Inhalt
...........................................................................................................................4
Einführung1.
..........................................................................................................................................................................................................4Neuerungen in Version 3,51.1
..........................................................................................................................................................................................................4Mindestsystemanforderungen1.2
...........................................................................................................................4
Installation2.
..........................................................................................................................................................................................................5Download aus Google Play2.1
..........................................................................................................................................................................................................5Download von der ESET-Website2.2
..........................................................................................................................................................................................................6Startassistent2.3
...........................................................................................................................9
Deinstallation3.
...........................................................................................................................9
Produktaktivierung4.
...........................................................................................................................10
Virenschutz5.
..........................................................................................................................................................................................................12Automatische Prüfung5.1
..........................................................................................................................................................................................................13Scan-Logs5.2
..........................................................................................................................................................................................................14Erweiterte Einstellungen5.3
...........................................................................................................................15
Anti-Theft6.
..........................................................................................................................................................................................................16Web-Portal6.1
...............................................................................................................................................................................................17Optimierung
6.1.1
...............................................................................................................................................................................................17Proaktiver Schutz
6.1.2
..........................................................................................................................................................................................................17SIM-Schutz6.2
...............................................................................................................................................................................................18Vertrauenswürdige SIM-Karten
6.2.1
...............................................................................................................................................................................................18Vertrauenswürdige Freunde
6.2.2
..........................................................................................................................................................................................................19SMS-Textbefehle6.3
..........................................................................................................................................................................................................20Einstellungen6.4
...............................................................................................................................................................................................20Sicherheitspasswort
6.4.1
...............................................................................................................................................................................................20Kontaktdetails
6.4.2
...........................................................................................................................21
Phishing-Schutz7.
...........................................................................................................................22
SMS- und Anruffilter8.
..........................................................................................................................................................................................................22Regeln8.1
...............................................................................................................................................................................................23Neue Regel hinzufügen
8.1.1
..........................................................................................................................................................................................................23Verlauf8.2
...........................................................................................................................23
Sicherheits-Audit9.
..........................................................................................................................................................................................................24Geräteüberwachung9.1
..........................................................................................................................................................................................................25Anwendungsaudit9.2
...........................................................................................................................26
Sicherheitsbericht10.
...........................................................................................................................27
Einstellungen11.
...........................................................................................................................28
Support12.