ESET SMART SECURITY Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Oprogramowanie antywirusowe ESET SMART SECURITY. ESET SMART SECURITY User guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 120
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
ESET SMART SECURITY 8
User Guide
(intended for product version 8.0 and higher)
Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011
Click here to download the most recent version of this document
Przeglądanie stron 0
1 2 3 4 5 6 ... 119 120

Podsumowanie treści

Strona 1 - ESET SMART SECURITY 8

ESET SMART SECURITY 8User Guide(intended for product version 8.0 and higher)Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Ser

Strona 2 - ESET SMART SECURITY

102.2.1 Advanced settingsAfter selecting Advanced settings, you will be prompted to select a location for the installation. By default, theprogram i

Strona 3 - Contents

100Ctrl+Alt+Rcancels comparisonCtrl+Alt+1displays all itemsCtrl+Alt+2displays only added items, log will show items present in current logCtrl+Alt+3di

Strona 4

101ExampleGenerate and save a log, recording original information about the system, to a file named previous.xml. Afterchanges to the system have been

Strona 5 - 1. ESET Smart Security

1025.6.4.1 Generating Service scriptTo generate a script, right-click any item from the menu tree (in the left pane) in the ESET SysInspector mainwi

Strona 6 - 1.2 System requirements

10304) UDP endpointsThis section contains information about existing UDP endpoints.Example:04) UDP endpoints:- 0.0.0.0, port 123 (ntp)+ 0.0.0.0, port

Strona 7 - 1.3 Prevention

104Example:08) Drivers:- Name: Microsoft ACPI Driver, exe path: c:\windows\system32\drivers\acpi.sys, state: Running,startup: Boot- Name: ADI UAA Func

Strona 8 - 2. Installation

1055.6.5 FAQDoes ESET SysInspector require Administrator privileges to run ?While ESET SysInspector does not require Administrator privileges to run

Strona 9 - 2.2 Offline installation

106the digital signature of that CAT file will be applied in the validation process of the executable.This is why there are sometimes files marked as

Strona 10 - 2.3 Product activation

107Windows ADK supports:Windows 8Windows 7Windows VistaWindows Vista Service Pack 1Windows Vista Service Pack 2Note: ESET SysRescue may not be availab

Strona 11

108The Create option is inactive if no MSI installation package is specified, or if no ESET Security solution is installed onthe computer. To select a

Strona 12

1095.7.4.4 Internet protocolThis section allows you to configure basic network information and set up predefined connections after runningESET SysRe

Strona 13 - 3. Beginner's guide

11If you would like to evaluate ESET Smart Security before making a purchase, select Activate Trial License. Fill in youremail address and country to

Strona 14

1105.7.5.1 Using ESET SysRescueSuppose that computers in the network have been infected by a virus which modifies executable (.exe) files. ESETSecu

Strona 15 - 3.2 Updates

111/sfxscan self-extracting archives (default)/no-sfxdo not scan self-extracting archives/rtpscan runtime packers (default)/no-rtpdo not scan runtime

Strona 16 - 3.3 Trusted zone setup

1126. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 Viru

Strona 17 - 3.5 Parental control tools

113If a file on your computer is detected as a Trojan, it is advisable to delete it, since it most likely contains nothing butmalicious code.6.1.4 R

Strona 18

1146.1.7 PackersPacker is a runtime self-extracting executable that rolls up several kinds of malware into a single package.The most common packers

Strona 19 - 4.1 Computer

1156.2.1 DoS attacksDoS, or Denial of Service, is an attempt to make a computer or network unavailable for its intended users. Thecommunication betw

Strona 20

1166.2.6 SMB RelaySMB Relay and SMB Relay 2 are special programs that are capable of carrying out attacks against remote computers.The programs take

Strona 21

1176.3.3 Vulnerability ShieldVulnerability shield is an extension of the Personal firewall that improves the detection of known vulnerabilities onth

