Inhalt
.......................................................5PRODUCTNAME1.
....................................................................................................5Neuerungen in Version 61.1
....................................................................................................5Systemanforderungen1.2
.......................................................6Installation2.
....................................................................................................6Standardinstallation2.1
....................................................................................................7Benutzerdefinierte Installation2.2
.......................................................8Produktaktivierung3.
.......................................................9Deinstallation4.
.......................................................10Übersicht5.
....................................................................................................10Tastaturbefehle5.1
....................................................................................................11Schutzstatus prüfen5.2
....................................................................................................11
Vorgehensweise bei fehlerhafter
Ausführung des Programms
5.3
.......................................................12Computerschutz6.
....................................................................................................12Viren- und Spyware-Schutz6.1
..............................................................................12Allgemein
6.1.1
..................................................................................12Ausschlussfilter
6.1.1.1
..............................................................................13Systemstart-Schutz
6.1.2
..............................................................................13Echtzeit-Dateischutz
6.1.3
..................................................................................13Erweiterte Einstellungen
6.1.3.1
..................................................................................13
Wann sollten die Eins tellungen für den
Echtzeit-Dateischutz geändert werden?
6.1.3.2
..................................................................................14Echtzeit-Da teischutz prüfen
6.1.3.3
..................................................................................14
Vorgehensweise bei fehlerhaftem
Echtzeit-Dateischutz
6.1.3.4
..............................................................................14On-Demand-Prüfung
6.1.4
..................................................................................15Prüfungstyp
6.1.4.1
........................................................................15Smart-Prüfung
6.1.4.1.1
........................................................................15Prüfen mit speziellen Einstellungen
6.1.4.1.2
..................................................................................15Zu prüfende Objekte
6.1.4.2
..................................................................................16Prüfprofile
6.1.4.3
..............................................................................16Einstellungen für ThreatSense
6.1.5
..................................................................................17Objekte
6.1.5.1
..................................................................................17Optionen
6.1.5.2
..................................................................................17Säubern
6.1.5.3
..................................................................................18Ausschlussfilter
6.1.5.4
..................................................................................18Grenzen
6.1.5.5
..................................................................................18Sonstige
6.1.5.6
..............................................................................18Eingedrungene Schadsoftware wurde erkannt
6.1.6
....................................................................................................19
Prüfen und Sperren von
Wechselmedien
6.2
.......................................................20Phishing-Schutz7.
.......................................................21Web- und E-Mail-Schutz8.
....................................................................................................21Web-Schutz8.1
..............................................................................21Ports
8.1.1
..............................................................................21URL-Listen
8.1.2
....................................................................................................21E-Mail-Schutz8.2
..............................................................................22Prüfen von E-Mails per POP3-Protokoll
8.2.1
..............................................................................22Prüfen von E-Mails per IMAP-Protokoll
8.2.2
.......................................................23Update9.
....................................................................................................23Einstellungen für Updates9.1
..............................................................................23Erweiterte Einstellungen
9.1.1
....................................................................................................23So erstellen Sie Update-Tasks9.2
....................................................................................................24
Upgrade von ESET Cyber Security auf
eine neue Version
9.3
....................................................................................................24Systemupdates9.4
.......................................................25Tools10.
....................................................................................................25Log-Dateien10.1
..............................................................................25Log-Wartung
10.1.1
..............................................................................26Log-Filter
10.1.2
....................................................................................................26Taskplaner10.2
..............................................................................27Erstellen von Ta sks
10.2.1
..............................................................................27Erstellen von benutzerdefinierten Tasks
10.2.2
....................................................................................................28Quarantäne10.3
..............................................................................28Qua rantäne für Dateien
10.3.1
..............................................................................28Wiederherstellen a us Quarantäne
10.3.2
..............................................................................28Einreichen von Dateien a us der Quara ntäne
10.3.3
....................................................................................................28Ausgeführte Prozesse10.4
....................................................................................................29Live Grid10.5
..............................................................................29Live Grid-Einstellungen
10.5.1
.......................................................30Benutzeroberfläche11.
....................................................................................................30Warnungen und Hinweise11.1
..............................................................................30Warnungen anzeigen
11.1.1
..............................................................................30Schutzstatus
11.1.2
....................................................................................................31Berechtigungen11.2
....................................................................................................31Kontextmenü11.3
.......................................................32Allgemein12.
....................................................................................................32Einstellungen importieren/exportieren12.1
....................................................................................................32Einstellungen für Proxyserver12.2
.......................................................33Glossar13.
....................................................................................................33Arten von Infiltrationen13.1
..............................................................................33Viren
13.1.1
..............................................................................33Würmer
13.1.2
..............................................................................33Trojaner
13.1.3
..............................................................................34Rootkits
13.1.4
..............................................................................34Adware
13.1.5
..............................................................................34Spyware
13.1.6
..............................................................................34Potenziell unsichere Anwendungen
13.1.7
..............................................................................35Evtl. unerwünschte Anwendungen
13.1.8
....................................................................................................35Arten von Remote-Angriffen13.2
..............................................................................35DoS-Angriffe
13.2.1