Eset Endpoint Antivirus 6
Total Page:16
File Type:pdf, Size:1020Kb
ESET ENDPOINT ANTIVIRUS 6 User Guide Microsoft® Windows® 10/8.1/8/7/Vista/XP x86 SP3/XP x64 SP2 Click here to download the most recent version of this document ESET ENDPOINT ANTIVIRUS 6 Copyright ©2016 by ESET, spol. s r. o. ESET Endpoint Antivirus was developed by ESET, spol. s r. o. For more information visit www.eset.com. All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without permission in writing from the author. ESET, spol. s r. o. reserves the right to change any of the described application software without prior notice. Worldwide Customer Support: www.eset.com/support REV. 3/29/2016 Contents 3.9.1.4 On.-.d..e..m...a..n..d.. .c..o..m...p..u..t.e..r. .s..c.a..n.............................................37 1. ESET E.n..d..p..o..in..t. .A..n..t.i.v..ir..u.s...............................5 3.9.1.4.1 Custom s.c..a..n.. .l.a..u..n..c.h..e..r....................................................38 1.1 Wh..a..t.'.s.. .n..e...w......................................................................................5 3.9.1.4.2 Scan prog..r.e..s..s.................................................................40 3.9.1.5 De.v..i.c..e.. c..o..n..t.r..o..l...............................................................41 1.2 Sys.t..e..m.... .r.e...q..u..i.r..e..m....e..n...t.s...................................................................6 3.9.1.5.1 Device co..n..t.r..o..l. r..u..l.e..s. .e..d..i.t.o..r.............................................42 1.3 Pre..v..e..n..t..i.o..n.......................................................................................6 3.9.1.5.2 Adding D.e..v.i.c..e.. .c.o..n..t..r.o..l. .r.u..l.e..s............................................43 2. Documentation for users connected via ESET 3.9.1.6 Re.m...o..v..a..b..l.e.. m...e..d..i.a...........................................................44 Remo.t.e.. .A..d.m...i.n..i.s.t.r.a..t.o..r................................8 3.9.1.7 Idl.e..-.s..t.a..t.e.. .s..c.a..n..n..i.n..g.........................................................45 3.9.1.8 Ho.s..t.-.b..a..s..e..d.. .I.n..t.r.u..s..i.o..n.. .P..r.e..v..e..n..t.i.o..n.. .S.y..s..t.e..m... .(.H..I.P..S..).............45 2.1 ESE.T.. .R...e..m....o..t..e.. .A...d..m....i.n..i.s..t.r..a..t..o..r.. .S..e..r..v..e..r...........................................8 3.9.1.8.1 Advanced.. .s..e..t.u..p..............................................................47 2.2 We..b.. .C..o...n..s..o..l.e...................................................................................9 3.9.1.8.2 HIPS inte.r.a..c..t.i.v..e.. .w..i.n..d..o..w..................................................48 2.3 Pro..x..y................................................................................................9 3.9.1.9 Pre..s..e..n..t.a..t..i.o..n.. m...o..d..e.........................................................48 2.4 Ag..e...n..t.............................................................................................10 3.9.1.10 Sta..r.t..u..p.. s..c..a..n...................................................................49 2.5 RD... .S..e..n..s..o..r......................................................................................10 3.9.1.10.1 Automat.i.c. .s..t.a..r.t..u..p.. f.i.l.e.. .c..h..e..c.k...........................................49 3.9.1.11 Do.c..u..m...e..n..t. .p..r.o..t..e..c.t..i.o..n.....................................................49 3. Usin.g. .E..S.E..T. .E..n..d.p..o..i.n..t. .A..n.t..iv..i.r.u..s. .b..y. .i.t.s..e.l.f........11 3.9.1.12 Exc..l.u..s..i.o..n..s......................................................................50 3.1 In.s..t.a..l.l.a..t..i.o..n... .w...i.t..h.. .E..S..E..T.. .A...V.. .R...e..m....o..v..e..r..........................................11 3.9.1.13 Th.r.e..a..t.S..e..n..s..e.. e..n..g..i.n..e.. .p..a..r.a..m...e..t.e..r..s. .s..e..t.u..p...........................51 3.1.1 ESET .A..V.. R..e..m...o..v..e..r............................................................12 3.9.1.13.1 Exclusion..s......................................................................56 3.1.2 Uninstallation using ESET AV Remover ended with 3.9.2 Web. a..n..d.. .e..m...a..i.l..............................................................56 error..............................................................................15 3.9.2.1 Pro..t..o..c.o..l. .f.i.l.t.e..r..i.n..g............................................................57 3.2 In.s..t.a..l.l.a..t..i.o..n.....................................................................................15 3.9.2.1.1 Web and. .e..m...a..i.l. c..l.i.e..n..t.s....................................................57 3.2.1 Adva.n..c..e..d.. i.n..s..t.a..l.l.a..t..i.o..n....................................................17 3.9.2.1.2 Excluded. .a..p..p..l.i.c.a..t..i.o..n..s....................................................58 3.3 Pr..o..d..u...c.t.. .i.n..s..t..a..l.l.a..t.i.o...n.. .v..i.a.. .E..R..A... .