ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 Guía de usuario

Busca en linea o descarga Guía de usuario para Software de seguridad antivirus ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008. ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 User guide Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir

Indice de contenidos

Pagina 1 - ESET ENDPOINT SECURITY

ESET ENDPOINT SECURITYUser Guide Microsoft® Windows® 7 / Vista / XP / 2000 / Home Server / 2003 / 2008Click here to download the most recent version o

Pagina 2

102.2 Custom installationCustom installation mode is designed for users who have experience with fine-tuning programs and who wish tomodify advanced

Pagina 3 - Contents

1004.7.5 Program menuSome of the most important setup options and features are available in the main program menu.Frequently used – Displays the mos

Pagina 4 - Glossary6

101the operating system and system resources.4.7.6 Context menuThe context menu is displayed after right-clicking on the selected object. The menu l

Pagina 5 - 1. ESET Endpoint Security

1025. Advanced user5.1 Proxy server setupIn large LAN networks, the connection of your computer to the Internet can be mediated by a proxy server. I

Pagina 6

1035.3 Keyboard shortcutsKey shortcuts that can be used when working with the ESET Endpoint Security include:Ctrl+Gdisables GUI in the productCtrl+I

Pagina 7 - 2. Installation

104/max-sfx-size=SIZEonly scan the files in a self-extracting archive if they are smaller than SIZE megabytes(default 0 = unlimited)/mailscan email fi

Pagina 8 - 2.1 Typical installation

1055.5.1.1 Starting ESET SysInspectorTo start ESET SysInspector, simply run the SysInspector.exe executable you downloaded from ESET's website.

Pagina 9

106HelpContains information about the application and its functions.DetailThis setting influences the information displayed in the Main window to make

Pagina 10 - 2.2 Custom installation

107Network connectionsThe Description window contains a list of processes and applications communicating over the network using theprotocol selected i

Pagina 11

1088risky, risk level 8-9 items are displayed9risky, risk level 9 items are displayed-decreases risk level+increases risk levelCtrl+9filtering mode, e

Pagina 12

109NOTE: If you compare two log files, select File > Save log to save it as a ZIP file; both files are saved. If you open this filelater, the conta

Pagina 13

11To configure your proxy server settings, select I use a proxy server and click Next. Enter the IP address or URL of yourproxy server in the Address

Pagina 14

1105.5.4 Service ScriptService script is a tool that provides help to customers that use ESET SysInspector by easily removing unwanted objectsfrom t

Pagina 15 - 2.5 Computer scan

111Example:02) Loaded modules:- c:\windows\system32\svchost.exe- c:\windows\system32\kernel32.dll+ c:\windows\system32\khbekhb.dll- c:\windows\system3

Pagina 16 - 3. Beginner's guide

112Example:06) Important registry entries:* Category: Standard Autostart (3 items) HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run- HotKeysCmds = C

Pagina 17

1135.5.4.3 Executing Service scriptsMark all desired items, then save and close the script. Run the edited script directly from the ESET SysInspecto

Pagina 18 - 3.3 Update setup

114What is Anti-Stealth technology ?Anti-Stealth technology provides effective rootkit detection.If the system is attacked by malicious code that beha

Pagina 19 - 3.4 Proxy server setup

1155.6.1 Minimum requirementsESET SysRescue works in the Microsoft Windows Preinstallation Environment (Windows PE) version 2.x, which is basedon Wi

Pagina 20 - 3.5 Settings protection

1165.6.4.1 FoldersTemporary folder is a working directory for files required during ESET SysRescue compilation.ISO folder is a folder, where the res

Pagina 21 - 3.6 Trusted zone setup

1175.6.4.5 Bootable USB deviceIf you have selected a USB device as your target medium, you can select one of the available USB devices on the Bootab

Pagina 22

1186. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 Viru

Pagina 23

1196.1.4 RootkitsRootkits are malicious programs that grant Internet attackers unlimited access to a system, while concealing theirpresence. Rootkit

Pagina 24 - 4.1 Computer

12This installation step allows you to designate how automatic program updates will be handled on your system. Click Change... to access the advanced

Pagina 25

1206.1.8 Potentially unwanted applicationsPotentially unwanted applications (PUAs) are not necessarily intended to be malicious, but may affect thep

Pagina 26

1216.2.5 TCP desynchronizationTCP desynchronization is a technique used in TCP Hijacking attacks. It is triggered by a process in which the sequenti

Pagina 27

1226.3 EmailEmail, or electronic mail, is a modern form of communication with many advantages. It is flexible, fast and direct, andplayed a crucial

