ESET SMART SECURITY Guía de usuario Pagina 4

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 120
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 3
..............................................................................74Update rollback
4.5.2
..............................................................................75How to create update tasks
4.5.3
....................................................................................................76Tools4.6
..............................................................................77Log files
4.6.1
..................................................................................78Log maintenance
4.6.1.1
..............................................................................78Scheduler
4.6.2
..............................................................................80Protection statistics
4.6.3
..............................................................................80Watch activity
4.6.4
..............................................................................81ESET SysInspector
4.6.5
..............................................................................81ESET Live Grid
4.6.6
..................................................................................82Suspicious files
4.6.6.1
..............................................................................83Running processes
4.6.7
..............................................................................84Network connections
4.6.8
..............................................................................86Quarantine
4.6.9
..............................................................................87Proxy server setup
4.6.10
..............................................................................87Alerts and notifications
4.6.11
..................................................................................88Message format
4.6.11.1
..............................................................................89Submission of samples for analysis
4.6.12
..............................................................................89System updates
4.6.13
....................................................................................................89User interface4.7
..............................................................................90Graphics
4.7.1
..............................................................................90Alerts and notifications
4.7.2
..................................................................................90Advanced setup
4.7.2.1
..............................................................................91Hidden notification windows
4.7.3
..............................................................................91Access setup
4.7.4
..............................................................................91Program menu
4.7.5
..............................................................................92Context menu
4.7.6
.......................................................93Advanced user5.
....................................................................................................93Profile manager5.1
....................................................................................................93Keyboard shortcuts5.2
....................................................................................................94Diagnostics5.3
....................................................................................................94Import and export settings5.4
....................................................................................................95Idle state detection5.5
....................................................................................................95ESET SysInspector5.6
..............................................................................95Introduction to ESET SysInspector
5.6.1
..................................................................................95Starting ESET SysInspector
5.6.1.1
..............................................................................96User Interface and application usage
5.6.2
..................................................................................96Program Controls
5.6.2.1
..................................................................................97Navigating in ESET SysInspector
5.6.2.2
........................................................................99Keyboard shortcuts
5.6.2.2.1
..................................................................................100Compare
5.6.2.3
..............................................................................101Command line parameters
5.6.3
..............................................................................101Service Script
5.6.4
..................................................................................102Generating Service script
5.6.4.1
..................................................................................102Structure of the Service script
5.6.4.2
..................................................................................104Executing Service scripts
5.6.4.3
..............................................................................105FAQ
5.6.5
..............................................................................106ESET SysInspector as part of ESET Smart Security
5.6.6
....................................................................................................106ESET SysRescue5.7
..............................................................................106Minimum requirements
5.7.1
..............................................................................107How to create rescue CD
5.7.2
..............................................................................107Target selection
5.7.3
..............................................................................107Settings
5.7.4
..................................................................................108Folders
5.7.4.1
..................................................................................108ESET Antivirus
5.7.4.2
..................................................................................108Advanced settings
5.7.4.3
..................................................................................109Internet protocol
5.7.4.4
..................................................................................109Bootable USB device
5.7.4.5
..................................................................................109Burn
5.7.4.6
..............................................................................109Working with ESET SysRescue
5.7.5
..................................................................................110Using ESET SysRescue
5.7.5.1
....................................................................................................110Command Line5.8
.......................................................112Glossary6.
....................................................................................................112Types of infiltration6.1
..............................................................................112Viruses
6.1.1
..............................................................................112Worms
6.1.2
..............................................................................112Trojans
6.1.3
..............................................................................113Rootkits
6.1.4
..............................................................................113Adware
6.1.5
..............................................................................113Spyware
6.1.6
..............................................................................114Packers
6.1.7
..............................................................................114Potentially unsafe applications
6.1.8
..............................................................................114Potentially unwanted applications
6.1.9
..............................................................................114Botnet
6.1.10
....................................................................................................114Types of remote attacks6.2
..............................................................................115DoS attacks
6.2.1
..............................................................................115DNS Poisoning
6.2.2
..............................................................................115Worm attacks
6.2.3
..............................................................................115Port scanning
6.2.4
..............................................................................115TCP desynchronization
6.2.5
..............................................................................116SMB Relay
6.2.6
..............................................................................116ICMP attacks
6.2.7
....................................................................................................116ESET Technology6.3
..............................................................................116Exploit Blocker
6.3.1
..............................................................................116Advanced Memory Scanner
6.3.2
..............................................................................117Vulnerability Shield
6.3.3
..............................................................................117ESET Live Grid
6.3.4
..............................................................................117Botnet protection
6.3.5
..............................................................................117Java Exploit Blocker
6.3.6
....................................................................................................118Email6.4
..............................................................................118Advertisements
6.4.1
..............................................................................118Hoaxes
6.4.2
..............................................................................119Phishing
6.4.3
..............................................................................119Recognizing spam scams
6.4.4
..................................................................................119Rules
6.4.4.1
..................................................................................120Whitelist
6.4.4.2
..................................................................................120Blacklist
6.4.4.3
..................................................................................120Exception list
6.4.4.4
..................................................................................120Server-side control
6.4.4.5
Vista de pagina 3
1 2 3 4 5 6 7 8 9 ... 119 120

Comentarios a estos manuales

Sin comentarios