Gebruiksaanwijzing /service van het product Smart Security 6 van de fabrikant ESET
Ga naar pagina of 109
E S E T S M A R T S E C U R I T Y 6 User Gu i de ( i nt e nded f or p rod uc t v ersi on 6.0 a nd hi g her) M i c rosof t Wi ndo w s 8 / 7 / V i st a / X P / Home Server 200 3 / Home Server 2011 C l i.
E S E T SM A R T S E C U R I T Y C opyrig ht 20 13 by E SE T, spol. s r . o. E SE T S m ar t Sec u rity was d ev elo p ed by E SE T, spo l . s r . o . For m o re info rm at io n visit w w w .
Conte n ts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 ESET S m ar t S e c ur i t y 6 1. .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. . .. .. . .
. . .. .. .. . . . .. .. .. . . .. .. .. . . . .. .. .. . . . .. .. .. . . . .. .. . . . . .. .. .. . . .. .. .. . . . .. .. .. . . . .79 P rox y ser ver set up 4 .6 .10 . . .. .. .. . . . .. .. .. . . .. .. .. . . . .. .. .. . . . .. .. .. . . . .. .
5 1. E S E T S m a r t S e c ur it y 6 E SE T Sm a rt Sec urit y 6 represent s a new approac h t o t rul y i nt eg ra ted c o mput er sec urit y . The m ost rec ent v ersi o n o f t he T hrea tS ense.
6 R oll bac k pr evi ou s vi r u s s i g natu r e database If y ou suspect t ha t a virus signat ure d at aba se or pro duct modul e up dat e ma y b e unst a b le o r corrupt , y ou c a n roll bac k t o t he p revi ous v ersi o n and disa b l e up dat es f or a set p eri o d o f ti me.
7 a pp l ic at ions t o a pp ea r and rel ea se sec uri ty up d a t es to el i mi nat e po t ent ia l t hrea ts on a reg ul a r b a si s. It i s im po rt a nt to do w nl o ad thes e sec uri ty upd at es as th ey ar e rel ea sed.
8 2. I ns ta l l a ti o n T here a re several met ho ds for i nst al li ng E SET Sm a rt Sec urit y o n y our c omput er. Inst a ll at ion me t hod s ma y vary dep ending on c o unt ry an d mea ns of dist ri buti on: L i ve i nst al le r ca n be do wn l oaded f rom t he E SE T w ebsi t e.
9 2 . 2 O ffl i n e i n st a l l a t i on Once yo u la unch t he off li ne inst al l a ti o n (.m si ) p a c kage, the i nst al la ti on w i za rd w i ll g ui de y ou th roug h t he set up pro c ess. Fi rst , the p rog ram c hec ks to see i f a new er versi on of E SE T Sma rt Sec urit y is a vai la b l e.
1 0 2. 2. 1 Ty p i ca l i n s ta ll a ti o n T yp i c al in st a ll at ion mode p rov i des c onf i g ura t ion o pti ons a pp ropria te f o r most users. These sett in g s p rov i de ex c el len t sec urit y , eas y setup and high system perform anc e.
1 1 T he nex t i nsta ll a t i o n wi nd ow off ers the op t i o n to set a p as sw ord to p rote c t y our pro g ra m sett i ng s. Sel ect Pr otect con fi g ur at ion s e t ti ngs w it h a pas s wor d and enter y our passw o rd i nt o the th e Ne w pass w or d an d C on f i r m ne w pas s w ord fi el ds.
1 2 2 . 5 U pg r a di n g t o a m or e re c e n t v e r si on New versi ons o f E SET Sm a rt Sec urit y are i ssued to im p l em ent im pro vement s o r fi x is sues tha t ca nnot b e resolved by a ut oma ti c up dat es t o prog ra m modules. Up g ra ding to a m ore rec ent v ersi o n ca n b e a c c o mpl ish ed i n sev era l w a ys: 1.
1 3 3 . B e g i nne r ' s g ui d e T hi s c ha pter p rov i des a n in i t ia l ov ervi ew o f E SE T Sm art Sec uri t y and it s basi c sett in g s. 3 . 1 I n t r odu c i n g u se r i n t e r fa c e d e si g n T he ma in p rog ram wi ndo w o f E SET Sm a rt Sec urit y is divi d ed int o tw o ma in sec ti ons.
1 4 c hange th e sta tus of i nd ivi d ual mod ul es, c l ic k S etu p an d sel ec t th e d esi red mod ul e. T he red ic on si g na l s c ri ti ca l p rob l em s – ma x im um p rote c ti o n o f y our c omput er i s no t ensured.
