Inhalt
.......................................................5Einleitung1.
.......................................................7Übersicht2.
....................................................................................................7Hauptfunktionen2.1
....................................................................................................8Neuerungen2.2
....................................................................................................9Bereitstellung2.3
..............................................................................9SharePoint Farm-Bereitstellung
2.3.1
..............................................................................10Installation in einer Cluster-Umgebung
2.3.2
....................................................................................................10SharePoint-Schutzarten2.4
..............................................................................10SharePoint-Integration
2.4.1
..................................................................................10Zugriffsfilter
2.4.1.1
..................................................................................11On-Demand-Datenbank-Scan
2.4.1.2
.......................................................13Vorbereiten für die Installation3.
....................................................................................................14Systemanforderungen3.1
....................................................................................................15SHA-2-Kompatibilität erforderlich3.2
....................................................................................................16
ESET Security for Microsoft SharePoint
Installationsschritte
3.3
..............................................................................20Vorha ndene Installa tion bearbeiten
3.3.1
....................................................................................................21Stille/unbeaufsichtigte Installation3.4
..............................................................................22Installation über die Kommandozeile
3.4.1
....................................................................................................26Produktaktivierung3.5
..............................................................................27ESET Business Account
3.5.1
..............................................................................27Aktivierung erfolgreich
3.5.2
..............................................................................27Aktivierungsfehler
3.5.3
..............................................................................27Lizenz
3.5.4
....................................................................................................28Auf neuere Version aktualisieren3.6
..............................................................................29Upgrades über ESMC
3.6.1
..............................................................................32Upgrades per ESET-Cluster
3.6.2
....................................................................................................34Terminalserver3.7
.......................................................35Erste Schritte4.
....................................................................................................35
Verwaltung über ESET Security
Management Center
4.1
....................................................................................................36Überwachung4.2
..............................................................................37Status
4.2.1
..............................................................................40Windows-Update verfügbar
4.2.2
..............................................................................40Netzwerkisolierung
4.2.3
.......................................................42
Arbeiten mit ESET Security for Microsoft
SharePoint
5.
....................................................................................................42Prüfung5.1
..............................................................................44Scanfenster und Scan-Log
5.1.1
....................................................................................................46Log-Dateien5.2
..............................................................................49Log-Filter
5.2.1
....................................................................................................50Update5.3
....................................................................................................53Einstellungen5.4
..............................................................................54Server
5.4.1
..............................................................................54Computer
5.4.2
..............................................................................55Netzwerk
5.4.3
..................................................................................55Fehlerbehebungsas sistent für das Netzwerk
5.4.3.1
..............................................................................55Web und E-Mail
5.4.4
..............................................................................56Tools - Diagnose-Logging
5.4.5
..............................................................................57Einstellungen importieren/exportieren
5.4.6
....................................................................................................57Tools5.5
..............................................................................59Ausgeführte Prozess e
5.5.1
..............................................................................60Aktivitä t beobachten
5.5.2
..............................................................................62Schutzstatistiken
5.5.3
..............................................................................63Cluster
5.5.4
..................................................................................65Clus terassistent – Knoten auswählen
5.5.4.1
..................................................................................66Clus terassistent – Clustereinstellungen
5.5.4.2
..................................................................................66
Clus terassistent - Einstellungen für die
Clustereinrichtung
5.5.4.3
..................................................................................67Clus terassistent – Knotenprüfung
5.5.4.4
..................................................................................69Clus terassistent - Knoteninstallation
5.5.4.5
..............................................................................71ESET-Shell
5.5.5
..................................................................................73Nutzung
5.5.5.1
..................................................................................78Befehle
5.5.5.2
..................................................................................80Batchdateien / Skripts
5.5.5.3
..............................................................................81ESET SysInspector
5.5.6
..............................................................................82ESET SysRescue Live
5.5.7
..............................................................................82Taskplaner
5.5.8
..................................................................................84Taskpla ner - Task hinzufügen
5.5.8.1
........................................................................86Tasktyp
5.5.8.1.1
........................................................................86Task-Zeitplanung
5.5.8.1.2
........................................................................87Durch Ereignis a usgelöst
5.5.8.1.3
........................................................................87Anwendung starten
5.5.8.1.4
........................................................................87Übersprungener Ta sk
5.5.8.1.5
........................................................................88Übersicht über geplante Tasks
5.5.8.1.6
..............................................................................88Da tei zur Analyse einreichen
5.5.9
..................................................................................89Verdächtige Datei
5.5.9.1
..................................................................................89Verdächtige Webseite
5.5.9.2
..................................................................................89Fehlalarm Datei
5.5.9.3
..................................................................................90Fehlalarm Webseite
5.5.9.4
..................................................................................90Sonstige
5.5.9.5
..............................................................................91Quarantäne
5.5.10
.......................................................93Server-Schutzeinstellungen6.
....................................................................................................95Leistungsindikatoren6.1
....................................................................................................97Echtzeitfilter6.2
..............................................................................98Viren- und Spywa re-Schutz
6.2.1
....................................................................................................99On-Demand-Datenbankprüfung6.3
..............................................................................99Prüfziele für die On-Demand-Datenba nkprüfung
6.3.1
..................................................................................101Viren- und Spyware-Schutz
6.3.1.1
....................................................................................................101Regeln6.4
..............................................................................101Regelliste
6.4.1
..................................................................................103Regelassistent
6.4.1.1
........................................................................104Regelbedingung
6.4.1.1.1
........................................................................106Regelaktionen
6.4.1.1.2
.......................................................108Allgemeine Einstellungen7.
....................................................................................................108Computer7.1