ESET NOD32 Antivisrus 4 Bedienungsanleitung
ESET
Foto-/Videosoftware
NOD32 Antivisrus 4
Lesen Sie kostenlos die 📖 deutsche Bedienungsanleitung für ESET NOD32 Antivisrus 4 (37 Seiten) in der Kategorie Foto-/Videosoftware. Dieser Bedienungsanleitung war für 36 Personen hilfreich und wurde von 2 Benutzern mit durchschnittlich 4.5 Sternen bewertet
Seite 1/37
User Guide
Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008
1. ESET NOD32 Antivirus 4 ..........................4
1.1 What’s new .................................................................. 4
1.2 System requirements .................................................... 4
2. Installation ............................................5
2.1 Typical installation ........................................................ 5
2.2 Custom installation ....................................................... 6
2.3 Using original settings ................................................... 7
2.4 Entering Username and password ................................... 8
2.5 On‑demand computer scan ............................................ 8
3. Beginner’s guide .....................................9
3.1 Introducing user interface design – modes ....................... 9
3.1.1 Checking operation of the system ...........................9
3.1.2 What to do if the program doesn’t work properly .....9
3.2 Update setup ...............................................................10
3.3 Proxy server setup ........................................................10
3.4 Settings protection .......................................................11
4. Work with ESET NOD32 Antivirus ............12
4.1 Antivirus and antispyware protection ............................ 12
4.1.1 Real‑time file system protection ............................12
4.1.1.1 Control setup........................................................12
4.1.1.1.1 Media to scan ......................................................12
4.1.1.1.2 Scan on (Event‑triggered scanning) ........................12
4.1.1.1.3 Advanced scan options..........................................12
4.1.1.2 Cleaning levels ......................................................12
4.1.1.3 When to modify real‑time protection configuration 13
4.1.1.4 Checking real‑time protection ...............................13
4.1.1.5 What to do if real‑time protection does not work ....13
4.1.2 Host Intrusion Prevention System (HIPS) ................13
4.1.3 Email client protection ..........................................13
4.1.3.1 POP3 checking ......................................................13
4.1.3.1.1 Compatibility .......................................................14
4.1.3.2 Integration with email clients ................................14
4.1.3.2.1 Appending tag messages to email body ..................14
4.1.3.3 Removing infiltrations ..........................................15
4.1.4 Web access protection ..........................................15
4.1.4.1 HTTP, HTTPs .........................................................15
4.1.4.1.1 Address management ...........................................15
4.1.4.1.2 Web browsers .......................................................15
Copyright © 2009 by ESET, spol. s r. o.
ESET NOD32 Antivirus was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without permission in
writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV.20090408‑004
Content
4.1.5 On‑demand computer scan ...................................16
4.1.5.1 Type of scan ..........................................................16
4.1.5.1.1 Smart scan ...........................................................16
4.1.5.1.2 Custom scan.........................................................16
4.1.5.2 Scan targets .........................................................16
4.1.5.3 Scan profiles .........................................................17
4.1.6 Protocol filtering ...................................................17
4.1.6.1 SSL .......................................................................17
4.1.6.1.1 Trusted certificates ...............................................17
4.1.6.1.2 Excluded certificates .............................................17
4.1.7 ThreatSense engine parameters setup ...................18
4.1.7.1 Objects setup .......................................................18
4.1.7.2 Options ................................................................18
4.1.7.3 Cleaning ...............................................................19
4.1.7.4 Extensions ............................................................19
4.1.7.5 Limits ...................................................................19
4.1.7.6 Other ...................................................................19
4.1.8 An infiltration is detected .....................................20
4.2 Updating the program ................................................. 20
4.2.1 Update setup .......................................................20
4.2.1.1 Update profiles .....................................................21
4.2.1.2 Advanced update setup .........................................21
4.2.1.2.1 Update mode .......................................................21
4.2.1.2.2 Proxy server ..........................................................21
4.2.1.2.3 Connecting to the LAN ......................................... 22
4.2.1.2.4 Creating update copies – Mirror ............................ 22
