ESET Smart Security 6 Guía de usuario

Busca en linea o descarga Guía de usuario para Software de seguridad antivirus ESET Smart Security 6. Eset Smart Security 6 Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir

Indice de contenidos

Pagina 1 - ESET SMART SECURITY 6

ESET SMART SECURITY 6User Guide(intended for product version 6.0 and higher) Microsoft Windows 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2

Pagina 2 - ESET SMART SECURITY

102.2.1 Typical installationTypical installation mode provides configuration options appropriate for most users. These settings provide excellentsec

Pagina 3 - Contents

100introduced into the compilation so you do not need to look for it later.5.7.4.4 Internet protocolThis section allows you to configure basic netwo

Pagina 4 - Glossary6

1015.7.5.1 Using ESET SysRescueSuppose that computers in the network have been infected by a virus which modifies executable (.exe) files. ESETSecu

Pagina 5 - 1. ESET Smart Security 6

102/no-unsafedo not scan for potentially unsafe applications (default)/unwantedscan for potentially unwanted applications/no-unwanteddo not scan for p

Pagina 6 - 1.3 Prevention

1036. Glossary6.1 Types of infiltrationAn Infiltration is a piece of malicious software trying to enter and/or damage a user’s computer.6.1.1 Viru

Pagina 7

1046.1.4 RootkitsRootkits are malicious programs that grant Internet attackers unlimited access to a system, while concealing theirpresence. Rootkit

Pagina 8 - 2. Installation

1056.1.8 Potentially unsafe applicationsThere are many legitimate programs whose function is to simplify the administration of networked computers.H

Pagina 9 - 2.2 Offline installation

1066.2.4 Port scanningPort scanning is used to determine which computer ports are open on a network host. A port scanner is softwaredesigned to find

Pagina 10

1076.3 EmailEmail, or electronic mail, is a modern form of communication with many advantages. It is flexible, fast and direct, andplayed a crucial

Pagina 11 - 2.3 Product activation

1086.3.4 Recognizing spam scamsGenerally, there are a few indicators which can help you identify spam (unsolicited emails) in your mailbox. If a mes

Pagina 12 - 2.6 Computer scan

1096.3.4.4 Server-side controlServer-side control is a technique for identifying mass spam based on the number of received messages and thereactions

Pagina 13 - 3. Beginner's guide

11The next installation window offers the option to set a password to protect your program settings. Select Protectconfiguration settings with a passw

Pagina 14

122.5 Upgrading to a more recent versionNew versions of ESET Smart Security are issued to implement improvements or fix issues that cannot be resolv

Pagina 15 - 3.2 Updates

133. Beginner's guideThis chapter provides an initial overview of ESET Smart Security and its basic settings.3.1 Introducing user interface des

Pagina 16 - 3.3 Trusted zone setup

14change the status of individual modules, click Setup and select the desired module.The red icon signals critical problems – maximum protection of yo

Pagina 17 - 3.5 Parental control tools

15will respond quickly to your questions and help find a resolution.3.2 UpdatesUpdating the virus signature database and updating program components

Pagina 18

16The Advanced setup window (click Setup in the main menu and then click Enter advanced setup..., or press F5 on yourkeyboard) contains additional upd

Pagina 19 - 4.1 Computer

17communication enabled and have remote desktop sharing available.3.4 Anti-TheftTo protect your computer in case of a loss or theft, choose from the

Pagina 20

184. Work with ESET Smart SecurityThe ESET Smart Security setup options allow you to adjust the protection levels of your computer and network.The Set

Pagina 21

19Web and Email protection setup allows you to enable or disable the following components:Web access protection – If enabled, all traffic through HTTP

Pagina 22

ESET SMART SECURITYCopyright 2013 by ESET, spol. s r. o.ESET Smart Security was developed by ESET, spol. s r. o.For more information visit www.eset.c

Pagina 23

20confirm.Computer scan setup... – Click to adjust the parameters of the on-demand scanner (manually executed scan).4.1.1 Antivirus and antispywareA

Pagina 24

21By default, Real-time file system protection launches at system startup and provides uninterrupted scanning. In specialcases (e.g., if there is a co

