Obsah
.......................................................5ESET Cyber Security Pro1.
....................................................................................................5Co je nového ve verzi 6?1.1
....................................................................................................5Systémové požadavky1.2
.......................................................6Instalace2.
....................................................................................................6Typická instalace2.1
....................................................................................................7Pokročilá instalace2.2
.......................................................8Aktivace produktu3.
.......................................................9Odinstalace4.
.......................................................10Základní přehled5.
....................................................................................................10Klávesové zkratky5.1
....................................................................................................11Kontrola stavu systému5.2
....................................................................................................11
Co dě lat, když program nepracuje
správně ?
5.3
.......................................................12Ochrana počítače6.
....................................................................................................12Antivirus a antispyware6.1
..............................................................................12Hlavní
6.1.1
..................................................................................12Výjimky
6.1.1.1
..............................................................................12Kontrola po startu
6.1.2
..............................................................................13Rezidentní ochra na souborového sys tému
6.1.3
..................................................................................13Rozšířené nastavení
6.1.3.1
..................................................................................13Konfigura ce rezidentní ochra ny
6.1.3.2
..................................................................................14Ově ření stavu rezidentní ochrany
6.1.3.3
..................................................................................14Nefunkční rezidentní ochrana ?
6.1.3.4
..............................................................................15Kontrola počíta če
6.1.4
..................................................................................15Typ kontroly
6.1.4.1
........................................................................15Smart kontrola
6.1.4.1.1
........................................................................16Volitelná kontrola
6.1.4.1.2
..................................................................................16Cíle kontroly
6.1.4.2
..................................................................................16Profily kontroly
6.1.4.3
..............................................................................17Nas tavení parametrů já dra ThreatSense
6.1.5
..................................................................................17Objekty
6.1.5.1
..................................................................................17Možnosti
6.1.5.2
..................................................................................17Léčení
6.1.5.3
..................................................................................18Přípony
6.1.5.4
..................................................................................18Omezení
6.1.5.5
..................................................................................18Ostatní
6.1.5.6
..............................................................................18Zachycení infiltrace
6.1.6
....................................................................................................19Kontrola a blokování výmě nných médií6.2
.......................................................20Anti-Phishing7.
.......................................................21Firewall8.
....................................................................................................21Režimy filtrování8.1
....................................................................................................21Pravidla firewallu8.2
..............................................................................22Vytvoření nového pra vidla
8.2.1
....................................................................................................22Zóny firewallu8.3
....................................................................................................22Profily firewallu8.4
....................................................................................................22Protokoly firewallu8.5
.......................................................23Web a mail9.
....................................................................................................23Ochrana přístupu na web9.1
..............................................................................23Porty
9.1.1
..............................................................................23Seznam URL adres
9.1.2
....................................................................................................23Ochrana poštovních klientů9.2
..............................................................................24Kontrola protokolu POP3
9.2.1
..............................................................................24Kontrola protokolu IMAP
9.2.2
.......................................................25Rodičovská kontrola10.
.......................................................26Aktualizace11.
....................................................................................................26Nastavení aktualizace11.1
..............................................................................26Rozšířená nastavení
11.1.1
....................................................................................................26Jak vytvořit aktualizační úlohu11.2
....................................................................................................27
Aktualizace ESET Cyber Security Pro na
novou verzi
11.3
....................................................................................................27Aktualizace operačního systému11.4
.......................................................28Nástroje12.
....................................................................................................28Protokoly12.1
..............................................................................28Údržba protokolů
12.1.1
..............................................................................28Filtrování protokolů
12.1.2
....................................................................................................29Plánovač12.2
..............................................................................29Vytvoření nové úlohy
12.2.1
..............................................................................30Vytvoření uživa tels ké úlohy
12.2.2
....................................................................................................30Karanténa12.3
..............................................................................30Vložení do karantény
12.3.1
..............................................................................30Obnovení z ka rantény
12.3.2
..............................................................................31Odesílání souborů
12.3.3
....................................................................................................31Spuště né procesy12.4
....................................................................................................31ESET LiveGrid®12.5
..............................................................................32Odesílání podezřelých souborů
12.5.1
.......................................................33Uživatelské rozhraní13.
....................................................................................................33Upozorně ní a události13.1
..............................................................................33Zobrazení upozorně ní
13.1.1
..............................................................................33Sta vy ochrany
13.1.2
....................................................................................................34Práva13.2
....................................................................................................34Kontextové menu13.3
.......................................................35Různé14.
....................................................................................................35Import a export nastavení14.1
....................................................................................................35Nastavení proxy serveru14.2
.......................................................36Slovník pojmů15.
....................................................................................................36Typy infiltrací15.1
..............................................................................36Viry
15.1.1
..............................................................................36Červi
15.1.2