Inhoudsopgave
.......................................................5ESET Endpoint Security1.
....................................................................................................5Wat is er nieuw in versie 61.1
....................................................................................................5Systeemvereisten1.2
.......................................................6
Gebruikers die verbinding maken via ESET
Remote Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Webconsole2.2
....................................................................................................8Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD-sensor2.5
.......................................................9Installatie3.
....................................................................................................9Standaardinstallatie3.1
....................................................................................................10Aangepaste installatie3.2
....................................................................................................11Installatie op afstand3.3
..............................................................................11Een pakket voor insta llatie op afstand maken
3.3.1
..............................................................................12Installatie op afstand op doelcomputers
3.3.2
..............................................................................12Verwijdering op afstand
3.3.3
..............................................................................12Upgrade op afstand
3.3.4
.......................................................13Productactivering4.
.......................................................15Verwijderen5.
.......................................................16Basisoverzicht6.
....................................................................................................16Sneltoetsen6.1
....................................................................................................17Werking van het systeem controleren6.2
....................................................................................................17
Te volgen procedure als het programma
niet correct werkt
6.3
.......................................................18Computerbeveiliging7.
....................................................................................................18Antivirus- en antispywarebeveiliging7.1
..............................................................................18Algemeen
7.1.1
..................................................................................18Uitsluitingen
7.1.1.1
..............................................................................19Beveiliging bij het opstarten
7.1.2
..............................................................................19Real-timebeveiliging va n bes tandss ysteem
7.1.3
..................................................................................19Geavanceerde opties
7.1.3.1
..................................................................................20
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
7.1.3.2
..................................................................................20Real-timebeveiliging controleren
7.1.3.3
..................................................................................20
Te volgen procedure als rea l-timebeveiliging niet
werkt
7.1.3.4
..............................................................................21On-demand computersca n
7.1.4
..................................................................................21Type sca n
7.1.4.1
........................................................................21Smart scan
7.1.4.1.1
........................................................................22Aangepa ste scan
7.1.4.1.2
..................................................................................22Scandoelen
7.1.4.2
..................................................................................22Scanprofielen
7.1.4.3
..............................................................................23Pa rameters voor ThreatSense-engine instellen
7.1.5
..................................................................................24Objecten
7.1.5.1
..................................................................................24Opties
7.1.5.2
..................................................................................24Opschonen
7.1.5.3
..................................................................................25Uitsluitingen
7.1.5.4
..................................................................................25Limiet
7.1.5.5
..................................................................................25Overige
7.1.5.6
..............................................................................26Er is een infiltratie gedetecteerd
7.1.6
....................................................................................................26Web- en e-mailbeveiliging7.2
..............................................................................27Beveiliging van webtoegang
7.2.1
..................................................................................27Poorten
7.2.1.1
..................................................................................27URL-lijsten
7.2.1.2
..............................................................................27E-mailbeveiliging
7.2.2
..................................................................................28POP3-protocolcontrole
7.2.2.1
..................................................................................28IMAP-protocolcontrole
7.2.2.2
....................................................................................................28Antiphishing7.3
.......................................................29Firewall8.
....................................................................................................29Filtermodi8.1
....................................................................................................30Firewallregels8.2
..............................................................................30Nieuwe regels maken
8.2.1
....................................................................................................30Firewallzones8.3
....................................................................................................31Firewallprofielen8.4
....................................................................................................31Firewalllogboeken8.5
.......................................................32Apparaatbeheer9.
....................................................................................................32Regeleditor9.1
.......................................................34Webbeheer10.
.......................................................35Hulpmiddelen11.
....................................................................................................35Logbestanden11.1
..............................................................................35Onderhoud va n logbes tanden
11.1.1
..............................................................................36Logbestanden filteren
11.1.2
....................................................................................................37Planner11.2
..............................................................................38Nieuwe taken maken
11.2.1
..............................................................................38Een door gebruiker gedefinieerde ta ak ma ken
11.2.2
....................................................................................................39Live Grid11.3
..............................................................................39Verdachte bestanden
11.3.1
....................................................................................................40Quarantaine11.4
..............................................................................40Bestanden in quara nta ine plaatsen
11.4.1
..............................................................................40Een in quara ntaine geplaats t bestand herstellen
11.4.2
..............................................................................41Een bestand verzenden vanuit quara nta ine
11.4.3
....................................................................................................41Machtigingen11.5
....................................................................................................41Presentatiemodus11.6
....................................................................................................42Actieve processen11.7
.......................................................43Gebruikersinterface12.
....................................................................................................43Waarschuwingen en meldingen12.1
..............................................................................43Waarschuwingen weergeven
12.1.1
..............................................................................44Beveiligingsstatussen
12.1.2
....................................................................................................44Contextmenu12.2