ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 Bruksanvisning

ESET Antivirusprogram ENDPOINT ANTIVIRUS MAC OS USER 5 - 10

Läs gratis den bruksanvisning för ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 (44 sidor) i kategorin Antivirusprogram. Guiden har ansetts hjälpsam av 2 personer och har ett genomsnittsbetyg på 4.3 stjärnor baserat på 1.5 recensioner. Har du en fråga om ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 eller vill du ställa frågor till andra användare av produkten? Ställ en fråga

Sida 1/44
US
US
US
USUSER
ER
ER
ERER GU
GU
GU
GU GUI
I
I
IIDE
DE
DE
DEDE
(intended for product version 6.5 and higher)
Click here to download the most recent version of this document
ESET, spol. s.r.o.
ESET Endpoint Antivi rus wa s developed by ESET, s pol. s r.o.
For more informa tion vi sit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording, s canning, or
otherwise without permission in writing from the author.
ESET, spol. s r.o. reserves the right to cha nge any of the described a pplication software without prior noce.
Cu s to me r C a re : www.eset.com/support
REV. 10/13/2017
Contents
.......................................................5ESET Endpoint Anvirus1.
....................................................................................................5What's new in version 61.1
....................................................................................................5System requirements1.2
.......................................................6
Users connecng via ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Web Console2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installaon3.
....................................................................................................9Typical installation3.1
....................................................................................................10Custom installation3.2
....................................................................................................10Remote installation3.3
..............................................................................11Creang a remote installa on package
3.3.1
..............................................................................11Remote ins tallaon on target computers
3.3.2
..............................................................................12Remote uninstallation
3.3.3
..............................................................................12Remote upgrade
3.3.4
.......................................................13Product acvaon4.
.......................................................15Uninstallaon5.
.......................................................16Basic overview6.
....................................................................................................16Keyboard shortcuts6.1
....................................................................................................17Checking operaon of the system6.2
....................................................................................................17
What to do if the program does not
work properly
6.3
.......................................................18Computer protecon7.
....................................................................................................18Antivirus and antispyware protection7.1
..............................................................................18General
7.1.1
..................................................................................18Exclusions
7.1.1.1
..............................................................................19Sta rtup protection
7.1.2
..............................................................................19Real-me file system protection
7.1.3
..................................................................................19Advanced options
7.1.3.1
..................................................................................20When to modify Real-me protecon conguration
7.1.3.2
..................................................................................20Checking Real-me protection
7.1.3.3
..................................................................................20What to do if Real-me protecon does not work
7.1.3.4
..............................................................................21On-demand computer scan
7.1.4
..................................................................................21Type of scan
7.1.4.1
........................................................................21Smart s can
7.1.4.1.1
........................................................................22Custom scan
7.1.4.1.2
..................................................................................22Scan ta rgets
7.1.4.2
..................................................................................22Scan proles
7.1.4.3
..............................................................................23ThreatSense engine parameters setup
7.1.5
..................................................................................23Objects
7.1.5.1
..................................................................................24Opons
7.1.5.2
..................................................................................24Cleaning
7.1.5.3
..................................................................................24Exclusions
7.1.5.4
..................................................................................25Limits
7.1.5.5
..................................................................................25Others
7.1.5.6
..............................................................................25An infiltration is detected
7.1.6
....................................................................................................26Web and email protecon7.2
..............................................................................26Web access protection
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL lis ts
7.2.1.2
..............................................................................27Email protection
7.2.2
..................................................................................27POP3 protocol checking
7.2.2.1
..................................................................................27IMAP protocol checking
7.2.2.2
....................................................................................................28Anti-Phishing7.3
.......................................................29Device control8.
....................................................................................................29Rules editor8.1
.......................................................31Tools9.
....................................................................................................31Log les9.1
..............................................................................31Log maintenance
9.1.1
..............................................................................32Log ltering
9.1.2
....................................................................................................32Scheduler9.2
..............................................................................33Creang new tasks
9.2.1
..............................................................................33Creang a user-dened ta sk
9.2.2
....................................................................................................34Live Grid9.3
..............................................................................34Suspicious les
9.3.1
....................................................................................................35Quarantine9.4
..............................................................................35Quaranning les
9.4.1
..............................................................................35Restoring a quarantined le
9.4.2
..............................................................................35Submitting a le from Quara nne
9.4.3
....................................................................................................35Privileges9.5
....................................................................................................36Presentation mode9.6
....................................................................................................36Running processes9.7
.......................................................37User interface10.
....................................................................................................37Alerts and notications10.1
..............................................................................37Dis play alerts
10.1.1
..............................................................................37Protection status es
10.1.2
....................................................................................................38Context menu10.2
.......................................................39Update11.
....................................................................................................39Update setup11.1
..............................................................................40Advanced options
11.1.1
....................................................................................................41How to create update tasks11.2
....................................................................................................41Upgrading to a new build11.3
....................................................................................................41System updates11.4
.......................................................43Miscellaneous12.
....................................................................................................43Import and export settings12.1
....................................................................................................43Proxy server setup12.2
....................................................................................................44Shared Local Cache12.3

