ESET NOD32 Antivisrus 4 Bedienungsanleitung

ESET Foto / Video-Software NOD32 Antivisrus 4

Lesen Sie kostenlos die 📖 deutsche Bedienungsanleitung für ESET NOD32 Antivisrus 4 (37 Seiten) in der Kategorie Foto / Video-Software. Dieser Bedienungsanleitung war für 27 Personen hilfreich und wurde von 2 Benutzern mit durchschnittlich 4.5 Sternen bewertet

Seite 1/37
User Guide
Microsoft® Windows® 7 / Vista / XP / 2000 / 2003 / 2008
1. ESET NOD32 Antivirus 4 ..........................4
1.1 What’s new .................................................................. 4
1.2 System requirements .................................................... 4
2. Installation ............................................5
2.1 Typical installation ........................................................ 5
2.2 Custom installation ....................................................... 6
2.3 Using original settings ................................................... 7
2.4 Entering Username and password ................................... 8
2.5 On‑demand computer scan ............................................ 8
3. Beginners guide .....................................9
3.1 Introducing user interface design – modes ....................... 9
3.1.1 Checking operation of the system ...........................9
3.1.2 What to do if the program doesnt work properly .....9
3.2 Update setup ...............................................................10
3.3 Proxy server setup ........................................................10
3.4 Settings protection .......................................................11
4. Work with ESET NOD32 Antivirus ............12
4.1 Antivirus and antispyware protection ............................ 12
4.1.1 Real‑time file system protection ............................12
4.1.1.1 Control setup........................................................12
4.1.1.1.1 Media to scan ......................................................12
4.1.1.1.2 Scan on (Event‑triggered scanning) ........................12
4.1.1.1.3 Advanced scan options..........................................12
4.1.1.2 Cleaning levels ......................................................12
4.1.1.3 When to modify real‑time protection configuration 13
4.1.1.4 Checking real‑time protection ...............................13
4.1.1.5 What to do if real‑time protection does not work ....13
4.1.2 Host Intrusion Prevention System (HIPS) ................13
4.1.3 Email client protection ..........................................13
4.1.3.1 POP3 checking ......................................................13
4.1.3.1.1 Compatibility .......................................................14
4.1.3.2 Integration with email clients ................................14
4.1.3.2.1 Appending tag messages to email body ..................14
4.1.3.3 Removing infiltrations ..........................................15
4.1.4 Web access protection ..........................................15
4.1.4.1 HTTP, HTTPs .........................................................15
4.1.4.1.1 Address management ...........................................15
4.1.4.1.2 Web browsers .......................................................15
Copyright © 2009 by ESET, spol. s r. o.
ESET NOD32 Antivirus was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without permission in
writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV.20090408‑004
Content
4.1.5 On‑demand computer scan ...................................16
4.1.5.1 Type of scan ..........................................................16
4.1.5.1.1 Smart scan ...........................................................16
4.1.5.1.2 Custom scan.........................................................16
4.1.5.2 Scan targets .........................................................16
4.1.5.3 Scan profiles .........................................................17
4.1.6 Protocol filtering ...................................................17
4.1.6.1 SSL .......................................................................17
4.1.6.1.1 Trusted certificates ...............................................17
4.1.6.1.2 Excluded certificates .............................................17
4.1.7 ThreatSense engine parameters setup ...................18
4.1.7.1 Objects setup .......................................................18
4.1.7.2 Options ................................................................18
4.1.7.3 Cleaning ...............................................................19
4.1.7.4 Extensions ............................................................19
4.1.7.5 Limits ...................................................................19
4.1.7.6 Other ...................................................................19
4.1.8 An infiltration is detected .....................................20
4.2 Updating the program ................................................. 20
4.2.1 Update setup .......................................................20
4.2.1.1 Update profiles .....................................................21
4.2.1.2 Advanced update setup .........................................21
4.2.1.2.1 Update mode .......................................................21
4.2.1.2.2 Proxy server ..........................................................21
4.2.1.2.3 Connecting to the LAN ......................................... 22
4.2.1.2.4 Creating update copies – Mirror ............................ 22
4.2.1.2.4.1 Updating from the Mirror ..................................... 23
4.2.1.2.4.2 Troubleshooting Mirror update problems .............. 24
4.2.2 How to create update tasks .................................. 24
4.3 Scheduler ....................................................................24
4.3.1 Purpose of scheduling tasks .................................. 24
4.3.2 Creating new tasks .............................................. 24
4.4 Quarantine ..................................................................25
4.4.1 Quarantining files ................................................ 25
4.4.2 Restoring from Quarantine .................................. 25
4.4.3 Submitting file from Quarantine ........................... 25
4.5 Log files ...................................................................... 26
4.5.1 Log maintenance ................................................. 26
4.6 User interface ............................................................. 26
4.6.1 Alerts and notifications ........................................ 27
4.7 ThreatSense.Net ......................................................... 28
4.7.1 Suspicious files .................................................... 28
4.7.2 Statistics ............................................................. 28
4.7.3 Submission .......................................................... 29
4.8 Remote administration ............................................... 29
4.9 Licenses ..................................................................... 29
5. Advanced user ..................................... 30
5.1 Proxy server setup ....................................................... 30
5.2 Export / import settings................................................ 31
5.2.1 Import settings .....................................................31
5.2.2 Export settings .....................................................31
5.3 Command Line ............................................................. 31
5.4 ESET SysInspector ........................................................32
5.4.1 User Interface and application usage .................... 32
5.4.1.1 Program Controls................................................. 32
5.4.1.2 Navigating in ESET SysInspector ........................... 32
5.4.1.3 Compare ............................................................. 33
5.4.1.4 SysInspector as part of ESET NOD32 Antivirus 4 .....34
5.5.1 Minimum requirements ....................................... 34
5.5.2 How to create a rescue CD ....................................34
5.5.2.1 Folders ................................................................ 34
5.5.2.2 ESET Antivirus...................................................... 34
5.5.2.3 Advanced ............................................................ 34
5.5.2.4 Bootable USB device ............................................ 35
5.5.2.5 Burn .................................................................... 35
5.5.3 Working with ESET SysRescue .............................. 35
5.5.3.1 Using ESET SysRescue .......................................... 35
6. Glossary .............................................. 36
6.1 Types of infiltrations .....................................................36
6.1.1 Viruses ................................................................ 36
6.1.2 Worms ................................................................ 36
6.1.3 Trojan horses ....................................................... 36
6.1.4 Rootkits ..............................................................36
6.1.5 Adware ...............................................................36
6.1.6 Spyware .............................................................. 37
6.1.7 Potentially unsafe applications ............................. 37
6.1.8 Potentially unwanted applications ....................... 37

Produktspezifikationen

Marke: ESET
Kategorie: Foto / Video-Software
Modell: NOD32 Antivisrus 4

Brauchst du Hilfe?

Wenn Sie Hilfe mit ESET NOD32 Antivisrus 4 benötigen, stellen Sie unten eine Frage und andere Benutzer werden Ihnen antworten