ESET REMOTE ADMINISTRATOR - ANNEXE 636 Installation Manual Page 3

  • Download
  • Add to my manuals
  • Print
  • Page
    / 24
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 2
Contents
.................................................41. ESET NOD32 Antivirus 4
.................................................................4System requirements1.1
.................................................52. Installation
.................................................................5Typical installation2.1
.................................................................5Custom installation2.2
.................................................................6Remote installation2.3
.......................................................................................6Creating remote installation package2.3.1
.......................................................................................6Remote installation on target computers2.3.2
.......................................................................................7Remote uninstallation2.3.3
.......................................................................................7Remote upgrade2.3.4
.................................................................7Entering Username and password2.4
.................................................................7On-demand computer scan2.5
.................................................83. Beginners guide
.................................................................8Introducing user interface design - modes3.1
.......................................................................................8Checking operation of the system3.1.1
.......................................................................................8
What to do if the program doesn't work
properly
3.1.2
.................................................104. Work with ESET NOD32 Antivirus
.................................................................10Antivirus and antispyware protection4.1
.......................................................................................10Real time file system protection4.1.1
......................................................................................10Real-Time Protection setup4.1.1.1
....................................................................................10Control Targets4.1.1.1.1
....................................................................................10Scan on (Event triggered scanning)4.1.1.1.2
....................................................................................10Advanced scan options4.1.1.1.3
....................................................................................11Exclusions from scanning4.1.1.1.4
......................................................................................11
When to modify real time protection
configuration
4.1.1.2
......................................................................................11Checking real time protection4.1.1.3
......................................................................................11
What to do if real time protection does not
work
4.1.1.4
.......................................................................................11On-demand computer scan4.1.2
......................................................................................12Type of scan4.1.2.1
....................................................................................12Smart scan4.1.2.1.1
....................................................................................12Custom scan4.1.2.1.2
......................................................................................12Scan targets4.1.2.2
......................................................................................12Scan profiles4.1.2.3
.......................................................................................13ThreatSense engine parameters setup4.1.3
......................................................................................13Objects4.1.3.1
......................................................................................13Options4.1.3.2
......................................................................................14Cleaning4.1.3.3
......................................................................................14Extensions4.1.3.4
......................................................................................14Limits4.1.3.5
......................................................................................14Others4.1.3.6
.......................................................................................14An infiltration is detected4.1.4
.................................................................15Updating the program4.2
.......................................................................................15Update setup4.2.1
.......................................................................................16How to create update tasks4.2.2
.................................................................16Scheduler4.3
.......................................................................................16Purpose of scheduling tasks4.3.1
.......................................................................................16Creating new tasks4.3.2
.................................................................17Quarantine4.4
.......................................................................................17Quarantining files4.4.1
.......................................................................................17Restoring from Quarantine4.4.2
.......................................................................................17Submitting file from Quarantine4.4.3
.................................................................17Log files4.5
.......................................................................................17Log maintenance4.5.1
.......................................................................................18Log filtering4.5.2
.................................................................18User interface4.6
.......................................................................................18Alerts and notifications4.6.1
......................................................................................18Alerts and notifications advanced setup4.6.1.1
.......................................................................................18Privileges4.6.2
.......................................................................................19Context menu4.6.3
.................................................................19ThreatSense.Net4.7
.......................................................................................19Suspicious files4.7.1
.................................................215. Advanced user
.................................................................21Import and export settings5.1
.......................................................................................21Import settings5.1.1
.......................................................................................21Export settings5.1.2
.................................................................21Proxy server setup5.2
.................................................................21Removable media blocking5.3
.................................................................21Remote administration5.4
.................................................236. Glossary
.................................................................23Types of infiltrations6.1
.......................................................................................23Viruses6.1.1
.......................................................................................23Worms6.1.2
.......................................................................................23Trojan horses6.1.3
.......................................................................................24Adware6.1.4
.......................................................................................24Spyware6.1.5
.......................................................................................24Potentially unsafe applications6.1.6
.......................................................................................24Potentially unwanted applications6.1.7
Page view 2
1 2 3 4 5 6 7 8 ... 23 24

Comments to this Manuals

No comments