1 ESET Endpoint Antivirus for macOS 1 ..................................................................................................
2 Neuerungen in Version 7 1 ...................................................................................................................
2.1 Vergleich zwischen den Version 6 und 7 2 ........................................................................................
2.2 Einstellungen migrieren 6 ..............................................................................................................
2.3 Änderungslog 7 .............................................................................................................................
3 Systemanforderungen 7 .......................................................................................................................
4 Upgrade von ESET Endpoint Antivirus for macOS Version 6 auf Version 7 8 ........................................
5 Installation 10 ......................................................................................................................................
5 Onboarding 11 ..............................................................................................................................
5 Systemerweiterungen erlauben 12 ........................................................................................................
5 Vollständigen Datenträgerzugriff zulassen 12 ............................................................................................
5 Installation mit Kommandozeile 14 ........................................................................................................
5 Einstellungen vor der Installation 14 ......................................................................................................
5 Jamf-Einstellungen vor der Installation 17 ................................................................................................
5 Über die ESET Management-Konsole bereitstellen 20 ....................................................................................
5 Wo finde ich meine Lizenz? 20 .............................................................................................................
5 Lokale Aktivierung 21 ......................................................................................................................
5 Aktivierung mit Terminal 21 ...............................................................................................................
5 Remoteaktivierung 22 ......................................................................................................................
6 Dokumentation für remote verwaltete Endpunkte 22 ..........................................................................
6.1 Produktkonfiguration in ESET PROTECT 22 .......................................................................................
6.1 Malware Scan Engine 23 .................................................................................................................
6.1 Echtzeit-Dateischutz 24 ..................................................................................................................
6.1 Cloudbasierter Schutz 26 ................................................................................................................
6.1 Malware-Scans 27 ........................................................................................................................
6.1 ThreatSense-Parameter 28 ..............................................................................................................
6.1 Zusätzliche ThreatSense-Parameter 31 .................................................................................................
6.1 Säuberungsstufen 31 ....................................................................................................................
6.1 Update 32 .................................................................................................................................
6.1 Update-Mirror (benutzerdefinierte Updateserver) 33 ...................................................................................
6.1 Phishing-Schutz 34 .......................................................................................................................
6.1 Web-Schutz 34 ...........................................................................................................................
6.1 E-Mail-Client-Schutz 36 ..................................................................................................................
6.1 Tools 37 ...................................................................................................................................
6.1 Proxyserver 38 ...........................................................................................................................
6.1 Log-Dateien 39 ...........................................................................................................................
6.1 Benutzeroberfläche 40 ...................................................................................................................
6.2 Einführung in ESET PROTECT CLOUD 41 ...........................................................................................
6.3 Einführung in ESET PROTECT 41 ......................................................................................................
6.4 Benachrichtigungen über MDM deaktivieren 43 ................................................................................
7 Arbeiten mit ESET Endpoint Antivirus for macOS 43 ............................................................................
7.1 Übersicht 44 .................................................................................................................................
7.2 Scannen 45 ..................................................................................................................................
7.2 Benutzerdefinierter Scan 48 .............................................................................................................
7.3 Sample abschicken 49 ...................................................................................................................
7.4 Schutzfunktionen 49 .....................................................................................................................
7.4 Computer 50 ..............................................................................................................................
7.4 Web und E-Mail 50 .......................................................................................................................
7.5 Update 51 ....................................................................................................................................
7.6 Tools 51 .......................................................................................................................................