Produktspecifikationer

Varumärke: ESET
Kategori: Antivirusprogram
Modell: ENDPOINT ANTIVIRUS MAC OS USER 5 - 10
Färg på produkten: Zilver
Förpackningens vikt: 29485 g
Förpackningens bredd: 1320 mm
Djuppackning: 254 mm
Förpackningshöjd: 940 mm
Blåtand: Ja
På / Av knapp: Ja
Monteringsverktyg: Ja
Fjärrkontroll: Magic
Skärm diagonal: 55 "
Upplösning: 1920 x 1080 Pixels
Original bildförhållande: 16:9
Antal processorkärnor: 2
Ljudformat som stöds: AAC, AC3, EAC3, HAAC, MP3, PCM
Videoformat som stöds: DIVX HD, MPEG, MPO
Närfältskommunikation (NFC): Ja
Ethernet LAN: Ja
Videolägen som stöds: 720p, 1080i, 1080p
Ljusstyrka: - cd/m²
Paket vikt: 29485 kg
Antal USB 2.0-portar: 1
Antal HDMI-portar: 3
Audio-ingan (L, R): 1
Komponenter för video (YPbPr/YCbCr): 1
DVI-port: Nee
Antal Ethernet LAN (RJ-45)-portar: 1
Smart TV: Ja
Inbyggda högtalare: Ja
Genomsnittlig effekt: 24 W
Strömförbrukning (i standby): 0.3 W
Antal högtalare: 2
Fjärrstöd för smartphone: Ja
Wi-Fi Direct: Ja
HD typ: Full HD
3D: Ja
Bildformat som stöds: JPG
Respons tid: - ms
VESA montering: Ja
Panelmonteringsgränssnitt: 400 x 400 mm
Hållbarhetscertifikat: ENERGY STAR
Inbyggd kamera: Nee
Djup (utan bas): 24.4 mm
Höjd (utan bas): 711 mm
Bredd (utan bas): 1220 mm
Vikt (utan bas): 19960 g
PC-ingang (D-Sub): Nee
Digitalt ljud, optisk utgång: 1
Common Interface Plus (CI+): Nee
Internet-TV: Ja
Inbyggda ljudavkodare: Dolby Digital
Ljudlägen: Game, Movie, Music, Sports, Standard
Enhetsbredd (med stativ): 1220 mm
Djupenhet (med stativ): 305 mm
Enhetshöjd (med stativ): 788 mm
Vikt (med stativ): 22680 g
Skrivbordsställ: Ja
Lokal nedbländning: Ja
Digital Living Network Alliance (DLNA) certifierad: Ja
Inkluderad programvara: Windows 8 Certified\nApp Store
Möjlighet att justera skärmmått: 4:3, 16:9
Gemensamt gränssnitt (CI): Nee
Antal RF-portar: 1
Rörelseinterpolationsteknik: TruMotion
Teknik för ljudavkodning: DTS
Förvaringstemperatur: -20 - 60 °C
Intel® Wireless Display (Intel® WiDi): Ja
Antal portar USB 3.2 Gen 1 (3.1 Gen 1) Typ A: 1
Förvaringsfuktighet: 70 - 85 procent
2D-3D-omvandlare: Ja
3D-glasögon ingår: Ja
Antal 3D-glasögon: 4
3D-kompatibilitetstyp: Passief
Kompatibla produkter: AN-MR400\nAN-VC500\nAG-F310
Andra funktioner: SIMPLINK\n3D World (3D Content Streaming)\nSmart Phone Remote Support
UPC-certifierad: Ja
Fjärrkontroll ingår: Ja
Wifi: Ja
AC-ingångsspänning: 100 - 240 V
AC-ingångsfrekvens: 50 - 60 Hz
Strömförbrukning (typiskt): 53.9 W
Drifttemperatur (TT): 0 - 40 °C
Relativ luftfuktighet i drift (VV): 70 - 80 procent
Batterier-ingår: Ja
Musikförmåga: 24 W

Behöver du hjälp?

Om du behöver hjälp med ESET ENDPOINT ANTIVIRUS MAC OS USER 5 - 10 ställ en fråga nedan och andra användare kommer att svara dig