ESET SMART SECURITY Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Antivirový bezpečnostní software ESET SMART SECURITY. Eset Smart Security 4, PC/Mac, 1U Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 46
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
User Guide
(intended for product version 4.2 and higher)
Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008
ESET Smart Security 4
Zobrazit stránku 0
1 2 3 4 5 6 ... 45 46

Shrnutí obsahu

Strany 1 - ESET Smart Security 4

User Guide(intended for product version 4.2 and higher)Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008ESET Smart Security 4

Strany 2

103. Beginner’s guideThis chapter provides an initial overview of ESET Smart Security and its basic settings. 3.1 Introducing user interface design

Strany 3

11If you are unable to solve a problem using the suggested solutions, click Help and support to access the help files or search the Knowledgebase. If y

Strany 4 - 1. ESET Smart Security 4

12Warning: An incorrect trusted zone configuration may pose a security risk to your computer.NOTE: By default, workstations from a Trusted zone are gra

Strany 5

134. Work with ESET Smart Security4.1 Antivirus and antispyware protectionAntivirus protection guards against malicious system attacks by controllin

Strany 6 - 2. Installation

144.1.1.3 When to modify real‑time protection configuration Real‑time protection is the most essential component of maintaining a secure system. There

Strany 7

154.1.2.1.1 CompatibilityCertain email programs may experience problems with POP3 filtering (e.g., if receiving messages with a slow Internet connecti

Strany 8

164.1.3 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the main medium fo

Strany 9

17monitored gradually in batches. This decreases the eectiveness of the data verification process, but also provides higher compatibility for listed a

Strany 10 - 3. Beginner’s guide

18to scan runtime packers or potentially unsafe applications and you also want to apply Strict cleaning. From the Configuration profiles window, click t

Strany 11

194.1.6.1 Objects setupThe Objects section allows you to define which computer components and files will be scanned for infiltrations.Operating memory –

Strany 12

Contents1. ESET Smart Security 4 ...41.1 What’s new ... 41.

Strany 13

20Warning: In the Default mode, the entire archive file is deleted only if all files in the archive are infected. If the archive also contains legitimat

Strany 14

21If an infected file is “locked“ or in use by a system process, it will usually only be deleted after it is released (normally after a system restart)

Strany 15

22When the Personal firewall switches to another profile, a notification will appear in the lower right corner near the system clock.4.2.3 Block all net

Strany 16

23• Remote: This tab contains information about the remote port (port range). It also allows you to define a list of remote IP addresses or zones for

Strany 17

24authentication – Server configuration”). • Encoded public key• Public key certificate (.crt)To test your settings, press the Test button. If authent

Strany 18

254.2.7 Establishing connection – detectionThe Personal firewall detects each newly‑created network connection. The active firewall mode determines whi

Strany 19

26One important principle in spam detection is the ability to recognize unsolicited email based on predefined trusted addresses (whitelist) and spam ad

Strany 20

27purchasing ESET Smart Security. 4.4.1 Update setupThe update setup section specifies update source information such as the update servers and authen

Strany 21

28Selecting the Use global proxy server settings option will use the proxy server configuration options already specified within the Miscellaneous >

Strany 22

29The first step in configuring the Mirror is to select the Create update mirror option. Selecting this option activates other Mirror configuration optio

Strany 23

4.1.6.3 Cleaning ...194.1.6.4 Extensions ...

Strany 24

304.4.1.2.4.2 Troubleshooting Mirror update problemsIn most cases, problems during an update from a Mirror server are caused by one or more of the fo

Strany 25

31Since Update is one of the most frequently used scheduled tasks, we will explain how to add a new update task. From the Scheduled task: drop‑down me

Strany 26

324.7 Log filesThe Log files contain information about all important program events that have occurred and provide an overview of detected threats. Log

Strany 27

33At the top of the ESET Smart Security main program window is a Standard menu which can be activated or disabled based on the Use standard menu optio

Strany 28

34about your computer related to newly‑detected threats. This information may include a sample or copy of the file in which the threat appeared, the pa

Strany 29

354.9.3 SubmissionYou can select how files and statistical information will be submitted to ESET. Select the By means of Remote Administrator or direc

Strany 30

365. Advanced userThis chapter describes features of ESET Smart Security which may be useful for more advanced users. Setup options for these feature

Strany 31

37General options:– help show help and quit– version show version information and quit– base‑dir = FOLDER load modules from FOLDER– quar‑dir =

Strany 32

38List – Contains functions for easier navigation within the program as well as various other functions like finding information online. NOTE: Items hi

Strany 33

39 tree structure section contains removed values value / file has been changed tree structure section contains modified values / files the risk level ha

Strany 34

41. ESET Smart Security 4ESET Smart Security 4 is the first representative of a new approach to truly integrated computer security. It utilizes the sp

Strany 35

40‑ c:\windows\system32\advapi32.dll [...]In this example the module khbekhb.dll was marked by a “+”. When the script runs, it will recognize the proc

Strany 36 - 5. Advanced user

41The selected items will either be deleted or reset to their original values.5.4.1.5.3 How to execute Service scriptsMark all desired items, then s

Strany 37

425.5.2.4 Bootable USB deviceIf you have selected USB device as your target medium, you can select one of the available USB media on the Bootable USB

Strany 38

436. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 VirusesA

Strany 39

44to be safe than sorry.If there is a file detected as adware on your computer, it is advisable to delete it, since there is a high probability that it

Strany 40

456.2.6 SMB RelaySMBRelay and SMBRelay2 are special programs that are capable of carrying out attacks against remote computers. The programs take ad

Strany 41

46small sum first• You are asked to enter, under various pretenses (data verification, Financial operations), some of your personal data – bank account

Strany 42

5Interactive, Policy‑based, Learning, Automatic and Automatic mode with exceptionsUsers can select whether the Personal firewall actions will be execut

Strany 43 - 6. Glossary

62. InstallationAfter purchase, the ESET Smart Security installer can be downloaded from the ESET website. It comes as awn ess_nt**_***.msi (ESET Sma

Strany 44

72.2 Custom installationCustom installation is designed for users who have experience fine‑tuning programs and who wish to modify advanced settings du

Strany 45

8Click Next to proceed to Configure automatic update settings. This step allows you to designate how automatic program component updates will be handle

Strany 46

9computer scan”.defined for a communication, ESET Smart Security prompts you to allow or deny the communication. Policy‑based mode – Evaluates communic

Komentáře k této Příručce

Žádné komentáře