ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 Handleiding
ESET
Antivirussoftware
ENDPOINT ANTIVIRUS MAC OS USER 5 - 10
Lees hieronder de 📖 handleiding in het Nederlandse voor ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 (44 pagina's) in de categorie Antivirussoftware. Deze handleiding was nuttig voor 59 personen en werd door 2 gebruikers gemiddeld met 4.5 sterren beoordeeld
Pagina 1/44

US
US
US
USUSER
ER
ER
ERER GU
GU
GU
GU GUI
I
I
IIDE
DE
DE
DEDE
(intended for product version 6.5 and higher)
Click here to download the most recent version of this document

ESET, spol. s.r.o.
ESET Endpoint Antivi rus wa s developed by ESET, s pol. s r.o.
For more informa tion vi sit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording, s canning, or
otherwise without permission in writing from the author.
ESET, spol. s r.o. reserves the right to cha nge any of the described a pplication software without prior noce.
Cu s to me r C a re : www.eset.com/support
REV. 10/13/2017

Contents
.......................................................5ESET Endpoint Anvirus1.
....................................................................................................5What's new in version 61.1
....................................................................................................5System requirements1.2
.......................................................6
Users connecng via ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Web Console2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installaon3.
....................................................................................................9Typical installation3.1
....................................................................................................10Custom installation3.2
....................................................................................................10Remote installation3.3
..............................................................................11Creang a remote installa on package
3.3.1
..............................................................................11Remote ins tallaon on target computers
3.3.2
..............................................................................12Remote uninstallation
3.3.3
..............................................................................12Remote upgrade
3.3.4
.......................................................13Product acvaon4.
.......................................................15Uninstallaon5.
.......................................................16Basic overview6.
....................................................................................................16Keyboard shortcuts6.1
....................................................................................................17Checking operaon of the system6.2
....................................................................................................17
What to do if the program does not
work properly
6.3
.......................................................18Computer protecon7.
....................................................................................................18Antivirus and antispyware protection7.1
..............................................................................18General
7.1.1
..................................................................................18Exclusions
7.1.1.1
..............................................................................19Sta rtup protection
7.1.2
..............................................................................19Real-me file system protection
7.1.3
..................................................................................19Advanced options
7.1.3.1
..................................................................................20When to modify Real-me protecon conguration
7.1.3.2
..................................................................................20Checking Real-me protection
7.1.3.3
..................................................................................20What to do if Real-me protecon does not work
7.1.3.4
..............................................................................21On-demand computer scan
7.1.4
..................................................................................21Type of scan
7.1.4.1
........................................................................21Smart s can
7.1.4.1.1
........................................................................22Custom scan
7.1.4.1.2
..................................................................................22Scan ta rgets
7.1.4.2
..................................................................................22Scan proles
7.1.4.3
..............................................................................23ThreatSense engine parameters setup
7.1.5
..................................................................................23Objects
7.1.5.1
..................................................................................24Opons
7.1.5.2
..................................................................................24Cleaning
7.1.5.3
..................................................................................24Exclusions
7.1.5.4
..................................................................................25Limits
7.1.5.5
..................................................................................25Others
7.1.5.6
..............................................................................25An infiltration is detected
7.1.6
....................................................................................................26Web and email protecon7.2
..............................................................................26Web access protection
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL lis ts
7.2.1.2
..............................................................................27Email protection
7.2.2
..................................................................................27POP3 protocol checking
7.2.2.1
..................................................................................27IMAP protocol checking
7.2.2.2
....................................................................................................28Anti-Phishing7.3
.......................................................29Device control8.
....................................................................................................29Rules editor8.1
.......................................................31Tools9.
....................................................................................................31Log les9.1
..............................................................................31Log maintenance
9.1.1
..............................................................................32Log ltering
9.1.2
....................................................................................................32Scheduler9.2
..............................................................................33Creang new tasks
9.2.1
..............................................................................33Creang a user-dened ta sk
9.2.2
....................................................................................................34Live Grid9.3
..............................................................................34Suspicious les
9.3.1
....................................................................................................35Quarantine9.4
..............................................................................35Quaranning les
9.4.1
..............................................................................35Restoring a quarantined le
9.4.2
..............................................................................35Submitting a le from Quara nne
9.4.3
....................................................................................................35Privileges9.5
....................................................................................................36Presentation mode9.6
....................................................................................................36Running processes9.7
.......................................................37User interface10.
....................................................................................................37Alerts and notications10.1
..............................................................................37Dis play alerts
10.1.1
..............................................................................37Protection status es
10.1.2
....................................................................................................38Context menu10.2
.......................................................39Update11.
....................................................................................................39Update setup11.1
..............................................................................40Advanced options
11.1.1
....................................................................................................41How to create update tasks11.2
....................................................................................................41Upgrading to a new build11.3
....................................................................................................41System updates11.4
.......................................................43Miscellaneous12.
....................................................................................................43Import and export settings12.1
....................................................................................................43Proxy server setup12.2
....................................................................................................44Shared Local Cache12.3
Product specificaties
Merk: | ESET |
Categorie: | Antivirussoftware |
Model: | ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 |
Ondersteunt Windows: | Nee |
Ondersteunt Mac-besturingssysteem: | Mac OS X 10.10 Yosemite,Mac OS X 10.11 El Capitan,Mac OS X 10.12 Sierra,Mac OS X 10.9 Mavericks |
Minimale opslag schijfruimte: | 200 MB |
Minimale RAM: | 300 MB |
Softwaretype: | Hernieuwing |
Aantal licenties: | - licentie(s) |
Aantal jaar: | 1 jaar |
Soort distributie: | Download |
Minimum RAM (client computer): | 300 MB |
Licentieniveau: | B |
Verplichte aankoop van licentieniveau: | 5 - 10 licentie(s) |
Heb je hulp nodig?
Als je hulp nodig hebt met ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 stel dan hieronder een vraag en andere gebruikers zullen je antwoorden
Handleiding Antivirussoftware ESET

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Februari 2025

24 Oktober 2022
Handleiding Antivirussoftware
- Antivirussoftware Axis
- Antivirussoftware AVG
- Antivirussoftware Bitdefender
- Antivirussoftware Kaspersky Lab
- Antivirussoftware Symantec
- Antivirussoftware Tandberg Data
- Antivirussoftware Symantec - Norton
Nieuwste handleidingen voor Antivirussoftware

29 Maart 2024

29 Maart 2024

29 Maart 2024

29 Maart 2024

5 Maart 2024

5 Maart 2024

5 Maart 2024

5 Maart 2024