Pagina 25

22requirements. While the Advanced heuristics on executing files from removable media option is enabled, if you wishto exclude some removable media (U

Pagina 26

234.1.1.1.4 Checking real-time protectionTo verify that real-time protection is working and detecting viruses, use a test file from eicar.com. This

Pagina 27

24malware and other potential threats.This type of scan can be also initiated by clicking Custom scan, and then selecting Removable media from the Sca

Pagina 28

25currently logged user doesn't have enough privileges to access the appropriate files to be scanned. Note that thisbutton is not available if cu

Pagina 29

264.1.1.2.3 Scan profilesYour preferred scan parameters can be saved for future scanning. We recommend that you create a different profile(with vari

Pagina 30

274.1.1.4 Idle-state scanningIdle scanner can be configured and enabled in Advanced setup under Computer > Antivirus and antispyware > Idle-st

Pagina 31

28Path – Path to excluded files and folders.Threat – If there is a name of a threat next to an excluded file, it means that the file is only excluded

Pagina 32

294.1.1.6.2 OptionsUse the Options section to select the methods used when scanning the system for infiltrations. The following optionsare available

Pagina 33

Contents...5ESET Smart Security 61...

Pagina 34

304.1.1.6.5 LimitsThe Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned:Maximum object si

Pagina 35

31Each uses the standard cleaning level and will attempt to clean the file and move it to Quarantine or terminate theconnection. A notification window

Pagina 36 - 4.2 Network

324.1.1.8 Document protectionThe Document protection feature scans Microsoft Office documents before they are opened, as well as filesdownloaded aut

Pagina 37

334.1.2.1 Filtering rulesThe Filter device access window displays existing extended rules for removable media.Category – Removable media type (CD/DV

Pagina 38

34Note: Filtering parameters in all text fields are handled case-sensitive and no wildcards (*, ?) are supported. They haveto be written exactly as de

Pagina 39

35 If you select Ask as the default action, ESET Smart Security will display a dialog window every time an operation is run.You can choose to Deny or

Pagina 40

364.2 NetworkThe Personal firewall controls all network traffic to and from the system. This is accomplished by allowing or denyingindividual networ

Pagina 41

374.2.1 Filtering modesFive filtering modes are available for the ESET Smart Security Personal firewall. Filtering modes can be found in Advanced se

Pagina 42

38deny a specific service associated with a standard port number (HTTP – 80, POP3 – 110, etc.) Add remote IP address / Trusted zone – A remote IP addr

Pagina 43

39your computer. Many infiltrations try to obtain and send private data, or download other malicious applications to hostworkstations. The Personal fi

Pagina 44

...79Proxy server setup4.6.10...

Pagina 45

404.2.3.1.1 Detailed view of all rulesTo see the following information in the Zone and rule setup window, click Toggle detailed view of all rules.Na

Pagina 46 - 4.3 Web and email

414.2.3.2 Editing rulesModification is required each time any of the monitored parameters are changed. In this case, the rule cannot fulfill thecond

Pagina 47

424.2.4.1.1 Zone authentication - Client configurationIn the Zone and rule setup window, click the Zones tab and create a new zone using the name of

Pagina 48

43To test your settings, click the Test button. If authentication is successful, a Server authentication successful notificationwill appear. If authen

Pagina 49

444.2.4.1.2 Zone authentication - Server configurationThe authentication process can be executed by any computer/server connected to the network tha

Pagina 50

454.2.5 Establishing connection - detectionThe Personal firewall detects each newly-created network connection. The active firewall mode determines

Pagina 51

464.2.7 System integrationThe ESET Smart Security Personal firewall can operate at several levels:All features active – The Personal firewall is ful

Pagina 52

47It is possible to disable the web/email/antispam protection module temporarily by clicking Enabled.Configure ... – Opens web/email/antispam protecti

Pagina 53

484.3.1.1.1 Email client protection configurationThe Email client protection module supports the following email clients: Microsoft Outlook, Outlook

Pagina 54

494.3.1.3 POP3, POP3S filterThe POP3 protocol is the most widespread protocol used to receive email communication in an email client application.ESE

