..................................................................................84Fehlerbehebungsassistent
4.3.8.1
..................................................................................84
Erstellen von Logs und Erstellen von Regeln oder
Ausnahmen anhand des Logs
4.3.8.2
........................................................................84Regel aus Log erstellen
4.3.8.2.1
..................................................................................85Erstellen von Ausnahmen von Firewall-Hinweisen
4.3.8.3
..................................................................................85Erweitertes PCAP-Logging
4.3.8.4
..................................................................................85Lösen von Problemen bei der Protokollfilterung
4.3.8.5
....................................................................................................86Sicherheits-Tools4.4
..............................................................................86Kindersicherung
4.4.1
..................................................................................89Kategorien
4.4.1.1
..................................................................................90Website-Ausnahmen
4.4.1.2
....................................................................................................91Aktualisieren des Programms4.5
..............................................................................94Update-Einstellungen
4.5.1
..................................................................................96Erweiterte Einstellungen für Updates
4.5.1.1
........................................................................96Update-Modus
4.5.1.1.1
........................................................................96Verbindungsoptionen
4.5.1.1.2
..............................................................................97Update-Rollback
4.5.2
..............................................................................98So erstellen Sie Update-Tasks
4.5.3
....................................................................................................99Tools4.6
..............................................................................100Password Manager
4.6.1
..................................................................................100Password Manager aktivieren
4.6.1.1
..................................................................................101Password Manager entsperren
4.6.1.2
..................................................................................101Password Manager deaktivieren
4.6.1.3
..................................................................................102Unterstützte Browser
4.6.1.4
..............................................................................102Identitäten
4.6.2
..............................................................................102App-Konten
4.6.3
..............................................................................103Web-Konten
4.6.4
..............................................................................103Menü
4.6.5
..................................................................................104Einstellungen
4.6.5.1
..................................................................................104Tools
4.6.5.2
..............................................................................105Mein Konto
4.6.6
..................................................................................105Master-Passwort
4.6.6.1
..................................................................................105Synchronisierung
4.6.6.2
..............................................................................106Secure Data Einführung
4.6.7
..................................................................................106Installation
4.6.7.1
..................................................................................106Erste Schritte
4.6.7.2
........................................................................107Verschlüsseltes virtuelles Laufwerk
4.6.7.2.1
........................................................................109Verschlüsselter Wechseldatenträger
4.6.7.2.2
..............................................................................110Sicheres Heimnetzwerk
4.6.8
..................................................................................111Netzwerkgerät
4.6.8.1
..............................................................................112Webcam-Schutz
4.6.9
..............................................................................112Tools in ESET Smart Security Premium
4.6.10
..................................................................................113Log-Dateien
4.6.10.1
........................................................................115Log-Dateien
4.6.10.1.1
..................................................................................116Ausgeführte Prozesse
4.6.10.2
..................................................................................117Sicherheitsbericht
4.6.10.3
..................................................................................118Aktivität beobachten
4.6.10.4
..................................................................................119Netzwerkverbindungen
4.6.10.5
..................................................................................120ESET SysInspector
4.6.10.6
..................................................................................121Taskplaner
4.6.10.7
..................................................................................123System Cleaner
4.6.10.8
..................................................................................123ESET SysRescue
4.6.10.9
..................................................................................123Cloudbasierter Schutz
4.6.10.10
........................................................................125Verdächtige Dateien
4.6.10.10.1
..................................................................................125Quarantäne
4.6.10.11
..................................................................................126Proxyserver
4.6.10.12
..................................................................................127E-Mail-Benachrichtigungen
4.6.10.13
........................................................................128Format von Meldungen
4.6.10.13.1
..................................................................................129Probe für die Analyse auswählen
4.6.10.14
..................................................................................129Microsoft Windows® update
4.6.10.15
..................................................................................130ESET CMD
4.6.10.16
....................................................................................................131Benutzeroberfläche4.7
..............................................................................132Elemente der Benutzeroberfläche
4.7.1
..............................................................................133Warnungen und Hinweise
4.7.2
..................................................................................134Erweiterte Einstellungen
4.7.2.1
..............................................................................135Einstellungen für den Zugriff
4.7.3
..............................................................................136Programmmenü
4.7.4
.......................................................138Fortgeschrittene Benutzer5.
....................................................................................................138Profile5.1
....................................................................................................139Tastaturbefehle5.2
....................................................................................................139Diagnose5.3
....................................................................................................140Einstellungen importieren/exportieren5.4
....................................................................................................141ESET SysInspector5.5
..............................................................................141Einführung in ESET SysInspector
5.5.1
..................................................................................141Starten von ESET SysInspector
5.5.1.1
..............................................................................142Benutzeroberfläche und Bedienung
5.5.2
..................................................................................142Menüs und Bedienelemente
5.5.2.1
..................................................................................144Navigation in ESET SysInspector
5.5.2.2
........................................................................145Tastaturbefehle
5.5.2.2.1
..................................................................................146Vergleichsfunktion
5.5.2.3
..............................................................................147Befehlszeilenparameter
5.5.3
..............................................................................148Dienste-Skript
5.5.4
..................................................................................148Erstellen eines Dienste-Skripts
5.5.4.1
..................................................................................148Aufbau des Dienste-Skripts
5.5.4.2
..................................................................................151Ausführen von Dienste-Skripten
5.5.4.3
..............................................................................152Häufige Fragen (FAQ)
5.5.5
....................................................................................................154Kommandozeile5.6
.......................................................156Glossar6.
....................................................................................................156Schadsoftwaretypen6.1
..............................................................................156Viren
6.1.1
..............................................................................156Würmer
6.1.2
..............................................................................157Trojaner
6.1.3
..............................................................................157Rootkits
6.1.4
..............................................................................157Adware
6.1.5
..............................................................................158Spyware
6.1.6
..............................................................................158Packprogramme
6.1.7
..............................................................................158Potenziell unsichere Anwendungen
6.1.8
..............................................................................158Eventuell unerwünschte Anwendungen
6.1.9
..............................................................................162Botnetz
6.1.10
....................................................................................................162Angriffe6.2
..............................................................................162DoS-Angriffe
6.2.1