Inhalt
.......................................................5PRODUCTNAME1.
....................................................................................................5Neuerungen in Version 61.1
....................................................................................................5Systemanforderungen1.2
.......................................................6
Benutzerverbindungen über ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator-Server2.1
....................................................................................................7Web-Konsole2.2
....................................................................................................8Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installation3.
....................................................................................................9Standardinstallation3.1
....................................................................................................10Benutzerdefinierte Installation3.2
....................................................................................................11Remoteinstallation3.3
..............................................................................11Ein Remoteins tallationspa ket erstellen
3.3.1
..............................................................................12Remoteinstalla tion auf den Zielrechnern
3.3.2
..............................................................................12Remote-Deinstallation
3.3.3
..............................................................................12Remote-Upgrade
3.3.4
.......................................................13Produktaktivierung4.
.......................................................15Deinstallation5.
.......................................................16Übersicht6.
....................................................................................................16Tastaturbefehle6.1
....................................................................................................17
Überprüfen der Funktionsfähigkeit des
Systems
6.2
....................................................................................................17
Vorgehensweise bei fehlerhafter
Ausführung des Programms
6.3
.......................................................18Computerschutz7.
....................................................................................................18Viren- und Spyware-Schutz7.1
..............................................................................18Allgemein
7.1.1
..................................................................................18Ausschlussfilter
7.1.1.1
..............................................................................19Systemstart-Schutz
7.1.2
..............................................................................19Echtzeit-Dateischutz
7.1.3
..................................................................................19Erweiterte Optionen
7.1.3.1
..................................................................................20
Wann sollten die Einstellungen für den
Echtzeit-Dateischutz geändert werden?
7.1.3.2
..................................................................................20Echtzeit-Da teischutz prüfen
7.1.3.3
..................................................................................20
Vorgehensweise bei fehlerhaftem
Echtzeit-Dateischutz
7.1.3.4
..............................................................................21On-Demand-Prüfung
7.1.4
..................................................................................21Prüfmethode
7.1.4.1
........................................................................21Smart-Prüfung
7.1.4.1.1
........................................................................22Benutzerdefinierte Prüfung
7.1.4.1.2
..................................................................................22Zu prüfende Objekte
7.1.4.2
..................................................................................22Prüfprofile
7.1.4.3
..............................................................................23Einstellungen für ThreatSense
7.1.5
..................................................................................23Objekte
7.1.5.1
..................................................................................24Optionen
7.1.5.2
..................................................................................24Säubern
7.1.5.3
..................................................................................24Ausschlussfilter
7.1.5.4
..................................................................................25Grenzen
7.1.5.5
..................................................................................25Weitere
7.1.5.6
..............................................................................25Eingedrungene Schadsoftware wurde erkannt
7.1.6
....................................................................................................26Web- und E-Mail-Schutz7.2
..............................................................................26Web-Schutz
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL-Listen
7.2.1.2
..............................................................................27E-Mail-Schutz
7.2.2
..................................................................................27Prüfen des POP3-Protokolls
7.2.2.1
..................................................................................28Prüfen des IMAP-Protokolls
7.2.2.2
....................................................................................................28Phishing-Schutz7.3
.......................................................29Medienkontrolle8.
....................................................................................................29Regel-Editor8.1
.......................................................31Tools9.
....................................................................................................31Log-Dateien9.1
..............................................................................31Log-Wartung
9.1.1
..............................................................................32Log-Filter
9.1.2
....................................................................................................33Taskplaner9.2
..............................................................................34Erstellen von Ta sks
9.2.1
..............................................................................34Erstellen eines benutzerdefinierten Tas ks
9.2.2
....................................................................................................35Live Grid9.3
..............................................................................35Verdächtige Dateien
9.3.1
....................................................................................................36Quarantäne9.4
..............................................................................36Qua rantäne für Dateien
9.4.1
..............................................................................36Wiederherstellen einer Datei aus der Qua rantäne
9.4.2
..............................................................................36Einreichen von Dateien a us der Quarantäne
9.4.3
....................................................................................................37Berechtigungen9.5
....................................................................................................37Präsentationsmodus9.6
....................................................................................................38Ausgeführte Prozesse9.7
.......................................................39Benutzeroberfläche10.
....................................................................................................39Warnungen und Benachrichtigungen10.1
..............................................................................39Warnungen anzeigen
10.1.1
..............................................................................40Schutzstatus
10.1.2
....................................................................................................40Kontextmenü10.2
.......................................................41Update11.
....................................................................................................41Einstellungen für Updates11.1
..............................................................................42Erweiterte Optionen
11.1.1
....................................................................................................43So erstellen Sie Update-Tasks11.2
....................................................................................................43Upgrade auf ein neues Build11.3
....................................................................................................43Systemupdates11.4
.......................................................45Allgemein12.
....................................................................................................45Einstellungen importieren/exportieren12.1