..................................................................................86Activering van Beveiligingsbeheerder
4.8.5.2
..................................................................................86Activering mislukt
4.8.5.3
..................................................................................87Licentie
4.8.5.4
..................................................................................87Activeringsvoortgang
4.8.5.5
..................................................................................87Activering voltooid
4.8.5.6
.......................................................88Werken met ESET Mail Security5.
....................................................................................................89Server5.1
..............................................................................90Agentprioriteit instellen
5.1.1
..................................................................................90Prioriteit aanpassen
5.1.1.1
..............................................................................90Agentprioriteit instellen
5.1.2
..............................................................................91Antivirus en antispyware
5.1.3
..............................................................................92Antispambeveiliging
5.1.4
..................................................................................93Filteren en verificatie
5.1.4.1
..................................................................................94Geavanceerde instellingen
5.1.4.2
..................................................................................97Instellingen voor grijze lijst
5.1.4.3
..............................................................................99Regels
5.1.5
..................................................................................99Lijst met regels
5.1.5.1
........................................................................100Regelwizard
5.1.5.1.1
........................................................................101Regelvoorwaarde
5.1.5.1.1.1
........................................................................102Regelactie
5.1.5.1.1.2
..............................................................................103Beveiliging van postvakdatabase
5.1.6
..............................................................................104Beveiliging van e-mailtransport
5.1.7
..................................................................................106Geavanceerde instellingen
5.1.7.1
..............................................................................107Op aanvraag database scannen
5.1.8
..................................................................................109Extra postvakitems
5.1.8.1
..................................................................................109Proxyserver
5.1.8.2
..................................................................................109Details van databasescanaccount
5.1.8.3
..............................................................................111Quarantaine voor e-mail
5.1.9
..................................................................................111Lokale quarantaine
5.1.9.1
........................................................................112Bestandopslag
5.1.9.1.1
........................................................................114Webinterface
5.1.9.1.2
..................................................................................118Quarantainepostvak en MS Exchange-quarantaine
5.1.9.2
........................................................................118Instellingen voor quarantainebeheer
5.1.9.2.1
........................................................................119Proxyserver
5.1.9.2.2
..................................................................................120Accountdetails van quarantainebeheer
5.1.9.3
..............................................................................120Cluster
5.1.10
..................................................................................120Clusterwizard - pagina 1
5.1.10.1
..................................................................................122Clusterwizard - pagina 2
5.1.10.2
..................................................................................123Clusterwizard - pagina 3
5.1.10.3
..................................................................................125Clusterwizard - pagina 4
5.1.10.4
....................................................................................................128Computer5.2
..............................................................................129Er is een infiltratie gedetecteerd
5.2.1
..............................................................................130Uitzonderingen voor processen
5.2.2
..............................................................................131Automatische uitsluitingen
5.2.3
..............................................................................131Gedeelde lokale cache
5.2.4
..............................................................................132Prestaties
5.2.5
..............................................................................132Real-timebeveiliging van bestandssysteem
5.2.6
..................................................................................133Uitsluitingen
5.2.6.1
........................................................................134Uitsluiting toevoegen of bewerken
5.2.6.1.1
........................................................................134Uitsluitingsindeling
5.2.6.1.2
..................................................................................134ThreatSense-parameters
5.2.6.2
........................................................................137
Bestandsextensies die moeten worden uitgesloten
van scans
5.2.6.2.1
........................................................................138Aanvullende ThreatSense-parameters
5.2.6.2.2
........................................................................138Opschoonniveaus
5.2.6.2.3
........................................................................138
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
5.2.6.2.4
........................................................................139Real-timebeveiliging controleren
5.2.6.2.5
........................................................................139
Te volgen procedure als real-timebeveiliging niet
werkt
5.2.6.2.6
........................................................................139Verzending
5.2.6.2.7
........................................................................140Statistieken
5.2.6.2.8
........................................................................140Verdachte bestanden
5.2.6.2.9
..............................................................................141Computerscan op aanvraag en Hyper-V-scan
5.2.7
..................................................................................141
Startprogramma voor aangepaste scan en
Hyper-V-scan
5.2.7.1
..................................................................................144Scanvoortgang
5.2.7.2
..................................................................................145Profielbeheer
5.2.7.3
..................................................................................146Scandoelen
5.2.7.4
..................................................................................146Een geplande scan tijdelijk uitschakelen
5.2.7.5
..............................................................................146Scannen bij inactieve status
5.2.8
..............................................................................147Opstartscan
5.2.9
..................................................................................147Automatische bestandscontrole bij opstarten
5.2.9.1
..............................................................................148Verwisselbare media
5.2.10
..............................................................................148Documentsbescherming
5.2.11
..............................................................................148HIPS
5.2.12
..................................................................................150HIPS-regels
5.2.12.1
........................................................................150HIPS-regelinstellingen
5.2.12.1.1
..................................................................................152Geavanceerde instellingen
5.2.12.2
........................................................................152Stuurprogramma's die altijd mogen worden geladen
5.2.12.2.1
....................................................................................................152Bijwerken5.3
..............................................................................153Updates terugdraaien
5.3.1
..............................................................................154Updatemodus
5.3.2
..............................................................................154HTTP-proxy
5.3.3
..............................................................................155Verbinding maken met LAN als
5.3.4
..............................................................................156Mirror
5.3.5
..................................................................................158Bijwerken vanaf de mirror
5.3.5.1
..................................................................................159Mirrorbestanden
5.3.5.2
..................................................................................159Updateproblemen met mirrors oplossen
5.3.5.3
..............................................................................160Updatetaken maken
5.3.6
....................................................................................................160Web en e-mail5.4
..............................................................................160Protocolfiltering
5.4.1
..................................................................................161Uitgesloten toepassingen
5.4.1.1
..................................................................................161Uitgesloten IP-adressen
5.4.1.2
..................................................................................161Web- en e-mailclients
5.4.1.3
..............................................................................162SSL/TLS
5.4.2
..................................................................................163Gecodeerde SSL-communicatie
5.4.2.1
..................................................................................163Lijst met bekende certificaten
5.4.2.2
..............................................................................164Beveiliging van e-mailclient
5.4.3
..................................................................................164E-mailprotocollen
5.4.3.1
..................................................................................165Waarschuwingen en meldingen
5.4.3.2
..................................................................................165MS Outlook-werkbalk
5.4.3.3
..................................................................................166Outlook Express- en Windows Mail-werkbalk
5.4.3.4
..................................................................................166Bevestigingsvenster
5.4.3.5