Inhalt
.......................................................5PRODUCTNAME1.
....................................................................................................5Neuerungen in Version 61.1
....................................................................................................5Systemanforderungen1.2
.......................................................6
Benutzerverbindungen über ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator-Server2.1
....................................................................................................7Web-Konsole2.2
....................................................................................................8Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installation3.
....................................................................................................9Standardinstallation3.1
....................................................................................................10Benutzerdefinierte Installation3.2
....................................................................................................11Remoteinstallation3.3
..............................................................................11Ein Remoteins tallationspa ket erstellen
3.3.1
..............................................................................12Remoteinstalla tion auf den Zielrechnern
3.3.2
..............................................................................12Remote-Deinstallation
3.3.3
..............................................................................12Remote-Upgrade
3.3.4
.......................................................13Produktaktivierung4.
.......................................................15Deinstallation5.
.......................................................16Übersicht6.
....................................................................................................16Tastaturbefehle6.1
....................................................................................................17
Überprüfen der Funktionsfähigkeit des
Systems
6.2
....................................................................................................17
Vorgehensweise bei fehlerhafter
Ausführung des Programms
6.3
.......................................................18Computerschutz7.
....................................................................................................18Viren- und Spyware-Schutz7.1
..............................................................................18Allgemein
7.1.1
..................................................................................18Ausschlussfilter
7.1.1.1
..............................................................................19Systemstart-Schutz
7.1.2
..............................................................................19Echtzeit-Dateischutz
7.1.3
..................................................................................19Erweiterte Optionen
7.1.3.1
..................................................................................20
Wann sollten die Einstellungen für den
Echtzeit-Dateischutz geändert werden?
7.1.3.2
..................................................................................20Echtzeit-Da teischutz prüfen
7.1.3.3
..................................................................................20
Vorgehensweise bei fehlerhaftem
Echtzeit-Dateischutz
7.1.3.4
..............................................................................21On-Demand-Prüfung
7.1.4
..................................................................................21Prüfmethode
7.1.4.1
........................................................................21Smart-Prüfung
7.1.4.1.1
........................................................................22Benutzerdefinierte Prüfung
7.1.4.1.2
..................................................................................22Zu prüfende Objekte
7.1.4.2
..................................................................................22Prüfprofile
7.1.4.3
..............................................................................23Einstellungen für ThreatSense
7.1.5
..................................................................................23Objekte
7.1.5.1
..................................................................................24Optionen
7.1.5.2
..................................................................................24Säubern
7.1.5.3
..................................................................................24Ausschlussfilter
7.1.5.4
..................................................................................25Grenzen
7.1.5.5
..................................................................................25Weitere
7.1.5.6
..............................................................................25Eingedrungene Schadsoftware wurde erkannt
7.1.6
....................................................................................................26Web- und E-Mail-Schutz7.2
..............................................................................26Web-Schutz
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL-Listen
7.2.1.2
..............................................................................27E-Mail-Schutz
7.2.2
..................................................................................27Prüfen des POP3-Protokolls
7.2.2.1
..................................................................................28Prüfen des IMAP-Protokolls
7.2.2.2
....................................................................................................28Phishing-Schutz7.3
.......................................................29Firewall8.
....................................................................................................29Filtermodi8.1
....................................................................................................30Firewall-Regeln8.2
..............................................................................30Erstellen neuer Regeln
8.2.1
....................................................................................................30Firewall-Zonen8.3
....................................................................................................31Firewall-Profile8.4
....................................................................................................31Firewall-Logs8.5
.......................................................32Medienkontrolle9.
....................................................................................................32Regel-Editor9.1
.......................................................34Web-Kontrolle10.
.......................................................35Tools11.
....................................................................................................35Log-Dateien11.1
..............................................................................35Log-Wartung
11.1.1
..............................................................................36Log-Filter
11.1.2
....................................................................................................37Taskplaner11.2
..............................................................................38Erstellen von Ta sks
11.2.1
..............................................................................38Erstellen eines benutzerdefinierten Tas ks
11.2.2
....................................................................................................39Live Grid11.3
..............................................................................39Verdächtige Dateien
11.3.1
....................................................................................................40Quarantäne11.4
..............................................................................40Qua rantäne für Dateien
11.4.1
..............................................................................40Wiederherstellen einer Datei aus der Qua rantäne
11.4.2
..............................................................................40Einreichen von Dateien a us der Quarantäne
11.4.3
....................................................................................................41Berechtigungen11.5
....................................................................................................41Präsentationsmodus11.6
....................................................................................................42Ausgeführte Prozesse11.7
.......................................................43Benutzeroberfläche12.
....................................................................................................43Warnungen und Benachrichtigungen12.1
..............................................................................43Warnungen anzeigen
12.1.1
..............................................................................44Schutzstatus
12.1.2
....................................................................................................44Kontextmenü12.2