4.2.1.2.4.1 Updating from the Mirror ..................................... 23
4.2.1.2.4.2 Troubleshooting Mirror update problems .............. 24
4.2.2 How to create update tasks .................................. 24
4.3 Scheduler ....................................................................24
4.3.1 Purpose of scheduling tasks .................................. 24
4.3.2 Creating new tasks .............................................. 24
4.4 Quarantine ..................................................................25
4.4.1 Quarantining files ................................................ 25
4.4.2 Restoring from Quarantine .................................. 25
4.4.3 Submitting file from Quarantine ........................... 25
4.5 Log files ...................................................................... 26
4.5.1 Log maintenance ................................................. 26
4.6 User interface ............................................................. 26
4.6.1 Alerts and notifications ........................................ 27
4.7 ThreatSense.Net ......................................................... 28
4.7.1 Suspicious files .................................................... 28
4.7.2 Statistics ............................................................. 28
4.7.3 Submission .......................................................... 29
4.8 Remote administration ............................................... 29
4.9 Licenses ..................................................................... 29
5. Advanced user ..................................... 30
5.1 Proxy server setup ....................................................... 30
5.2 Export / import settings................................................ 31
5.2.1 Import settings .....................................................31
5.2.2 Export settings .....................................................31
5.3 Command Line ............................................................. 31
5.4 ESET SysInspector ........................................................32
5.4.1 User Interface and application usage .................... 32
5.4.1.1 Program Controls................................................. 32
5.4.1.2 Navigating in ESET SysInspector ........................... 32
5.4.1.3 Compare ............................................................. 33
5.4.1.4 SysInspector as part of ESET NOD32 Antivirus 4 .....34
5.5.1 Minimum requirements ....................................... 34
5.5.2 How to create a rescue CD ....................................34
5.5.2.1 Folders ................................................................ 34
5.5.2.2 ESET Antivirus...................................................... 34
5.5.2.3 Advanced ............................................................ 34
5.5.2.4 Bootable USB device ............................................ 35
5.5.2.5 Burn .................................................................... 35
5.5.3 Working with ESET SysRescue .............................. 35
5.5.3.1 Using ESET SysRescue .......................................... 35
6. Glossary .............................................. 36
6.1 Types of infiltrations .....................................................36
6.1.1 Viruses ................................................................ 36
6.1.2 Worms ................................................................ 36
6.1.3 Trojan horses ....................................................... 36
6.1.4 Rootkits ..............................................................36
6.1.5 Adware ...............................................................36
6.1.6 Spyware .............................................................. 37
6.1.7 Potentially unsafe applications ............................. 37
6.1.8 Potentially unwanted applications ....................... 37
Produktspezifikationen
Marke: | ESET |
Kategorie: | Foto-/Videosoftware |
Modell: | NOD32 Antivisrus 4 |
Brauchst du Hilfe?
Wenn Sie Hilfe mit ESET NOD32 Antivisrus 4 benötigen, stellen Sie unten eine Frage und andere Benutzer werden Ihnen antworten
Bedienungsanleitung Foto-/Videosoftware ESET
7 Februar 2024
Bedienungsanleitung Foto-/Videosoftware
- Foto-/Videosoftware Apple
- Foto-/Videosoftware Microsoft
- Foto-/Videosoftware Roland
- Foto-/Videosoftware Canon
- Foto-/Videosoftware Bang And Olufsen
- Foto-/Videosoftware Roxio
- Foto-/Videosoftware Olympus
- Foto-/Videosoftware Nikon
- Foto-/Videosoftware AVM
- Foto-/Videosoftware Konica-Minolta
- Foto-/Videosoftware Osram
- Foto-/Videosoftware DoorBird
- Foto-/Videosoftware Acronis
- Foto-/Videosoftware Adobe
- Foto-/Videosoftware Pinnacle
- Foto-/Videosoftware LevelOne
- Foto-/Videosoftware Sonos
- Foto-/Videosoftware Google
- Foto-/Videosoftware Autodesk
- Foto-/Videosoftware Serif
- Foto-/Videosoftware Terratec
- Foto-/Videosoftware Ulead
- Foto-/Videosoftware Corel
- Foto-/Videosoftware ABBYY
- Foto-/Videosoftware Foxit
- Foto-/Videosoftware FileMaker
- Foto-/Videosoftware Propellerhead
- Foto-/Videosoftware Lavasoft
- Foto-/Videosoftware Atomix
- Foto-/Videosoftware AccSone
- Foto-/Videosoftware Xils Lab
- Foto-/Videosoftware Polyverse
- Foto-/Videosoftware Laplink
- Foto-/Videosoftware Showpad
- Foto-/Videosoftware Cakewalk
- Foto-/Videosoftware Antares
Neueste Bedienungsanleitung für -Kategorien-
21 Mai 2024
14 Mai 2024
14 Mai 2024
2 Mai 2024
30 April 2024
25 April 2024
23 April 2024
22 April 2024
23 Februar 2024
15 Februar 2024