Inhalt
.......................................................5PRODUCTNAME1.
....................................................................................................5Neuerungen in Version 61.1
....................................................................................................5Systemanforderungen1.2
.......................................................6Installation2.
....................................................................................................6Standardinstallation2.1
....................................................................................................7Benutzerdefinierte Installation2.2
.......................................................8Produktaktivierung3.
.......................................................9Deinstallation4.
.......................................................10Übersicht5.
....................................................................................................10Tastaturbefehle5.1
....................................................................................................11Schutzstatus prüfen5.2
....................................................................................................11
Vorgehensweise bei fehlerhafter
Ausführung des Programms
5.3
.......................................................12Computerschutz6.
....................................................................................................12Viren- und Spyware-Schutz6.1
..............................................................................12Allgemein
6.1.1
..................................................................................12Ausschlussfilter
6.1.1.1
..............................................................................13Systemstart-Schutz
6.1.2
..............................................................................13Echtzeit-Dateischutz
6.1.3
..................................................................................13Erweiterte Einstellungen
6.1.3.1
..................................................................................13
Wann sollten die Eins tellungen für den
Echtzeit-Dateischutz geändert werden?
6.1.3.2
..................................................................................14Echtzeit-Da teischutz prüfen
6.1.3.3
..................................................................................14
Vorgehensweise bei fehlerhaftem
Echtzeit-Dateischutz
6.1.3.4
..............................................................................14On-Demand-Prüfung
6.1.4
..................................................................................15Prüfungstyp
6.1.4.1
........................................................................15Smart-Prüfung
6.1.4.1.1
........................................................................15Prüfen mit speziellen Einstellungen
6.1.4.1.2
..................................................................................15Zu prüfende Objekte
6.1.4.2
..................................................................................16Prüfprofile
6.1.4.3
..............................................................................16Einstellungen für ThreatSense
6.1.5
..................................................................................17Objekte
6.1.5.1
..................................................................................17Optionen
6.1.5.2
..................................................................................17Säubern
6.1.5.3
..................................................................................18Ausschlussfilter
6.1.5.4
..................................................................................18Grenzen
6.1.5.5
..................................................................................18Sonstige
6.1.5.6
..............................................................................18Eingedrungene Schadsoftware wurde erkannt
6.1.6
....................................................................................................19
Prüfen und Sperren von
Wechselmedien
6.2
.......................................................20Phishing-Schutz7.
.......................................................21Firewall8.
....................................................................................................21Filtermodi8.1
....................................................................................................22Firewall-Regeln8.2
..............................................................................22Erstellen neuer Regeln
8.2.1
....................................................................................................22Firewall-Zonen8.3
....................................................................................................22Firewall-Profile8.4
....................................................................................................23Firewall-Logs8.5
.......................................................24Web- und E-Mail-Schutz9.
....................................................................................................24Web-Schutz9.1
..............................................................................24Ports
9.1.1
..............................................................................24URL-Listen
9.1.2
....................................................................................................24E-Mail-Schutz9.2
..............................................................................25Prüfen von E-Mails per POP3-Protokoll
9.2.1
..............................................................................25Prüfen von E-Mails per IMAP-Protokoll
9.2.2
.......................................................26Kindersicherung10.
.......................................................27Update11.
....................................................................................................27Einstellungen für Updates11.1
..............................................................................27Erweiterte Einstellungen
11.1.1
....................................................................................................27So erstellen Sie Update-Tasks11.2
....................................................................................................28
Upgrade von ESET Cyber Security Pro
auf eine neue Version
11.3
....................................................................................................28Systemupdates11.4
.......................................................29Tools12.
....................................................................................................29Log-Dateien12.1
..............................................................................29Log-Wartung
12.1.1
..............................................................................30Log-Filter
12.1.2
....................................................................................................30Taskplaner12.2
..............................................................................31Erstellen von Ta sks
12.2.1
..............................................................................31Erstellen von benutzerdefinierten Tasks
12.2.2
....................................................................................................32Quarantäne12.3
..............................................................................32Qua rantäne für Dateien
12.3.1
..............................................................................32Wiederherstellen a us Quarantäne
12.3.2
..............................................................................32Einreichen von Dateien a us der Quara ntäne
12.3.3
....................................................................................................32Ausgeführte Prozesse12.4
....................................................................................................33Live Grid12.5
..............................................................................33Live Grid-Einstellungen
12.5.1
.......................................................34Benutzeroberfläche13.
....................................................................................................34Warnungen und Hinweise13.1
..............................................................................34Warnungen anzeigen
13.1.1
..............................................................................34Schutzstatus
13.1.2
....................................................................................................35Berechtigungen13.2
....................................................................................................35Kontextmenü13.3
.......................................................36Allgemein14.
....................................................................................................36Einstellungen importieren/exportieren14.1
....................................................................................................36Einstellungen für Proxyserver14.2
.......................................................37Glossar15.
....................................................................................................37Arten von Infiltrationen15.1