ESET SMART SECURITY Guía de usuario Pagina 16

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 46
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 15
16
4.1.3 Web access protection
Internet connectivity is a standard feature in a personal computer.
Unfortunately, it has also become the main medium for transferring
malicious code. Because of this, it is essential that you carefully
consider your Web access protection. We strongly recommend that
the Enable web access protection option is selected. This option is
located in Advanced Setup (F5) > Antivirus and antispyware > Web
access protection.
4.1.3.1 HTTP, HTTPs
Web access protection works by monitoring communication between
Internet browsers and remote servers, and complies with HTTP
(Hypertext Transfer Protocol) and HTTPs (encrypted communication)
rules. By default, ESET Smart Security is configured to use the
standards of most Internet browsers. However, the HTTP scanner
setup options can be modified in Advanced Setup (F5) > Antivirus
and antispyware > Web access protection > HTTP, HTTPs. In the
main HTTP filter window, you can select or deselect the Enable HTTP
checking option. You can also define the port numbers used for HTTP
communication. By default, the port numbers 80, 8080 and 3128 are
predefined. HTTPs checking can be performed in the following modes:
Do not use HTTPs protocol checking Encrypted communication
will not be checked
Use HTTPs protocol checking for selected ports HTTPs checking
only for ports defined in Ports used by HTTPs protocol
Use HTTPs protocol checking for applications marked as Internet
browsers that use selected ports Only check applications that are
specified in the browsers section and use ports defined in Ports used
by HTTPs protocol.
4.1.3.1.1 Address management
This section enables you to specify HTTP addresses to block, allow
or exclude from checking. The buttons Add, Edit, Remove and
Export are used to manage the lists of addresses. Websites in the
list of blocked addresses will not be accessible. Websites in the list of
excluded addresses are accessed without being scanned for malicious
code. If you select the Allow access only to HTTP addresses in the
list of allowed addresses option, only addresses present in the list of
allowed addresses will be accessible, while all other HTTP addresses
will be blocked.
In all lists, the special symbols * (asterisk) and ? (question mark) can be
used. The asterisk substitutes any character string, and the question
mark substitutes any symbol. Particular care should be taken when
specifying excluded addresses, because the list should only contain
trusted and safe addresses. Similarly, it is necessary to ensure that the
symbols * and ? are used correctly in this list. To activate a list, select
the List active option. If you wish to be notified when entering an
address from the current list, select Notify when applying address
from the list option.
4.1.3.1.2 Web browsers
ESET Smart Security also contains the Web browsers feature, which
allows you to define whether the given application is a browser or not.
If an application is marked as a browser, all communication from this
application is monitored regardless of the port numbers involved.
The Web browsers feature complements the HTTP checking feature,
as HTTP checking only takes place on predefined ports. However,
many Internet services utilize changing or unknown port numbers. To
account for this, the Web browser feature can establish control of port
communications regardless of the connection parameters.
The list of applications marked as web browsers is accessible directly
from the Web browsers submenu of the HTTP branch. This section
also contains the Active mode submenu, which defines the checking
mode for Internet browsers.
Active mode is useful because it examines transferred data as
a whole. If it is not enabled, communication of applications is
Vista de pagina 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 45 46

Comentarios a estos manuales

Sin comentarios