1 5 w i ll respond quic kl y t o yo ur q uest i ons and help fi nd a resol ut i o n. 3 . 2 U pdat e s Upd at i ng the virus signat ure d at aba se an d up dat ing prog ra m com p onents i s an im p orta nt par t o f p rotec t i ng y our system a g ai nst ma li c i ous code.
1 6 T he A dv anc ed set up wi ndo w (c l i ck S e tup in t he ma in menu a nd the n cl i c k Ente r adv a n ced s etu p. .. , o r p ress F 5 o n y our keybo ar d) c ont a i ns addit iona l upd a t e op ti ons. Cl ic k Upd at e in t he A dv anc ed set up t ree to th e lef t.
1 7 c o mm uni c a t ion enabl ed a nd ha ve rem ote d eskt o p shar i ng ava i l abl e. 3 . 4 A n t i -T h e ft T o protec t yo ur com pute r in c ase of a loss or t hef t , c hoose fr om t he fol low ing op ti ons t o regist er y o ur com p ute r wi th t he E SE T Anti - Th ef t sy st em .
1 8 4. Wo r k wi th E S E T S m a r t S e c ur i ty T he E SE T Sm art Sec uri t y set up op t i o ns al low y ou to adj ust t he p rote c t ion level s of yo ur com pute r and netw ork.
1 9 W e b and Em ai l pro t ec ti o n setup al l ows y o u to enabl e or d i sa b le the f oll owi ng c o mponent s: W e b acc e s s pr ote ct ion – If enabl ed, a l l t ra f fi c t hroug h HT TP or HT T PS i s sc a nned f or ma li ci ous soft wa re.
20 c o nf i rm . Com pu t e r scan s e tup . .. – Cl i c k t o a djust t he p a ra met ers of t he on- d em a nd sc a nner ( ma nual ly ex ecut ed sc a n) .
21 B y d ef a ul t, Rea l-t i m e fi l e sy st em p rote c t ion la unc hes at system st a rt up and prov ides uni nt errupted sca nni ng . In speci a l c ases ( e.
22 requi rem ents. Whi l e the A dva n ced h eu ris ti cs o n e xe cuti n g f i les fro m re mov ab le me di a op t i on is ena b le d, i f y o u wi sh t o ex c lude so me removabl e medi a (U SB ) ports f rom bein g sc anned b y adv a nc ed heuri sti c s on fi l e ex ec ut i o n, cl i c k Exce pti on s .
23 4. 1. 1. 1. 4 Ch e c k i n g r e al -t i me p r o te c ti o n T o veri f y tha t rea l-t i m e p rot ec ti o n is w orki ng an d d et ec ti ng viruses , use a test f i le f rom ei ca r.c om. Thi s t est fi l e is a ha rm less f i le detec t a ble by a l l an t i vi rus p rog ram s.
24 m a l wa re a nd other potent ia l threa ts . T hi s type of sc an c a n b e al so ini t i at ed by c l ic ki ng C us tom s can , a nd the n sel ec ti ng R emova ble me dia fr om t he S c an targets d rop- d own men u and c li ck i ng S c an . See Sc a n p rog ress for more i nf orm a t i o n about the sca nni ng p roc ess.
25 c urrent l y l og g ed user d oesn't have enoug h privi leges to ac ces s the a pp ropria te fi le s to b e sc anned. Note tha t th i s butt o n is not avai l a b le i f c urrent ly log g ed user ca nnot c a l l UAC op era t ions as Ad mi ni st ra tor.
26 4. 1. 1. 2. 3 S c an p r o f i le s Y our p ref erred sca n para me t ers c a n b e saved for f ut ure sc a nni ng . We rec o mm end tha t yo u crea te a d i f ferent p rofi le ( wi th vari ous sc a n ta rg et s, sca n met ho ds an d o t her para met ers) for ea c h reg ul a rl y used sc a n.
27 4. 1. 1. 4 Idle - s t at e s ca n n in g Idle sc anner c an be conf igured and enabl ed i n Ad v ance d se tup under C ompute r > An ti v i r u s an d an t i s pyw a r e > Idle- s tat e s c ann i ng . When the c omput er i s in idl e sta te , then a si l ent c omput er sc a n is p erf orm ed on al l loc al drives.
28 Path – P at h to ex cl ud ed fi l es and fol d ers. Thr e a t – If the re is a nam e o f a thr ea t nex t t o a n ex cl uded f i le, i t mea ns tha t th e fi le is onl y ex cl uded f or the g iven t hrea t, not c o mpl etel y.
29 4. 1. 1. 6. 2 Op ti o n s Use the O ptions sec ti on to sel ec t th e met hod s used whe n sca nni ng the system f or i nfi lt ra t i o ns. The f ol l o wi ng o pti o ns a re ava il abl e: He ur istic s – A heuri st ic i s an a l g o ri t hm ana lyz ing the (m al i c i o us) ac ti vit y of prog ram s.
