ESET Smart Security 6 Guia do Utilizador

Consulte online ou descarregue Guia do Utilizador para Software de segurança antivirus ESET Smart Security 6. Eset Smart Security 6 Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir

Resumo do Conteúdo

Página 1 - ESET SMART SECURITY 6

ESET SMART SECURITY 6User Guide(intended for product version 6.0 and higher) Microsoft Windows 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2

Página 2 - ESET SMART SECURITY

102.2.1 Typical installationTypical installation mode provides configuration options appropriate for most users. These settings provide excellentsec

Página 3 - Contents

100introduced into the compilation so you do not need to look for it later.5.7.4.4 Internet protocolThis section allows you to configure basic netwo

Página 4 - Glossary6

1015.7.5.1 Using ESET SysRescueSuppose that computers in the network have been infected by a virus which modifies executable (.exe) files. ESETSecu

Página 5 - 1. ESET Smart Security 6

102/no-unsafedo not scan for potentially unsafe applications (default)/unwantedscan for potentially unwanted applications/no-unwanteddo not scan for p

Página 6 - 1.3 Prevention

1036. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 Viru

Página 7

1046.1.4 RootkitsRootkits are malicious programs that grant Internet attackers unlimited access to a system, while concealing theirpresence. Rootkit

Página 8 - 2. Installation

1056.1.8 Potentially unsafe applicationsThere are many legitimate programs whose function is to simplify the administration of networked computers.H

Página 9 - 2.2 Offline installation

1066.2.4 Port scanningPort scanning is used to determine which computer ports are open on a network host. A port scanner is softwaredesigned to find

Página 10

1076.3 EmailEmail, or electronic mail, is a modern form of communication with many advantages. It is flexible, fast and direct, andplayed a crucial

Página 11 - 2.3 Product activation

1086.3.4 Recognizing spam scamsGenerally, there are a few indicators which can help you identify spam (unsolicited emails) in your mailbox. If a mes

Página 12 - 2.6 Computer scan

1096.3.4.4 Server-side controlServer-side control is a technique for identifying mass spam based on the number of received messages and thereactions

Página 13 - 3. Beginner's guide

11The next installation window offers the option to set a password to protect your program settings. Select Protectconfiguration settings with a passw

Página 14

122.5 Upgrading to a more recent versionNew versions of ESET Smart Security are issued to implement improvements or fix issues that cannot be resolv

Página 15 - 3.2 Updates

133. Beginner's guideThis chapter provides an initial overview of ESET Smart Security and its basic settings.3.1 Introducing user interface des

Página 16 - 3.3 Trusted zone setup

14change the status of individual modules, click Setup and select the desired module.The red icon signals critical problems – maximum protection of yo

Página 17 - 3.5 Parental control tools

15will respond quickly to your questions and help find a resolution.3.2 UpdatesUpdating the virus signature database and updating program components

Página 18

16The Advanced setup window (click Setup in the main menu and then click Enter advanced setup..., or press F5 on yourkeyboard) contains additional upd

Página 19 - 4.1 Computer

17communication enabled and have remote desktop sharing available.3.4 Anti-TheftTo protect your computer in case of a loss or theft, choose from the

Página 20

184. Work with ESET Smart SecurityThe ESET Smart Security setup options allow you to adjust the protection levels of your computer and network.The Set

Página 21

19Web and Email protection setup allows you to enable or disable the following components:Web access protection – If enabled, all traffic through HTTP

Página 22

ESET SMART SECURITYCopyright 2013 by ESET, spol. s r. o.ESET Smart Security was developed by ESET, spol. s r. o.For more information visit www.eset.c

Página 23

20confirm.Computer scan setup... – Click to adjust the parameters of the on-demand scanner (manually executed scan).4.1.1 Antivirus and antispywareA

Página 24

21By default, Real-time file system protection launches at system startup and provides uninterrupted scanning. In specialcases (e.g., if there is a co