Strona 22 - 4.1.1.1.2 Cleaning levels

1186.4 EmailEmail, or electronic mail, is a modern form of communication with many advantages. It is flexible, fast and direct,and played a crucial

Strona 23 - 4.1.1.2 Computer scan

1196.4.3 PhishingThe term phishing defines a criminal activity which uses techniques of social engineering (manipulating users inorder to obtain con

Strona 24

122.6 First scan after installationAfter installing ESET Smart Security, a computer scan will start 20 minutes after installation or computer restar

Strona 25 - 4.1.1.2.2 Scan progress

1206.4.4.2 WhitelistIn general, a whitelist is a list of items or persons who are accepted, or have been granted permission. The term“email whitelis

Strona 26 - 4.1.1.3 Startup scan

133. Beginner's guideThis chapter provides an initial overview of ESET Smart Security and its basic settings.3.1 The main program windowThe mai

Strona 27 - 4.1.1.5 Exclusions

14What to do if the program doesn't work properly?If the modules enabled are working properly, the Protection status icon will be green. A red ex

Strona 28

15Phantom account does not exist initially, but is a security feature that is triggered automatically when youmark a device as missing. You may need t

Strona 29 - 4.1.1.6.2 Options

16The Advanced setup window (click Setup in the main menu and then click Enter advanced setup..., or press F5 onyour keyboard) contains additional upd

Strona 30 - 4.1.1.6.5 Limits

17NOTE: By default, workstations from a Trusted zone are granted access to shared files and printers, have incomingRPC communication enabled and have

Strona 31 - 4.1.1.6.6 Other

184. Work with ESET Smart SecurityThe ESET Smart Security setup options allow you to adjust the protection levels of your computer and network.The Set

Strona 32

19Web and Email protection setup allows you to enable or disable the following components:Web access protection – If enabled, all traffic through HTTP

Strona 33 - 4.1.3 Device control

ESET SMART SECURITYCopyright 2015 by ESET, spol. s r. o.ESET Smart Security was developed by ESET, spol. s r. o.For more information visit www.eset.c

Strona 34

20Computer scan setup... – Click to adjust the parameters of the on-demand scanner (manually executed scan).4.1.1 Antivirus and antispywareAntivirus

Strona 35

21Media to scanBy default, all types of media are scanned for potential threats:Local drives – Controls all system hard drives.Device control – Disk S

Strona 36 - 4.1.4 HIPS

22Additional ThreatSense parameters for executed filesAdvanced heuristics on file execution – By default, Advanced heuristics is used when files are e

Strona 37

234.1.1.1.3 When to modify real-time protection configurationReal-time protection is the most essential component of maintaining a secure system. Al

Strona 38 - 4.1.5 Gamer mode

24Smart scanSmart scan allows you to quickly launch a computer scan and clean infected files with no need for user intervention.The advantage of Smart

Strona 39 - 4.2 Network

25Infected items are not cleaned automatically. Scanning without cleaning can be used to obtain an overview of thecurrent protection status. If you ar

Strona 40 - 4.2.1 Filtering modes

26After all scans computer takes no action – Triggers a scheduled shutdown or reboot when the computer scanfinishes. Once the scan has finished, a shu

Strona 41 - 4.2.1.1 Learning mode

274.1.1.3.1 Automatic startup file checkWhen creating a System startup file check scheduled task, you have several options to adjust the followingpa

Strona 42 - 4.2.2 Firewall profiles

28an asterisk (*) represents a variable string of zero or more characters.ExamplesIf you wish to exclude all files in a folder, type the path to the f

Strona 43 - 4.2.3.1 Rules setup

294.1.1.6 ThreatSense engine parameters setupThreatSense is technology comprised of many complex threat detection methods. This technology is proact

Strona 44

Contents...5ESET Smart Security1...