3 0 4. 1. 1. 6. 5 L im i ts T he L im it s sec ti on al l ows y o u to sp ec if y t he ma x im um si z e of ob je c t s and level s of nest ed a rc hives to b e sc a nned: M aximum object s iz e – Defi nes the m a x i mum siz e o f o bjec ts to b e sc anned.
3 1 E ac h uses t he st a ndard cl ea ni ng level an d wi l l at tem pt to cl ea n the fi le a nd move it to Quar a nt ine or term ina te the c o nnec ti o n. A no t i f ic at ion w i ndow is d ispl ayed in the noti f i c at ion ar ea at th e b ott o m right c orner of t he scr een.
3 2 4. 1. 1. 8 Do c u m e n t p r o t e c ti o n T he D ocum ent p rotec t i o n fea ture sc ans M i c roso f t O ff ic e d ocum ents before t hey ar e o pened, as wel l as fi l es do w nl o aded a ut oma ti c a l ly by Int ernet E x p l orer suc h as M i c ro soft A ct iveX ele m ent s.
3 3 4. 1. 2. 1 Fi lt e r in g r u le s T he Fi lt er d evic e a c cess w i nd ow d i spl a ys ex i st ing ex te nded rul es f or removabl e medi a. Ca tegor y – Removabl e medi a type ( C D /D V D/USB ...) . De scr ipti on – Fi l ter dev i c e rul es d esc ript ion.
3 4 No te : Fi lt eri ng p ar a m et ers i n al l text f i elds are ha ndle d ca se-sensi t i v e a nd no w i l d ca rds ( * , ?) are sup po rt ed. They ha ve t o be wr i t ten ex a c t ly a s d el i v ered b y the v endo r. Cl i c k t he Popu l ate wi th con ne ct e d de v i ce par a m e t e r s .
3 5 If y ou sel ect As k as the defa ult a c ti o n, E SE T Sm art Sec uri t y wi l l d i spl a y a dia log wi nd ow every ti me a n op era t i o n is run. Y ou c a n choose to De n y o r All ow the o perat i on. If y ou d o not c hoose an ac t i on, an a c ti o n wi ll b e sel ect ed b as ed on th e pre- defi ned rul es.
3 6 4 . 2 N e t w or k T he P ersona l fi rew a l l c ont rol s al l net work t ra ff ic t o a nd fr om t he sy st em . Thi s is a c com pli shed by al l owi ng o r d eny i ng i nd ivi d ual netw o rk c onnec ti ons b a sed on spec i f ied fi lt eri ng rule s.
3 7 4. 2. 1 F il te r i n g m o de s Fi ve fi l t eri ng modes are a vai l a ble f o r the E SE T Sma rt Sec urit y Personal f i rew al l . Fi lt eri ng modes c a n b e found i n A dva n ced s e t up (F 5 ) b y cl i c ki ng Ne tw or k > Pe rs on al fi r e w a ll .
3 8 deny a speci fi c servic e assoc ia ted wi th a sta nd a rd po rt number (H T T P – 80 , P O P 3 – 110, et c .) A dd r e mote I P addr e ss / Tru ste d z on e – A remot e IP a dd ress o r zo.
3 9 yo ur com pute r. Ma ny inf il t ra ti o ns try to o bta in a nd send priva t e d a t a , or d ownl oad o th er ma li c i o us appli c a t i o ns to ho st w orkst at ions. T he P ersona l fi rew a l l a l l o w s y ou to d et ec t an d ter mi na t e suc h connec ti ons.
4 0 4. 2. 3 . 1. 1 De t ai le d vi e w o f al l r u l e s T o see the fol low i ng inf orma ti on i n the Zone and rule setup wi nd ow, c li c k Tog g le d e t ai l e d vi e w of a ll r u les . Name – Na me of rul e, c hec kbo x mu st b e selec t ed to ac t i v at e the rul e.
4 1 4. 2. 3 . 2 Edit i n g r u l e s M od i f i ca ti on i s req ui red eac h t i m e any o f the m oni t ored p a ra met ers a re c ha nged . In thi s ca se, the rul e ca nnot f ul fi ll the c o ndit ions an d the spec i fi ed ac ti on c a nnot b e a pp l ied.
4 2 4. 2. 4 . 1. 1 Zo n e au t h e n ti ca ti o n - C li e n t co n f ig u r a ti o n In the Z on e an d r u le s e t up wi nd ow, cl ic k th e Z one s ta b a nd c rea te a new z one usin g t he nam e o f t he z one a ut hent ic a t ed b y the server.
