ESET Cyber Security Handleiding

ESET Antivirussoftware Cyber Security

Lees hieronder de 📖 handleiding in het Nederlandse voor ESET Cyber Security (22 pagina's) in de categorie Antivirussoftware. Deze handleiding was nuttig voor 4 personen en werd door 2 gebruikers gemiddeld met 4.5 sterren beoordeeld

Pagina 1/22
ESET CYBER SECURITY
for Mac
Installation Manual and User Guide
Click here to download the most recent version of this document
ESET CYBER SECURITY
Copyright 2013 by ESET, spol. s r.o.
ESET Cyber Security was developed by ESET, spol. s r.o.
For more informaon visit www.eset.com.
All rights reserved. No part of this documentaon may be reproduced, stored in a
retrieval system or transmied in any form or by any means, electronic,
mechanical, photocopying, recording, scanning, or otherwise without permission
in wring from the author.
ESET, spol. s r.o. reserves the right to change any of the described applicaon
soîž«ware without prior notice.
Customer Care: www.eset.com/support
REV. 11. 1. 2013
Contents
................................................................41. ESET Cyber Security
..................................................................................4What's new1.1
..................................................................................4System requirements1.2
................................................................42. Installaon
..................................................................................4Typical installaon2.1
..................................................................................5Custom installaon2.2
................................................................53. Product activaon
................................................................64. Uninstallaon
................................................................65. Basic overview
..................................................................................6Keyboard shortcuts5.1
..................................................................................6Checking protecon status5.2
..................................................................................6What to do if the program does not work properly5.3
................................................................66. Computer protecon
..................................................................................7Anvirus and anspyware protecon6.1
.............................................................................7Real-me le system protecon6.1.1
............................................................................7Scan on (Event triggered scanning)6.1.1.1
............................................................................7Advanced opons6.1.1.2
............................................................................7
When to modify Real-me protecon
conguraon
6.1.1.3
............................................................................7Checking Real-me protecon6.1.1.4
............................................................................8What to do if Real-me protecon does not work6.1.1.5
.............................................................................8On-demand computer scan6.1.2
............................................................................8Type of scan6.1.2.1
.............................................................................8Smart scan6.1.2.1.1
.............................................................................8Custom scan6.1.2.1.2
............................................................................9Scan targets6.1.2.2
............................................................................9Scan proîž“les6.1.2.3
.............................................................................9Exclusions6.1.3
.............................................................................9ThreatSense engine parameters setup6.1.4
............................................................................10Objects6.1.4.1
............................................................................10Opons6.1.4.2
............................................................................10Cleaning6.1.4.3
............................................................................10Extensions6.1.4.4
............................................................................11Limits6.1.4.5
............................................................................11Others6.1.4.6
.............................................................................11An inltraon is detected6.1.5
..................................................................................12Removable media scanning and blocking6.2
................................................................127. Web and mail protecon
..................................................................................12Web protecon7.1
.............................................................................12Ports7.1.1
.............................................................................12Acve mode7.1.2
.............................................................................12URL lists7.1.3
..................................................................................12Email protecon7.2
.............................................................................13POP3 protocol checking7.2.1
.............................................................................13IMAP protocol checking7.2.2
................................................................138. Update
..................................................................................13Update setup8.1
..................................................................................14How to create update tasks8.2
..................................................................................14Upgrading ESET Cyber Security to a new version8.3
................................................................149. Tools
..................................................................................14Log îž“les9.1
.............................................................................14Log maintenance9.1.1
.............................................................................14Log îž“ltering9.1.2
..................................................................................15Scheduler9.2
.............................................................................15Creang new tasks9.2.1
.............................................................................15Creang user-dened tasks9.2.2
..................................................................................16Quaranne9.3
.............................................................................16Quaranning les9.3.1
.............................................................................16Restoring from Quaranne9.3.2
.............................................................................16Subming le from Quaranne9.3.3
..................................................................................16Running processes9.4
..................................................................................17Live Grid9.5
.............................................................................17Live Grid setup9.5.1
................................................................1710.User interface
..................................................................................17Alerts and nocaons10.1
.............................................................................18Alerts and nocaons advanced setup10.1.1
..................................................................................18Privileges10.2
..................................................................................18Context menu10.3
................................................................1811.Miscellaneous
..................................................................................18Import and export seî ‚ngs11.1
.............................................................................18Import seî ‚ngs11.1.1
.............................................................................18Export seî ‚ngs11.1.2
..................................................................................18Proxy server setup11.2
................................................................1912.Glossary
..................................................................................19Types of inltraon12.1
.............................................................................19Viruses12.1.1
.............................................................................19Worms12.1.2
.............................................................................19Trojan horses12.1.3
.............................................................................19Rootkits12.1.4
.............................................................................19Adware12.1.5
.............................................................................20Spyware12.1.6
.............................................................................20Potenally unsafe applicaons12.1.7
.............................................................................20Potenally unwanted applicaons12.1.8
..................................................................................20Types of remote aî €acks12.2
.............................................................................20DoS aî €acks12.2.1
.............................................................................20DNS Poisoning12.2.2
.............................................................................20Port scanning12.2.3
.............................................................................21TCP desynchronizaon12.2.4
.............................................................................21SMB Relay12.2.5
.............................................................................21ICMP aî €acks12.2.6
..................................................................................21Email12.3
.............................................................................21Adversements12.3.1
.............................................................................22Hoaxes12.3.2
.............................................................................22Phishing12.3.3
.............................................................................22Recognizing spam scams12.3.4


Product specificaties

Merk: ESET
Categorie: Antivirussoftware
Model: Cyber Security
Soort: Antivirusbeveiliging
Platform: MAC
Ondersteunt Windows: Nee
Ondersteunt Mac-besturingssysteem: Mac OS X 10.5 Leopard, Mac OS X 10.6 Snow Leopard, Mac OS X 10.7 Lion, Mac OS X 10.8 Mountain Lion
Minimale opslag schijfruimte: - MB
Minimale processor: Intel
Minimale RAM: - MB
Aantal licenties: 4 licentie(s)
Licentie termijn (jaren): 3 jaar
Licentietype: Volledig

Heb je hulp nodig?

Als je hulp nodig hebt met ESET Cyber Security stel dan hieronder een vraag en andere gebruikers zullen je antwoorden