Strona 45 - 4.2.4 Configuring zones

30writers. Its latest version introduces a completely new way of code emulation based on binary translation. This newbinary translator helps to bypass

Strona 46

314.1.1.6.6 OtherYou can configure the following options in the Other section:Log all objects – If this option is selected, the log file will show a

Strona 47

32Cleaning and deletingIf there is no predefined action to take for Real-time file system protection, you will be prompted to select anoption in the a

Strona 48

334.1.1.8 Document protectionThe Document protection feature scans Microsoft Office documents before they are opened, as well as filesdownloaded aut

Strona 49

34pop-up in the lower right corner and access to the device will not be granted.4.1.3.1 Device control rulesThe Device control rules editor window d

Strona 50 - 4.2.7 System integration

354.1.3.2 Adding Device control rulesA Device control rule defines the action that will be taken when a device meeting the rule criteria is connecte

Strona 51 - 4.3 Web and email

36as delivered by the vendor.Tip: In order to figure out the parameters of a device, create an allowing rule for the appropriate type of devices,conne

Strona 52

371. Name the rule and select Block from the Action drop-down menu.2. Open the Target applications tab. Leave the Source applications tab blank to app

Strona 53 - 4.3.1.2 IMAP, IMAPS scanner

38manually, so a rule created from a dialog window can be less specific than the rule that triggered that dialogwindow. This means that after creating

Strona 54 - 4.3.1.3 POP3, POP3S filter

394.2 NetworkThe Personal firewall controls all network traffic to and from the system. This is accomplished by allowing ordenying individual networ

Strona 55 - 4.3.1.4 Antispam protection

...74Update rollback4.5.2...

Strona 56

40Network attack protection (IDS) – Analyses the content of network traffic and protects from network attacks. Anytraffic which is considered harmful

Strona 57 - 4.3.2.1 HTTP, HTTPs

41Firewall user profilesProfiles are a tool to control the behavior of the ESET Smart Security Personal firewall.Advanced protection featuresEnable Ne

Strona 58

42Notify about learning mode expiration in X days – Specifies the number of days after which ESET Smart Security willnotify the user that Learning mod

Strona 59 - 4.3.3 Protocol filtering

43Display information about application allows you to define how applications will be displayed in the list of rules.The following options are availab

Strona 60

444.2.3.1.1 Detailed view of all rulesTo see the following information in the Zone and rule setup window, click Toggle detailed view of all rules.Na

Strona 61 - 4.3.3.3.2 Add IPv6 address

454.2.3.2 Editing rulesModification is required each time any of the monitored parameters are changed. In this case, the rule cannot fulfillthe cond

Strona 62 - 4.3.3.4.1 Certificates

464.2.4.1 Network authenticationFor mobile computers, it is recommended that you verify the network credibility of the network that you areconnectin

Strona 63

47authenticate the server. The authentication process is repeated for each network your computer connects to. Click Setup... and specify a server name

Strona 64 - 4.4 Parental control

484.2.4.1.2 Zone authentication - Server configurationThe authentication process can be executed by any computer/server connected to the network tha

Strona 65

494.2.5 Establishing connection - detectionThe Personal firewall detects each newly-created network connection. The active firewall mode determines

Strona 66

51. ESET Smart SecurityESET Smart Security represents a new approach to truly integrated computer security. The most recent version ofthe ThreatSense®

Strona 67

504.2.6 LoggingThe ESET Smart Security Personal firewall saves all important events in a log file, which can be viewed directly fromthe main menu. C

Strona 68 - 4.5 Updating the program

514.3 Web and emailWeb and email configuration can be found in the Setup pane by clicking on Web and email. From here you canaccess more detailed se

Strona 69

524.3.1 Email client protectionEmail protection provides control of email communication received through the POP3 and IMAP protocols. Using theplug-

Strona 70

534.3.1.1.1 Email client protection configurationThe Email client protection module supports the following email clients: Microsoft Outlook, Outlook

Strona 71 - 4.5.1 Update settings

544.3.1.3 POP3, POP3S filterThe POP3 protocol is the most widespread protocol used to receive email communication in an email clientapplication. ESE

Strona 72 - 4.5.1.2.1 Update mode

554.3.1.4 Antispam protectionUnsolicited email, called spam, ranks among the greatest problems of electronic communication. Spam representsup to 80