Página 25

22requirements. While the Advanced heuristics on executing files from removable media option is enabled, if you wishto exclude some removable media (U

Página 26

234.1.1.1.4 Checking real-time protectionTo verify that real-time protection is working and detecting viruses, use a test file from eicar.com. This

Página 27

24malware and other potential threats.This type of scan can be also initiated by clicking Custom scan, and then selecting Removable media from the Sca

Página 28

25currently logged user doesn't have enough privileges to access the appropriate files to be scanned. Note that thisbutton is not available if cu

Página 29

264.1.1.2.3 Scan profilesYour preferred scan parameters can be saved for future scanning. We recommend that you create a different profile(with vari

Página 30

274.1.1.4 Idle-state scanningIdle scanner can be configured and enabled in Advanced setup under Computer > Antivirus and antispyware > Idle-st

Página 31

28Path – Path to excluded files and folders.Threat – If there is a name of a threat next to an excluded file, it means that the file is only excluded

Página 32

294.1.1.6.2 OptionsUse the Options section to select the methods used when scanning the system for infiltrations. The following optionsare available

Página 33

Contents...5ESET Smart Security 61...

Página 34

304.1.1.6.5 LimitsThe Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned:Maximum object si

Página 35

31Each uses the standard cleaning level and will attempt to clean the file and move it to Quarantine or terminate theconnection. A notification window

Página 36 - 4.2 Network

324.1.1.8 Document protectionThe Document protection feature scans Microsoft Office documents before they are opened, as well as filesdownloaded aut

Página 37

334.1.2.1 Filtering rulesThe Filter device access window displays existing extended rules for removable media.Category – Removable media type (CD/DV

Página 38

34Note: Filtering parameters in all text fields are handled case-sensitive and no wildcards (*, ?) are supported. They haveto be written exactly as de

Página 39

35 If you select Ask as the default action, ESET Smart Security will display a dialog window every time an operation is run.You can choose to Deny or

Página 40

364.2 NetworkThe Personal firewall controls all network traffic to and from the system. This is accomplished by allowing or denyingindividual networ

Página 41

374.2.1 Filtering modesFive filtering modes are available for the ESET Smart Security Personal firewall. Filtering modes can be found in Advanced se

Página 42

38deny a specific service associated with a standard port number (HTTP – 80, POP3 – 110, etc.) Add remote IP address / Trusted zone – A remote IP addr

Página 43

39your computer. Many infiltrations try to obtain and send private data, or download other malicious applications to hostworkstations. The Personal fi

Página 44

...79Proxy server setup4.6.10...

Página 45

404.2.3.1.1 Detailed view of all rulesTo see the following information in the Zone and rule setup window, click Toggle detailed view of all rules.Na

Página 46 - 4.3 Web and email

414.2.3.2 Editing rulesModification is required each time any of the monitored parameters are changed. In this case, the rule cannot fulfill thecond

Página 47

424.2.4.1.1 Zone authentication - Client configurationIn the Zone and rule setup window, click the Zones tab and create a new zone using the name of

Página 48

43To test your settings, click the Test button. If authentication is successful, a Server authentication successful notificationwill appear. If authen

Página 49

444.2.4.1.2 Zone authentication - Server configurationThe authentication process can be executed by any computer/server connected to the network tha

Página 50

454.2.5 Establishing connection - detectionThe Personal firewall detects each newly-created network connection. The active firewall mode determines

Página 51

464.2.7 System integrationThe ESET Smart Security Personal firewall can operate at several levels:All features active – The Personal firewall is ful

Página 52

47It is possible to disable the web/email/antispam protection module temporarily by clicking Enabled.Configure ... – Opens web/email/antispam protecti

Página 53

484.3.1.1.1 Email client protection configurationThe Email client protection module supports the following email clients: Microsoft Outlook, Outlook

Página 54

494.3.1.3 POP3, POP3S filterThe POP3 protocol is the most widespread protocol used to receive email communication in an email client application.ESE

Página 55

51. ESET Smart Security 6ESET Smart Security 6 represents a new approach to truly integrated computer security. The most recent version of theThreatSe

Página 56

50methods) and the resulting index value determines whether a message is spam or not.Antispam protection in ESET Smart Security allows you to set diff

Página 57

514.3.2 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the main mediumfo

Página 58 - 4.4 Parental control

524.3.2.1.1 Active mode for web browsersESET Smart Security also contains the Active mode submenu, which defines the checking mode for web browsers.

