ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 User's Guide Page 3

  • Download
  • Add to my manuals
  • Print
  • Page
    / 124
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 2
Contents
..................................................5
ESET Endpoint Security1.
........................................................................5System requirements1.1
........................................................................5Prevention1.2
..................................................7
Installation2.
........................................................................8Typical installation2.1
........................................................................10Custom installation2.2
........................................................................14Entering username and password2.3
........................................................................14Upgrading to a more recent version2.4
........................................................................15Computer scan2.5
..................................................16
Beginner's guide3.
........................................................................16Introducing user interface design3.1
........................................................................17What to do if the program doesn't work properly3.2
........................................................................18Update setup3.3
........................................................................19Proxy server setup3.4
........................................................................20Settings protection3.5
........................................................................21Trusted zone setup3.6
..................................................22
Work with ESET Endpoint Security4.
........................................................................24Computer4.1
.................................................................................24Antivirus and antispyware protection4.1.1
.............................................................................24Real-time file system protection4.1.1.1
...............................................................................25Media to scan4.1.1.1.1
...............................................................................25Scan on (Event-triggered scanning)4.1.1.1.2
...............................................................................26Advanced scan options4.1.1.1.3
...............................................................................26Cleaning levels4.1.1.1.4
...............................................................................27
When to modify real-time protection
configuration
4.1.1.1.5
...............................................................................27Checking real-time protection4.1.1.1.6
...............................................................................27What to do if real-time protection does not work4.1.1.1.7
.............................................................................27Document protection4.1.1.2
.............................................................................28Computer scan4.1.1.3
...............................................................................28Type of scan4.1.1.3.1
............................................................................28Smart scan4.1.1.3.1.1
............................................................................29Custom scan4.1.1.3.1.2
...............................................................................29Scan targets4.1.1.3.2
...............................................................................29Scan profiles4.1.1.3.3
...............................................................................30Scan progress4.1.1.3.4
.............................................................................31Startup scan4.1.1.4
...............................................................................31Automatic startup file check4.1.1.4.1
.............................................................................32Exclusions by path4.1.1.5
.............................................................................33ThreatSense engine parameters setup4.1.1.6
...............................................................................33Objects4.1.1.6.1
...............................................................................34Options4.1.1.6.2
...............................................................................34Cleaning4.1.1.6.3
...............................................................................35Extension4.1.1.6.4
...............................................................................35Limits4.1.1.6.5
...............................................................................36Other4.1.1.6.6
.............................................................................36An infiltration is detected4.1.1.7
.................................................................................38Removable media4.1.2
.................................................................................38Device control4.1.3
.............................................................................39Device control rules4.1.3.1
.............................................................................40Adding Device control rules4.1.3.2
.................................................................................41Host-based Intrusion Prevention System (HIPS)4.1.4
........................................................................43Network4.2
.................................................................................44Filtering modes4.2.1
.................................................................................45Firewall profiles4.2.2
.................................................................................46Configuring and using rules4.2.3
.............................................................................47Rules setup4.2.3.1
.............................................................................47Editing rules4.2.3.2
.................................................................................49Configuring zones4.2.4
.............................................................................49Network authentication4.2.4.1
...............................................................................49Zone authentication - Client configuration4.2.4.1.1
...............................................................................51Zone authentication - Server configuration4.2.4.1.2
.................................................................................52Establishing connection - detection4.2.5
.................................................................................52Logging4.2.6
.................................................................................53System integration4.2.7
........................................................................53Web and email4.3
.................................................................................54Web access protection4.3.1
.............................................................................54HTTP, HTTPs4.3.1.1
...............................................................................55Active mode for web browsers4.3.1.1.1
.............................................................................55URL address management4.3.1.2
.................................................................................56Email client protection4.3.2
.............................................................................57POP3, POP3S filter4.3.2.1
.............................................................................58IMAP, IMAPS protocol control4.3.2.2
.............................................................................58Integration with email clients4.3.2.3
...............................................................................59Email client protection configuration4.3.2.3.1
.............................................................................59Removing infiltrations4.3.2.4
.................................................................................60Antispam protection4.3.3
.............................................................................61Adding addresses to whitelist and blacklist4.3.3.1
.............................................................................61Marking messages as spam4.3.3.2
.................................................................................61Protocol filtering4.3.4
.............................................................................61Web and email clients4.3.4.1
.............................................................................62Excluded applications4.3.4.2
.............................................................................63Excluded IP addresses4.3.4.3
...............................................................................63Add IPv4 address4.3.4.3.1
...............................................................................63Add IPv6 address4.3.4.3.2
.............................................................................64SSL protocol checking4.3.4.4
...............................................................................64Certificates4.3.4.4.1
............................................................................64Trusted certificates4.3.4.4.1.1
............................................................................65Excluded certificates4.3.4.4.1.2
............................................................................65Encrypted SSL communication4.3.4.4.1.3
........................................................................66Web control4.4
.................................................................................66Web control rules4.4.1
.................................................................................67Adding Web control rules4.4.2
.................................................................................68Group editor4.4.3
........................................................................68Updating the program4.5
.................................................................................71Update setup4.5.1
.............................................................................72Update profiles4.5.1.1
.............................................................................72Advanced update setup4.5.1.2
...............................................................................73Update mode4.5.1.2.1
...............................................................................73Proxy server4.5.1.2.2
...............................................................................74Connecting to the LAN4.5.1.2.3
...............................................................................74Creating update copies - Mirror4.5.1.2.4
............................................................................75Updating from the Mirror4.5.1.2.4.1
............................................................................77Troubleshooting Mirror update problems4.5.1.2.4.2
.............................................................................77Update rollback4.5.1.3
.................................................................................78How to create update tasks4.5.2
........................................................................79Tools4.6
.................................................................................80Log files4.6.1
.............................................................................81Log maintenance4.6.1.1
.................................................................................82Scheduler4.6.2
.............................................................................84Creating new tasks4.6.2.1
.................................................................................85Protection statistics4.6.3
.................................................................................86Watch activity4.6.4
.................................................................................86ESET SysInspector4.6.5
Page view 2
1 2 3 4 5 6 7 8 ... 123 124

Comments to this Manuals

No comments