ESET Cyber Security Bruksanvisning
ESET
Antivirusprogramvare
Cyber Security
Les nedenfor 📖 manual på norsk for ESET Cyber Security (22 sider) i kategorien Antivirusprogramvare. Denne guiden var nyttig for 12 personer og ble vurdert med 4.5 stjerner i gjennomsnitt av 2 brukere
Side 1/22

ESET CYBER SECURITY
Copyright 2013 by ESET, spol. s r.o.
ESET Cyber Security was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a
retrieval system or transmitted in any form or by any means, electronic,
mechanical, photocopying, recording, scanning, or otherwise without permission
in writing from the author.
ESET, spol. s r.o. reserves the right to change any of the described application
software without prior notice.
Customer Care: www.eset.com/support
REV. 11. 1. 2013

Contents
................................................................41. ESET Cyber Security
..................................................................................4What's new1.1
..................................................................................4System requirements1.2
................................................................42. Installation
..................................................................................4Typical installation2.1
..................................................................................5Custom installation2.2
................................................................53. Product activation
................................................................64. Uninstallation
................................................................65. Basic overview
..................................................................................6Keyboard shortcuts5.1
..................................................................................6Checking protection status5.2
..................................................................................6What to do if the program does not work properly5.3
................................................................66. Computer protection
..................................................................................7Antivirus and antispyware protection6.1
.............................................................................7Real-time file system protection6.1.1
............................................................................7Scan on (Event triggered scanning)6.1.1.1
............................................................................7Advanced options6.1.1.2
............................................................................7
When to modify Real-time protection
configuration
6.1.1.3
............................................................................7Checking Real-time protection6.1.1.4
............................................................................8What to do if Real-time protection does not work6.1.1.5
.............................................................................8On-demand computer scan6.1.2
............................................................................8Type of scan6.1.2.1
.............................................................................8Smart scan6.1.2.1.1
.............................................................................8Custom scan6.1.2.1.2
............................................................................9Scan targets6.1.2.2
............................................................................9Scan profiles6.1.2.3
.............................................................................9Exclusions6.1.3
.............................................................................9ThreatSense engine parameters setup6.1.4
............................................................................10Objects6.1.4.1
............................................................................10Options6.1.4.2
............................................................................10Cleaning6.1.4.3
............................................................................10Extensions6.1.4.4
............................................................................11Limits6.1.4.5
............................................................................11Others6.1.4.6
.............................................................................11An infiltration is detected6.1.5
..................................................................................12Removable media scanning and blocking6.2
................................................................127. Web and mail protection
..................................................................................12Web protection7.1
.............................................................................12Ports7.1.1
.............................................................................12Active mode7.1.2
.............................................................................12URL lists7.1.3
..................................................................................12Email protection7.2
.............................................................................13POP3 protocol checking7.2.1
.............................................................................13IMAP protocol checking7.2.2
................................................................138. Update
..................................................................................13Update setup8.1
..................................................................................14How to create update tasks8.2
..................................................................................14Upgrading ESET Cyber Security to a new version8.3
................................................................149. Tools
..................................................................................14Log files9.1
.............................................................................14Log maintenance9.1.1
.............................................................................14Log filtering9.1.2
..................................................................................15Scheduler9.2
.............................................................................15Creating new tasks9.2.1
.............................................................................15Creating user-defined tasks9.2.2
..................................................................................16Quarantine9.3
.............................................................................16Quarantining files9.3.1
.............................................................................16Restoring from Quarantine9.3.2
.............................................................................16Submitting file from Quarantine9.3.3
..................................................................................16Running processes9.4
..................................................................................17Live Grid9.5
.............................................................................17Live Grid setup9.5.1
................................................................1710.User interface
..................................................................................17Alerts and notifications10.1
.............................................................................18Alerts and notifications advanced setup10.1.1
..................................................................................18Privileges10.2
..................................................................................18Context menu10.3
................................................................1811.Miscellaneous
..................................................................................18Import and export settings11.1
.............................................................................18Import settings11.1.1
.............................................................................18Export settings11.1.2
..................................................................................18Proxy server setup11.2
................................................................1912.Glossary
..................................................................................19Types of infiltration12.1
.............................................................................19Viruses12.1.1
.............................................................................19Worms12.1.2
.............................................................................19Trojan horses12.1.3
.............................................................................19Rootkits12.1.4
.............................................................................19Adware12.1.5
.............................................................................20Spyware12.1.6
.............................................................................20Potentially unsafe applications12.1.7
.............................................................................20Potentially unwanted applications12.1.8
..................................................................................20Types of remote attacks12.2
.............................................................................20DoS attacks12.2.1
.............................................................................20DNS Poisoning12.2.2
.............................................................................20Port scanning12.2.3
.............................................................................21TCP desynchronization12.2.4
.............................................................................21SMB Relay12.2.5
.............................................................................21ICMP attacks12.2.6
..................................................................................21Email12.3
.............................................................................21Advertisements12.3.1
.............................................................................22Hoaxes12.3.2
.............................................................................22Phishing12.3.3
.............................................................................22Recognizing spam scams12.3.4
Produkspesifikasjoner
Merke: | ESET |
Kategori: | Antivirusprogramvare |
Modell: | Cyber Security |
Trenger du hjelp?
Hvis du trenger hjelp med ESET Cyber Security still et spørsmål nedenfor, og andre brukere vil svare deg
Antivirusprogramvare ESET Manualer
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025
ESET Manualer
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025
25 Februar 2025