Eset Endpoint Antivirus

Eset Endpoint Antivirus

ESET ENDPOINT ANTIVIRUS User Guide Microsoft® Windows® 8 / 7 / Vista / XP / 2000 / Home Server / NT4 (SP6) Click here to download the most recent version of this document ESET ENDPOINT ANTIVIRUS Copyright ©2013 by ESET, spol. s r. o. ESET Endpoint Antivirus was developed by ESET, spol. s r. o. For more information visit www.eset.com. All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without permission in writing from the author. ESET, spol. s r. o. reserves the right to change any of the described application software without prior notice. Worldwide Customer Support: www.eset.com/support REV. 17. 4. 2013 Contents 4.2.1.1 HTTP.,. .H...T..T..P..s.................................................................41 1. ES.E..T. .E..n.d..p..o.i.n..t. .A.n..t.i.v..ir..u.s......................5 4.2.1.1.1 Acti.v..e.. .m...o...d..e.. .f.o..r.. w....e..b.. .b..r.o...w...s..e..r.s..................................42 4.2.1.2 URL .a..d..d..r..e..s.s.. .m...a..n..a..g..e..m....e..n..t.........................................42 1.1 Syste.m... .r.e..q.u..i.r.e..m...e.n..t.s..................................................5 4.2.2 Em..a..i.l. c..l.i.e..n..t.. .p..r.o...t.e..c..t..i.o..n................................................43 1.2 Preve.n..t.i.o..n.................................................................5 4.2.2.1 POP3..,. P..O...P..3..S.. .f.i.l.t..e..r.......................................................44 4.2.2.2 IMAP.,. .I.M...A...P..S.. p...r.o..t..o..c..o..l. .c..o..n..t..r.o...l...................................45 2. In.s.t.a..ll.a..t.i.o.n.......................................7 4.2.2.3 Integ..r.a..t..i.o..n.. .w...i.t..h.. .e..m...a..i.l. .c..l.i.e..n..t..s...................................45 4.2.2.3.1 Ema..i.l. .c.l.i.e..n...t. .p..r..o..t..e..c.t..i.o..n... c..o..n...f.i.g..u..r..a..t.i.o...n.......................46 2.1 Typic.a..l .i.n..s.t.a..l.l.a.t..io..n......................................................8 4.2.2.4 Rem.o..v..i.n..g.. .i.n..f..i.l.t.r..a..t.i.o...n..s...............................................46 2.2 Cust.o..m... .in..s..t.a..ll.a..t.i.o..n...................................................10 4.2.3 Pro..t.o...c.o...l. f..i.l.t.e..r..i.n..g..........................................................47 2.3 Ente.r.i.n..g. .u..s.e..r.n..a..m...e. .a..n..d. .p..a..s.s..w..o..r.d................................13 4.2.3.1 Web .a..n..d... e..m....a..i.l. c..l.i.e..n..t..s.................................................47 2.4 Upgr.a..d..i.n.g.. .t.o.. .a. .m...o..r.e.. r..e.c..e..n.t.. v..e..r.s..io..n.............................13 4.2.3.2 Exclu..d..e..d.. .a..p..p...l.i.c.a..t..i.o..n...s................................................48 4.2.3.3 Exclu..d..e..d.. .I.P.. .a..d..d..r..e..s.s..e..s.................................................49 2.5 Com.p..u..t.e..r. .s.c..a.n..........................................................14 4.2.3.3.1 Add.. I.P..v..4.. .a..d..d...r.e..s..s.........................................................49 3. B.e.g..i.n.n..e..r.'s.. g..u.i.d..e...............................15 4.2.3.3.2 Add.. I.P..v..6.. .a..d..d...r.e..s..s.........................................................49 4.2.3.4 SSL p..r..o..t..o..c..o..l. .c.h...e..c.k..i.n...g................................................50 3.1 Intro.d..u..c.i.n..g.. u..s..e.r.. i.n..t.e..r.f.a..c.e.. .d..e.s..i.g.n.................................15 4.2.3.4.1 Cer.t..i.f.i.c..a..t.e..s..................................................................50 3.2 Wha.t. .t.o.. .d..o. .i.f. .t.h..e. .p..r.o..g..r.a..m.. .d..o..e.s..n..'t.. w...o..r.k.. p..r.o..p..e..r.l.y..........16 4.2.3.4.1.1 Trust.e..d... c..e..r.t..i.f.i.c..a..t..e..s....................................................50 3.3 Upda..t.e.. .s.e..t.u..p............................................................17 4.2.3.4.1.2 Exclud..e..d... c..e..r.t..i.f.i.c..a..t..e..s...................................................51 4.2.3.4.1.3 Encryp...t.e..d... S..S..L.. .c..o..m...m....u..n..i.c..a..t..i.o..n...................................51 3.4 Prox.y.. .s.e..r.v..e..r. .s.e..t.u..p....................................................18 4.3 