4 3 T o t est y our set t ings, c l ic k the Te s t butt o n. If a ut hent ic at i on i s suc c essf ul, a Ser ver a uthenti c ation s uc c es s ful not i f ic at ion w i ll a pp ea r. If a ut henti c a t i o n is not c o nf i g ured prop erl y , one of t he fol low ing error messa g es wi ll a ppear: Ser ver authenti ca ti o n fail ed .
4 4 4. 2. 4 . 1. 2 Zo n e au t h e n ti ca ti o n - S e r v e r co n f ig u r a ti o n T he aut hent i ca ti on pro c ess c a n b e ex ec ut ed b y any com pute r/server c onnec t ed t o t he netw ork tha t i s to b e a ut hent ic a t ed.
4 5 4. 2. 5 Es ta bli s h i n g c o n n e ct io n - de te c t io n T he P ersona l fi rew a l l detec ts eac h new ly- c rea ted netw ork c o nnec ti o n. The ac ti ve fi rew a ll mode d eter m i nes w hi ch a c ti o ns are p erf orm ed for t he new rul e.
4 6 4. 2. 7 S y s te m i n t e g r at io n T he E SE T Sm art Sec uri t y P ersona l fi rew a l l c a n op era t e at severa l level s: A ll featur e s a ct iv e – The P ersona l fi rew al l i s ful l y in t eg ra ted a nd i t s com p onents are a c ti v e b y defa ult .
4 7 It is po ssi b l e to d i sa ble t he we b/ema il /an t i sp am protec ti on modul e tem p orar i ly by c l ic ki ng E n abl e d . Config ur e . ..
4 8 4. 3 . 1. 1. 1 Em ai l cl i e n t p r o te ct i o n c o n fi g u r at i o n T he E ma il c l ient protec ti on m od ul e supp orts t he fol low ing ema i l cl i ent s: Mi c rosoft Outl o ok, O utl oo k E x p ress, Wi nd ows M a i l, Wi nd ows L i ve Ma i l and Moz i ll a T hunderbird.
4 9 4. 3 . 1. 3 POP3, POP3 S fi l te r T he P O P 3 protoc ol is t he most wi d esprea d pro t oc ol used t o rec eive ema i l com muni ca ti on i n an em a i l c l ient a pp l ic at ion. E SE T Sm a rt Sec urit y p rov i des protec ti on f or thi s protoc ol reg ardl ess of t he ema il cl i ent used .
50 m et hods) a nd th e resul t i ng index v a l ue d et erm ine s whet her a me ssa g e is spa m or no t . Anti spam p rote c t ion in E SET Sm a rt Sec urit y al low s y ou t o set d i f f erent para met ers to work w it h ma il i ng li st s.
51 4. 3 . 2 W e b acc e s s p r o t e c ti o n Int ernet c onnec ti v i t y i s a st a ndard fea ture in a p ersona l com p ute r. Unfort unat el y, i t has a l so b ec ome t he ma i n medi um f or tra nsfe rri ng ma li c i o us code.
52 4. 3 . 2. 1. 1 A ct iv e mo de fo r w e b br o w s e r s E SE T Sm a rt Sec urit y al so cont ai ns the Activ e m ode submenu, w hi ch defi nes the c hec ki ng mode for w eb b rows ers.
53 R e mov e / R emove al l – Cl ic k R emove t o delet e the sel ect ed add ress f rom t he l i st . To d el ete a l l addresses, sel ect R e mov e al l . Exp or t . .. – Sa ve a dd resses fr om t he cur rent l i st to a si mple text f i l e. 4. 3 .
54 4. 3 . 3 . 2 Ex cl u de d ap p l i cat i o n s T o ex c l ud e c o mm uni c a ti o n o f sp ec if ic net work-aw a re appl i c at ions fr om c ont ent fi lt eri ng , sel ec t t hem in t he l i st . HT T P / PO P 3 /I M AP c omm unic a t i o n o f t he sel ect ed appli c a t i o ns wi ll no t b e c heck ed f or t hrea ts.
55 4. 3 . 3 . 3 Ex cl u de d IP addr e s s e s T he ent ri es i n the l ist w i l l be ex c l uded from the protoc o l cont ent f i l teri ng . HTT P /P O P 3 /IMAP com m uni ca ti on fr om/t o t he sel ec ted add resses w i ll not be c hec ked for t hrea ts.
56 4. 3 . 3 . 4 SS L p r o t o c o l ch e c k i n g E SE T Sm a rt Sec urit y enabl es y ou t o c hec k p rotoc o l s enc a psul a t ed i n SSL pro t oc ol.
