Inhoudsopgave
.......................................................5ESET Cyber Security Pro1.
....................................................................................................5Wat is nieuw in versie 61.1
....................................................................................................5Systeemvereisten1.2
.......................................................6Installatie2.
....................................................................................................6Standaardinstallatie2.1
....................................................................................................7Aangepaste installatie2.2
.......................................................8Productactivering3.
.......................................................9Verwijderen4.
.......................................................10Basisoverzicht5.
....................................................................................................10Sneltoetsen5.1
....................................................................................................11Beveiligingsstatus controleren5.2
....................................................................................................11
Te volgen procedure als het programma
niet correct werkt
5.3
.......................................................12Computerbeveiliging6.
....................................................................................................12Antivirus- en antispywarebeveiliging6.1
..............................................................................12Algemeen
6.1.1
..................................................................................12Uitsluitingen
6.1.1.1
..............................................................................13Beveiliging bij het opstarten
6.1.2
..............................................................................13Real-timebeveiliging va n bes tandss ysteem
6.1.3
..................................................................................13Geavanceerde opties
6.1.3.1
..................................................................................13
Wanneer moet de configuratie voor
Real-timebeveiliging worden gewijzigd?
6.1.3.2
..................................................................................14Real-timebeveiliging controleren
6.1.3.3
..................................................................................14
Te volgen procedure als Real-timebeveiliging niet
werkt
6.1.3.4
..............................................................................14On-demand computersca n
6.1.4
..................................................................................15Type sca n
6.1.4.1
........................................................................15Smart scan
6.1.4.1.1
........................................................................15Aangepa ste scan
6.1.4.1.2
..................................................................................15Scandoelen
6.1.4.2
..................................................................................16Scanprofielen
6.1.4.3
..............................................................................16Pa rameters voor ThreatSense-engine ins tellen
6.1.5
..................................................................................17Objecten
6.1.5.1
..................................................................................17Opties
6.1.5.2
..................................................................................17Opschonen
6.1.5.3
..................................................................................18Uitsluitingen
6.1.5.4
..................................................................................18Limiet
6.1.5.5
..................................................................................18Overige
6.1.5.6
..............................................................................18Er is een infiltratie gedetecteerd
6.1.6
....................................................................................................19
Scannen en blokkeren van
verwisselbare media
6.2
.......................................................20Antiphishing7.
.......................................................21Firewall8.
....................................................................................................21Filtermodi8.1
....................................................................................................21Firewallregels8.2
..............................................................................22Nieuwe regels maken
8.2.1
....................................................................................................22Firewallzones8.3
....................................................................................................22Firewallprofielen8.4
....................................................................................................22Firewalllogboeken8.5
.......................................................23Web- en e-mailbeveiliging9.
....................................................................................................23Webbeveiliging9.1
..............................................................................23Poorten
9.1.1
..............................................................................23URL-lijsten
9.1.2
....................................................................................................23E-mailbeveiliging9.2
..............................................................................24POP3-protocolcontrole
9.2.1
..............................................................................24IMAP-protocolcontrole
9.2.2
.......................................................25Ouderlijk toezicht10.
.......................................................26Bijwerken11.
....................................................................................................26Instellingen voor bijwerken11.1
..............................................................................26Geava nceerde opties
11.1.1
....................................................................................................26Updatetaken maken11.2
....................................................................................................27
ESET Cyber Security Pro bijwerken naar
een nieuwe versie
11.3
....................................................................................................27Systeemupdates11.4
.......................................................28Hulpmiddelen12.
....................................................................................................28Logbestanden12.1
..............................................................................28Logbestanden onderhouden
12.1.1
..............................................................................29Logbestanden filteren
12.1.2
....................................................................................................29Planner12.2
..............................................................................30Nieuwe taken maken
12.2.1
..............................................................................30Door gebruiker gedefinieerde ta ken ma ken
12.2.2
....................................................................................................31Quarantaine12.3
..............................................................................31Bestanden in quara nta ine plaatsen
12.3.1
..............................................................................31Hers tellen va nuit quara nta ine
12.3.2
..............................................................................31Bestand verzenden vanuit qua rantaine
12.3.3
....................................................................................................31Actieve processen12.4
....................................................................................................32Live Grid12.5
..............................................................................32Live Grid installeren
12.5.1
.......................................................33Gebruikersinterface13.
....................................................................................................33Waarschuwingen en meldingen13.1
..............................................................................33Waarschuwingen weergeven
13.1.1
..............................................................................33Beveiligingsstatussen
13.1.2
....................................................................................................34Machtigingen13.2
....................................................................................................34Contextmenu13.3
.......................................................35Overige14.
....................................................................................................35Instellingen importeren en exporteren14.1
....................................................................................................35Proxyserver instellen14.2
.......................................................36Woordenlijst15.
....................................................................................................36Typen infiltraties15.1