Pagina 55

51. ESET Smart Security 6ESET Smart Security 6 represents a new approach to truly integrated computer security. The most recent version of theThreatSe

Pagina 56

50methods) and the resulting index value determines whether a message is spam or not.Antispam protection in ESET Smart Security allows you to set diff

Pagina 57

514.3.2 Web access protectionInternet connectivity is a standard feature in a personal computer. Unfortunately, it has also become the main mediumfo

Pagina 58 - 4.4 Parental control

524.3.2.1.1 Active mode for web browsersESET Smart Security also contains the Active mode submenu, which defines the checking mode for web browsers.

Pagina 59

53Remove/Remove all – Click Remove to delete the selected address from the list. To delete all addresses, selectRemove all.Export... – Save addresses

Pagina 60

544.3.3.2 Excluded applicationsTo exclude communication of specific network-aware applications from content filtering, select them in the list. HTTP

Pagina 61

554.3.3.3 Excluded IP addressesThe entries in the list will be excluded from the protocol content filtering. HTTP/POP3/IMAP communication from/tothe

Pagina 62 - 4.5 Updating the program

564.3.3.4 SSL protocol checkingESET Smart Security enables you to check protocols encapsulated in SSL protocol. You can use various scanning modesfo

Pagina 63

574.3.3.4.1.2 Excluded certificatesThe Excluded certificates section contains certificates that are considered safe. The content of encryptedcommuni

Pagina 64

58NOTE: Potential phishing websites that have been whitelisted will expire after several hours by default. To allow awebsite permanently, you can use

Pagina 65

59If you click Parental control in the Setup pane from the main product window of ESET Smart Security, you will see thatthe main window is divided int

Pagina 66

6Rollback previous virus signature databaseIf you suspect that a virus signature database or product module update may be unstable or corrupt, you can

Pagina 67

601. Open User Accounts by clicking the Start button (located at the bottom left side of your desktop), clicking ControlPanel and then clicking User A

Pagina 68

614.4.1 Web page content filteringIf the check box next to a category is selected, it is allowed. Deselect the check box next to a specific category

Pagina 69 - 4.6 Tools

624.4.2 Blocked and allowed web pagesEnter a URL address into the blank field under the list, select Allow or Block and click Add to add it to the l

Pagina 70

63Last successful update – The date of the last update. If you do not see a recent date, your virus signature databasemay not be current.Virus signatu

Pagina 71

64Important: Under normal circumstances, when updates are downloaded properly the message Update is notnecessary – Virus signature database is up to d

Pagina 72

654.5.1 Update setupUpdate setup options are available from the Advanced setup tree (F5 key) by clicking Update > Update. This sectionspecifies u

Pagina 73

66Pre-release updates (the Pre-release update option) are updates which have gone through thorough internal testingand will be generally available soo

Pagina 74

67will display a notification.The Regularly check for latest product version option will enable the Regular checking for latest product versionschedul

Pagina 75

684.5.1.3 Update rollbackIf you suspect that a new update of the virus database and/or program modules may be unstable or corrupt, you canroll back

Pagina 76

694.5.2 How to create update tasksUpdates can be triggered manually by clicking Update virus signature database in the primary window displayed afte

Pagina 77

7applications to appear and release security updates to eliminate potential threats on a regular basis. It is important todownload these security upda

Pagina 78

70Submit file for analysis – Allows you to submit a suspicious file for analysis to the ESET Virus Lab. The dialog windowdisplayed after clicking this

Pagina 79

714.6.1.1 Log maintenanceThe Logging configuration of ESET Smart Security is accessible from the main program window. Click Setup > Enteradvanced

Pagina 80

724. Depending on the timing option you choose in the previous step, one of the following dialog windows will bedisplayed:Once – The task will be perf

Pagina 81 - 4.7 User interface

734.6.4 Watch activityTo see the current File system activity in graph form, click Tools > Watch activity. At the bottom of the graph is atimelin

Pagina 82

74The following actions are available:Compare – Compares two existing logs.Create... – Creates a new log. Please wait until the ESET SysInspector log

