
21
3.6 Trusted zone setup
It is necessary to configure the Trusted zone to protect your computer in a network environment. You can allow other
users to access your computer by configuring the Trusted zone to allow sharing. Click Setup > Network > Change the
protection mode of your computer in the network.... A window will display options allowing you to choose the
desired protection mode of your computer in the network.
Trusted zone detection occurs after ESET Endpoint Security installation and whenever your computer connects to a
new network.Therefore, there is usually no need to define the Trusted zone. By default, a dialog window is displayed
upon detection of a new zone which allows you to set the protection level for that zone.
Warning: An incorrect trusted zone configuration may pose a security risk to your computer.
NOTE: By default, workstations from a Trusted zone are granted access to shared files and printers, have incoming RPC
communication enabled and have remote desktop sharing available.
Comentarios a estos manuales