(.c..o..m....m....a..n..d.. .l.i.n...e..).........................20 3.9.2.1.3 Excluded. .I.P.. a..d..d..r..e..s.s..e..s....................................................59 3.4 Pr..o..d..u...c.t.. .a..c..t.i.v..a..t..i.o..n........................................................................21 3.9.2.1.4 SSL/TLS ........................................................................59 3.5 Co..m....p..u...t.e...r. .s..c..a..n.............................................................................22 3.9.2.1.4.1 Encrypte.d.. S..S..L. .c..o..m...m...u..n..i.c.a..t..i.o..n........................................60 3.6 Up...g..r.a..d...i.n..g.. .t..o.. .a.. .m....o..r..e.. .r..e..c..e..n..t.. .v..e..r..s..i.o..n........................................22 3.9.2.1.4.2 List of kn.o..w..n.. .c..e..r.t.i.f.i.c..a..t.e..s................................................60 3.7 Be..g..i.n...n..e..r..'.s.. .g..u..i.d..e...........................................................................23 3.9.2.2 Em..a..i.l. c..l.i.e..n..t. .p..r.o..t..e..c.t..i.o..n...................................................61 3.7.1 The u..s.e..r.. i.n..t..e..r.f.a..c..e..........................................................23 3.9.2.2.1 Email clie..n..t.s...................................................................61 3.7.2 Upda..t.e.. .s.e..t..u..p.................................................................25 3.9.2.2.2 Email pro..t.o..c..o..l.s..............................................................62 3.8 Co..m....m....o..n.. .Q...u...e..s..t.i.o...n..s....................................................................26 3.9.2.2.3 Alerts an.d.. .n..o..t.i.f.i.c..a..t.i.o..n..s..................................................63 3.8.1 How .t.o.. .u..p..d..a..t.e.. .E..S.E..T.. E..n..d..p..o..i.n..t. .A..n..t.i.v..i.r.u..s...........................27 3.9.2.3 We..b.. .a..c..c.e..s..s.. p..r..o..t.e..c..t.i.o..n...................................................64 3.8.2 How .t.o.. .a..c..t.i.v..a..t.e.. .E.S..E..T. .E..n..d..p..o..i.n..t. .A..n..t.i.v..i.r.u..s.........................27 3.9.2.3.1 Web prot..o..c.o..l.s................................................................64 3.8.3 How to use current credentials to activate a new 3.9.2.3.2 URL addr.e..s..s. .m...a..n..a..g..e..m...e..n..t.............................................65 prod.u..c.t..........................................................................28 3.9.2.4 An.t.i.-.P..h..i.s..h..i.n..g.. p..r..o..t.e..c..t.i.o..n.................................................66 3.8.4 How .t.o.. .r.e..m...o..v..e.. .a.. v..i.r.u..s.. .f.r.o..m... .m...y. .P..C..................................28 3.9.3 Upda..t.i.n..g.. t..h..e.. p..r..o..g.r..a..m.....................................................67 3.8.5 How .t.o.. .c..r.e..a..t.e.. .a.. .n..e..w.. .t.a..s..k.. i.n.. .S..c.h..e..d..u..l.e..r...........................28 3.9.3.1 Up.d..a..t..e.. s..e..t.u..p..................................................................70 3.8.6 How .t.o.. .s..c.h..e..d..u..l.e.. .a.. .s.c..a..n.. .t.a..s..k. .(.e..v..e..r.y.. 2..4.. .h..o..u..r.s..)................29 3.9.3.1.1 Update p.r..o..f.i.l.e..s..............................................................72 3.8.7 How to connect ESET Endpoint Antivirus to ESET 3.9.3.1.2 Update r.o..l.l.b..a..c.k..............................................................72 Remo..t..e.. A..d..m...i.n..i.s..t.r..a..t.o..r...................................................29 3.9.3.1.3 Update m..o..d..e..................................................................73 3.8.8 How .t.o.. .c..o..n..f.i.g.u..r..e.. a.. .m...i.r.r..o..r..............................................29 3.9.3.1.4 HTTP Pro.x.y......................................................................73 3.8.9 How do I upgrade to Windows 10 with ESET Endpoint Antiv.i.r..u..s........................................................................30 3.9.3.1.5 Connect .t.o.. .L.A..N... a..s...........................................................74 3.9.3.1.6 Mirror ........................................................................75 3.9 W..o..r..k.