Inhoud
.......................................................5ESET Endpoint Antivirus 6,61.
....................................................................................................5Wat is er nieuw in versie 6.61.1
....................................................................................................5Systeemvereisten1.2
....................................................................................................6Preventie1.3
.......................................................8
Documentatie voor gebruikers die zijn
verbonden via ESET Remote Administrator
2.
....................................................................................................9ESET Remote Administrator Server2.1
....................................................................................................9Webconsole2.2
....................................................................................................10Proxy2.3
....................................................................................................10Agent2.4
....................................................................................................10RD-sensor2.5
.......................................................11
ESET Endpoint Antivirus zelfstandig
gebruiken
3.
....................................................................................................11Installatie met ESET AV Remover3.1
..............................................................................12ESET AV Remover
3.1.1
..............................................................................14
Verwijderen met ESET AV Remover geëindigd met een
fout
3.1.2
....................................................................................................15Installatie3.2
..............................................................................17Geavanceerde installatie
3.2.1
....................................................................................................19Productinstallatie via ERA (opdrachtregel)3.3
....................................................................................................21Productactivering3.4
....................................................................................................21Computerscan3.5
....................................................................................................21Upgraden naar een nieuwere versie3.6
....................................................................................................22Handleiding voor beginners3.7
..............................................................................22De gebruikersinterface
3.7.1
..............................................................................25Instellingen voor updates
3.7.2
....................................................................................................26Veelgestelde vragen3.8
..............................................................................27ESET Endpoint Antivirus bijwerken
3.8.1
..............................................................................27ESET Endpoint Antivirus activeren
3.8.2
..............................................................................28
Huidige referenties gebruiken om een nieuw product
te activeren
3.8.3
..............................................................................28Een virus van de pc verwijderen
3.8.4
..............................................................................28Een nieuwe taak maken in Planner
3.8.5
..............................................................................29Een scantaak plannen (elke 24 uur)
3.8.6
..............................................................................29
Hoe u ESET Endpoint Antivirus verbindt met ESET
Remote Administrator
3.8.7
..............................................................................29Een mirror configureren
3.8.8
..............................................................................30
Hoe voer ik een upgrade uit naar Windows 10 met
ESET Endpoint Antivirus
3.8.9
..............................................................................30Hoe u de Overschrijfmodus gebruikt
3.8.10
..............................................................................32Hoe u Externe bewaking en extern beheer activeert
3.8.11
....................................................................................................34Werken met ESET Endpoint Antivirus3.9
..............................................................................36Computer
3.9.1
..................................................................................36Antivirus
3.9.1.1
........................................................................37Er is een infiltratie gedetecteerd
3.9.1.1.1
..................................................................................39Gedeelde lokale cache
3.9.1.2
..................................................................................39Real-timebeveiliging van bestandssysteem
3.9.1.3
........................................................................40Aanvullende ThreatSense-parameters
3.9.1.3.1
........................................................................41Opschoonniveaus
3.9.1.3.2
........................................................................41Real-timebeveiliging controleren
3.9.1.3.3
........................................................................41
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
3.9.1.3.4
........................................................................41
Te volgen procedure als real-timebeveiliging niet
werkt
3.9.1.3.5
..................................................................................42Computerscan op aanvraag
3.9.1.4
........................................................................43Aangepaste scan starten
3.9.1.4.1
........................................................................44Scanvoortgang
3.9.1.4.2
........................................................................45Logbestand van computerscan
3.9.1.4.3
..................................................................................45Apparaatbeheer
3.9.1.5
........................................................................46Regeleditor voor apparaatbeheer
3.9.1.5.1
........................................................................47Regels voor Apparaatbeheer toevoegen
3.9.1.5.2
..................................................................................49Verwisselbare media
3.9.1.6
..................................................................................49Scannen bij inactieve status
3.9.1.7
..................................................................................50HIPS (Host-based Intrusion Prevention System)
3.9.1.8
........................................................................52Geavanceerde instellingen
3.9.1.8.1
........................................................................53Interactief venster van HIPS
3.9.1.8.2
..................................................................................53Presentatiemodus
3.9.1.9
..................................................................................54Opstartscan
3.9.1.10
........................................................................54Automatische bestandscontrole bij opstarten
3.9.1.10.1
..................................................................................55Documentbescherming
3.9.1.11
..................................................................................55Uitsluitingen
3.9.1.12
..................................................................................56Parameters voor ThreatSense-engine instellen
3.9.1.13
........................................................................61Uitsluitingen
3.9.1.13.1
..............................................................................62Web en e-mail
3.9.2
..................................................................................62Protocolfiltering
3.9.2.1
........................................................................63Web- en e-mailclients
3.9.2.1.1
........................................................................63Uitgesloten toepassingen
3.9.2.1.2
........................................................................64Uitgesloten IP-adressen
3.9.2.1.3
........................................................................64SSL/TLS
3.9.2.1.4
........................................................................65Gecodeerde SSL-communicatie
3.9.2.1.4.1
........................................................................66Lijst met bekende certificaten
3.9.2.1.4.2
........................................................................66Lijst met door SSL/TLS gefilterde toepassingen
3.9.2.1.4.3
..................................................................................67Beveiliging van e-mailclient
3.9.2.2
........................................................................67E-mailclients
3.9.2.2.1
........................................................................68E-mailprotocollen
3.9.2.2.2
........................................................................69Waarschuwingen en meldingen
3.9.2.2.3
..................................................................................70Beveiliging van webtoegang
3.9.2.3
........................................................................71Webprotocollen
3.9.2.3.1
........................................................................71URL-adresbeheer
3.9.2.3.2
..................................................................................72Antiphishing-beveiliging
3.9.2.4
..............................................................................73Het programma bijwerken
3.9.3
..................................................................................77Instellingen voor updates
3.9.3.1
........................................................................79Updateprofielen
3.9.3.1.1
........................................................................79Updates terugdraaien
3.9.3.1.2
........................................................................80Updatemodus
3.9.3.1.3
........................................................................80HTTP-proxy
3.9.3.1.4
........................................................................81Verbinding maken met LAN als
3.9.3.1.5
........................................................................82Mirror
3.9.3.1.6
........................................................................84Bijwerken vanaf de mirror
3.9.3.1.6.1
........................................................................86Updateproblemen met mirrors oplossen
3.9.3.1.6.2
..................................................................................86Updatetaken maken
3.9.3.2
..............................................................................87Hulpmiddelen
3.9.4