Pagina 28

1236.3.4 Recognizing spam scamsGenerally, there are a few indicators which can help you identify spam (unsolicited emails) in your mailbox. If a mes

Pagina 29

1246.3.4.4 Server-side controlServer-side control is a technique for identifying mass spam based on the number of received messages and thereactions

Pagina 30

13The next installation window offers the option to set a password to protect your program settings. Select the Protectconfiguration settings with a p

Pagina 31

142.3 Entering username and passwordFor optimal functionality, it is important that the program is automatically updated. This is only possible if t

Pagina 32

152.5 Computer scanAfter installing ESET Endpoint Security, you should perform a computer scan to check for malicious code. In the mainprogram windo

Pagina 33

163. Beginner's guideThis chapter provides an initial overview of ESET Endpoint Security and its basic settings.3.1 Introducing user interface

Pagina 34

173.2 What to do if the program doesn't work properlyIf the modules enabled are working properly, they are assigned a green check. If not, a re

Pagina 35

18If you are unable to solve a problem using the suggested solutions, click Help and support to access the help files orsearch the ESET Knowledgebase.

Pagina 36

19The Advanced setup window (click Setup in the main menu and then click Enter advanced setup..., or press F5 on yourkeyboard) contains additional upd

Pagina 37

ESET ENDPOINT SECURITYCopyright ©2012 by ESET, spol. s r. o.ESET Endpoint Security was developed by ESET, spol. s r. o.For more information visit www.

Pagina 38

203.5 Settings protectionESET Endpoint Security settings can be very important from the perspective of your security policy. Unauthorizedmodificatio

Pagina 39

213.6 Trusted zone setupIt is necessary to configure the Trusted zone to protect your computer in a network environment. You can allow otherusers to

Pagina 40

224. Work with ESET Endpoint SecurityThe ESET Endpoint Security setup options allow you to adjust the protection levels of your computer and network.T

Pagina 41

23The Web and Email protection setup allows you to enable or disable the following components:Web access protection – If enabled, all traffic through

Pagina 42

244.1 ComputerThe Computer module can be found in the Setup pane after clicking on the Computer title. It shows an overview of allprotection modules

Pagina 43 - 4.2 Network

25database update. This behavior is configured using Smart optimization. If this is disabled, all files are scanned eachtime they are accessed. To mod

Pagina 44

264.1.1.1.3 Advanced scan optionsMore detailed setup options can be found under Computer > Antivirus and antispyware > Real-time systemprotect

Pagina 45

274.1.1.1.5 When to modify real-time protection configurationReal-time protection is the most essential component of maintaining a secure system. Al

Pagina 46

284.1.1.3 Computer scanThe on-demand scanner is an important part of your antivirus solution. It is used to perform scans of files and folderson you

Pagina 47

294.1.1.3.1.2 Custom scanCustom scan is an optimal solution if you wish to specify scanning parameters such as scan targets and scanningmethods. The

Pagina 48

Contents...5ESET Endpoint Security1...

Pagina 49

304.1.1.3.4 Scan progressThe scan progress window shows the current status of the scan and information about the number of files found thatcontain m

Pagina 50

31To background – You can run another parallel scan. The running scan will be minimized to the background.Click Bring to foreground to bring a scan to

Pagina 51

32Lists of files to be scanned are fixed for each group.Scan priority – A level of priority to use for the scan start:Normal – at an average system lo

Pagina 52

33ExamplesIf you wish to exclude all files in a folder, type the path to the folder and use the mask “*.*”. To exclude an entire drive including all f

Pagina 53 - 4.3 Web and email

344.1.1.6.2 OptionsUse the Options section to select the methods used when scanning the system for infiltrations. The following optionsare available

Pagina 54

354.1.1.6.4 ExtensionAn extension is a part of a file name delimited by a period. An extension defines the type and content of a file. Thissection o

Pagina 55

364.1.1.6.6 OtherYou can configure the following options in the Other section:Log all objects – If this option is selected, the log file will show a

Pagina 56

37Cleaning and deletingIf there is no predefined action to take for Real-time file system protection, you will be asked to select an option in analert

Pagina 57

384.1.2 Removable mediaESET Endpoint Security provides automatic removable media (CD/DVD/USB/...) scanning. This module allows you toscan an inserte

Pagina 58

394.1.3.1 Device control rulesThe Device control rules editor window displays existing rules and allows for precise control of external devices that

Pagina 59

...87ESET Live Grid4.6.6...

