Inhoud
.......................................................5Voorwoord1.
.......................................................7Overzicht2.
....................................................................................................7Belangrijkste functies2.1
....................................................................................................8Nieuwe functies2.2
....................................................................................................9Beveiligingstypen2.3
.......................................................10Voorbereiden op installatie3.
....................................................................................................11Systeemvereisten3.1
....................................................................................................12Voor SHA-2 vereiste compatibiliteit3.2
....................................................................................................13
Installatiestappen voor ESET File
Security
3.3
..............................................................................17Een besta ande installatie wijzigen
3.3.1
....................................................................................................18
Stille installatie/installatie zonder
toezicht
3.4
..............................................................................19Installatie va naf opdra chtregel
3.4.1
....................................................................................................23Productactivering3.5
..............................................................................24ESET Busines s Account
3.5.1
..............................................................................24Activering voltooid
3.5.2
..............................................................................24Activering mislukt
3.5.3
..............................................................................24Licentie
3.5.4
....................................................................................................24
Upgrade uitvoeren naar een nieuwere
versie
3.6
..............................................................................25Upgrade uitvoeren via ESMC
3.6.1
..............................................................................28Upgrade uitvoeren via ESET-cluster
3.6.2
....................................................................................................31Installatie in een clusteromgeving3.7
....................................................................................................31Terminalserver3.8
.......................................................32Aan de slag4.
....................................................................................................32
Beheerd via ESET Security Management
Center
4.1
....................................................................................................33Controle4.2
..............................................................................34Status
4.2.1
..............................................................................35Windows -upda te bes chikbaar
4.2.2
..............................................................................36Netwerkisolatie
4.2.3
.......................................................37Als u ESET File Security5.
....................................................................................................37Scannen5.1
..............................................................................39Sca nvenster en scanlogboek
5.1.1
....................................................................................................41Logbestanden5.2
..............................................................................44Logbestanden filteren
5.2.1
....................................................................................................45Bijwerken5.3
....................................................................................................48Instellen5.4
..............................................................................49Server
5.4.1
..............................................................................49Computer
5.4.2
..............................................................................50Netwerk
5.4.3
..................................................................................50De wizard Probleemoplossing - Netwerk
5.4.3.1
..............................................................................50Web en e-mail
5.4.4
..............................................................................51Hulpmiddelen - Registratie in diagnos elogboek
5.4.5
..............................................................................52Instellingen importeren en exporteren
5.4.6
....................................................................................................53Hulpmiddelen5.5
..............................................................................54Actieve processen
5.5.1
..............................................................................55Activiteit bekijken
5.5.2
..............................................................................57Beveiligingsstatistieken
5.5.3
..............................................................................58Cluster
5.5.4
..................................................................................60Clusterwizard - Knooppunten selecteren
5.5.4.1
..................................................................................61Clusterwizard - Clusterins tellingen
5.5.4.2
..................................................................................61Clusterwizard - Clusterins tallatie-instellingen
5.5.4.3
..................................................................................62Clusterwizard - Knooppuntcontrole
5.5.4.4
..................................................................................64Clusterwizard - Knooppunten insta lleren
5.5.4.5
..............................................................................66ESET-shell
5.5.5
..................................................................................68Syntaxis
5.5.5.1
..................................................................................73Opdrachten
5.5.5.2
..................................................................................75Batchbestanden/scripts
5.5.5.3
..............................................................................76ESET SysInspector
5.5.6
..............................................................................77ESET SysRes cue Live
5.5.7
..............................................................................77Planner
5.5.8
..................................................................................79Planner - Taa k toevoegen
5.5.8.1
........................................................................81Taaktype
5.5.8.1.1
........................................................................81Taaktijden
5.5.8.1.2
........................................................................82Bij gebeurtenis
5.5.8.1.3
........................................................................82Toepassing uitvoeren
5.5.8.1.4
........................................................................82Overgeslagen taak
5.5.8.1.5
........................................................................83Overzicht van geplande ta ak
5.5.8.1.6
..............................................................................83Voorbeelden voor analyse verzenden
5.5.9
..................................................................................84Verdacht bes tand
5.5.9.1
..................................................................................84Verdachte site
5.5.9.2
..................................................................................84Vals positief bestand
5.5.9.3
..................................................................................85Vals positieve site
5.5.9.4
..................................................................................85Overige
5.5.9.5
..............................................................................86Quarantaine
5.5.10
....................................................................................................87OneDrive-scan installeren5.6
..............................................................................91ESET OneDrive-sca nner registreren
5.6.1
..............................................................................95
Registratie van ESET OneDrive-sca nner ongedaan
maken
5.6.2
.......................................................101Algemene instellingen6.
....................................................................................................101Detectie-engine6.1
..............................................................................104Beveiliging va n zelflerende systemen
6.1.1
..............................................................................106Uitsluitingen
6.1.2
..................................................................................106Prestatie-uitsluitingen
6.1.2.1
..................................................................................107Uitsluitingen van detectie
6.1.2.2
........................................................................109Wizard Uitsluiting maken
6.1.2.2.1
..............................................................................110Gea vanceerde opties
6.1.3
..............................................................................110Automa tische uitsluitingen
6.1.4
..............................................................................110Gedeelde lokale cache
6.1.5
..............................................................................111Er is een infiltratie gedetecteerd
6.1.6
..............................................................................112Real-timebeveiliging van bestands systeem
6.1.7
..................................................................................113ThreatSense-parameters
6.1.7.1
........................................................................116Aanvullende Threa tSense-parameters
6.1.7.1.1
........................................................................117
Besta ndsextensies die moeten worden uitgesloten
van scans
6.1.7.1.2
..............................................................................117Uitzonderingen voor proces sen
6.1.8
..............................................................................118Op de cloud gebaseerde beveiliging
6.1.9