..................................................................................80
Uitzonderingen maken van meldingen van
Persoonlijke firewall
4.3.8.3
..................................................................................80Geavanceerde PCAP-logboekregistratie
4.3.8.4
..................................................................................80Problemen oplossen met protocolfiltering
4.3.8.5
....................................................................................................81Beveiligingshulpprogramma's4.4
..............................................................................81Ouderlijk toezicht
4.4.1
..................................................................................83Categorieën
4.4.1.1
..................................................................................84Website-uitzonderingen
4.4.1.2
....................................................................................................86Het programma bijwerken4.5
..............................................................................88Update-instellingen
4.5.1
..................................................................................89Updateprofielen
4.5.1.1
..................................................................................90Ins tellingen voor gea vanceerde upda te
4.5.1.2
........................................................................90Updatemodus
4.5.1.2.1
........................................................................90HTTP-proxy
4.5.1.2.2
..............................................................................91Ongedaan maken van upda te
4.5.2
..............................................................................92Updatetaken maken
4.5.3
....................................................................................................93Hulpmiddelen4.6
..............................................................................94Beveiliging va n thuisnetwerk
4.6.1
..............................................................................94Webcam beveiliging
4.6.2
..............................................................................95Hulpmiddelen in ESET Smart Security
4.6.3
..................................................................................96Logbestanden
4.6.3.1
........................................................................98Logbestanden
4.6.3.1.1
..................................................................................99Actieve processen
4.6.3.2
..................................................................................100Beveiligingsstatistieken
4.6.3.3
..................................................................................101Activiteit bekijken
4.6.3.4
..................................................................................102Netwerkverbindingen
4.6.3.5
..................................................................................103ESET SysIns pector
4.6.3.6
..................................................................................104Planner
4.6.3.7
..................................................................................105ESET SysRescue
4.6.3.8
..................................................................................105ESET LiveGrid®
4.6.3.9
........................................................................106Verda chte besta nden
4.6.3.9.1
..................................................................................107Quarantaine
4.6.3.10
..................................................................................108Proxyserver
4.6.3.11
..................................................................................109E-mailmeldingen
4.6.3.12
........................................................................111Berichtindeling
4.6.3.12.1
..................................................................................111Voorbeeld voor ana lyse selecteren
4.6.3.13
..................................................................................112Microsoft Windows®-update
4.6.3.14
....................................................................................................112Gebruikersinterface4.7
..............................................................................112Elementen van gebruikersinterface
4.7.1
..............................................................................113Waars chuwingen en meldingen
4.7.2
..................................................................................115Geavanceerde instellingen
4.7.2.1
..............................................................................115Toegangsinstellingen
4.7.3
..............................................................................116Programmamenu
4.7.4
.......................................................118Geavanceerde gebruiker5.
....................................................................................................118Profielbeheer5.1
....................................................................................................118Sneltoetsen5.2
....................................................................................................119Diagnostiek5.3
....................................................................................................119Instellingen importeren en exporteren5.4
....................................................................................................120ESET SysInspector5.5
..............................................................................120ESET SysInspector
5.5.1
..................................................................................121ESET SysInspector sta rten
5.5.1.1
..............................................................................121Gebruikersinterface en gebruik van de toepassing
5.5.2
..................................................................................121Bes turingselementen in progra mma
5.5.2.1
..................................................................................123Navigeren in ESET SysInspector
5.5.2.2
........................................................................124Sneltoetsen
5.5.2.2.1
..................................................................................125Vergelijken
5.5.2.3
..............................................................................126Opdrachtregelparameters
5.5.3
..............................................................................127Servicescript
5.5.4
..................................................................................127Servicescript genereren
5.5.4.1
..................................................................................127Structuur van het services cript
5.5.4.2
..................................................................................130Servicescripts uitvoeren
5.5.4.3
..............................................................................131Veelgestelde vragen
5.5.5
..............................................................................132
ESET SysInspector als onderdeel van ESET Smart
Security
5.5.6
....................................................................................................133Opdrachtregel5.6
.......................................................135Woordenlijst6.
....................................................................................................135Typen infiltraties6.1
..............................................................................135Virussen
6.1.1
..............................................................................135Wormen
6.1.2
..............................................................................136Troja ans e paarden
6.1.3
..............................................................................136Rootkits
6.1.4
..............................................................................136Adware
6.1.5
..............................................................................137Spyware
6.1.6
..............................................................................137Compressiesoftware
6.1.7
..............................................................................137Potentieel onveilige toepa ssingen
6.1.8
..............................................................................138Potentieel ongewenste toepa ssingen
6.1.9
..............................................................................140Botnet
6.1.10
....................................................................................................140Typen externe aanvallen6.2
..............................................................................141DoS-aanvallen
6.2.1
..............................................................................141DNS Pois oning
6.2.2
..............................................................................141Wormaanvallen
6.2.3
..............................................................................141Port Scanning
6.2.4
..............................................................................141TCP-desynchronisatie
6.2.5
..............................................................................142SMB Relay
6.2.6
..............................................................................142ICMP-aanvallen
6.2.7
....................................................................................................142ESET Technology6.3
..............................................................................142Exploit Blocker
6.3.1
..............................................................................143Geavanceerde geheugens canner
6.3.2
..............................................................................143Bescherming tegen netwerkaanvallen
6.3.3
..............................................................................143ESET LiveGrid®
6.3.4
..............................................................................143Botnet-beveiliging
6.3.5
..............................................................................144Java Exploit Blocker
6.3.6
..............................................................................144Beveiliging va n bankieren en betalingen
6.3.7
..............................................................................145Beveiliging tegen aanvallen met scripts
6.3.8
..............................................................................145Ransomware-beveiliging
6.3.9
....................................................................................................145E-mail6.4
..............................................................................146Advertenties
6.4.1
..............................................................................146Nepmeldingen
6.4.2
..............................................................................146Phishing
6.4.3
..............................................................................147Spam herkennen
6.4.4
..................................................................................147Regels
6.4.4.1
..................................................................................147Witte lijst
6.4.4.2