Pagina 60

404.1.3.2 Adding Device control rulesA Device control rule defines the action that will be taken when a device meeting the rule criteria is connecte

Pagina 61

41Rules can be limited to certain users or user groups by adding them to the User list:Add – Opens the Object type: Users or Groups dialog window that

Pagina 62

42A dialog window is shown every time if Ask is the default action. It allows the user to choose to Deny or Allow theoperation. If the user does not c

Pagina 63

434.2 NetworkThe Personal firewall controls all network traffic to and from the system. This is accomplished by allowing or denyingindividual networ

Pagina 64

444.2.1 Filtering modesFive filtering modes are available for the ESET Endpoint Security Personal firewall. Filtering modes can be found in Advanced

Pagina 65

454.2.2 Firewall profilesProfiles can be used to control the behavior of the ESET Endpoint Security Personal firewall.. When creating or editing aPe

Pagina 66 - 4.4 Web control

464.2.3 Configuring and using rulesRules represent a set of conditions used to meaningfully test all network connections and all actions assigned to

Pagina 67

474.2.3.1 Rules setupRules setup allows you to view all rules applied on the traffic generated by individual applications within trusted zonesand th

Pagina 68 - 4.5 Updating the program

48remote IP addresses or zones for a given rule.Protocol represents the transfer protocol used for the rule. Click Select protocol... to open the Prot

Pagina 69

494.2.4 Configuring zonesIn the Zone setup window you can specify the zone name, description, network address list and zone authentication(see Zone

Pagina 70

51. ESET Endpoint SecurityESET Endpoint Security represents a new approach to truly integrated computer security. The most recent version ofthe Threat

Pagina 71

50There are two authentication types available:1) Using ESET authentication serverZone authentication searches for a specific server in the network an

Pagina 72

51Server configuration).The name of the authentication zone does not match the server zone.The configured zone name does not correspond with the authe

Pagina 73

524.2.5 Establishing connection - detectionThe Personal firewall detects each newly-created network connection. The active firewall mode determines

Pagina 74

53A thorough analysis of this data can help detect attempts to compromise system security. Many other factors indicatepotential security risks and all

Pagina 75

54the email client (POP3, MAPI, IMAP, HTTP).The Antispam protection filters unsolicited email messages.Disable – Deactivates web/email/antispam protec

Pagina 76

55Use HTTPS protocol checking for selected ports – HTTPS checking only for ports defined in Ports used by HTTPSprotocol.Use HTTPS protocol checking fo

Pagina 77

56addresses, because the list should only contain trusted and safe addresses. Similarly, it is necessary to ensure that thesymbols * and ? are used co

Pagina 78

57Template added to the subject of infected email – Edit this template if you wish to modify the subject prefix formatof an infected email. This funct

Pagina 79 - 4.6 Tools

584.3.2.2 IMAP, IMAPS protocol controlThe Internet Message Access Protocol (IMAP) is another Internet protocol for email retrieval. IMAP has someadv

Pagina 80

59Even if integration is not enabled, email communication is still protected by the email client protection module (POP3,IMAP).4.3.2.3.1 Email clien

Pagina 81

6Regularly scan your computer for virusesA regular automatic scan of your computer with the proper settings can remove infiltrations that may have bee

Pagina 82

604.3.3 Antispam protectionUnsolicited email, called spam, ranks among the greatest problems of electronic communication. Spam represents upto 80 pe

Pagina 83

61Start email client antispam protection automatically – When enabled, antispam protection will be automaticallyactivated at system startup.Enable adv

Pagina 84

624.3.4.2 Excluded applicationsTo exclude communication of specific network-aware applications from content filtering, select them in the list. HTTP

Pagina 85

634.3.4.3 Excluded IP addressesThe entries in the addresses list will be excluded from the protocol content filtering. HTTP/POP3/IMAP communicationf

Pagina 86

644.3.4.4 SSL protocol checkingESET Endpoint Security enables you to check protocols encapsulated in SSL protocol. You can use various scanningmodes

Pagina 87

654.3.4.4.1.2 Excluded certificatesThe Excluded certificates section contains certificates that are considered safe. The content of encryptedcommuni

Pagina 88

66not be checked at all.4.4 Web controlThe Web control section allows you to configure settings that prevent your company from risk of legal liabili

Pagina 89

674.4.2 Adding Web control rulesThe Web control rules window allows you to manually create or modify the existing Web control filtering rule.Enter a

Pagina 90

684.4.3 Group editorThe Group Editor window is divided into two parts. The right part of the window contain a list of categories andsubcategories. S

Pagina 91

69Last successful update – The date of the last update. Make sure it refers to a recent date, which means that the virussignature database is current.

