ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 Handleiding
ESET
Antivirussoftware
ENDPOINT ANTIVIRUS MAC OS USER 5 - 10
Lees hieronder de 📖 handleiding in het Nederlandse voor ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 (44 pagina's) in de categorie Antivirussoftware. Deze handleiding was nuttig voor 49 personen en werd door 2 gebruikers gemiddeld met 4.5 sterren beoordeeld
Pagina 1/44
US
US
US
USUSER
ER
ER
ERER GU
GU
GU
GU GUI
I
I
IIDE
DE
DE
DEDE
(intended for product version 6.5 and higher)
Click here to download the most recent version of this document
ESET, spol. s.r.o.
ESET Endpoint Antivi rus wa s developed by ESET, s pol. s r.o.
For more informa tion vi sit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording, s canning, or
otherwise without permission in writing from the author.
ESET, spol. s r.o. reserves the right to cha nge any of the described a pplication software without prior noce.
Cu s to me r C a re : www.eset.com/support
REV. 10/13/2017
Contents
.......................................................5ESET Endpoint Anvirus1.
....................................................................................................5What's new in version 61.1
....................................................................................................5System requirements1.2
.......................................................6
Users connecng via ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Web Console2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installaon3.
....................................................................................................9Typical installation3.1
....................................................................................................10Custom installation3.2
....................................................................................................10Remote installation3.3
..............................................................................11Creang a remote installa on package
3.3.1
..............................................................................11Remote ins tallaon on target computers
3.3.2
..............................................................................12Remote uninstallation
3.3.3
..............................................................................12Remote upgrade
3.3.4
.......................................................13Product acvaon4.
.......................................................15Uninstallaon5.
.......................................................16Basic overview6.
....................................................................................................16Keyboard shortcuts6.1
....................................................................................................17Checking operaon of the system6.2
....................................................................................................17
What to do if the program does not
work properly
6.3
.......................................................18Computer protecon7.
....................................................................................................18Antivirus and antispyware protection7.1
..............................................................................18General
7.1.1
..................................................................................18Exclusions
7.1.1.1
..............................................................................19Sta rtup protection
7.1.2
..............................................................................19Real-me file system protection
7.1.3
..................................................................................19Advanced options
7.1.3.1
..................................................................................20When to modify Real-me protecon conguration
7.1.3.2
..................................................................................20Checking Real-me protection
7.1.3.3
..................................................................................20What to do if Real-me protecon does not work
7.1.3.4
..............................................................................21On-demand computer scan
7.1.4
..................................................................................21Type of scan
7.1.4.1
........................................................................21Smart s can
7.1.4.1.1
........................................................................22Custom scan
7.1.4.1.2
..................................................................................22Scan ta rgets
7.1.4.2
..................................................................................22Scan proles
7.1.4.3
..............................................................................23ThreatSense engine parameters setup
7.1.5
..................................................................................23Objects
7.1.5.1
..................................................................................24Opons
7.1.5.2
..................................................................................24Cleaning
7.1.5.3
..................................................................................24Exclusions
7.1.5.4
..................................................................................25Limits
7.1.5.5
..................................................................................25Others
7.1.5.6
..............................................................................25An infiltration is detected
7.1.6
....................................................................................................26Web and email protecon7.2
..............................................................................26Web access protection
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL lis ts
7.2.1.2
..............................................................................27Email protection
7.2.2
..................................................................................27POP3 protocol checking
7.2.2.1
..................................................................................27IMAP protocol checking
7.2.2.2
....................................................................................................28Anti-Phishing7.3
.......................................................29Device control8.
....................................................................................................29Rules editor8.1
.......................................................31Tools9.
....................................................................................................31Log les9.1
..............................................................................31Log maintenance
9.1.1
..............................................................................32Log ltering
9.1.2
....................................................................................................32Scheduler9.2
..............................................................................33Creang new tasks
9.2.1
..............................................................................33Creang a user-dened ta sk
9.2.2
....................................................................................................34Live Grid9.3
..............................................................................34Suspicious les
9.3.1
....................................................................................................35Quarantine9.4
..............................................................................35Quaranning les
9.4.1
..............................................................................35Restoring a quarantined le
9.4.2
..............................................................................35Submitting a le from Quara nne
9.4.3
....................................................................................................35Privileges9.5
....................................................................................................36Presentation mode9.6
....................................................................................................36Running processes9.7
.......................................................37User interface10.
....................................................................................................37Alerts and notications10.1
..............................................................................37Dis play alerts
10.1.1
..............................................................................37Protection status es
10.1.2
....................................................................................................38Context menu10.2
.......................................................39Update11.
....................................................................................................39Update setup11.1
..............................................................................40Advanced options
11.1.1
....................................................................................................41How to create update tasks11.2
....................................................................................................41Upgrading to a new build11.3
....................................................................................................41System updates11.4
.......................................................43Miscellaneous12.
....................................................................................................43Import and export settings12.1
....................................................................................................43Proxy server setup12.2
....................................................................................................44Shared Local Cache12.3
Product specificaties
Merk: | ESET |
Categorie: | Antivirussoftware |
Model: | ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 |
Ondersteunt Windows: | Nee |
Ondersteunt Mac-besturingssysteem: | Mac OS X 10.10 Yosemite,Mac OS X 10.11 El Capitan,Mac OS X 10.12 Sierra,Mac OS X 10.9 Mavericks |
Minimale opslag schijfruimte: | 200 MB |
Minimale RAM: | 300 MB |
Softwaretype: | Hernieuwing |
Aantal licenties: | - licentie(s) |
Aantal jaar: | 1 jaar |
Soort distributie: | Download |
Minimum RAM (client computer): | 300 MB |
Licentieniveau: | B |
Verplichte aankoop van licentieniveau: | 5 - 10 licentie(s) |
Heb je hulp nodig?
Als je hulp nodig hebt met ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 stel dan hieronder een vraag en andere gebruikers zullen je antwoorden
Handleiding Antivirussoftware ESET
24 Oktober 2022
Handleiding Antivirussoftware
- Antivirussoftware Axis
- Antivirussoftware AVG
- Antivirussoftware Bitdefender
- Antivirussoftware Kaspersky Lab
- Antivirussoftware Symantec
- Antivirussoftware Tandberg Data
- Antivirussoftware Symantec - Norton
Nieuwste handleidingen voor Antivirussoftware
29 Maart 2024
29 Maart 2024
29 Maart 2024
29 Maart 2024
5 Maart 2024
5 Maart 2024
5 Maart 2024
5 Maart 2024