Strona 73 - 4.5.1.2.2 Proxy server

56Spam score loggingThe ESET Smart Security Antispam engine assigns a spam score to every scanned message. The message will berecorded in the antispam

Strona 74 - 4.5.2 Update rollback

574.3.2 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the mainmedium fo

Strona 75

584.3.2.2 URL address managementThe URL address management section enables you to specify HTTP addresses to block, allow or exclude fromchecking. Ad

Strona 76 - 4.6 Tools

594.3.3 Protocol filteringAntivirus protection for the application protocols is provided by the ThreatSense scanning engine, which seamlesslyintegra

Strona 77 - 4.6.1 Log files

61.1 What's new in version 8ESET Smart Security version 8 features many small improvements:A new Smart mode for HIPS – is placed between Automa

Strona 78 - 4.6.2 Scheduler

604.3.3.2 Excluded applicationsTo exclude communication of specific network-aware applications from content filtering, select them in the list.HTTP/

Strona 79

614.3.3.3 Excluded IP addressesThe entries in the list will be excluded from protocol content filtering. HTTP/POP3/IMAP communication from/tothe sel

Strona 80 - 4.6.4 Watch activity

624.3.3.4 SSL protocol checkingESET Smart Security enables you to check protocols encapsulated in SSL protocol. You can use various scanningmodes fo

Strona 81 - 4.6.6 ESET Live Grid

634.3.3.4.1.2 Excluded certificatesThe Excluded certificates section contains certificates that are considered safe. The content of encryptedcommuni

Strona 82 - 4.6.6.1 Suspicious files

64NOTE: Potential phishing websites that have been whitelisted will expire after several hours by default. To allow awebsite permanently, you can use

Strona 83 - 4.6.7 Running processes

652. Click Setup > Parental control from the main program window. Even though Enabled appears next to Parentalcontrol, you must configure Parental

Strona 84 - 4.6.8 Network connections

66will toggle Parental control for the account. Under an active account, click Setup... to see the list of allowedcategories of web pages for this ac

Strona 85

674.4.1 Web page content filteringIf the check box next to a category is selected, it is allowed. Deselect the check box next to a specific category

Strona 86 - 4.6.9 Quarantine

684.4.2 Blocked and allowed web pagesEnter a URL address into the blank field under the list, select Allow or Block and click Add to add it to the l

Strona 87 - 4.6.10 Proxy server setup

69Last successful update – The date of the last update. If you do not see a recent date, your virus signature databasemay not be current.Virus signatu

Strona 88 - 4.6.11.1 Message format

71.3 PreventionWhen you work with your computer, and especially when you browse the Internet, please keep in mind that noantivirus system in the wor

Strona 89 - 4.7 User interface

70Important: Under normal circumstances, when updates are downloaded properly the message Update is notnecessary – the virus signature database is up

Strona 90 - 4.7.2.1 Advanced setup

714.5.1 Update settingsUpdate setup options are available from the Advanced setup tree (F5 key) by clicking Update > Settings. This sectionspecif

Strona 91 - 4.7.5 Program menu

72Authentication for update servers is based on the Username and Password generated and sent to you afterpurchase. By default, no verification is requ

Strona 92 - 4.7.6 Context menu

73NOTE: Selecting the most appropriate option depends on the workstation where the settings will be applied. Pleasebe aware that there are differences

Strona 93 - 5. Advanced user

74and download updates.Warning: When either Current user or Specified user is selected, an error may occur when changing the identity ofthe program to

Strona 94 - 5.3 Diagnostics

75Example: Let the number 6871 be the most recent version of virus signature database. 6870 and 6868 are stored as avirus signature database snapshots

Strona 95 - 5.6 ESET SysInspector

764.6 ToolsThe Tools menu includes modules that help simplify program administration and offers additional options foradvanced users.This menu inclu

