Eset Endpoint Security
Total Page:16
File Type:pdf, Size:1020Kb
ESET ENDPOINT SECURITY User Guide Microsoft® Windows® 8 / 7 / Vista / XP / 2000 / Home Server Click here to download the most recent version of this document ESET ENDPOINT SECURITY Copyright ©2013 by ESET, spol. s r. o. ESET Endpoint Security was developed by ESET, spol. s r. o. For more information visit www.eset.com. All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without permission in writing from the author. ESET, spol. s r. o. reserves the right to change any of the described application software without prior notice. Worldwide Customer Support: www.eset.com/support REV. 17. 4. 2013 Contents 4.2.1 Filt..e..r.i.n...g.. m....o..d..e..s............................................................44 1. ES.E..T. .E..n.d..p..o.i.n..t. .S.e..c.u..r.i.t.y.......................5 4.2.2 Fir.e..w...a..l.l. .p..r.o...f.i.l.e..s...........................................................45 4.2.3 Co.n..f..i.g..u..r.i.n...g.. a..n...d.. .u..s..i.n..g.. .r.u..l.e..s........................................46 1.1 Syste.m... .r.e..q.u..i.r.e..m...e.n..t.s..................................................5 4.2.3.1 Rules.. .s.e..t..u..p...................................................................47 1.2 Preve.n..t.i.o..n.................................................................5 4.2.3.2 Editin...g.. r..u..l.e..s.................................................................47 4.2.4 Co.n..f..i.g..u..r.i.n...g.. z..o..n...e..s.......................................................49 2. In.s.t.a..ll.a..t.i.o.n.......................................7 4.2.4.1 Netw...o..r.k.. .a..u..t..h..e..n...t.i.c..a..t..i.o..n............................................49 4.2.4.1.1 Zon.e.. .a..u..t..h..e..n...t.i.c..a..t..i.o..n.. .-. .C..l.i.e..n...t. .c..o..n..f..i.g..u..r.a..t..i.o..n..............49 2.1 Typic.a..l .i.n..s.t.a..l.l.a.t..io..n......................................................8 4.2.4.1.2 Zon.e.. a..u...t.h...e..n..t..i.c.a..t..i.o..n... -.. S..e..r..v..e..r. .c.o...n..f.i.g..u...r.a..t..i.o..n..............51 2.2 Cust.o..m... .in..s..t.a..ll.a..t.i.o..n...................................................10 4.2.5 Est..a..b..l.i.s..h..i.n..g.. .c..o..n..n...e..c.t..i.o..n... -.. d...e..t.e..c..t..i.o..n..........................52 2.3 Ente.r.i.n..g.. u..s..e.r..n.a..m...e.. a..n..d.. p..a..s.s..w..o..r.d................................14 4.2.6 Lo.g..g..i.n..g.........................................................................52 2.4 Upgr..a.d..i.n..g. .t.o.. .a.. m...o..r.e.. .r.e..c.e..n..t. .v.e..r.s..i.o.n.............................14 4.2.7 Sys..t..e..m... .i.n..t..e..g..r.a..t..i.o..n......................................................53 2.5 Com.p..u.t..e.r.. s..c.a..n..........................................................15 4.3 Web. .a..n..d. .e..m...a.i.l.........................................................53 4.3.1 We..b.. .a..c..c.e..s..s.. p...r.o..t..e..c..t.i.o...n................................................54 3. B.e.g..i.n.n..e..r.'s.. g..u.i.d..e...............................16 4.3.1.1 HTTP..,. H...T..T..P..s.................................................................55 4.3.1.1.1 Acti.v..e.. .m...o...d..e.. .f.o..r.. w....e..b.. .b..r.o...w...s..e..r.s..................................55 3.1 Intro..d.u..c..in..g.. .u.s..e..r. .in..t.e..r.f.a..c..e. .d..e..s.i.g..n................................16 4.3.1.2 URL .a..d..d..r..e..s.s.. .m...a..n..a..g..e..m....e..n..t.........................................56 3.2 Wha.t. .t.o.. .d.o.. .i.f. t..h.e.. .p..r.o..g.r..a.m... .d..o.e..s..n.'