ESET Cyber Security Bruksanvisning

ESET Antivirusprogramvare Cyber Security

Les nedenfor 📖 manual på norsk for ESET Cyber Security (22 sider) i kategorien Antivirusprogramvare. Denne guiden var nyttig for 12 personer og ble vurdert med 4.5 stjerner i gjennomsnitt av 2 brukere

Side 1/22
ESET CYBER SECURITY
for Mac
Installation Manual and User Guide
Click here to download the most recent version of this document
ESET CYBER SECURITY
Copyright 2013 by ESET, spol. s r.o.
ESET Cyber Security was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a
retrieval system or transmitted in any form or by any means, electronic,
mechanical, photocopying, recording, scanning, or otherwise without permission
in writing from the author.
ESET, spol. s r.o. reserves the right to change any of the described application
software without prior notice.
Customer Care: www.eset.com/support
REV. 11. 1. 2013
Contents
................................................................41. ESET Cyber Security
..................................................................................4What's new1.1
..................................................................................4System requirements1.2
................................................................42. Installation
..................................................................................4Typical installation2.1
..................................................................................5Custom installation2.2
................................................................53. Product activation
................................................................64. Uninstallation
................................................................65. Basic overview
..................................................................................6Keyboard shortcuts5.1
..................................................................................6Checking protection status5.2
..................................................................................6What to do if the program does not work properly5.3
................................................................66. Computer protection
..................................................................................7Antivirus and antispyware protection6.1
.............................................................................7Real-time file system protection6.1.1
............................................................................7Scan on (Event triggered scanning)6.1.1.1
............................................................................7Advanced options6.1.1.2
............................................................................7
When to modify Real-time protection
configuration
6.1.1.3
............................................................................7Checking Real-time protection6.1.1.4
............................................................................8What to do if Real-time protection does not work6.1.1.5
.............................................................................8On-demand computer scan6.1.2
............................................................................8Type of scan6.1.2.1
.............................................................................8Smart scan6.1.2.1.1
.............................................................................8Custom scan6.1.2.1.2
............................................................................9Scan targets6.1.2.2
............................................................................9Scan profiles6.1.2.3
.............................................................................9Exclusions6.1.3
.............................................................................9ThreatSense engine parameters setup6.1.4
............................................................................10Objects6.1.4.1
............................................................................10Options6.1.4.2
............................................................................10Cleaning6.1.4.3
............................................................................10Extensions6.1.4.4
............................................................................11Limits6.1.4.5
............................................................................11Others6.1.4.6
.............................................................................11An infiltration is detected6.1.5
..................................................................................12Removable media scanning and blocking6.2
................................................................127. Web and mail protection
..................................................................................12Web protection7.1
.............................................................................12Ports7.1.1
.............................................................................12Active mode7.1.2
.............................................................................12URL lists7.1.3
..................................................................................12Email protection7.2
.............................................................................13POP3 protocol checking7.2.1
.............................................................................13IMAP protocol checking7.2.2
................................................................138. Update
..................................................................................13Update setup8.1
..................................................................................14How to create update tasks8.2
..................................................................................14Upgrading ESET Cyber Security to a new version8.3
................................................................149. Tools
..................................................................................14Log files9.1
.............................................................................14Log maintenance9.1.1
.............................................................................14Log filtering9.1.2
..................................................................................15Scheduler9.2
.............................................................................15Creating new tasks9.2.1
.............................................................................15Creating user-defined tasks9.2.2
..................................................................................16Quarantine9.3
.............................................................................16Quarantining files9.3.1
.............................................................................16Restoring from Quarantine9.3.2
.............................................................................16Submitting file from Quarantine9.3.3
..................................................................................16Running processes9.4
..................................................................................17Live Grid9.5
.............................................................................17Live Grid setup9.5.1
................................................................1710.User interface
..................................................................................17Alerts and notifications10.1
.............................................................................18Alerts and notifications advanced setup10.1.1
..................................................................................18Privileges10.2
..................................................................................18Context menu10.3
................................................................1811.Miscellaneous
..................................................................................18Import and export settings11.1
.............................................................................18Import settings11.1.1
.............................................................................18Export settings11.1.2
..................................................................................18Proxy server setup11.2
................................................................1912.Glossary
..................................................................................19Types of infiltration12.1
.............................................................................19Viruses12.1.1
.............................................................................19Worms12.1.2
.............................................................................19Trojan horses12.1.3
.............................................................................19Rootkits12.1.4
.............................................................................19Adware12.1.5
.............................................................................20Spyware12.1.6
.............................................................................20Potentially unsafe applications12.1.7
.............................................................................20Potentially unwanted applications12.1.8
..................................................................................20Types of remote attacks12.2
.............................................................................20DoS attacks12.2.1
.............................................................................20DNS Poisoning12.2.2
.............................................................................20Port scanning12.2.3
.............................................................................21TCP desynchronization12.2.4
.............................................................................21SMB Relay12.2.5
.............................................................................21ICMP attacks12.2.6
..................................................................................21Email12.3
.............................................................................21Advertisements12.3.1
.............................................................................22Hoaxes12.3.2
.............................................................................22Phishing12.3.3
.............................................................................22Recognizing spam scams12.3.4

Produkspesifikasjoner

Merke: ESET
Kategori: Antivirusprogramvare
Modell: Cyber Security

Trenger du hjelp?

Hvis du trenger hjelp med ESET Cyber Security still et spørsmål nedenfor, og andre brukere vil svare deg