Strona 96 - 5.6.2.1 Program Controls

774.6.1 Log filesLog files contain information about all important program events that have occurred and provide an overview ofdetected threats. Log

Strona 97

78You can show the context menu by right-clicking a specific entry. The following options are available in the contextmenu:Filter records of the same

Strona 98

79By default, the following scheduled tasks are displayed in Scheduler:Log maintenanceRegular automatic updateAutomatic update after dial-up connectio

Strona 99

82. InstallationThere are several methods for installing ESET Smart Security on your computer. Installation methods may varydepending on country and m

Strona 100 - 5.6.2.3 Compare

804.6.3 Protection statisticsTo view a graph of statistical data related to ESET Smart Security's protection modules, click Tools > Protecti

Strona 101 - 5.6.4 Service Script

81given in KB (kilobytes)/MB/GB. If you mouse over either read data or written data in the legend below the graph,the graph will only display data for

Strona 102

82The ESET Live Grid setup menu provides several options for enabling / disabling ESET Live Grid, which serves tosubmit suspicious files and anonymous

Strona 103

834.6.7 Running processesRunning processes displays the running programs or processes on your computer and keeps ESET immediately andcontinuously in

Strona 104

84By clicking a given application at the bottom, the following information will appear at the bottom of the window:File – Location of an application o

Strona 105 - 5.6.5 FAQ

85Sent/Received – Amount of data exchanged within the connection.Open in a new window – Displays information in a separate window.The Configure connec

Strona 106 - 5.7 ESET SysRescue

864.6.9 QuarantineThe main function of the quarantine is to safely store infected files. Files should be quarantined if they cannot becleaned, if it

Strona 107 - 5.7.4 Settings

87infected incorrectly (for example, by heuristic analysis of the code) and subsequently quarantined, please send thefile to the ESET Virus Lab. To su

Strona 108 - 5.7.4.1 Folders

88SMTP server requires authentication – If the SMTP server requires authentication, these fields should be filled inwith a valid username and password

Strona 109 - 5.7.4.6 Burn

894.6.12 Submission of samples for analysisThe file submission dialog enables you to send a file or a site to ESET for analysis and can be found in

Strona 110 - 5.8 Command Line

92.2 Offline installationOnce you launch the offline installation (.msi) package, the installation wizard will guide you through the setupprocess.Fi

Strona 111

90The Context menu is displayed after right-clicking an object. Use this tool to integrate ESET Smart Security controlelements into the context menu.4

Strona 112 - 6. Glossary

91would be a system or network administrator. This option is especially useful for terminal servers, provided that allsystem notifications are sent to

Strona 113 - 6.1.6 Spyware

92Block network – Personal firewall will block all outgoing / incoming network and internet traffic.Temporarily disable firewall – Switches the firewa

Strona 114 - 6.2 Types of remote attacks

935. Advanced user5.1 Profile managerProfile manager is used in two places within ESET Smart Security – in the On-demand computer scan section and i

Strona 115 - 6.2.5 TCP desynchronization

94TABmoves the cursor in a windowEsccloses the active dialog window5.3 DiagnosticsDiagnostics provides application crash dumps of ESET processes (fo

Strona 116 - 6.3 ESET Technology

955.5 Idle state detectionIdle state detection settings can be configured in Advanced setup under Tools > Idle state detection. These settingsspe

Strona 117 - 6.3.6 Java Exploit Blocker

965.6.2 User Interface and application usageFor clarity the main program window is divided into four major sections – Program Controls located on th

Strona 118 - 6.4 Email

97HelpContains information about the application and its functions.DetailThis setting influences the information displayed in the main program window

Strona 119 - 6.4.4.1 Rules

98Description window you may find additional details for each process such as dynamic libraries used by the processand their location in the system, t

Strona 120 - 6.4.4.5 Server-side control

995.6.2.2.1 Keyboard shortcutsKey shortcuts that can be used when working with the ESET SysInspector include:FileCtrl+Oopens existing logCtrl+Ssaves

Komentarze do niniejszej Instrukcji

Brak uwag