Inhoudsopgave
.......................................................5ESET Endpoint Antivirus1.
....................................................................................................5Wat is er nieuw in versie 61.1
....................................................................................................5Systeemvereisten1.2
.......................................................6
Gebruikers die verbinding maken via ESET
Remote Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Webconsole2.2
....................................................................................................8Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD-sensor2.5
.......................................................9Installatie3.
....................................................................................................9Standaardinstallatie3.1
....................................................................................................10Aangepaste installatie3.2
....................................................................................................11Installatie op afstand3.3
..............................................................................11Een pakket voor insta llatie op afstand maken
3.3.1
..............................................................................12Installatie op afstand op doelcomputers
3.3.2
..............................................................................12Verwijdering op afstand
3.3.3
..............................................................................12Upgrade op afstand
3.3.4
.......................................................13Productactivering4.
.......................................................15Verwijderen5.
.......................................................16Basisoverzicht6.
....................................................................................................16Sneltoetsen6.1
....................................................................................................17Werking van het systeem controleren6.2
....................................................................................................17
Te volgen procedure als het programma
niet correct werkt
6.3
.......................................................18Computerbeveiliging7.
....................................................................................................18Antivirus- en antispywarebeveiliging7.1
..............................................................................18Algemeen
7.1.1
..................................................................................18Uitsluitingen
7.1.1.1
..............................................................................19Beveiliging bij het opstarten
7.1.2
..............................................................................19Real-timebeveiliging va n bes tandss ysteem
7.1.3
..................................................................................19Geavanceerde opties
7.1.3.1
..................................................................................20
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
7.1.3.2
..................................................................................20Real-timebeveiliging controleren
7.1.3.3
..................................................................................20
Te volgen procedure als rea l-timebeveiliging niet
werkt
7.1.3.4
..............................................................................21On-demand computersca n
7.1.4
..................................................................................21Type sca n
7.1.4.1
........................................................................21Smart scan
7.1.4.1.1
........................................................................22Aangepa ste scan
7.1.4.1.2
..................................................................................22Scandoelen
7.1.4.2
..................................................................................22Scanprofielen
7.1.4.3
..............................................................................23Pa rameters voor ThreatSense-engine instellen
7.1.5
..................................................................................24Objecten
7.1.5.1
..................................................................................24Opties
7.1.5.2
..................................................................................24Opschonen
7.1.5.3
..................................................................................25Uitsluitingen
7.1.5.4
..................................................................................25Limiet
7.1.5.5
..................................................................................25Overige
7.1.5.6
..............................................................................26Er is een infiltratie gedetecteerd
7.1.6
....................................................................................................26Web- en e-mailbeveiliging7.2
..............................................................................27Beveiliging van webtoegang
7.2.1
..................................................................................27Poorten
7.2.1.1
..................................................................................27URL-lijsten
7.2.1.2
..............................................................................27E-mailbeveiliging
7.2.2
..................................................................................28POP3-protocolcontrole
7.2.2.1
..................................................................................28IMAP-protocolcontrole
7.2.2.2
....................................................................................................28Antiphishing7.3
.......................................................29Apparaatbeheer8.
....................................................................................................29Regeleditor8.1
.......................................................31Hulpmiddelen9.
....................................................................................................31Logbestanden9.1
..............................................................................31Onderhoud va n logbes tanden
9.1.1
..............................................................................32Logbestanden filteren
9.1.2
....................................................................................................33Planner9.2
..............................................................................34Nieuwe taken maken
9.2.1
..............................................................................34Een door gebruiker gedefinieerde ta ak ma ken
9.2.2
....................................................................................................35Live Grid9.3
..............................................................................35Verdachte bestanden
9.3.1
....................................................................................................36Quarantaine9.4
..............................................................................36Bestanden in quara nta ine plaatsen
9.4.1
..............................................................................36Een in quara ntaine geplaats t bestand herstellen
9.4.2
..............................................................................37Een bestand verzenden vanuit quara nta ine
9.4.3
....................................................................................................37Machtigingen9.5
....................................................................................................37Presentatiemodus9.6
....................................................................................................38Actieve processen9.7
.......................................................39Gebruikersinterface10.
....................................................................................................39Waarschuwingen en meldingen10.1
..............................................................................39Waarschuwingen weergeven
10.1.1
..............................................................................40Beveiligingsstatussen
10.1.2
....................................................................................................40Contextmenu10.2
.......................................................41Bijwerken11.
....................................................................................................41Instellingen voor update11.1
..............................................................................42Geava nceerde opties
11.1.1
....................................................................................................43Updatetaken maken11.2
....................................................................................................43Upgraden naar een nieuwe build11.3
....................................................................................................43Systeemupdates11.4
.......................................................45Overige12.
....................................................................................................45Instellingen importeren en exporteren12.1
....................................................................................................45Proxyserver instellen12.2