Upd.a.t..in..g.. .t.h..e. .p..r.o..g..r.a..m................................................52 3.5 Sett.in..g..s. .p..r.o..t.e..c.t..io..n....................................................19 4.3.1 Up.d...a..t.e.. .s..e..t.u...p...............................................................55 4. W...o.r.k.. .w..i.t.h.. E..S.E..T. .E..n.d..p..o.i.n..t. .A.n..t.i.v..ir..u.s......20 4.3.1.1 Upda..t..e.. p...r.o..f..i.l.e..s...........................................................56 4.3.1.2 Adva.n...c.e..d... u...p..d..a..t..e.. .s.e..t..u..p..............................................56 4.1 Com.p..u.t..e.r.................................................................21 4.3.1.2.1 Upd..a..t..e.. m....o..d..e...............................................................56 4.1.1 An.t..i.v..i.r.u..s.. .a..n..d.. .a..n..t..i.s..p..y..w...a..r..e.. p...r.o..t..e..c..t.i.o...n......................22 4.3.1.2.2 Prox..y.. .s.e..r..v..e..r.................................................................57 4.1.1.1 Real-.t..i.m...e.. .f.i.l.e.. .s..y..s.t..e..m... .p..r..o..t..e..c.t..i.o..n................................22 4.3.1.2.3 Con.n...e..c.t..i.n..g.. .t..o.. .t.h...e.. L..A...N................................................57 4.1.1.1.1 Med..i.a.. .t.o... s..c..a..n...............................................................23 4.3.1.2.4 Crea..t..i.n..g.. .u..p...d..a..t..e.. c..o..p...i.e..s. .-. .M...i.r..r.o..r.................................58 4.1.1.1.2 Scan.. .o..n... (..E..v..e..n..t..-.t..r.i.g..g..e..r.e..d... s..c..a..n..n..i.n...g..)..........................23 4.3.1.2.4.1 Upda.t..i.n..g.. .f.r.o...m... .t.h...e.. M....i.r.r.o...r..........................................59 4.1.1.1.3 Adv.a..n..c..e..d.. .s..c.a..n... o...p..t..i.o..n..s...............................................23 4.3.1.2.4.2 Troub...l.e..s.h...o..o..t..i.n..g.. .M...i.r..r.o..r.. u...p..d..a..t..e.. .p..r.o...b..l.e..m...s...............60 4.1.1.1.4 Clea..n..i.n..g.. .l.e..v..e..l.s.............................................................23 4.3.1.3 Upda.t..e.. .r.o..l.l.b...a..c.k............................................................61 4.1.1.1.5 When to modify real-time protection 4.3.2 Ho..w... .t.o... c..r.e..a..t..e.. .u..p..d...a..t.e.. .t..a..s.k..s.......................................62 con.f.i.g..u..r..a..t.i.o...n...............................................................24 4.4 Tool.s.......................................................................63 4.1.1.1.6 Che.c..k..i.n..g.. .r.e..a..l.-.t..i.m...e.. .p..r..o..t..e..c.t..i.o..n....................................24 4.4.1 Lo.g.. f..i.l.e..s........................................................................64 4.1.1.1.7 Wha..t.. .t.o... d...o.. .i.f. .r.e..a..l.-.t..i.m...e.. .p..r..o..t..e..c.t..i.o..n... d...o..e..s.. n...o..t.. w....o..r.k...24 4.4.1.1 Log m...a..i.n..t..e..n..a..n...c.e.........................................................65 4.1.1.2 Docu.m....e..n..t.. p...r.o..t..e..c..t.i.o...n.................................................25 4.4.2 Sch..e..d...u..l.e..r.....................................................................65 4.1.1.3 Comp...u..t..e..r. .s.c..a..n.............................................................25 4.4.2.1 Creat..i.n..g.. .n..e..w.... t..a..s..k..s.....................................................68 4.1.1.3.1 Typ.e.. o...f. .s.c..a..n..................................................................26 4.4.3 Pro..t..e..c.t..i.o..n... s..t..a..t.i.s..t..i.c.s....................................................69 4.1.1.3.1.1 Smart.. s..c..a..n....................................................................26 4.4.4 Wa..t..c..h.. .a..c.t..i.v..i.t..y.............................................................70 4.1.1.3.1.2 Custo..m... .s.c..a..n.................................................................26 4.4.5 ES.E..T.. S..y..s..I.n..s..p..e..c..t..o..r.......................................................70 4.1.1.3.2 Scan.. .t..a..r.g..e..t..s.................................................................26 4.4.6 ESE.T.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    105 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us