.t. .w...o.r..k. .p..r.o..p..e.r..ly...........17 4.3.2 Em.a..i.l. .c..l.i.e..n..t.. p...r.o..t..e..c..t.i.o...n................................................57 3.3 Upda..t.e.. .s.e..t.u..p............................................................18 4.3.2.1 POP3.,. .P..O...P..3..S.. .f.i.l.t..e..r.......................................................57 3.4 Prox.y.. .s.e..r.v..e..r. .s.e..t.u..p....................................................19 4.3.2.2 IMAP.,. .I.M...A...P..S.. p...r.o..t..o..c..o..l. .c..o..n..t..r.o...l...................................58 4.3.2.3 Integ..r.a..t..i.o..n.. .w...i.t..h.. .e..m...a..i.l. .c..l.i.e..n..t..s...................................59 3.5 Sett.i.n..g.s.. .p.r..o.t..e.c..t.i.o..n...................................................20 4.3.2.3.1 Em.a..i.l. c..l.i.e..n..t.. .p..r.o...t.e..c..t..i.o..n.. .c..o..n..f..i.g..u..r.a..t..i.o..n.......................60 3.6 Trus.t.e..d. .z..o.n..e.. .s.e..t.u..p....................................................21 4.3.2.4 Rem.o...v..i.n..g.. .i.n..f.i.l.t..r.a..t..i.o..n...s..............................................60 4.3.3 Ant..i.s..p..a..m... .p..r..o..t..e..c.t..i.o..n....................................................61 4. W..o..r.k. .w..i.t.h.. .E.S..E.T.. .E.n..d.p..o..i.n.t. .S..e.c.u..r.i.t.y........22 4.3.3.1 Addi.n..g.. .a..d..d..r..e..s.s..e..s.. t..o.. .w...h...i.t.e..l.i.s..t.. a..n...d.. .b..l.a..c..k..l.i.s.t.............62 4.1 Com.p..u..t.e..r................................................................24 4.3.3.2 Mark.i.n...g.. m....e..s.s..a..g..e..s.. a..s.. .s.p...a..m..........................................62 4.1.1 An.t..i.v..i.r.u..s.. .a..n..d.. .a..n..t..i.s..p..y..w...a..r..e.. p...r.o..t..e..c..t.i.o...n......................24 4.3.4 Pro..t..o..c..o..l. .f.i.l.t..e..r.i.n..g..........................................................62 4.1.1.1 Real-.t..i.m...e.. .f.i.l.e.. .s..y..s.t..e..m... .p..r..o..t..e..c.t..i.o..n................................24 4.3.4.1 Web. a..n...d.. .e..m...a..i.l. .c.l.i.e..n...t.s.................................................62 4.1.1.1.1 Med..i.a.. .t.o... s..c..a..n...............................................................25 4.3.4.2 Exclu..d..e..d.. .a..p..p...l.i.c.a..t..i.o..n...s................................................63 4.1.1.1.2 Scan.. .o..n... (..E..v..e..n..t..-.t..r.i.g..g..e..r.e..d... s..c..a..n..n..i.n...g..)..........................25 4.3.4.3 Exclu..d..e..d.. .I.P.. .a..d..d..r..e..s.s..e..s.................................................64 4.1.1.1.3 Adv.a..n..c..e..d.. .s..c.a..n... o...p..t..i.o..n..s...............................................26 4.3.4.3.1 Add.. I.P..v..4.. .a..d..d...r.e..s..s.........................................................64 4.1.1.1.4 Clea..n..i.n..g.. .l.e..v..e..l.s.............................................................26 4.3.4.3.2 Add.. I.P..v..6.. .a..d..d...r.e..s..s.........................................................64 4.1.1.1.5 When to modify real-time protection 4.3.4.4 SSL p..r.o..t..o..c..o..l. .c..h..e..c..k..i.n..g.................................................65 conf..i.g..u..r.a..t..i.o..n................................................................27 4.3.4.4.1 Cert..i.f.i.c..a..t..e..s..................................................................65 4.1.1.1.6 Che.c.k..i.n...g.. r..e..a..l.-.t..i.m...e.. .p..r.o...t.e..c..t..i.o..n....................................27 4.3.4.4.1.1 Trust.e..d.. .c.e..r..t.i.f..i.c.a..t..e..s.....................................................65 4.1.1.1.7 Wha..t.. t..o.. .d..o... i.f.. r..e..a..l.-.t..i.m...e.. .p..r.o...t.e..c..t..i.o..n.. .d..o...e..s. .n..o...t. .w...o...r.k...27 4.3.4.4.1.2 Exclu.d..e..d.. .c..e..r.t..i.f.i.c..a..t.e..s...................................................66 4.1.1.2 Docu.m...e..n...t. .p..r..o..t..e..c.t..i.o..n..................................................27 4.3.4.4.1.3 Encry.p..t..e..d.. .S..S..L.. .c.o...m...m...u...n..i.c..a..t.i.o...n..................................66 4.1.1.3 Comp...u..t..e..r. .s.c..a..n.............................................................28 4.4 Web.. c..o..n.t..r.o..l............................................................67 4.1.1.3.1 Typ.e.. o...f. .s.c..a..n..................................................................28 4.4.1 We..b.