ESET Cyber Security Handleiding
ESET
Antivirussoftware
Cyber Security
Lees hieronder de 📖 handleiding in het Nederlandse voor ESET Cyber Security (22 pagina's) in de categorie Antivirussoftware. Deze handleiding was nuttig voor 8 personen en werd door 2 gebruikers gemiddeld met 4.5 sterren beoordeeld
Pagina 1/22

ESET CYBER SECURITY
for Mac
Installation Manual and User Guide
Click here to download the most recent version of this document

ESET CYBER SECURITY
Copyright 2013 by ESET, spol. s r.o.
ESET Cyber Security was developed by ESET, spol. s r.o.
For more informaon visit www.eset.com.
All rights reserved. No part of this documentaon may be reproduced, stored in a
retrieval system or transmied in any form or by any means, electronic,
mechanical, photocopying, recording, scanning, or otherwise without permission
in wring from the author.
ESET, spol. s r.o. reserves the right to change any of the described applicaon
soîž«ware without prior notice.
Customer Care: www.eset.com/support
REV. 11. 1. 2013

Contents
................................................................41. ESET Cyber Security
..................................................................................4What's new1.1
..................................................................................4System requirements1.2
................................................................42. Installaon
..................................................................................4Typical installaon2.1
..................................................................................5Custom installaon2.2
................................................................53. Product activaon
................................................................64. Uninstallaon
................................................................65. Basic overview
..................................................................................6Keyboard shortcuts5.1
..................................................................................6Checking protecon status5.2
..................................................................................6What to do if the program does not work properly5.3
................................................................66. Computer protecon
..................................................................................7Anvirus and anspyware protecon6.1
.............................................................................7Real-me le system protecon6.1.1
............................................................................7Scan on (Event triggered scanning)6.1.1.1
............................................................................7Advanced opons6.1.1.2
............................................................................7
When to modify Real-me protecon
conguraon
6.1.1.3
............................................................................7Checking Real-me protecon6.1.1.4
............................................................................8What to do if Real-me protecon does not work6.1.1.5
.............................................................................8On-demand computer scan6.1.2
............................................................................8Type of scan6.1.2.1
.............................................................................8Smart scan6.1.2.1.1
.............................................................................8Custom scan6.1.2.1.2
............................................................................9Scan targets6.1.2.2
............................................................................9Scan proîž“les6.1.2.3
.............................................................................9Exclusions6.1.3
.............................................................................9ThreatSense engine parameters setup6.1.4
............................................................................10Objects6.1.4.1
............................................................................10Opons6.1.4.2
............................................................................10Cleaning6.1.4.3
............................................................................10Extensions6.1.4.4
............................................................................11Limits6.1.4.5
............................................................................11Others6.1.4.6
.............................................................................11An inltraon is detected6.1.5
..................................................................................12Removable media scanning and blocking6.2
................................................................127. Web and mail protecon
..................................................................................12Web protecon7.1
.............................................................................12Ports7.1.1
.............................................................................12Acve mode7.1.2
.............................................................................12URL lists7.1.3
..................................................................................12Email protecon7.2
.............................................................................13POP3 protocol checking7.2.1
.............................................................................13IMAP protocol checking7.2.2
................................................................138. Update
..................................................................................13Update setup8.1
..................................................................................14How to create update tasks8.2
..................................................................................14Upgrading ESET Cyber Security to a new version8.3
................................................................149. Tools
..................................................................................14Log îž“les9.1
.............................................................................14Log maintenance9.1.1
.............................................................................14Log îž“ltering9.1.2
..................................................................................15Scheduler9.2
.............................................................................15Creang new tasks9.2.1
.............................................................................15Creang user-dened tasks9.2.2
..................................................................................16Quaranne9.3
.............................................................................16Quaranning les9.3.1
.............................................................................16Restoring from Quaranne9.3.2
.............................................................................16Submiî ‚ng îž“le from Quaranne9.3.3
..................................................................................16Running processes9.4
..................................................................................17Live Grid9.5
.............................................................................17Live Grid setup9.5.1
................................................................1710.User interface
..................................................................................17Alerts and nocaons10.1
.............................................................................18Alerts and nocaons advanced setup10.1.1
..................................................................................18Privileges10.2
..................................................................................18Context menu10.3
................................................................1811.Miscellaneous
..................................................................................18Import and export seî ‚ngs11.1
.............................................................................18Import seî ‚ngs11.1.1
.............................................................................18Export seî ‚ngs11.1.2
..................................................................................18Proxy server setup11.2
................................................................1912.Glossary
..................................................................................19Types of inltraon12.1
.............................................................................19Viruses12.1.1
.............................................................................19Worms12.1.2
.............................................................................19Trojan horses12.1.3
.............................................................................19Rootkits12.1.4
.............................................................................19Adware12.1.5
.............................................................................20Spyware12.1.6
.............................................................................20Potenally unsafe applicaons12.1.7
.............................................................................20Potenally unwanted applicaons12.1.8
..................................................................................20Types of remote aî €acks12.2
.............................................................................20DoS aî €acks12.2.1
.............................................................................20DNS Poisoning12.2.2
.............................................................................20Port scanning12.2.3
.............................................................................21TCP desynchronizaon12.2.4
.............................................................................21SMB Relay12.2.5
.............................................................................21ICMP aî €acks12.2.6
..................................................................................21Email12.3
.............................................................................21Adversements12.3.1
.............................................................................22Hoaxes12.3.2
.............................................................................22Phishing12.3.3
.............................................................................22Recognizing spam scams12.3.4
Product specificaties
Merk: | ESET |
Categorie: | Antivirussoftware |
Model: | Cyber Security |
Soort: | Antivirusbeveiliging |
Platform: | MAC |
Ondersteunt Windows: | Nee |
Ondersteunt Mac-besturingssysteem: | Mac OS X 10.5 Leopard, Mac OS X 10.6 Snow Leopard, Mac OS X 10.7 Lion, Mac OS X 10.8 Mountain Lion |
Minimale opslag schijfruimte: | - MB |
Minimale processor: | Intel |
Minimale RAM: | - MB |
Aantal licenties: | 4 licentie(s) |
Licentie termijn (jaren): | 3 jaar |
Licentietype: | Volledig |
Heb je hulp nodig?
Als je hulp nodig hebt met ESET Cyber Security stel dan hieronder een vraag en andere gebruikers zullen je antwoorden
Handleiding Antivirussoftware ESET

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Oktober 2022
Handleiding Antivirussoftware
- Antivirussoftware Axis
- Antivirussoftware AVG
- Antivirussoftware Bitdefender
- Antivirussoftware Kaspersky Lab
- Antivirussoftware Symantec
- Antivirussoftware Tandberg Data
- Antivirussoftware Symantec - Norton
Nieuwste handleidingen voor Antivirussoftware

29 Maart 2024

29 Maart 2024

29 Maart 2024

29 Maart 2024

5 Maart 2024

5 Maart 2024

5 Maart 2024

5 Maart 2024