ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 Guía de usuario Pagina 55

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 124
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 54
55
Use HTTPS protocol checking for selected ports HTTPS checking only for ports defined in Ports used by HTTPS
protocol.
Use HTTPS protocol checking for selected ports The program will only check those applications that are specified in
the browsers section and that use ports defined in Ports used by HTTPS protocol. Port 443 is set by default.
Encrypted communication will be not scanned. To enable the scanning of encrypted communication and view the
scanner setup, navigate to SSL protocol checking in Advanced setup section, click Web and email > Protocol filtering
> SSL and enable the Always scan SSL protocol option.
4.3.1.1.1 Active mode for web browsers
ESET Endpoint Security also contains the Active mode submenu, which defines the checking mode for web browsers.
Active mode is useful because it examines transferred data from applications accessing the Internet as a whole,
regardless of whether they are marked as web browsers or not (for more information, see Web and email clients). If
Active mode is disabled, communication from applications is monitored gradually in batches. This decreases the
effectiveness of the data verification process, but also provides higher compatibility for listed applications. If no
problems occur while using it, we recommend that you enable active checking mode by selecting the checkbox next to
the desired application.This is how Active mode works: When a controlled application downloads data, it is first saved
to a temporary file created by ESET Endpoint Security. Data is not available for the given application at that time. Once
downloading is complete, it is checked for malicious code. If no infiltration is found, data is sent to the original
application. This process provides complete control of the communications made by a controlled application. If passive
mode is activated, data is trickle-fed to the original application to avoid timeouts.
4.3.1.2 URL address management
The URL address management section enables you to specify HTTP addresses to block, allow or exclude from checking.
The Add, Edit, Remove and Export buttons are used to manage the lists of addresses. Websites in the list of blocked
addresses will not be accessible. Websites in the list of excluded addresses are accessed without being scanned for
malicious code. If you select the Allow access only to URL addresses in the list of allowed addresses option, only
addresses present in the list of allowed addresses will be accessible, while all other HTTP addresses will be blocked.
If you add a URL address to the List of addresses excluded from filtering, the address will be excluded from scanning.
You can also allow or block certain addresses by adding them to the List of allowed addresses or List of blocked
addresses. After you click the Lists... button, the HTTP address/mask lists window will pop-up where you can Add or
Remove lists of addresses. In order to add an HTTPS URL addresses to the list, the Always scan SSL protocol option
has to be active.
In all lists, the special symbols * (asterisk) and ? (question mark) can be used. The asterisk substitutes any character
string, and the question mark substitutes any symbol. Particular care should be taken when specifying excluded
Vista de pagina 54
1 2 ... 50 51 52 53 54 55 56 57 58 59 60 ... 123 124

Comentarios a estos manuales

Sin comentarios