57 4. 3 . 3 . 4 . 1. 2 Ex c l u de d ce r t if i ca te s T he E x cl ud ed c ert if ic at es sec t i on cont ai ns c ert if i c a tes t ha t are consi d ered sa f e. The cont ent of enc ry pted c o mm uni c a t ions uti l i zi ng the cer t i fi ca tes in t he li st wi ll no t b e chec ked f or threa ts.
58 NOTE: Po te nt i al phishi ng websi t es th a t have b een whi t el ist ed wi ll ex p ir e af ter sev era l hours b y defa ult . To al low a w ebsi t e p erm a nentl y , y ou c a n use t he URL a dd ress ma nagemen t tool .
59 If y ou cl i c k Par e ntal con tro l i n the S e tup p a ne from the m a i n pro duct wi ndo w o f E SET Sm a rt Sec uri t y, y ou w i l l see tha t t he ma in wi nd ow i s d i vided i nt o t hree sec ti ons.
6 0 1. Op en Us e r A c coun ts b y cl i c ki ng the S t ar t b ut t on (l oca ted at th e b ott o m l eft si de of y our d eskt o p), c li ck i ng C on t r ol Pan e l an d the n cl i c ki ng Us e r A c c ou nts . 2. C l ic k M a n ag e an oth e r ac c ou nt .
6 1 4. 4. 1 W e b p a g e co n t e n t f il te r i n g If the c hec k b ox nex t t o a ca tegory i s sel ec ted, it i s al l owed. D esel ec t the c hec k b ox nex t t o a sp ec if ic c at eg o ry to b l oc k i t f or the sel ect ed ac count .
6 2 4. 4. 2 Bl o c k e d an d al lo w e d w e b p a ge s E nt er a URL address i nto the bla nk fi el d und er the li st, sele c t Allow or B lock and c li ck Add to add it t o t he li st . To d el et e a n URL a dd ress from the l ist , c li ck the rem o ve butt o n .
6 3 Las t su cc es s ful u pdate – The dat e of the la st upd at e. If y ou do not see a rec ent d at e, y our virus si g na ture dat abase m a y not b e cur rent . Vir u s sig n at u r e d at abase v e r s i on – The virus si g nat ure dat abas e number, whi c h is al so an a c ti v e li nk to E SE T’s w ebsi t e.
6 4 Important: Und er norma l c i rcum sta nc es, wh en up dat es a re d ownl oaded p roperl y the m essa g e Upd ate is n ot n e c e s s ar y – Viru s s ig natur e databa s e is u p to d at e wi l l appear in t he Upd ate wi ndo w . If t hi s i s no t the c ase, t he prog ra m is out o f dat e a nd more vulne ra ble to inf ec t i o n.
6 5 4. 5. 1 U p date s e tu p Upd at e setup op ti ons a re ava il abl e fr om th e Advance d s etu p t ree ( F 5 key) by c l ic ki ng Update > Update . Thi s sect i on spec i fi es upd at e so urc e i nf orma t i on, such a s the upd a t e servers and a ut henti c a t i o n d at a f or these servers.
6 6 Pre- rel ea se upd at es (t he Pre -re leas e up date opti o n) are up d a t es wh i c h have g one th roug h t horoug h i nt erna l t est ing a nd wi l l b e g enera l l y ava il abl e soo n. You ca n b enef i t from enabl ing pre- rel ease upd a t es b y havi ng ac ce ss to the most rec ent detec t i o n met ho ds and fi x es.
6 7 w i ll displ ay a not i f ic at ion. T he R egular ly che ck for l at e s t pr odu ct v er sion op t i on wi ll ena b le the R e g u la r c he ck i ng for la tes t pr od u ct v e r sion sc hed ul ed ta sk ( see Sc hed ul er ) .
6 8 4. 5. 1. 3 U p dat e r o l lba ck If y ou suspect t ha t a new up dat e of t he v i rus d a t a base and/or prog ra m modules ma y b e unsta b l e or c orrupt, yo u ca n rol l b ac k to the p revious versi on a nd disa b l e up dat es f or a set peri od o f ti me.
6 9 4. 5. 2 H o w to cr e at e u p date tas k s Upd at es ca n be t ri g g ered ma nua l ly by c l ic ki ng Update v i ru s s ig natur e dat aba s e in t he prim ary wi nd ow displ ayed af ter c li ck i ng Upd at e from the m a i n men u. Upd at es ca n a l so b e run as sc hed ul ed t a sks.
7 0 S ubmit fi le for analy sis – A l low s y ou to submi t a suspi c ious fi l e for ana l ysis t o t he E SE T V irus L a b. The d ia l og wi ndo w displ ayed af ter c li c ki ng thi s o pti on i s d esc ri b ed in the Submi ssi o n o f f il es f or ana lysi s sec t i o n.