Página 59

53Remove/Remove all – Click Remove to delete the selected address from the list. To delete all addresses, selectRemove all.Export... – Save addresses

Página 60

544.3.3.2 Excluded applicationsTo exclude communication of specific network-aware applications from content filtering, select them in the list. HTTP

Página 61

554.3.3.3 Excluded IP addressesThe entries in the list will be excluded from the protocol content filtering. HTTP/POP3/IMAP communication from/tothe

Página 62 - 4.5 Updating the program

564.3.3.4 SSL protocol checkingESET Smart Security enables you to check protocols encapsulated in SSL protocol. You can use various scanning modesfo

Página 63

574.3.3.4.1.2 Excluded certificatesThe Excluded certificates section contains certificates that are considered safe. The content of encryptedcommuni

Página 64

58NOTE: Potential phishing websites that have been whitelisted will expire after several hours by default. To allow awebsite permanently, you can use

Página 65

59If you click Parental control in the Setup pane from the main product window of ESET Smart Security, you will see thatthe main window is divided int

Página 66

6Rollback previous virus signature databaseIf you suspect that a virus signature database or product module update may be unstable or corrupt, you can

Página 67

601. Open User Accounts by clicking the Start button (located at the bottom left side of your desktop), clicking ControlPanel and then clicking User A

Página 68

614.4.1 Web page content filteringIf the check box next to a category is selected, it is allowed. Deselect the check box next to a specific category

Página 69 - 4.6 Tools

624.4.2 Blocked and allowed web pagesEnter a URL address into the blank field under the list, select Allow or Block and click Add to add it to the l

Página 70

63Last successful update – The date of the last update. If you do not see a recent date, your virus signature databasemay not be current.Virus signatu

Página 71

64Important: Under normal circumstances, when updates are downloaded properly the message Update is notnecessary – Virus signature database is up to d

Página 72

654.5.1 Update setupUpdate setup options are available from the Advanced setup tree (F5 key) by clicking Update > Update. This sectionspecifies u

Página 73

66Pre-release updates (the Pre-release update option) are updates which have gone through thorough internal testingand will be generally available soo

Página 74

67will display a notification.The Regularly check for latest product version option will enable the Regular checking for latest product versionschedul

Página 75

684.5.1.3 Update rollbackIf you suspect that a new update of the virus database and/or program modules may be unstable or corrupt, you canroll back

Página 76

694.5.2 How to create update tasksUpdates can be triggered manually by clicking Update virus signature database in the primary window displayed afte

Página 77

7applications to appear and release security updates to eliminate potential threats on a regular basis. It is important todownload these security upda

Página 78

70Submit file for analysis – Allows you to submit a suspicious file for analysis to the ESET Virus Lab. The dialog windowdisplayed after clicking this

Página 79

714.6.1.1 Log maintenanceThe Logging configuration of ESET Smart Security is accessible from the main program window. Click Setup > Enteradvanced

Página 80

724. Depending on the timing option you choose in the previous step, one of the following dialog windows will bedisplayed:Once – The task will be perf

Página 81 - 4.7 User interface

734.6.4 Watch activityTo see the current File system activity in graph form, click Tools > Watch activity. At the bottom of the graph is atimelin

Página 82

74The following actions are available:Compare – Compares two existing logs.Create... – Creates a new log. Please wait until the ESET SysInspector log

