ESET Cyber Security Bruksanvisning
ESET
Antivirusprogram
Cyber Security
Läs nedan 📖 manual på svenska för ESET Cyber Security (22 sidor) i kategorin Antivirusprogram. Denna guide var användbar för 2 personer och betygsatt med 4.5 stjärnor i genomsnitt av 2 användare
Sida 1/22

ESET CYBER SECURITY
for Mac
Installation Manual and User Guide
Click here to download the most recent version of this document

ESET CYBER SECURITY
Copyright 2013 by ESET, spol. s r.o.
ESET Cyber Security was developed by ESET, spol. s r.o.
For more informaon visit www.eset.com.
All rights reserved. No part of this documentaon may be reproduced, stored in a
retrieval system or transmied in any form or by any means, electronic,
mechanical, photocopying, recording, scanning, or otherwise without permission
in wring from the author.
ESET, spol. s r.o. reserves the right to change any of the described applicaon
soware without prior notice.
Customer Care: www.eset.com/support
REV. 11. 1. 2013

Contents
................................................................41. ESET Cyber Security
..................................................................................4What's new1.1
..................................................................................4System requirements1.2
................................................................42. Installaon
..................................................................................4Typical installaon2.1
..................................................................................5Custom installaon2.2
................................................................53. Product activaon
................................................................64. Uninstallaon
................................................................65. Basic overview
..................................................................................6Keyboard shortcuts5.1
..................................................................................6Checking protecon status5.2
..................................................................................6What to do if the program does not work properly5.3
................................................................66. Computer protecon
..................................................................................7Anvirus and anspyware protecon6.1
.............................................................................7Real-me le system protecon6.1.1
............................................................................7Scan on (Event triggered scanning)6.1.1.1
............................................................................7Advanced opons6.1.1.2
............................................................................7
When to modify Real-me protecon
conguraon
6.1.1.3
............................................................................7Checking Real-me protecon6.1.1.4
............................................................................8What to do if Real-me protecon does not work6.1.1.5
.............................................................................8On-demand computer scan6.1.2
............................................................................8Type of scan6.1.2.1
.............................................................................8Smart scan6.1.2.1.1
.............................................................................8Custom scan6.1.2.1.2
............................................................................9Scan targets6.1.2.2
............................................................................9Scan proles6.1.2.3
.............................................................................9Exclusions6.1.3
.............................................................................9ThreatSense engine parameters setup6.1.4
............................................................................10Objects6.1.4.1
............................................................................10Opons6.1.4.2
............................................................................10Cleaning6.1.4.3
............................................................................10Extensions6.1.4.4
............................................................................11Limits6.1.4.5
............................................................................11Others6.1.4.6
.............................................................................11An inltraon is detected6.1.5
..................................................................................12Removable media scanning and blocking6.2
................................................................127. Web and mail protecon
..................................................................................12Web protecon7.1
.............................................................................12Ports7.1.1
.............................................................................12Acve mode7.1.2
.............................................................................12URL lists7.1.3
..................................................................................12Email protecon7.2
.............................................................................13POP3 protocol checking7.2.1
.............................................................................13IMAP protocol checking7.2.2
................................................................138. Update
..................................................................................13Update setup8.1
..................................................................................14How to create update tasks8.2
..................................................................................14Upgrading ESET Cyber Security to a new version8.3
................................................................149. Tools
..................................................................................14Log les9.1
.............................................................................14Log maintenance9.1.1
.............................................................................14Log ltering9.1.2
..................................................................................15Scheduler9.2
.............................................................................15Creang new tasks9.2.1
.............................................................................15Creang user-dened tasks9.2.2
..................................................................................16Quaranne9.3
.............................................................................16Quaranning les9.3.1
.............................................................................16Restoring from Quaranne9.3.2
.............................................................................16Subming le from Quaranne9.3.3
..................................................................................16Running processes9.4
..................................................................................17Live Grid9.5
.............................................................................17Live Grid setup9.5.1
................................................................1710.User interface
..................................................................................17Alerts and nocaons10.1
.............................................................................18Alerts and nocaons advanced setup10.1.1
..................................................................................18Privileges10.2
..................................................................................18Context menu10.3
................................................................1811.Miscellaneous
..................................................................................18Import and export sengs11.1
.............................................................................18Import sengs11.1.1
.............................................................................18Export sengs11.1.2
..................................................................................18Proxy server setup11.2
................................................................1912.Glossary
..................................................................................19Types of inltraon12.1
.............................................................................19Viruses12.1.1
.............................................................................19Worms12.1.2
.............................................................................19Trojan horses12.1.3
.............................................................................19Rootkits12.1.4
.............................................................................19Adware12.1.5
.............................................................................20Spyware12.1.6
.............................................................................20Potenally unsafe applicaons12.1.7
.............................................................................20Potenally unwanted applicaons12.1.8
..................................................................................20Types of remote aacks12.2
.............................................................................20DoS aacks12.2.1
.............................................................................20DNS Poisoning12.2.2
.............................................................................20Port scanning12.2.3
.............................................................................21TCP desynchronizaon12.2.4
.............................................................................21SMB Relay12.2.5
.............................................................................21ICMP aacks12.2.6
..................................................................................21Email12.3
.............................................................................21Adversements12.3.1
.............................................................................22Hoaxes12.3.2
.............................................................................22Phishing12.3.3
.............................................................................22Recognizing spam scams12.3.4
Produktspecifikationer
Varumärke: | ESET |
Kategori: | Antivirusprogram |
Modell: | Cyber Security |
Behöver du hjälp?
Om du behöver hjälp med ESET Cyber Security ställ en fråga nedan och andra användare kommer att svara dig
Antivirusprogram ESET Manualer

25 Februari 2025

25 Februari 2025

25 Februari 2025

25 Februari 2025

25 Februari 2025

25 Februari 2025

25 Februari 2025
Antivirusprogram Manualer
- Antivirusprogram Axis
- Antivirusprogram Bitdefender
- Antivirusprogram Symantec - Norton
- Antivirusprogram Symantec
- Antivirusprogram Kaspersky Lab
Nyaste Antivirusprogram Manualer

21 September 2024

21 September 2024

21 September 2024

21 September 2024

Symantec Norton AntiVirus Dual Protection (Mac) Bruksanvisning
20 September 2024
20 September 2024

20 September 2024

20 September 2024

20 September 2024

Symantec Norton Internet Security Premier Edition 2009 Bruksanvisning
20 September 2024