ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 Handleiding
ESET
Antivirussoftware
ENDPOINT ANTIVIRUS MAC OS USER 5 - 10
Bekijk gratis de handleiding van ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 (44 pagina’s), behorend tot de categorie Antivirussoftware. Deze gids werd als nuttig beoordeeld door 69 mensen en kreeg gemiddeld 4.5 sterren uit 35 reviews. Heb je een vraag over ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 of wil je andere gebruikers van dit product iets vragen? Stel een vraag
Pagina 1/44

US
US
US
USUSER
ER
ER
ERER GU
GU
GU
GU GUI
I
I
IIDE
DE
DE
DEDE
(intended for product version 6.5 and higher)
Click here to download the most recent version of this document

ESET, spol. s.r.o.
ESET Endpoint Antivi rus wa s developed by ESET, s pol. s r.o.
For more informa tion vi sit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording, s canning, or
otherwise without permission in writing from the author.
ESET, spol. s r.o. reserves the right to cha nge any of the described a pplication software without prior noce.
Cu s to me r C a re : www.eset.com/support
REV. 10/13/2017

Contents
.......................................................5ESET Endpoint Anvirus1.
....................................................................................................5What's new in version 61.1
....................................................................................................5System requirements1.2
.......................................................6
Users connecng via ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Web Console2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installaon3.
....................................................................................................9Typical installation3.1
....................................................................................................10Custom installation3.2
....................................................................................................10Remote installation3.3
..............................................................................11Creang a remote installa on package
3.3.1
..............................................................................11Remote ins tallaon on target computers
3.3.2
..............................................................................12Remote uninstallation
3.3.3
..............................................................................12Remote upgrade
3.3.4
.......................................................13Product acvaon4.
.......................................................15Uninstallaon5.
.......................................................16Basic overview6.
....................................................................................................16Keyboard shortcuts6.1
....................................................................................................17Checking operaon of the system6.2
....................................................................................................17
What to do if the program does not
work properly
6.3
.......................................................18Computer protecon7.
....................................................................................................18Antivirus and antispyware protection7.1
..............................................................................18General
7.1.1
..................................................................................18Exclusions
7.1.1.1
..............................................................................19Sta rtup protection
7.1.2
..............................................................................19Real-me file system protection
7.1.3
..................................................................................19Advanced options
7.1.3.1
..................................................................................20When to modify Real-me protecon conguration
7.1.3.2
..................................................................................20Checking Real-me protection
7.1.3.3
..................................................................................20What to do if Real-me protecon does not work
7.1.3.4
..............................................................................21On-demand computer scan
7.1.4
..................................................................................21Type of scan
7.1.4.1
........................................................................21Smart s can
7.1.4.1.1
........................................................................22Custom scan
7.1.4.1.2
..................................................................................22Scan ta rgets
7.1.4.2
..................................................................................22Scan proles
7.1.4.3
..............................................................................23ThreatSense engine parameters setup
7.1.5
..................................................................................23Objects
7.1.5.1
..................................................................................24Opons
7.1.5.2
..................................................................................24Cleaning
7.1.5.3
..................................................................................24Exclusions
7.1.5.4
..................................................................................25Limits
7.1.5.5
..................................................................................25Others
7.1.5.6
..............................................................................25An infiltration is detected
7.1.6
....................................................................................................26Web and email protecon7.2
..............................................................................26Web access protection
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL lis ts
7.2.1.2
..............................................................................27Email protection
7.2.2
..................................................................................27POP3 protocol checking
7.2.2.1
..................................................................................27IMAP protocol checking
7.2.2.2
....................................................................................................28Anti-Phishing7.3
.......................................................29Device control8.
....................................................................................................29Rules editor8.1
.......................................................31Tools9.
....................................................................................................31Log les9.1
..............................................................................31Log maintenance
9.1.1
..............................................................................32Log ltering
9.1.2
....................................................................................................32Scheduler9.2
..............................................................................33Creang new tasks
9.2.1
..............................................................................33Creang a user-dened ta sk
9.2.2
....................................................................................................34Live Grid9.3
..............................................................................34Suspicious les
9.3.1
....................................................................................................35Quarantine9.4
..............................................................................35Quaranning les
9.4.1
..............................................................................35Restoring a quarantined le
9.4.2
..............................................................................35Submitting a le from Quara nne
9.4.3
....................................................................................................35Privileges9.5
....................................................................................................36Presentation mode9.6
....................................................................................................36Running processes9.7
.......................................................37User interface10.
....................................................................................................37Alerts and notications10.1
..............................................................................37Dis play alerts
10.1.1
..............................................................................37Protection status es
10.1.2
....................................................................................................38Context menu10.2
.......................................................39Update11.
....................................................................................................39Update setup11.1
..............................................................................40Advanced options
11.1.1
....................................................................................................41How to create update tasks11.2
....................................................................................................41Upgrading to a new build11.3
....................................................................................................41System updates11.4
.......................................................43Miscellaneous12.
....................................................................................................43Import and export settings12.1
....................................................................................................43Proxy server setup12.2
....................................................................................................44Shared Local Cache12.3
Product specificaties
Merk: | ESET |
Categorie: | Antivirussoftware |
Model: | ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 |
Ondersteunt Windows: | Nee |
Ondersteunt Mac-besturingssysteem: | Mac OS X 10.10 Yosemite,Mac OS X 10.11 El Capitan,Mac OS X 10.12 Sierra,Mac OS X 10.9 Mavericks |
Minimale opslag schijfruimte: | 200 MB |
Minimale RAM: | 300 MB |
Softwaretype: | Hernieuwing |
Aantal licenties: | - licentie(s) |
Aantal jaar: | 1 jaar |
Soort distributie: | Download |
Minimum RAM (client computer): | 300 MB |
Licentieniveau: | B |
Verplichte aankoop van licentieniveau: | 5 - 10 licentie(s) |
Heb je hulp nodig?
Als je hulp nodig hebt met ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 stel dan hieronder een vraag en andere gebruikers zullen je antwoorden
Handleiding Antivirussoftware ESET
24 Februari 2025
24 Februari 2025
24 Februari 2025
24 Februari 2025
24 Februari 2025
24 Februari 2025
24 Februari 2025
24 Oktober 2022
Handleiding Antivirussoftware
Nieuwste handleidingen voor Antivirussoftware
16 April 2025
29 Maart 2024
29 Maart 2024
29 Maart 2024
29 Maart 2024
5 Maart 2024
5 Maart 2024
5 Maart 2024
5 Maart 2024