Inhoud
.......................................................6ESET Smart Security Premium1.
....................................................................................................7Wat is er nieuw in deze versie1.1
....................................................................................................8Welk product heb ik?1.2
....................................................................................................9Systeemvereisten1.3
....................................................................................................9Preventie1.4
.......................................................11Installatie2.
....................................................................................................11Live-installatieprogramma2.1
....................................................................................................12Offline installatie2.2
..............................................................................13Een licentiecode invoeren
2.2.1
..............................................................................14Licentiebeheer gebruiken
2.2.2
..............................................................................14Geavanceerde instellingen
2.2.3
....................................................................................................14Algemene installatieproblemen2.3
....................................................................................................15Productactivering2.4
....................................................................................................16Licentiecode invoeren2.5
....................................................................................................16Upgraden naar een nieuwere versie2.6
....................................................................................................17Eerste scan na installatie2.7
.......................................................18Handleiding voor beginners3.
....................................................................................................18Het hoofdprogrammavenster3.1
....................................................................................................21Updates3.2
....................................................................................................22Instellingen voor vertrouwde zones3.3
....................................................................................................23Antidiefstal3.4
....................................................................................................24Hulpmiddelen voor Ouderlijk toezicht3.5
.......................................................25Werken met ESET Smart Security Premium4.
....................................................................................................27Computerbeveiliging4.1
..............................................................................28Detectie-engine
4.1.1
..................................................................................29Real-timebeveiliging van bestandssysteem
4.1.1.1
........................................................................30Aanvullende ThreatSense-parameters
4.1.1.1.1
........................................................................31Opschoonniveaus
4.1.1.1.2
........................................................................31
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
4.1.1.1.3
........................................................................31Real-timebeveiliging controleren
4.1.1.1.4
........................................................................32
Te volgen procedure als real-timebeveiliging niet
werkt
4.1.1.1.5
..................................................................................32Computerscan
4.1.1.2
........................................................................33Aangepaste scan starten
4.1.1.2.1
........................................................................35Scanvoortgang
4.1.1.2.2
........................................................................36Scanprofielen
4.1.1.2.3
........................................................................36Logbestand computerscan
4.1.1.2.4
..................................................................................36Scannen bij inactieve status
4.1.1.3
..................................................................................37Opstartscan
4.1.1.4
........................................................................37Automatische bestandscontrole bij opstarten
4.1.1.4.1
..................................................................................37Uitsluitingen
4.1.1.5
..................................................................................39ThreatSense-parameters
4.1.1.6
........................................................................43Opschonen
4.1.1.6.1
........................................................................44
Bestandsextensies die moeten worden uitgesloten
van scans
4.1.1.6.2
..................................................................................44Er is een infiltratie gedetecteerd
4.1.1.7
..................................................................................46Documentsbescherming
4.1.1.8
..............................................................................46Verwisselbare media
4.1.2
..............................................................................47Apparaatbeheer
4.1.3
..................................................................................48Regeleditor voor apparaatbeheer
4.1.3.1
..................................................................................49Regels voor apparaatbeheer toevoegen
4.1.3.2
..................................................................................50Editor beveiligingsregels webcam
4.1.3.3
..............................................................................51HIPS (Host-based Intrusion Prevention System)
4.1.4
..................................................................................53Geavanceerde instellingen
4.1.4.1
..................................................................................54Interactief venster van HIPS
4.1.4.2
..................................................................................55Potentieel ransomware-gedrag gedetecteerd
4.1.4.3
..............................................................................55Gamer-modus
4.1.5
....................................................................................................56Internet-beveiliging4.2
..............................................................................57Beveiliging van webtoegang
4.2.1
..................................................................................58Basis
4.2.1.1
..................................................................................58Webprotocollen
4.2.1.2
..................................................................................58URL-adresbeheer
4.2.1.3
..............................................................................59Beveiliging van e-mailclient
4.2.2
..................................................................................59E-mailclients
4.2.2.1
..................................................................................60E-mailprotocollen
4.2.2.2
..................................................................................61Waarschuwingen en meldingen
4.2.2.3
..................................................................................62Integratie met e-mailclients
4.2.2.4
........................................................................62Beveiliging van e-mailclient configureren
4.2.2.4.1
..................................................................................62POP3-, POP3S-filter
4.2.2.5
..................................................................................63Antispambeveiliging
4.2.2.6
..............................................................................65Protocolfiltering
4.2.3
..................................................................................65Web- en e-mailclients
4.2.3.1
..................................................................................66Uitgesloten toepassingen
4.2.3.2
..................................................................................67Uitgesloten IP-adressen
4.2.3.3
........................................................................67IPv4-adres toevoegen
4.2.3.3.1
........................................................................67IPv6-adres toevoegen
4.2.3.3.2
..................................................................................68SSL/TLS
4.2.3.4
........................................................................69Certificaten
4.2.3.4.1
........................................................................69Versleuteld netwerkverkeer
4.2.3.4.1.1
........................................................................69Lijst met bekende certificaten
4.2.3.4.2
........................................................................70Lijst met door SSL/TLS gefilterde toepassingen
4.2.3.4.3
..............................................................................70Antiphishing-beveiliging
4.2.4
....................................................................................................72Netwerkbeveiliging4.3
..............................................................................73Firewall
4.3.1
..................................................................................75Leermodusinstellingen
4.3.1.1
..................................................................................76Netwerkaanvalbeveiliging
4.3.1.2
..............................................................................76Firewallprofielen
4.3.2
..................................................................................76Profielen die zijn toegewezen aan netwerkadapters
4.3.2.1
..............................................................................77Regels configureren en gebruiken
4.3.3
..................................................................................78Firewallregels
4.3.3.1
..................................................................................79Werken met regels
4.3.3.2
..............................................................................80Zones configureren
4.3.4
..............................................................................80Bekende netwerken
4.3.5
..................................................................................81Editor voor bekende netwerken
4.3.5.1
..................................................................................84Netwerkverificatie - Serverconfiguratie
4.3.5.2
..............................................................................84Logboekregistratie
4.3.6
..............................................................................84Verbinding tot stand brengen - detectie
4.3.7
..............................................................................85Problemen oplossen met ESET Persoonlijke firewall
4.3.8
..................................................................................85Wizard Probleemoplossing
4.3.8.1