Inhalt
......................................................................................................................5
Einführung1.
...................................................................................................................................................................................................................5Neuerungen in Version 21.1
...................................................................................................................................................................................................................9Mindestsystemanforderungen1.2
......................................................................................................................9
Verbindungen von Benutzern mit ESET Remote Administrator2.
...................................................................................................................................................................................................................10ESET Remote Administrator-Server2.1
...................................................................................................................................................................................................................11Web-Konsole2.2
...................................................................................................................................................................................................................11Proxy2.3
...................................................................................................................................................................................................................12Agent2.4
...................................................................................................................................................................................................................12RD Sensor2.5
......................................................................................................................12
Remote-Installation3.
......................................................................................................................13
Lokale Installation auf dem Gerät4.
...................................................................................................................................................................................................................13Download von der ESET-Website4.1
...................................................................................................................................................................................................................14Download aus Google Play4.2
...................................................................................................................................................................................................................15Startassistent4.3
......................................................................................................................16
Deinstallation5.
......................................................................................................................16
Produktaktivierung6.
......................................................................................................................17
Virenschutz7.
...................................................................................................................................................................................................................18Automatische Scans7.1
...................................................................................................................................................................................................................19Scan-Logs7.2
...................................................................................................................................................................................................................20Ignorierungsregeln7.3
...................................................................................................................................................................................................................20Erweiterte Einstellungen7.4
......................................................................................................................21
Anti-Theft8.
...................................................................................................................................................................................................................23Administratorkontakte8.1
...............................................................................................................................................................................................23Hinzufügen eines Administratorkontakts
8.1.1
...................................................................................................................................................................................................................23Informationen der Bildschirmsperre8.2
...................................................................................................................................................................................................................23Vertrauenswürdige SIM-Karten8.3
...................................................................................................................................................................................................................24Remotebefehle8.4
......................................................................................................................25
Anwendungskontrolle9.
...................................................................................................................................................................................................................25Blockierregeln9.1
...............................................................................................................................................................................................26Nach Anwendungsname blockieren
9.1.1
....................................................................................................................................................................................26So blockieren Sie Anwendungen auf Grundlage des Anwendungsnamens
9.1.1.1
...............................................................................................................................................................................................26Blockieren nach Anwendungskategorie
9.1.2
....................................................................................................................................................................................27Blockieren einer Anwendung auf Grundlage der Anwendungskategorie
9.1.2.1
...............................................................................................................................................................................................27Blockieren nach Anwendungsberechtigungen
9.1.3
....................................................................................................................................................................................27So blockieren Sie Anwendungen auf Grundlage der Anwendungsberechtigungen
9.1.3.1
...............................................................................................................................................................................................27Unbekannte Quellen blockieren
9.1.4
...................................................................................................................................................................................................................28Ausnahmen9.2
...............................................................................................................................................................................................28Hinzufügen von Ausnahmen
9.2.1
...................................................................................................................................................................................................................28Erforderliche Anwendungen9.3
...................................................................................................................................................................................................................29Zugelassene Anwendungen9.4
...................................................................................................................................................................................................................29Berechtigungen9.5
...................................................................................................................................................................................................................31Verwendung9.6