Pagina 92

72. InstallationOnce you launch the installer, the installation wizard will guide you through the setup process.Important: Make sure that no other ant

Pagina 93

70Important: Under normal circumstances, when updates are downloaded properly the message Update is notnecessary – Virus signature database is up to d

Pagina 94

712. An error occurred while downloading update files – A possible cause of the error is incorrect Internet connectionsettings. We recommend that you

Pagina 95

72The currently used update profile is displayed in the Selected profile drop-down menu. Click Profiles... to create a newprofile.The list of availabl

Pagina 96 - 4.7 User interface

734.5.1.2.1 Update modeThe Update mode tab contains options related to the program component update. The program enables you topredefine its behavio

Pagina 97

74proxy server.4.5.1.2.3 Connecting to the LANWhen updating from a local server with an NT-based operating system, authentication for each network c

Pagina 98

75The first step in configuring the Mirror is to select the Create update mirror option. Selecting this option activatesother Mirror configuration opt

Pagina 99

76Append your Certificate chain file, or generate a self-signed certificate if you wish to run HTTP server with HTTPS (SSL)support. The following type

Pagina 100

77mode for more information about program component updates.4.5.1.2.4.2 Troubleshooting Mirror update problemsIn most cases, problems during an upda

Pagina 101

78used to update other workstations located in the network. If a newer version of EULA is available when updating, adialog window with 60 seconds time

Pagina 102 - 5. Advanced user

794.6 ToolsThe Tools menu includes modules that help simplify program administration and offer additional options for advancedusers.This menu includ

Pagina 103 - 5.4 Command Line

82.1 Typical installationTypical installation mode provides configuration options appropriate for most users. These settings provide excellentsecuri

Pagina 104 - 5.5 ESET SysInspector

804.6.1 Log filesLog files contain information about all important program events that have occurred and provide an overview ofdetected threats. Log

Pagina 105

81how the filtering rules were applied.Device control – Contains records of removable media or devices that were connected to the computer. Onlydevice

Pagina 106

824.6.2 SchedulerScheduler manages and launches scheduled tasks with predefined configuration and properties.The Scheduler can be accessed from the

Pagina 107

833. Enter a name of the task and select one of the timing options:Once – The task will be performed only once, at the predefined date and time.Repeat

Pagina 108

844.6.2.1 Creating new tasksTo create a new task in Scheduler, click the Add... button or right-click and select Add... from the context menu. Fivet

Pagina 109

854.6.3 Protection statisticsTo view a graph of statistical data related to ESET Endpoint Security's protection modules, click Tools > Prote

Pagina 110

864.6.4 Watch activityTo see the current File system activity in graph form, click Tools > Watch activity. At the bottom of the graph is atimelin

Pagina 111

87The following actions are available:Compare – Compares two existing logs.Create... – Creates a new log. Please wait until the ESET SysInspector log

Pagina 112

88you if further information is required for analysis. Please note that you will not receive a response from ESET unlessmore information is needed.In

Pagina 113

89Time of discovery – Period of time since the application was discovered by ESET Live Grid technology.NOTE: When an application is marked as Unknown

Pagina 114 - 5.6 ESET SysRescue

9By default, the I agree to participate in ESET Live Grid option is selected, which will activate this feature.The next step in the installation proce

Pagina 115

90Application/Local IP – Name of application, local IP addresses and communication ports.Remote IP – IP address and port number of the particular remo

Pagina 116

914.6.9 QuarantineThe main function of the quarantine is to safely store infected files. Files should be quarantined if they cannot becleaned, if it

Pagina 117

924.6.10 Submission of files for analysisThe file submission dialog enables you to send a file to ESET for analysis and can be found in Tools > S

Pagina 118 - 6. Glossary

93Send event notifications to LAN computers by means of Messenger service – Select this checkbox to send messagesto LAN computers via the Windows® mes

Pagina 119

944.6.13 DiagnosticsDiagnostics provides application crash dumps of ESET's processes (e.g. ekrn). If an application crashes, a dump will begene

Pagina 120 - 6.2 Types of remote attacks

954.6.15 Remote administrationESET Remote Administrator (ERA) is a powerful tool to manage security policy and to obtain an overview of the overalls

Pagina 121

964.7 User interfaceThe User interface section allows you to configure the behavior of the program's Graphical user interface (GUI).Using the G

Pagina 122 - 6.3 Email

974.7.2 Alerts and notificationsThe Alerts and notifications section under User interface allows you to configure how threat alerts and systemnotifi

Pagina 123

98The Display only notifications requiring user’s interaction option allows you to toggle alerts and notifications thatrequire no user interaction. Se

Pagina 124

994.7.4 Access setupIn order to provide maximum security for your system, it is essential for ESET Endpoint Security to be correctlyconfigured. Any

Comentarios a estos manuales

Sin comentarios