminates rootkits.
The ThreatSense technology setup options allow you to specify several
scan parameters:
File types and extensions that are to be scanned
The combination of various detection methods
Levels of cleaning, etc.
To enter the setup window, click the Setup... button located in
any module‘s setup window which uses ThreatSense technology
(see below). Dierent security scenarios could require dierent
configurations. With this in mind, ThreatSense is individually
configurable for the following protection modules:
Real‑time file system protection
System startup file check
Email protection
Web access protection
On‑demand computer scan
The ThreatSense parameters are highly optimized for each module,
and their modification can significantly influence system operation.
For example, changing parameters to always scan runtime packers,
or enabling advanced heuristics in the real‑time file system
protection module could result in a system slow‑down (normally,
only newly‑created files are scanned using these methods). Therefore,
we recommend that you leave the default ThreatSense parameters
unchanged for all modules except On‑demand computer scan.
Seitenansicht 17
1 2 ... 13 14 15 16 17 18 19 20 21 22 23 ... 45 46

Kommentare zu diesen Handbüchern

Keine Kommentare