Inhoudsopgave
.......................................................5ESET Cyber Security1.
....................................................................................................5Wat is nieuw in versie 61.1
....................................................................................................5Systeemvereisten1.2
.......................................................6Installatie2.
....................................................................................................6Standaardinstallatie2.1
....................................................................................................7Aangepaste installatie2.2
.......................................................8Productactivering3.
.......................................................9Verwijderen4.
.......................................................10Basisoverzicht5.
....................................................................................................10Sneltoetsen5.1
....................................................................................................11Beveiligingsstatus controleren5.2
....................................................................................................11
Te volgen procedure als het programma
niet correct werkt
5.3
.......................................................12Computerbeveiliging6.
....................................................................................................12Antivirus- en antispywarebeveiliging6.1
..............................................................................12Algemeen
6.1.1
..................................................................................12Uitsluitingen
6.1.1.1
..............................................................................13Beveiliging bij het opstarten
6.1.2
..............................................................................13Real-timebeveiliging va n bes tandss ysteem
6.1.3
..................................................................................13Geavanceerde opties
6.1.3.1
..................................................................................13
Wanneer moet de configuratie voor
Real-timebeveiliging worden gewijzigd?
6.1.3.2
..................................................................................14Real-timebeveiliging controleren
6.1.3.3
..................................................................................14
Te volgen procedure als Real-timebeveiliging niet
werkt
6.1.3.4
..............................................................................14On-demand computersca n
6.1.4
..................................................................................15Type sca n
6.1.4.1
........................................................................15Smart scan
6.1.4.1.1
........................................................................15Aangepa ste scan
6.1.4.1.2
..................................................................................15Scandoelen
6.1.4.2
..................................................................................16Scanprofielen
6.1.4.3
..............................................................................16Pa rameters voor ThreatSense-engine ins tellen
6.1.5
..................................................................................17Objecten
6.1.5.1
..................................................................................17Opties
6.1.5.2
..................................................................................17Opschonen
6.1.5.3
..................................................................................18Uitsluitingen
6.1.5.4
..................................................................................18Limiet
6.1.5.5
..................................................................................18Overige
6.1.5.6
..............................................................................18Er is een infiltratie gedetecteerd
6.1.6
....................................................................................................19
Scannen en blokkeren van
verwisselbare media
6.2
.......................................................20Antiphishing7.
.......................................................21Web- en e-mailbeveiliging8.
....................................................................................................21Webbeveiliging8.1
..............................................................................21Poorten
8.1.1
..............................................................................21URL-lijsten
8.1.2
....................................................................................................21E-mailbeveiliging8.2
..............................................................................22POP3-protocolcontrole
8.2.1
..............................................................................22IMAP-protocolcontrole
8.2.2
.......................................................23Bijwerken9.
....................................................................................................23Instellingen voor bijwerken9.1
..............................................................................23Geava nceerde opties
9.1.1
....................................................................................................23Updatetaken maken9.2
....................................................................................................24
ESET Cyber Security bijwerken naar een
nieuwe versie
9.3
....................................................................................................24Systeemupdates9.4
.......................................................25Hulpmiddelen10.
....................................................................................................25Logbestanden10.1
..............................................................................25Logbestanden onderhouden
10.1.1
..............................................................................26Logbestanden filteren
10.1.2
....................................................................................................26Planner10.2
..............................................................................27Nieuwe taken maken
10.2.1
..............................................................................27Door gebruiker gedefinieerde ta ken ma ken
10.2.2
....................................................................................................28Quarantaine10.3
..............................................................................28Bestanden in quara nta ine plaatsen
10.3.1
..............................................................................28Hers tellen va nuit quara nta ine
10.3.2
..............................................................................28Bestand verzenden vanuit qua rantaine
10.3.3
....................................................................................................28Actieve processen10.4
....................................................................................................29Live Grid10.5
..............................................................................29Live Grid installeren
10.5.1
.......................................................30Gebruikersinterface11.
....................................................................................................30Waarschuwingen en meldingen11.1
..............................................................................30Waarschuwingen weergeven
11.1.1
..............................................................................30Beveiligingsstatussen
11.1.2
....................................................................................................31Machtigingen11.2
....................................................................................................31Contextmenu11.3
.......................................................32Overige12.
....................................................................................................32Instellingen importeren en exporteren12.1
....................................................................................................32Proxyserver instellen12.2
.......................................................33Woordenlijst13.
....................................................................................................33Typen infiltraties13.1
..............................................................................33Virussen
13.1.1
..............................................................................33Wormen
13.1.2
..............................................................................33Trojaanse paarden
13.1.3
..............................................................................34Rootkits
13.1.4
..............................................................................34Adware
13.1.5
..............................................................................34Spyware
13.1.6
..............................................................................34Potentieel onveilige toepassingen
13.1.7
..............................................................................35Potentieel ongewenste toepassingen
13.1.8
....................................................................................................35Typen externe aanvallen13.2
..............................................................................35DoS-aanvallen
13.2.1