1 ESET Endpoint Security for macOS 1 .................................................................................................
1.1 Čo je nové vo verzii 6 1 ..............................................................................................................................
1.2 Systémové požiadavky 2 ...........................................................................................................................
2 Dokumentácia pre používateľov pripojených cez ESET Security Management
Center 2 ...................................................................................................................................................................
3 Inštalácia 3 ........................................................................................................................................................
3.1 Typická inštalácia 4 ....................................................................................................................................
3.2 Pokročilá inštalácia 5 .................................................................................................................................
3.3 Vzdialená inštalácia 7 ................................................................................................................................
4 Aktivácia produktu 8 ....................................................................................................................................
5 Odinštalovanie 9 ............................................................................................................................................
6 Stručný prehľad 9 ..........................................................................................................................................
6.1 Klávesové skratky 10 .................................................................................................................................
6.2 Kontrola funkčnosti programu 10 ............................................................................................................
6.3 Čo robiť, ak program nepracuje správne 11 ...........................................................................................
7 Ochrana počítača 11 .....................................................................................................................................
7.1 Antivírus a antispyware 11 ........................................................................................................................
7.1.1 Všeobecné 12 ............................................................................................................................................
7.1.1.1 Vylúčenia 12 ............................................................................................................................................
7.1.2 Ochrana pri štarte počítača 13 ........................................................................................................................
7.1.3 Rezidentná ochrana súborového systému 13 ......................................................................................................
7.1.3.1 Rozšírené nastavenia 13 .............................................................................................................................
7.1.3.2 Kedy je vhodné upraviť nastavenia rezidentnej ochrany 14 ..................................................................................
7.1.3.3 Overenie funkčnosti rezidentnej ochrany 14 .....................................................................................................
7.1.3.4 Čo robiť, ak rezidentná ochrana nefunguje 15 ...................................................................................................
7.1.4 Manuálna kontrola počítača 15 .......................................................................................................................
7.1.4.1 Typy kontroly 16 .......................................................................................................................................
7.1.4.1.1 Smart kontrola 16 ...................................................................................................................................
7.1.4.1.2 Prispôsobená kontrola 16 .........................................................................................................................
7.1.4.2 Ciele kontroly 17 .......................................................................................................................................
7.1.4.3 Profily kontroly 17 .....................................................................................................................................
7.1.5 Nastavenie parametrov jadra ThreatSense 18 .....................................................................................................
7.1.5.1 Objekty 19 ..............................................................................................................................................
7.1.5.2 Metódy 19 ...............................................................................................................................................
7.1.5.3 Liečenie 19 .............................................................................................................................................
7.1.5.4 Vylúčenia 20 ............................................................................................................................................
7.1.5.5 Obmedzenia 20 ........................................................................................................................................
7.1.5.6 Ostatné 21 ..............................................................................................................................................
7.1.6 Našla sa infiltrácia 21 ...................................................................................................................................
7.2 Web a e-mail 22 ...........................................................................................................................................
7.2.1 Ochrana prístupu na web 22 ..........................................................................................................................
7.2.1.1 Porty 22 .................................................................................................................................................
7.2.1.2 Zoznam URL adries 22 ...............................................................................................................................
7.2.2 E-mailová ochrana 23 ...................................................................................................................................
7.2.2.1 Kontrola protokolu POP3 24 .........................................................................................................................
7.2.2.2 Kontrola protokolu IMAP 24 ..........................................................................................................................
7.3 Anti-Phishing 24 ..........................................................................................................................................
8 Firewall 25 ..........................................................................................................................................................
8.1 Režimy filtrovania 25 ..................................................................................................................................
8.2 Pravidlá firewallu 26 ...................................................................................................................................
8.2.1 Vytvorenie nového pravidla 27 ........................................................................................................................
8.3 Zóny 27 .........................................................................................................................................................