7 1 4. 6. 1. 1 Lo g ma in te n a n c e T he L o g g in g c o nf i g ura ti o n o f E SET Sm art Sec uri t y is ac ces si b le f ro m t he ma in p rog ram wi ndo w . Cl i c k S e tup > Ente r adv ance d se tup . . . > T oo ls > Log f il es . The l og s sec ti on is used to d efi ne ho w the l o g s w i ll be ma naged .
7 2 4 . D epend i ng o n the t i mi ng op ti on y ou c hoose i n the p revious st ep, o ne o f the f oll owi ng dia log wi nd ows w i ll be displ ayed : Once – The t a sk w i ll be p erf o rm ed at the pred ef i ned d at e a nd ti me . R e pe at e dly – The t a sk w i ll be perform ed a t the spec i fi ed t i me i nt erva l .
7 3 4. 6. 4 W a tc h a ct iv i t y T o see the curr ent F i le s y ste m ac ti v i ty in g ra ph f orm, c li c k Tools > W at c h act iv it y . At th e b ott o m of t he g raph i s a t i mel ine whi ch records Fi le system ac t i v it y real - t i me b a sed on t he sel ec ted ti me span.
7 4 T he fol low ing ac t i o ns are a vai l a ble: Com par e – Com p ar es tw o ex ist i ng log s. Cre at e . .. – Cre a t es a new log. P l ea se wa i t unti l the E SE T SysInsp ec tor log is c o mpl ete ( S tat us shown as C rea ted) . De l e te – Rem oves sel ect ed log s from the l ist .
7 5 yo u if fur t her i nf orm a t i o n is requi red for a na lysi s. P l ea se note t ha t y ou wi l l not rec eive a response from E SET unl ess m ore inf orma ti o n is needed. Sel ec t the Enable log g ing op t i on to crea te an event l o g t o rec o rd fi l e and sta ti st i c al i nf o rma t i on sub mi ssi ons.
7 6 B y c l i ck i ng a g i ven a pp l i ca ti on at t he b ott om, th e fol low i ng inf orma ti on wi l l appear at the b ott o m of t he wi ndo w : Fi l e – L oca ti on of a n appli c a ti o n o n y our c omput er. Fi l e s i z e – Fi l e si z e in B ( by tes ) .
7 7 Ope n in a n e w w i nd ow – D i spla y s inf orma ti on i n a separ a t e wi ndo w. T he C on f i g u r e con ne ct i on v i e w . . . op t i on in t he Net w o rk c onnec t i o ns scr een ent .
7 8 4. 6. 9 Qu ar a n t in e T he ma in func ti on of th e q uar a nt ine i s to saf el y store i nfec te d fi l es. Fi le s should b e quara nti ned i f they ca nnot b e c lea ned , if i t is no t saf e or a dv i sa ble to d el et e the m o r if th ey ar e b ei ng fa lsel y d et ec ted b y E SE T Sma rt Sec urit y .
7 9 4. 6. 10 Pr o x y s e r v e r s e tu p In la rg e L A N net w orks, t he c onnec t ion o f y our c omput er to th e Intern et ca n b e m edia ted b y a pro x y server. If thi s i s the c ase, t he fol low ing set t i ng s need to b e d ef i ned. O therw i se the p rog ram wi l l not b e abl e to upd at e i t sel f a ut oma ti c a l ly.
8 0 rec eive noti fi c a ti o ns v i a the Wi nd ows® messa g ing servi c e. In t e r v a l be t w e e n s en ding m e s sag e s (s ec. ) – To cha ng e t he len g th o f the i nt erv a l b et w een noti fi c a t ions sent v i a L A N, ent er t he d esi red t i me i nt erva l in seconds.
8 1 4. 6. 13 S y s t e m u p dat e s T he Wi ndows upd at e f ea ture i s an i mporta nt c o mponent of p rot ec ti ng users from ma li c i o us so f t w a re. For t hi s rea son, i t is v it a l to ins t a l l Mi c rosoft Wi nd ows upd at es as soon as t hey becom e ava il abl e.
8 2 4. 7 . 2 A l e r ts an d n o t if i ca ti o n s T he Ale rts an d n oti f ic at ions sec ti on und er Us er inte r f ac e al low s y ou t o c onfi g ure how thr ea t al ert s and sy st em noti f i ca ti ons ( e.g. suc c essful upd a t e messa g es) are handl ed by E SE T Sm art Sec uri t y .
