Inhoud
.......................................................5ESET NOD32 Antivirus1.
....................................................................................................6Wat is er nieuw in deze versie1.1
....................................................................................................6Welk product heb ik?1.2
....................................................................................................7Systeemvereisten1.3
....................................................................................................7Preventie1.4
.......................................................9Installatie2.
....................................................................................................9Live-installatieprogramma2.1
....................................................................................................10Offline installatie2.2
..............................................................................11Een licentiecode invoeren
2.2.1
..............................................................................12Licentiebeheer gebruiken
2.2.2
..............................................................................12Geavanceerde instellingen
2.2.3
....................................................................................................12Algemene installatieproblemen2.3
....................................................................................................13Productactivering2.4
....................................................................................................14Licentiecode invoeren2.5
....................................................................................................14Upgraden naar een nieuwere versie2.6
....................................................................................................15Eerste scan na installatie2.7
.......................................................16Handleiding voor beginners3.
....................................................................................................16Het hoofdprogrammavenster3.1
....................................................................................................18Updates3.2
.......................................................20Werken met ESET NOD32 Antivirus4.
....................................................................................................21Computerbeveiliging4.1
..............................................................................22Detectie-engine
4.1.1
..................................................................................23Real-timebeveiliging van bestandssysteem
4.1.1.1
........................................................................24Aanvullende ThreatSense-parameters
4.1.1.1.1
........................................................................25Opschoonniveaus
4.1.1.1.2
........................................................................25
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
4.1.1.1.3
........................................................................25Real-timebeveiliging controleren
4.1.1.1.4
........................................................................25
Te volgen procedure als real-timebeveiliging niet
werkt
4.1.1.1.5
..................................................................................26Computerscan
4.1.1.2
........................................................................27Aangepaste scan starten
4.1.1.2.1
........................................................................28Scanvoortgang
4.1.1.2.2
........................................................................29Scanprofielen
4.1.1.2.3
........................................................................30Logbestand computerscan
4.1.1.2.4
..................................................................................30Scannen bij inactieve status
4.1.1.3
..................................................................................30Opstartscan
4.1.1.4
........................................................................30Automatische bestandscontrole bij opstarten
4.1.1.4.1
..................................................................................31Uitsluitingen
4.1.1.5
..................................................................................32ThreatSense-parameters
4.1.1.6
........................................................................37Opschonen
4.1.1.6.1
........................................................................38
Bestandsextensies die moeten worden uitgesloten
van scans
4.1.1.6.2
..................................................................................38Er is een infiltratie gedetecteerd
4.1.1.7
..................................................................................40Documentsbescherming
4.1.1.8
..............................................................................40Verwisselbare media
4.1.2
..............................................................................41Apparaatbeheer
4.1.3
..................................................................................42Regeleditor voor apparaatbeheer
4.1.3.1
..................................................................................43Regels voor apparaatbeheer toevoegen
4.1.3.2
..............................................................................44HIPS (Host-based Intrusion Prevention System)
4.1.4
..................................................................................47Geavanceerde instellingen
4.1.4.1
..................................................................................47Interactief venster van HIPS
4.1.4.2
..................................................................................48Potentieel ransomware-gedrag gedetecteerd
4.1.4.3
..............................................................................48Gamer-modus
4.1.5
....................................................................................................49Internet-beveiliging4.2
..............................................................................50Beveiliging van webtoegang
4.2.1
..................................................................................50Basis
4.2.1.1
..................................................................................51Webprotocollen
4.2.1.2
..................................................................................51URL-adresbeheer
4.2.1.3
..............................................................................52Beveiliging van e-mailclient
4.2.2
..................................................................................52E-mailclients
4.2.2.1
..................................................................................53E-mailprotocollen
4.2.2.2
..................................................................................54Waarschuwingen en meldingen
4.2.2.3
..................................................................................55Integratie met e-mailclients
4.2.2.4
........................................................................55Beveiliging van e-mailclient configureren
4.2.2.4.1
..................................................................................55POP3-, POP3S-filter
4.2.2.5
..............................................................................56Protocolfiltering
4.2.3
..................................................................................56Web- en e-mailclients
4.2.3.1
..................................................................................57Uitgesloten toepassingen
4.2.3.2
..................................................................................58Uitgesloten IP-adressen
4.2.3.3
........................................................................58IPv4-adres toevoegen
4.2.3.3.1
........................................................................58IPv6-adres toevoegen
4.2.3.3.2
..................................................................................59SSL/TLS
4.2.3.4
........................................................................60Certificaten
4.2.3.4.1
........................................................................60Versleuteld netwerkverkeer
4.2.3.4.1.1
........................................................................60Lijst met bekende certificaten
4.2.3.4.2
........................................................................61Lijst met door SSL/TLS gefilterde toepassingen
4.2.3.4.3
..............................................................................61Antiphishing-beveiliging
4.2.4
....................................................................................................63Het programma bijwerken4.3
..............................................................................65Update-instellingen
4.3.1
..................................................................................67Instellingen voor geavanceerde update
4.3.1.1
........................................................................67Updatemodus
4.3.1.1.1
........................................................................67Verbindingsopties
4.3.1.1.2
..............................................................................68Ongedaan maken van update
4.3.2
..............................................................................69Updatetaken maken
4.3.3
....................................................................................................70Hulpmiddelen4.4
..............................................................................70Hulpmiddelen in ESET NOD32 Antivirus
4.4.1
..................................................................................71Logbestanden
4.4.1.1
........................................................................72Logbestanden
4.4.1.1.1
..................................................................................74Actieve processen
4.4.1.2
..................................................................................75Beveiligingsrapport
4.4.1.3
..................................................................................76Activiteit bekijken
4.4.1.4
..................................................................................77ESET SysInspector
4.4.1.5
..................................................................................78Planner
4.4.1.6
..................................................................................79Systeemopruiming
4.4.1.7
..................................................................................80ESET SysRescue
4.4.1.8
..................................................................................80Op de cloud gebaseerde beveiliging
4.4.1.9
........................................................................81Verdachte bestanden
4.4.1.9.1
..................................................................................82Quarantaine
4.4.1.10
..................................................................................83Proxyserver
4.4.1.11