ESET SMART SECURITY Betriebsanweisung Seite 38

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 46
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 37
38
List Contains functions for easier navigation within the program as
well as various other functions like finding information online.
NOTE: Items highlighted in red are unknown and are therefore
considered potentially dangerous. If an item is in red, it does not
automatically mean that you can delete the file. Before deleting,
please make sure that the files are truly dangerous or not needed.
Help Contains information about the application and its functions.
Detail Influences information displayed in other sections of
SysInspector. In Basic mode you have access to information used to
find solutions for common problems in your system. In Medium mode
the program displays less used details. In Full mode ESET SysInspector
displays detailed information needed to solve more complex
problems.
Item filtering The most eective use of Item filtering is to find
suspicious files or registry entries in your system. By adjusting the
slider you can filter items by their Risk Level. If the slider is set to the
far left (Risk Level 1) then all items are displayed. By moving the slider
to the right, the program filters out items that are less risky than the
current Risk Level and only displays items that are more suspicious
than the displayed level. With the slider on the far right, the program
displays only known harmful items.
All items within the range 6 to 9 can pose a security risk. If you do not
have an ESET security solution installed, we recommend you scan your
system with the ESET Online scanner after the program has found any
high‑risk items. ESET Online scanner is a free service and can be found
at http://www.eset.com/onlinescan/.
NOTE: The Risk level of an item can be determined quickly by
comparing the color of the item with the color on the Risk Level slider.
Search Search can be used to quickly find a specific item by its name
or part of its name. The results of search requests are displayed in the
Description window.
Return By clicking the back or forward arrow you can return to
previously displayed information in the Description window.
Status section Displays the current node in the Navigation window.
5.4.1.2 Navigating in ESET SysInspector
ESET SysInspector divides various types of information into several
basic sections called nodes. If available, you may find additional
details by expanding each node into its subnodes. To open or collapse
a node just double‑click the name of the node or click
or next to
the name of the node. As you browse through the tree structure of
nodes and subnodes in the Navigation window you may find various
details for each node shown in the Description window. If you browse
through items in the Description window, additional details for each
item may display in the Details window.
Below are descriptions of the main nodes in the Navigation window
and related information in the Description and Details windows.
Running processes This node contains information about
applications and processes running at the time the report was
generated. The Description window displays details for each process,
such as dynamic libraries used by the process and their location in the
system, the name of the application’s vendor, the risk level of the file,
etc.
The Details window contains additional information about items
selected in the Description window such as the file size or its hash.
NOTE: An operating system is comprised of several important kernel
processes which run continually in order to provide basic functions
vital to other applications. In certain cases, such processes are
displayed in ESET SysInspector as a file path beginning with \??\. These
symbols indicate a safe and accurate configuration.
Network connections The Description window contains a list of
processes and applications communicating over the network. The
communication protocol used is shown in the Navigation window
(TCP or UDP) along with the remote address to which the application
is connecting. You can also check DNS assigned IP addresses.
The Details window contains additional information about items
selected in the Description window such as the file size or its hash.
Important Registry Entries Contains a list of selected registry
entries often related to various problems with your system such as
specifying startup programs, browser helper objects (BHO), etc.
In the Description window you may find which files are related to
specific registry entries. You may see additional details in the Details
window.
Services The Description window contains a list of files registered as
Windows Services. You may check the way the service is set to start
along with specific details about the file in the Details window.
Drivers The list of drivers installed on the system.
Critical files The Description window displays content of critical files
related to the Microsoft Windows®operating system.
System information Contains detailed information about hardware
and software along with information about set environmental
variables and user rights.
File details A list of important system files and files in the Program
Files folder. Additional information specific to the files can be found in
the Description and Details windows.
About Information about ESET SysInspector
5.4.1.3 Compare
The Compare feature allows you to compare two existing SysInspector
logs in order to highlight common to both logs. This feature is useful
if you want to keep track of changes to the system and may allow you
to detect the activity of malicious code.
After launching, ESET SysInspector creates a new log, which is
displayed in a new window. Navigate to File > Save Log to save a
log to a file. Log files can later be opened and viewed. To open an
existing log, click File > Open Log. In the main program window, ESET
SysInspector always displays one log at a time.
If you are comparing two logs, it’s important to compare a currently
active log to a log saved in a file. To compare logs, use the option
File > Compare Log and choose Select file. The selected log will
be compared to the active one in the main program windows. The
resulting, so called comparative log will display only dierences
between those two logs.
NOTE: If you compare two log files, select File > Save Log, and save
it as a .zip file, both files are saved. If you later open this file, the
contained logs are automatically compared.
Next to the displayed items, SysInspector shows symbols identifying
dierences between the compared logs. Items marked by a can
only be found in the active log and were not present in the opened
comparative log. Items marked by a on the other hand, were
present only in the opened log and are missing in the active one.
Description of all symbols that can be displayed next to items:
new value, not present in the previous log
tree structure section contains new values
removed value, present in the previous log only
Seitenansicht 37
1 2 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46

Kommentare zu diesen Handbüchern

Keine Kommentare