Obsah
.......................................................5ESET Endpoint Antivirus1.
....................................................................................................5Co je nového ve verzi 6?1.1
....................................................................................................5Systémové požadavky1.2
.......................................................6
Dokumentace pro uživatele připojené k
ESET Remote Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7ERA Web Console2.2
....................................................................................................7ERA Proxy2.3
....................................................................................................8ERA Agent2.4
....................................................................................................8ESET RD Sensor2.5
.......................................................9Instalace3.
....................................................................................................9Typická instalace3.1
....................................................................................................10Pokročilá instalace3.2
....................................................................................................10Vzdálená instalace3.3
..............................................................................11
Vytvoření instalačního balíčku pomocí ESET
instalátoru
3.3.1
..............................................................................11Vzdálená instalace
3.3.2
..............................................................................12Vzdálená odinstalace
3.3.3
..............................................................................12Vzdálená aktualizace produktu
3.3.4
.......................................................13Aktivace produktu4.
.......................................................14Odinstalace5.
.......................................................15Seznámení s uživatelským prostředím6.
....................................................................................................15Klávesové zkratky6.1
....................................................................................................16Stav ochrany6.2
....................................................................................................16
Co dělat, pokud program nepracuje
správně
6.3
.......................................................17Ochrana počítače7.
....................................................................................................17Antivirová a antispywarová ochrana7.1
..............................................................................17Hlavní
7.1.1
..................................................................................17Výjimky
7.1.1.1
..............................................................................18Kontrola po startu
7.1.2
..............................................................................18Rezidentní ochrana souborového systému
7.1.3
..................................................................................18Rozšířená nastavení kontroly
7.1.3.1
..................................................................................19Konfigurace rezidentní ochrany
7.1.3.2
..................................................................................19Ověření stavu rezidentní ochrany
7.1.3.3
..................................................................................19Co dělat, když nefunguje rezidentní ochrana?
7.1.3.4
..............................................................................20Volitelná kontrola počítače
7.1.4
..................................................................................20Typ kontroly
7.1.4.1
........................................................................20Smart kontrola
7.1.4.1.1
........................................................................21Volitelná kontrola
7.1.4.1.2
..................................................................................21Cíle kontroly
7.1.4.2
..................................................................................21Profily kontroly
7.1.4.3
..............................................................................22Nastavení parametrů skenovací jádra ThreatSense
7.1.5
..................................................................................22Objekty
7.1.5.1
..................................................................................23Možnosti
7.1.5.2
..................................................................................23Léčení
7.1.5.3
..................................................................................23Výjimky
7.1.5.4
..................................................................................23Omezení
7.1.5.5
..................................................................................24Ostatní
7.1.5.6
..............................................................................24Nalezena infiltrace
7.1.6
....................................................................................................25Blokování výměnných médií7.2
.......................................................26Anti-Phishing8.
.......................................................27Web a mail9.
....................................................................................................27Ochrana přístupu na web9.1
..............................................................................27Porty
9.1.1
..............................................................................27Aktivní režim
9.1.2
..............................................................................27Seznam URL adres
9.1.3
....................................................................................................28Ochrana poštovních klientů9.2
..............................................................................28Kontrola protokolu POP3
9.2.1
..............................................................................28Kontrola protokolu IMAP
9.2.2
.......................................................29Správa zařízení10.
....................................................................................................29Editor pravidel10.1
.......................................................31Aktualizace11.
....................................................................................................31Nastavení aktualizace11.1
..............................................................................32Rozšířená nastavení
11.1.1
....................................................................................................33Jak vytvořit aktualizační úlohu11.2
....................................................................................................33Aktualizace na novou verzi11.3
....................................................................................................33Aktualizace systému11.4
.......................................................35Nástroje12.
....................................................................................................35Protokoly12.1
..............................................................................35Údržba protokolů
12.1.1
..............................................................................36Filtrování protokolů
12.1.2
....................................................................................................36Plánovač12.2
..............................................................................37Vytvoření nové úlohy
12.2.1
..............................................................................37Vytvoření uživatelské úlohy
12.2.2
....................................................................................................38Karanténa12.3
..............................................................................38Vložení objektu do karantény
12.3.1
..............................................................................38Obnovení objektu z karantény
12.3.2
..............................................................................38Odesílání souborů k analýze
12.3.3
....................................................................................................38Spuštěné procesy12.4
....................................................................................................39ESET LiveGrid®12.5
..............................................................................39Odesílání podezřelých souborů
12.5.1
.......................................................41Uživatelské rozhraní13.
....................................................................................................41Upozornění a události13.1
..............................................................................41Zobrazení upozornění
13.1.1
..............................................................................42Stavy ochrany
13.1.2
....................................................................................................42Oprávnění13.2
....................................................................................................42Prezentační režim13.3
....................................................................................................43Kontextové menu13.4