Használati útmutató ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10
ESET
Víruskereső szoftver
ENDPOINT ANTIVIRUS MAC OS USER 5 - 10
Olvassa el alább 📖 a magyar nyelvű használati útmutatót ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 (44 oldal) a Víruskereső szoftver kategóriában. Ezt az útmutatót 3 ember találta hasznosnak és 2 felhasználó értékelte átlagosan 4.5 csillagra
Oldal 1/44

US
US
US
USUSER
ER
ER
ERER GU
GU
GU
GU GUI
I
I
IIDE
DE
DE
DEDE
(intended for product version 6.5 and higher)
Click here to download the most recent version of this document

ESET, spol. s.r.o.
ESET Endpoint Antivi rus wa s developed by ESET, s pol. s r.o.
For more informa tion vi sit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording, s canning, or
otherwise without permission in writing from the author.
ESET, spol. s r.o. reserves the right to cha nge any of the described a pplication software without prior noce.
Cu s to me r C a re : www.eset.com/support
REV. 10/13/2017

Contents
.......................................................5ESET Endpoint Anvirus1.
....................................................................................................5What's new in version 61.1
....................................................................................................5System requirements1.2
.......................................................6
Users connecng via ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Web Console2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installaon3.
....................................................................................................9Typical installation3.1
....................................................................................................10Custom installation3.2
....................................................................................................10Remote installation3.3
..............................................................................11Creang a remote installa on package
3.3.1
..............................................................................11Remote ins tallaon on target computers
3.3.2
..............................................................................12Remote uninstallation
3.3.3
..............................................................................12Remote upgrade
3.3.4
.......................................................13Product acvaon4.
.......................................................15Uninstallaon5.
.......................................................16Basic overview6.
....................................................................................................16Keyboard shortcuts6.1
....................................................................................................17Checking operaon of the system6.2
....................................................................................................17
What to do if the program does not
work properly
6.3
.......................................................18Computer protecon7.
....................................................................................................18Antivirus and antispyware protection7.1
..............................................................................18General
7.1.1
..................................................................................18Exclusions
7.1.1.1
..............................................................................19Sta rtup protection
7.1.2
..............................................................................19Real-me file system protection
7.1.3
..................................................................................19Advanced options
7.1.3.1
..................................................................................20When to modify Real-me protecon conguration
7.1.3.2
..................................................................................20Checking Real-me protection
7.1.3.3
..................................................................................20What to do if Real-me protecon does not work
7.1.3.4
..............................................................................21On-demand computer scan
7.1.4
..................................................................................21Type of scan
7.1.4.1
........................................................................21Smart s can
7.1.4.1.1
........................................................................22Custom scan
7.1.4.1.2
..................................................................................22Scan ta rgets
7.1.4.2
..................................................................................22Scan proles
7.1.4.3
..............................................................................23ThreatSense engine parameters setup
7.1.5
..................................................................................23Objects
7.1.5.1
..................................................................................24Opons
7.1.5.2
..................................................................................24Cleaning
7.1.5.3
..................................................................................24Exclusions
7.1.5.4
..................................................................................25Limits
7.1.5.5
..................................................................................25Others
7.1.5.6
..............................................................................25An infiltration is detected
7.1.6
....................................................................................................26Web and email protecon7.2
..............................................................................26Web access protection
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL lis ts
7.2.1.2
..............................................................................27Email protection
7.2.2
..................................................................................27POP3 protocol checking
7.2.2.1
..................................................................................27IMAP protocol checking
7.2.2.2
....................................................................................................28Anti-Phishing7.3
.......................................................29Device control8.
....................................................................................................29Rules editor8.1
.......................................................31Tools9.
....................................................................................................31Log les9.1
..............................................................................31Log maintenance
9.1.1
..............................................................................32Log ltering
9.1.2
....................................................................................................32Scheduler9.2
..............................................................................33Creang new tasks
9.2.1
..............................................................................33Creang a user-dened ta sk
9.2.2
....................................................................................................34Live Grid9.3
..............................................................................34Suspicious les
9.3.1
....................................................................................................35Quarantine9.4
..............................................................................35Quaranning les
9.4.1
..............................................................................35Restoring a quarantined le
9.4.2
..............................................................................35Submitting a le from Quara nne
9.4.3
....................................................................................................35Privileges9.5
....................................................................................................36Presentation mode9.6
....................................................................................................36Running processes9.7
.......................................................37User interface10.
....................................................................................................37Alerts and notications10.1
..............................................................................37Dis play alerts
10.1.1
..............................................................................37Protection status es
10.1.2
....................................................................................................38Context menu10.2
.......................................................39Update11.
....................................................................................................39Update setup11.1
..............................................................................40Advanced options
11.1.1
....................................................................................................41How to create update tasks11.2
....................................................................................................41Upgrading to a new build11.3
....................................................................................................41System updates11.4
.......................................................43Miscellaneous12.
....................................................................................................43Import and export settings12.1
....................................................................................................43Proxy server setup12.2
....................................................................................................44Shared Local Cache12.3
Termékspecifikációk
Márka: | ESET |
Kategória: | Víruskereső szoftver |
Modell: | ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 |
Szüksége van segítségre?
Ha segítségre van szüksége ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10, tegyen fel kérdést alább, és más felhasználók válaszolnak Önnek
Útmutatók Víruskereső szoftver ESET

6 Július 2024
Útmutatók Víruskereső szoftver
- Víruskereső szoftver Axis
- Víruskereső szoftver AVG
- Víruskereső szoftver Tandberg Data
- Víruskereső szoftver Bitdefender
- Víruskereső szoftver Symantec - Norton
- Víruskereső szoftver Symantec
- Víruskereső szoftver Kaspersky Lab
Legújabb útmutatók Víruskereső szoftver

30 Augusztus 2024

30 Augusztus 2024

30 Augusztus 2024

30 Augusztus 2024

29 Augusztus 2024

29 Augusztus 2024

29 Augusztus 2024

29 Augusztus 2024

29 Augusztus 2024

Symantec Norton Internet Security Premier Edition 2009 Útmutató
29 Augusztus 2024