Inhoud
.......................................................6ESET Internet Security1.
....................................................................................................7Wat is er nieuw in deze versie1.1
....................................................................................................7Welk product heb ik?1.2
....................................................................................................8Systeemvereisten1.3
....................................................................................................8Preventie1.4
.......................................................10Installatie2.
....................................................................................................10Live-installatieprogramma2.1
....................................................................................................11Offline installatie2.2
..............................................................................12Een licentiecode invoeren
2.2.1
..............................................................................13Licentiebeheer gebruiken
2.2.2
..............................................................................13Geavanceerde instellingen
2.2.3
....................................................................................................13Algemene installatieproblemen2.3
....................................................................................................14Productactivering2.4
....................................................................................................15Licentiecode invoeren2.5
....................................................................................................15Upgraden naar een nieuwere versie2.6
....................................................................................................16Eerste scan na installatie2.7
.......................................................17Handleiding voor beginners3.
....................................................................................................17Het hoofdprogrammavenster3.1
....................................................................................................19Updates3.2
....................................................................................................20Instellingen voor vertrouwde zones3.3
....................................................................................................21Antidiefstal3.4
....................................................................................................22Hulpmiddelen voor Ouderlijk toezicht3.5
.......................................................23Werken met ESET Internet Security4.
....................................................................................................25Computerbeveiliging4.1
..............................................................................26Detectie-engine
4.1.1
..................................................................................27Real-timebeveiliging van bestandssysteem
4.1.1.1
........................................................................28Aanvullende ThreatSense-parameters
4.1.1.1.1
........................................................................29Opschoonniveaus
4.1.1.1.2
........................................................................29
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
4.1.1.1.3
........................................................................29Real-timebeveiliging controleren
4.1.1.1.4
........................................................................30
Te volgen procedure als real-timebeveiliging niet
werkt
4.1.1.1.5
..................................................................................30Computerscan
4.1.1.2
........................................................................31Aangepaste scan starten
4.1.1.2.1
........................................................................33Scanvoortgang
4.1.1.2.2
........................................................................34Scanprofielen
4.1.1.2.3
........................................................................34Logbestand computerscan
4.1.1.2.4
..................................................................................34Scannen bij inactieve status
4.1.1.3
..................................................................................35Opstartscan
4.1.1.4
........................................................................35Automatische bestandscontrole bij opstarten
4.1.1.4.1
..................................................................................35Uitsluitingen
4.1.1.5
..................................................................................37ThreatSense-parameters
4.1.1.6
........................................................................41Opschonen
4.1.1.6.1
........................................................................42
Bestandsextensies die moeten worden uitgesloten
van scans
4.1.1.6.2
..................................................................................42Er is een infiltratie gedetecteerd
4.1.1.7
..................................................................................44Documentsbescherming
4.1.1.8
..............................................................................44Verwisselbare media
4.1.2
..............................................................................45Apparaatbeheer
4.1.3
..................................................................................46Regeleditor voor apparaatbeheer
4.1.3.1
..................................................................................47Regels voor apparaatbeheer toevoegen
4.1.3.2
..................................................................................48Editor beveiligingsregels webcam
4.1.3.3
..............................................................................49HIPS (Host-based Intrusion Prevention System)
4.1.4
..................................................................................51Geavanceerde instellingen
4.1.4.1
..................................................................................52Interactief venster van HIPS
4.1.4.2
..................................................................................53Potentieel ransomware-gedrag gedetecteerd
4.1.4.3
..............................................................................53Gamer-modus
4.1.5
....................................................................................................54Internet-beveiliging4.2
..............................................................................55Beveiliging van webtoegang
4.2.1
..................................................................................56Basis
4.2.1.1
..................................................................................56Webprotocollen
4.2.1.2
..................................................................................56URL-adresbeheer
4.2.1.3
..............................................................................57Beveiliging van e-mailclient
4.2.2
..................................................................................57E-mailclients
4.2.2.1
..................................................................................58E-mailprotocollen
4.2.2.2
..................................................................................59Waarschuwingen en meldingen
4.2.2.3
..................................................................................60Integratie met e-mailclients
4.2.2.4
........................................................................60Beveiliging van e-mailclient configureren
4.2.2.4.1
..................................................................................60POP3-, POP3S-filter
4.2.2.5
..................................................................................61Antispambeveiliging
4.2.2.6
..............................................................................62Protocolfiltering
4.2.3
..................................................................................63Web- en e-mailclients
4.2.3.1
..................................................................................63Uitgesloten toepassingen
4.2.3.2
..................................................................................64Uitgesloten IP-adressen
4.2.3.3
........................................................................64IPv4-adres toevoegen
4.2.3.3.1
........................................................................64IPv6-adres toevoegen
4.2.3.3.2
..................................................................................65SSL/TLS
4.2.3.4
........................................................................66Certificaten
4.2.3.4.1
........................................................................66Versleuteld netwerkverkeer
4.2.3.4.1.1
........................................................................66Lijst met bekende certificaten
4.2.3.4.2
........................................................................67Lijst met door SSL/TLS gefilterde toepassingen
4.2.3.4.3
..............................................................................67Antiphishing-beveiliging
4.2.4
....................................................................................................69Netwerkbeveiliging4.3
..............................................................................70Firewall
4.3.1
..................................................................................72Leermodusinstellingen
4.3.1.1
..................................................................................73Netwerkaanvalbeveiliging
4.3.1.2
..............................................................................73Firewallprofielen
4.3.2
..................................................................................73Profielen die zijn toegewezen aan netwerkadapters
4.3.2.1
..............................................................................74Regels configureren en gebruiken
4.3.3
..................................................................................75Firewallregels
4.3.3.1
..................................................................................76Werken met regels
4.3.3.2
..............................................................................77Zones configureren
4.3.4
..............................................................................77Bekende netwerken
4.3.5
..................................................................................78Editor voor bekende netwerken
4.3.5.1
..................................................................................81Netwerkverificatie - Serverconfiguratie
4.3.5.2
..............................................................................81Logboekregistratie
4.3.6
..............................................................................81Verbinding tot stand brengen - detectie
4.3.7
..............................................................................82Problemen oplossen met ESET Persoonlijke firewall
4.3.8
..................................................................................82Wizard Probleemoplossing
4.3.8.1