Obsah
.......................................................5ESET Cyber Security1.
....................................................................................................5Co je nového ve verzi 6?1.1
....................................................................................................5Systémové požadavky1.2
.......................................................6Instalace2.
....................................................................................................6Typická instalace2.1
....................................................................................................7Pokročilá instalace2.2
.......................................................8Aktivace produktu3.
.......................................................9Odinstalace4.
.......................................................10Základní přehled5.
....................................................................................................10Klávesové zkratky5.1
....................................................................................................11Kontrola stavu systému5.2
....................................................................................................11
Co dě lat, když program nepracuje
správně ?
5.3
.......................................................12Ochrana počítače6.
....................................................................................................12Antivirus a antispyware6.1
..............................................................................12Hlavní
6.1.1
..................................................................................12Výjimky
6.1.1.1
..............................................................................12Kontrola po startu
6.1.2
..............................................................................13Rezidentní ochra na souborového sys tému
6.1.3
..................................................................................13Rozšířené na stavení
6.1.3.1
..................................................................................13Konfigura ce rezidentní ochra ny
6.1.3.2
..................................................................................14Ově ření s tavu rezidentní ochrany
6.1.3.3
..................................................................................14Nefunkční rezidentní ochrana?
6.1.3.4
..............................................................................15Kontrola počítače
6.1.4
..................................................................................15Typ kontroly
6.1.4.1
........................................................................15Smart kontrola
6.1.4.1.1
........................................................................16Volitelná kontrola
6.1.4.1.2
..................................................................................16Cíle kontroly
6.1.4.2
..................................................................................16Profily kontroly
6.1.4.3
..............................................................................17Nas tavení parametrů jádra ThreatSense
6.1.5
..................................................................................17Objekty
6.1.5.1
..................................................................................17Možnosti
6.1.5.2
..................................................................................17Léčení
6.1.5.3
..................................................................................18Přípony
6.1.5.4
..................................................................................18Omezení
6.1.5.5
..................................................................................18Ostatní
6.1.5.6
..............................................................................18Zachycení infiltrace
6.1.6
....................................................................................................19Kontrola a blokování výmě nných médií6.2
.......................................................20Anti-Phishing7.
.......................................................21Web a mail8.
....................................................................................................21Ochrana přístupu na web8.1
..............................................................................21Porty
8.1.1
..............................................................................21Seznam URL adres
8.1.2
....................................................................................................21Ochrana poštovních klientů8.2
..............................................................................22Kontrola protokolu POP3
8.2.1
..............................................................................22Kontrola protokolu IMAP
8.2.2
.......................................................23Aktualizace9.
....................................................................................................23Nastavení aktualizace9.1
..............................................................................23Rozšířená na stavení
9.1.1
....................................................................................................23Jak vytvořit aktualizační úlohu9.2
....................................................................................................24
Aktualizace ESET Cyber Security na
novou verzi
9.3
....................................................................................................24Aktualizace operačního systému9.4
.......................................................25Nástroje10.
....................................................................................................25Protokoly10.1
..............................................................................25Údržba protokolů
10.1.1
..............................................................................25Filtrová ní protokolů
10.1.2
....................................................................................................26Plánovač10.2
..............................................................................26Vytvoření nové úlohy
10.2.1
..............................................................................27Vytvoření uživatelské úlohy
10.2.2
....................................................................................................27Karanténa10.3
..............................................................................27Vložení do karantény
10.3.1
..............................................................................27Obnovení z karantény
10.3.2
..............................................................................28Odesílání souborů
10.3.3
....................................................................................................28Spuště né procesy10.4
....................................................................................................28ESET LiveGrid®10.5
..............................................................................29Odesílání podezřelých souborů
10.5.1
.......................................................30Uživatelské rozhraní11.
....................................................................................................30Upozorně ní a události11.1
..............................................................................30Zobrazení upozorně ní
11.1.1
..............................................................................30Sta vy ochrany
11.1.2
....................................................................................................31Práva11.2
....................................................................................................31Kontextové menu11.3
.......................................................32Různé12.
....................................................................................................32Import a export nastavení12.1
....................................................................................................32Nastavení proxy serveru12.2
.......................................................33Slovník pojmů13.
....................................................................................................33Typy infiltrací13.1
..............................................................................33Viry
13.1.1
..............................................................................33Červi
13.1.2
..............................................................................33Trojské koně
13.1.3
..............................................................................34Rootkity
13.1.4
..............................................................................34Adware
13.1.5
..............................................................................34Spyware
13.1.6
..............................................................................34Potenciálně zneužitelné aplikace
13.1.7
..............................................................................34Potenciálně nechtě né aplika ce
13.1.8
....................................................................................................35Typy vzdálených útoků13.2
..............................................................................35DoS útoky
13.2.1
..............................................................................35DNS Poisoning
13.2.2
..............................................................................35Skenová ní portů
13.2.3