8 3 4. 7 . 5 Pro gr am m e n u Som e of the most im p orta nt setup o pti ons a nd fea tu res ar e ava i la b le in t he ma in p rog ram men u. Fre qu e ntl y u s e d – D i spl a ys th e most frequent ly used p ar t s o f E SE T Sm art Sec uri t y. You c a n q ui c kly ac c ess the se from t he pro g ra m menu.
8 4 4. 7 . 6 Co n te x t me n u T he cont ex t m enu is d ispl ayed af ter right-c li ck i ng an ob j ec t. T he men u li sts al l opti o ns ava i la b l e to p erf o rm o n the ob j ec t. It is po ssi b l e to int eg ra t e E SE T Sm art Sec uri t y c ontr ol el ement s int o the c o nt ex t menu.
8 5 5. A d v a nc e d use r 5. 1 Pr ofi l e m an a g e r Pro f i l e ma na g er is used i n tw o p l a ces w i thi n E SE T Sma rt Sec urit y – i n the Compute r s ca n sec ti on a nd in the Up date sec ti on. Com pu t e r scan Y our p ref erred sca n para me t ers c a n b e saved for f ut ure sc a nni ng .
8 6 5. 3 D i a g n ost ic s Dia g no st ic s prov ides appl i ca ti on c ra sh d um ps of E SE T 's processe s (e. g . e krn ) . If a n appli c a t ion cr a shes, a d ump wi ll b e g enera ted. Thi s ca n hel p dev el opers t o deb ug a nd fi x vari ous E SE T Sma rt Sec uri ty p rob l em s.
8 7 5. 6 E S E T S y s I n spe c t or 5. 6. 1 In tr o du c ti o n to E S ET S y s In s p e c to r E SE T SysInsp ec tor is a n appl i c at ion tha t t ho roug hly inspec ts yo ur com p ute r and d is pla y s g a t hered d at a i n a c o mprehens i ve wa y .
8 8 5. 6. 2 U s e r In te r f ac e an d ap p li ca ti o n u s ag e For c l ari ty the ma i n p rog ram w i nd ow is d ivi d ed int o four ma jor sec ti ons – P rog ram Cont rols l oc a t ed on t he .
8 9 w i th. In "B a sic " mode, y ou have ac c ess to i nf orm a t i o n used t o f i nd solu t i ons for com mon p rob l em s in y our sy st em .
9 0 i ts has h. Impor ta nt Regi s try Entr ies C ont a i ns a l ist of sel ect ed reg ist ry ent ri es wh i c h ar e o f t en rel at ed t o vari ous pro blem s w i th y our system l i ke t hose spec i fying st a rtup p rog ram s, browser hel p er o bjec t s (B HO ) , et c .
9 1 Vie w C t rl + 5 view by vend or, al l vend ors C t rl + 6 view by vend or, o nl y Mi c rosoft C t rl + 7 view by vend or, al l other v endo rs C t rl + 3 displ ays f ul l deta il C t rl + 2 displ.
9 2 m a rked b y a were present only in t he op ened l og and are m i ssing i n the ac ti ve one. Descr i p ti on of a l l sy m bo l s tha t c an b e d i spla y ed nex t to it ems: new val ue, no t p .
9 3 5. 6. 4 S e r v i ce S cr i p t Servi ce sc ript is a tool tha t prov i des hel p t o c ust o me rs tha t use E SE T SysInspec t or b y easi ly removi ng unwa nted o bjec t s f rom t he system . Servi ce sc ript ena bles t he user to ex p ort the ent ire E SE T SysInsp ec tor log, or i t s sel ec ted part s.
9 4 E x am p l e: 0 2 ) L o a d e d m o d u l e s : - c : w i n d o w s s y s t e m 3 2 s v c h o s t . e x e - c : w i n d o w s s y s t e m 3 2 k e r n e l 3 2 . d l l + c : w i n d o w s s y s t e m 3 2 k h b e k h b . d l l - c : w i n d o w s s y s t e m 3 2 a d v a p i 3 2 .
9 5 E x am p l e: 0 6 ) I m p o r t a n t r e g i s t r y e n t r i e s : * C a t e g o r y : S t a n d a r d A u t o s t a r t ( 3 i t e m s ) H K L M S O F T W A R E M i c r o s o f t W i n d o w s C u r r e n t V e r s i o n R u n - H o t K e y s C m d s = C : W i n d o w s s y s t e m 3 2 h k c m d .
9 6 5. 6. 4. 3 Ex e c u t i n g S e r v i ce s c r i p t s M a rk a l l d esi red it ems, then sa v e a nd c l o se the sc ript . Run the edit ed sc ri p t dire c t ly f rom t he E SE T SysInspec t or ma in w i nd ow b y sel ec ti ng the R u n S e rvi ce Sc r ipt op ti on f rom t he Fi le menu.
