Inhoud
.......................................................6ESET Smart Security1.
....................................................................................................7Wat is er nieuw in versie 91.1
....................................................................................................7Systeemvereisten1.2
....................................................................................................7Preventie1.3
.......................................................9Installatie2.
....................................................................................................9Live-installatieprogramma2.1
....................................................................................................10Offline installatie2.2
..............................................................................11Geavanceerde instellingen
2.2.1
....................................................................................................12Algemene installatieproblemen2.3
....................................................................................................12Productactivering2.4
....................................................................................................13Licentiecode invoeren2.5
....................................................................................................13Upgraden naar een nieuwere versie2.6
....................................................................................................14Eerste scan na installatie2.7
.......................................................15Handleiding voor beginners3.
....................................................................................................15Het hoofdprogrammavenster3.1
....................................................................................................17Updates3.2
....................................................................................................18Instellingen voor vertrouwde zones3.3
....................................................................................................20Antidiefstal3.4
....................................................................................................20Hulpmiddelen voor Ouderlijk toezicht3.5
.......................................................21Werken met ESET Smart Security4.
....................................................................................................23Computerbeveiliging4.1
..............................................................................24Antivirus
4.1.1
..................................................................................25Real-timebeveiliging van bestandssysteem
4.1.1.1
........................................................................26Aanvullende ThreatSense-parameters
4.1.1.1.1
........................................................................26Opschoonniveaus
4.1.1.1.2
........................................................................27
Wanneer moet de configuratie voor
real-timebeveiliging worden gewijzigd?
4.1.1.1.3
........................................................................27Real-timebeveiliging controleren
4.1.1.1.4
........................................................................27
Te volgen procedure als real-timebeveiliging niet
werkt
4.1.1.1.5
..................................................................................28Computerscan
4.1.1.2
........................................................................29Aangepaste scan starten
4.1.1.2.1
........................................................................30Scanvoortgang
4.1.1.2.2
........................................................................31Scanprofielen
4.1.1.2.3
..................................................................................31Opstartscan
4.1.1.3
........................................................................31Automatische bestandscontrole bij opstarten
4.1.1.3.1
..................................................................................32Scannen bij inactieve status
4.1.1.4
..................................................................................32Uitsluitingen
4.1.1.5
..................................................................................33ThreatSense-parameters
4.1.1.6
........................................................................38Opschonen
4.1.1.6.1
........................................................................38
Bestandsextensies die moeten worden uitgesloten
van scans
4.1.1.6.2
..................................................................................39Er is een infiltratie gedetecteerd
4.1.1.7
..................................................................................41Documentsbescherming
4.1.1.8
..............................................................................41Verwisselbare media
4.1.2
..............................................................................42Apparaatbeheer
4.1.3
..................................................................................43Regeleditor voor apparaatbeheer
4.1.3.1
..................................................................................44Regels voor apparaatbeheer toevoegen
4.1.3.2
..............................................................................45HIPS (Host-based Intrusion Prevention System)
4.1.4
..................................................................................48Geavanceerde instellingen
4.1.4.1
..................................................................................48Interactief venster van HIPS
4.1.4.2
..............................................................................49Gamer-modus
4.1.5
....................................................................................................50Internet-beveiliging4.2
..............................................................................51Beveiliging van webtoegang
4.2.1
..................................................................................52Basis
4.2.1.1
..................................................................................52Webprotocollen
4.2.1.2
..................................................................................52URL-adresbeheer
4.2.1.3
..............................................................................53Beveiliging van e-mailclient
4.2.2
..................................................................................53E-mailclients
4.2.2.1
..................................................................................54E-mailprotocollen
4.2.2.2
..................................................................................55Waarschuwingen en meldingen
4.2.2.3
..................................................................................56Integratie met e-mailclients
4.2.2.4
........................................................................56Beveiliging van e-mailclient configureren
4.2.2.4.1
..................................................................................56POP3-, POP3S-filter
4.2.2.5
..................................................................................57Antispambeveiliging
4.2.2.6
..............................................................................58Protocolfiltering
4.2.3
..................................................................................59Web- en e-mailclients
4.2.3.1
..................................................................................59Uitgesloten toepassingen
4.2.3.2
..................................................................................60Uitgesloten IP-adressen
4.2.3.3
........................................................................60IPv4-adres toevoegen
4.2.3.3.1
........................................................................60IPv6-adres toevoegen
4.2.3.3.2
..................................................................................61SSL/TLS
4.2.3.4
........................................................................62Certificaten
4.2.3.4.1
........................................................................62Lijst met bekende certificaten
4.2.3.4.2
........................................................................63Lijst met door SSL gefilterde toepassingen
4.2.3.4.3
..............................................................................63Antiphishing-beveiliging
4.2.4
....................................................................................................64Netwerkbeveiliging4.3
..............................................................................66Persoonlijke firewall
4.3.1
..................................................................................67Leermodusinstellingen
4.3.1.1
..............................................................................68Firewallprofielen
4.3.2
..................................................................................69Profielen die zijn toegewezen aan netwerkadapters
4.3.2.1
..............................................................................69Regels configureren en gebruiken
4.3.3
..................................................................................70Firewallregels
4.3.3.1
..................................................................................71Werken met regels
4.3.3.2
..............................................................................71Zones configureren
4.3.4
..............................................................................72Bekende netwerken
4.3.5
..................................................................................72Editor voor bekende netwerken
4.3.5.1
..................................................................................75Netwerkverificatie - Serverconfiguratie
4.3.5.2
..............................................................................75Logboekregistratie
4.3.6
..............................................................................76Verbinding tot stand brengen - detectie
4.3.7
..............................................................................77Problemen oplossen met ESET Persoonlijke firewall
4.3.8
..................................................................................77Wizard Probleemoplossing
4.3.8.1
..................................................................................77
Regels of uitzonderingen registreren en maken van
logbestand
4.3.8.2
........................................................................77Regel maken van logbestand
4.3.8.2.1
..................................................................................78
Uitzonderingen maken van meldingen van
Persoonlijke firewall
4.3.8.3
..................................................................................78Geavanceerde PCAP-logboekregistratie
4.3.8.4
..................................................................................78Problemen oplossen met protocolfiltering
4.3.8.5
....................................................................................................79Beveiligingshulpprogramma's4.4