Página 83

75you if further information is required for analysis. Please note that you will not receive a response from ESET unlessmore information is needed.Sel

Página 84

76By clicking a given application at the bottom, the following information will appear at the bottom of the window:File – Location of an application o

Página 85 - 5. Advanced user

77Open in a new window – Displays information in a separate window.The Configure connection view... option in the Network connections screen enters th

Página 86 - 5.5 Idle state detection

784.6.9 QuarantineThe main function of the quarantine is to safely store infected files. Files should be quarantined if they cannot becleaned, if it

Página 87 - 5.6 ESET SysInspector

794.6.10 Proxy server setupIn large LAN networks, the connection of your computer to the Internet can be mediated by a proxy server. If this is thec

Página 88

82. InstallationThere are several methods for installing ESET Smart Security on your computer. Installation methods may varydepending on country and m

Página 89

80receive notifications via the Windows® messaging service.Interval between sending messages (sec.) – To change the length of the interval between not

Página 90

814.6.13 System updatesThe Windows update feature is an important component of protecting users from malicious software. For this reason,it is vital

Página 91

824.7.2 Alerts and notificationsThe Alerts and notifications section under User interface allows you to configure how threat alerts and systemnotifi

Página 92

834.7.5 Program menuSome of the most important setup options and features are available in the main program menu.Frequently used – Displays the most

Página 93

844.7.6 Context menuThe context menu is displayed after right-clicking an object. The menu lists all options available to perform on theobject.It is

Página 94

855. Advanced user5.1 Profile managerProfile manager is used in two places within ESET Smart Security – in the Computer scan section and in the Upda

Página 95

865.3 DiagnosticsDiagnostics provides application crash dumps of ESET's processes (e.g. ekrn). If an application crashes, a dump will begenerat

Página 96

875.6 ESET SysInspector5.6.1 Introduction to ESET SysInspectorESET SysInspector is an application that thoroughly inspects your computer and displ

Página 97 - 5.7 ESET SysRescue

885.6.2 User Interface and application usageFor clarity the main program window is divided into four major sections – Program Controls located on th

Página 98

89with. In "Basic" mode, you have access to information used to find solutions for common problems in your system. Inthe "Medium"

Página 99

92.2 Offline installationOnce you launch the offline installation (.msi) package, the installation wizard will guide you through the setup process.F

Página 100

90its hash.Important Registry EntriesContains a list of selected registry entries which are often related to various problems with your system like th

Página 101 - 5.8 Command Line

91ViewCtrl+5view by vendor, all vendorsCtrl+6view by vendor, only MicrosoftCtrl+7view by vendor, all other vendorsCtrl+3displays full detailCtrl+2disp

Página 102

92marked by a were present only in the opened log and are missing in the active one. Description of all symbols that can be displayed next to items:

Página 103 - 6. Glossary

935.6.4 Service ScriptService script is a tool that provides help to customers that use ESET SysInspector by easily removing unwanted objectsfrom th

Página 104

94Example:02) Loaded modules:- c:\windows\system32\svchost.exe- c:\windows\system32\kernel32.dll+ c:\windows\system32\khbekhb.dll- c:\windows\system32

Página 105 - 6.2 Types of remote attacks

95Example:06) Important registry entries:* Category: Standard Autostart (3 items) HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run- HotKeysCmds = C:

Página 106

965.6.4.3 Executing Service scriptsMark all desired items, then save and close the script. Run the edited script directly from the ESET SysInspector

Página 107 - 6.3 Email

97What is Anti-Stealth technology ?Anti-Stealth technology provides effective rootkit detection.If the system is attacked by malicious code that behav

Página 108

985.7.1 Minimum requirementsESET SysRescue works in the Microsoft Windows Preinstallation Environment (Windows PE) version 2.x, which is basedon Win

Página 109

995.7.4 SettingsBefore initiating ESET SysRescue creation, the install wizard displays compilation parameters. These can be modified byclicking the

Comentários a estes Manuais

Sem comentários