9 7 W hat is A nti- S tealt h te chn olog y ? Anti - St eal th t ec hnolog y p rovides eff ec t i ve ro otk i t d et ec ti o n. If the system i s at ta ck ed by ma li c i o us code t ha t b eha ves a s a rootk i t , the user ma y b e ex p osed to d at a l o ss o r thef t.
9 8 5. 7 . 1 M in im u m r e qu ir e m e n ts E SE T SysResc ue work s in t he Mi c rosoft Wi nd ows P rei nsta l l a ti o n E nv i ronme nt (W i nd ows P E ) v ersi o n 2 .
9 9 5. 7 . 4 Se tt i n g s B ef o re ini t i at ing E SE T SysResc ue crea t i on, the i nsta ll w i za rd d ispl ays com pil a t i o n p ar a m et ers.
1 0 0 i ntroduced int o the com pi l a t ion so y ou d o not need t o l ook f or it l a t er. 5. 7 . 4 . 4 In te r n e t p r o t o c o l T hi s sec t ion al l ows yo u to conf i g ure basi c net work i nf o rm a t i o n and set up p redefi ned c onnec t i o ns af ter runni ng E SET SysResc ue.
1 0 1 5. 7 . 5. 1 U s i n g ES E T S y s R e s c u e Suppose th a t com pute rs in the net work ha ve b een i nf ect ed b y a v i rus whi c h modif ie s ex ecut a ble ( .ex e) f il es. E SE T Sec uri ty solut i on i s c a pabl e of cl ea ning al l in f ec ted f i les except for ex plor e r .
1 0 2 /no- unsa fe do no t sca n f or p otent ia l l y unsa f e appl i c at ions ( defa ult ) /unw ant ed sc an for po t ent ia ll y unwa nte d appl i c at ions /no- unw a nt ed do no t sca n f or p o.
1 0 3 6 . G l o ssa r y 6 . 1 T y pe s of i n fi l t r a t i on An Infi l t ra ti on is a piec e o f m a l ic i ous soft wa re tryi ng to ente r and/or dam age a user’s com puter . 6. 1. 1 V ir u s e s A com p ute r v i rus i s a piec e o f ma li ci ous c o d e tha t i s pre- pend ed o r appended t o ex i st ing fi l es on y our com puter .
1 0 4 6. 1. 4 R o o t k i ts Rootk i ts ar e ma li c i ous p rog ram s t ha t g rant Int ernet a t t a c kers unl i m i ted a c cess to a sy st em , whi l e c once a l ing th ei r presenc e.
1 0 5 6. 1. 8 Po t e n ti al l y u n s af e ap p li c at io n s T here a re ma ny legit i m a t e p rog ra ms whose func t i o n is t o si m pl i f y th e admi ni st rat ion of net w o rked c o mput ers. Howe ver, in t he wrong ha nds, t hey ma y b e m i sused for ma li c i ous p urpo ses.
1 0 6 6. 2. 4 Po r t s ca n n i n g Po rt sca nni ng is used t o determ in e whi c h com pute r p orts are op en on a net work host. A po rt sca nner i s so f t w are designed to fi nd such p orts.
1 0 7 6 . 3 E m a i l E ma i l , or el ec troni c m a i l, i s a m od ern form of com muni ca ti on w i t h ma ny adv a nt a g es. It i s fl ex i ble, fa st a nd d i rec t, a nd pla y ed a c ruci a l role i n the p roli f era ti o n o f the Int ernet i n the earl y 1 9 9 0‘s.
1 0 8 6. 3 . 4 R e c o g n iz i n g s p am s c am s Gene ra l ly, there are a few i ndic a t ors whi ch ca n hel p yo u ident i fy spam ( unsol i ci ted ema il s) in yo ur ma il bo x . If a mes sa g e f ul fi ll s at le a st some of the fol low i ng cri t eri a, i t is most li kel y a sp a m messa g e.
1 0 9 6. 3 . 4 . 4 S e r v e r -s ide c o n tr o l Server-si de c ont rol is a tec hni q ue f or i d enti f ying ma ss sp a m base d o n the num ber o f rec ei ved messa g es a nd the rea ct ions of users. E ac h messa g e l ea v es a uni que digit al “f ootpri nt” b a sed on t he c onten t o f the m essa g e.
Een belangrijk punt na aankoop van elk apparaat ESET Smart Security 6 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen ESET Smart Security 6 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens ESET Smart Security 6 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding ESET Smart Security 6 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over ESET Smart Security 6 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van ESET Smart Security 6 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de ESET Smart Security 6 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met ESET Smart Security 6 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.