Pagina 83

75you if further information is required for analysis. Please note that you will not receive a response from ESET unlessmore information is needed.Sel

Pagina 84

76By clicking a given application at the bottom, the following information will appear at the bottom of the window:File – Location of an application o

Pagina 85 - 5. Advanced user

77Open in a new window – Displays information in a separate window.The Configure connection view... option in the Network connections screen enters th

Pagina 86 - 5.5 Idle state detection

784.6.9 QuarantineThe main function of the quarantine is to safely store infected files. Files should be quarantined if they cannot becleaned, if it

Pagina 87 - 5.6 ESET SysInspector

794.6.10 Proxy server setupIn large LAN networks, the connection of your computer to the Internet can be mediated by a proxy server. If this is thec

Pagina 88

82. InstallationThere are several methods for installing ESET Smart Security on your computer. Installation methods may varydepending on country and m

Pagina 89

80receive notifications via the Windows® messaging service.Interval between sending messages (sec.) – To change the length of the interval between not

Pagina 90

814.6.13 System updatesThe Windows update feature is an important component of protecting users from malicious software. For this reason,it is vital

Pagina 91

824.7.2 Alerts and notificationsThe Alerts and notifications section under User interface allows you to configure how threat alerts and systemnotifi

Pagina 92

834.7.5 Program menuSome of the most important setup options and features are available in the main program menu.Frequently used – Displays the most

Pagina 93

844.7.6 Context menuThe context menu is displayed after right-clicking an object. The menu lists all options available to perform on theobject.It is

Pagina 94

855. Advanced user5.1 Profile managerProfile manager is used in two places within ESET Smart Security – in the Computer scan section and in the Upda

Pagina 95

865.3 DiagnosticsDiagnostics provides application crash dumps of ESET's processes (e.g. ekrn). If an application crashes, a dump will begenerat

Pagina 96

875.6 ESET SysInspector5.6.1 Introduction to ESET SysInspectorESET SysInspector is an application that thoroughly inspects your computer and displ

Pagina 97 - 5.7 ESET SysRescue

885.6.2 User Interface and application usageFor clarity the main program window is divided into four major sections – Program Controls located on th

Pagina 98

89with. In "Basic" mode, you have access to information used to find solutions for common problems in your system. Inthe "Medium"

Pagina 99

92.2 Offline installationOnce you launch the offline installation (.msi) package, the installation wizard will guide you through the setup process.F

Pagina 100

90its hash.Important Registry EntriesContains a list of selected registry entries which are often related to various problems with your system like th

Pagina 101 - 5.8 Command Line

91ViewCtrl+5view by vendor, all vendorsCtrl+6view by vendor, only MicrosoftCtrl+7view by vendor, all other vendorsCtrl+3displays full detailCtrl+2disp

Pagina 102

92marked by a were present only in the opened log and are missing in the active one. Description of all symbols that can be displayed next to items:

Pagina 103 - 6. Glossary

935.6.4 Service ScriptService script is a tool that provides help to customers that use ESET SysInspector by easily removing unwanted objectsfrom th

Pagina 104

94Example:02) Loaded modules:- c:\windows\system32\svchost.exe- c:\windows\system32\kernel32.dll+ c:\windows\system32\khbekhb.dll- c:\windows\system32

Pagina 105 - 6.2 Types of remote attacks

95Example:06) Important registry entries:* Category: Standard Autostart (3 items) HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run- HotKeysCmds = C:

Pagina 106

965.6.4.3 Executing Service scriptsMark all desired items, then save and close the script. Run the edited script directly from the ESET SysInspector

Pagina 107 - 6.3 Email

97What is Anti-Stealth technology ?Anti-Stealth technology provides effective rootkit detection.If the system is attacked by malicious code that behav

Pagina 108

985.7.1 Minimum requirementsESET SysRescue works in the Microsoft Windows Preinstallation Environment (Windows PE) version 2.x, which is basedon Win

Pagina 109

995.7.4 SettingsBefore initiating ESET SysRescue creation, the install wizard displays compilation parameters. These can be modified byclicking the

Comentarios a estos manuales

Sin comentarios