1. Eset Nod32 Antivirus 4
4
1.1 What's New
4
1.2 System Requirements
4
2. Installation
5
2.1 Typical Installation
5
2.2 Custom Installation
6
2.3 Using Original Settings
7
2.4 Entering Username And Password
8
2.5 On-Demand Computer Scan
8
3. Beginner's Guide
9
3.1 Introducing User Interface Design – Modes
9
3.1.1 Checking Operation Of The System
9
3.1.2 What To Do If The Program Doesn't Work Properly
9
3.2 Update Setup
10
3.3 Proxy Server Setup
10
3.4 Settings Protection
11
4. Work With Eset Nod32 Antivirus
12
4.1 Antivirus And Antispyware Protection
12
4.1.1 Real-Time File System Protection
12
4.1.1.1 Control Setup
12
4.1.1.1.1 Media To Scan
12
4.1.1.1.2 Scan On (Event-Triggered Scanning)
12
4.1.1.1.3 Advanced Scan Options
12
4.1.1.2 Cleaning Levels
12
4.1.1.3 When To Modify Real-Time Protection Configuration
13
4.1.1.4 Checking Real-Time Protection
13
4.1.1.5 What To Do If Real-Time Protection Does Not Work
13
4.1.2 Host Intrusion Prevention System (Hips)
13
4.1.3 Email Client Protection
13
4.1.3.1 Pop3 Checking
13
4.1.3.1.1 Compatibility
14
4.1.3.2 Integration With Email Clients
14
4.1.3.2.1 Appending Tag Messages To Email Body
14
4.1.3.3 Removing Infiltrations
15
4.1.4 Web Access Protection
15
4.1.4.1 Http, Https
15
4.1.4.1.1 Address Management
15
4.1.4.1.2 Web Browsers
15
4.1.5 On-Demand Computer Scan
16
4.1.5.1 Type Of Scan
16
4.1.5.1.1 Smart Scan
16
4.1.5.1.2 Custom Scan
16
4.1.5.2 Scan Targets
16
4.1.5.3 Scan Profiles
17
4.1.6 Protocol Filtering
17
4.1.6.1 Ssl
17
4.1.6.1.1 Trusted Certificates
17
4.1.6.1.2 Excluded Certificates
17
4.1.7 Threatsense Engine Parameters Setup
18
4.1.7.1 Objects Setup
18
4.1.7.2 Options
18
4.1.7.3 Cleaning
19
4.1.7.4 Extensions
19
4.1.7.5 Limits
19
4.1.7.6 Other
19
4.1.8 An Infiltration Is Detected
20
4.2 Updating The Program
20
4.2.1 Update Setup
20
4.2.1.1 Update Profiles
21
4.2.1.2 Advanced Update Setup
21
4.2.1.2.1 Update Mode
21
4.2.1.2.2 Proxy Server
21
4.2.1.2.3 Connecting To The Lan
22
4.2.1.2.4 Creating Update Copies – Mirror
22
4.2.1.2.4.1 Updating From The Mirror
23
4.2.1.2.4.2 Troubleshooting Mirror Update Problems
24
4.2.2 How To Create Update Tasks
24
4.3 Scheduler
24
4.3.1 Purpose Of Scheduling Tasks
24
4.3.2 Creating New Tasks
24
4.4 Quarantine
25
4.4.1 Quarantining Files
25
4.4.2 Restoring From Quarantine
25
4.4.3 Submitting File From Quarantine
25
4.5 Log Files
26
4.5.1 Log Maintenance
26
4.6 User Interface
26
4.6.1 Alerts And Notifications
27
4.7 Threatsense.net
28
4.7.1 Suspicious Files
28
4.7.2 Statistics
28
4.7.3 Submission
29
4.8 Remote Administration
29
4.9 Licenses
29
5. Advanced User
30
5.1 Proxy Server Setup
30
5.2 Export / Import Settings
31
5.2.1 Import Settings
31
5.2.2 Export Settings
31
5.3 Command Line
31
5.4 Eset Sysinspector
32
5.4.1 User Interface And Application Usage
32
5.4.1.1 Program Controls
32
5.4.1.2 Navigating In Eset Sysinspector
32
5.4.1.3 Compare
33
5.4.1.4 Sysinspector As Part Of Eset Nod32 Antivirus 4
34
5.5.1 Minimum Requirements
34
5.5.2 How To Create A Rescue Cd
34
5.5.2.1 Folders
34
5.5.2.2 Eset Antivirus
34
5.5.2.3 Advanced
34
5.5.2.4 Bootable Usb Device
35
5.5.2.5 Burn
35
5.5.3 Working With Eset Sysrescue
35
5.5.3.1 Using Eset Sysrescue
35
6. Glossary
36
6.1 Types Of Infiltrations
36
6.1.1 Viruses
36
6.1.2 Worms
36
6.1.3 Trojan Horses
36
6.1.4 Rootkits
36
6.1.5 Adware
36
6.1.6 Spyware
37
6.1.7 Potentially Unsafe Applications
37
6.1.8 Potentially Unwanted Applications
37
Diskussion
Hinterlassen Sie einen Kommentar oder stellen Sie eine Frage
An der Diskussion teilnehmen
Stellen Sie eine Frage zum Handbuch oder fügen Sie eine hilfreiche Antwort für andere Nutzer hinzu.