1 ESET Cyber Security Pro 1 ........................................................................................................................
1.1 Čo je nové vo verzii 6 1 ..............................................................................................................................
1.2 Systémové požiadavky 1 ...........................................................................................................................
2 Inštalácia 1 ........................................................................................................................................................
2.1 Typická inštalácia 2 ....................................................................................................................................
2.2 Pokročilá inštalácia 3 .................................................................................................................................
2.3 Povolenie rozšírení systému 4 ..................................................................................................................
2.4 Povolenie úplného prístupu k disku 4 .....................................................................................................
3 Aktivácia produktu 5 ....................................................................................................................................
4 Odinštalovanie 5 ............................................................................................................................................
5 Stručný prehľad 5 ..........................................................................................................................................
5.1 Klávesové skratky 6 ...................................................................................................................................
5.2 Kontrola funkčnosti programu 6 ..............................................................................................................
5.3 Čo robiť, ak program nepracuje správne 7 .............................................................................................
6 Ochrana počítača 7 .......................................................................................................................................
6.1 Antivírusová a antispywarová ochrana 7 ................................................................................................
6.1.1 Všeobecné 7 ..............................................................................................................................................
6.1.1.1 Vylúčenia 7 ..............................................................................................................................................
6.1.2 Ochrana pri štarte počítača 8 ..........................................................................................................................
6.1.3 Rezidentná ochrana súborového systému 8 ........................................................................................................
6.1.3.1 Rozšírené nastavenia 8 ...............................................................................................................................
6.1.3.2 Kedy je vhodné upraviť nastavenia rezidentnej ochrany 9 ....................................................................................
6.1.3.3 Overenie funkčnosti rezidentnej ochrany 9 .......................................................................................................
6.1.3.4 Čo robiť, ak rezidentná ochrana nefunguje 9 .....................................................................................................
6.1.4 Manuálna kontrola počítača 10 .......................................................................................................................
6.1.4.1 Typy kontroly 10 .......................................................................................................................................
6.1.4.1.1 Smart kontrola 10 ...................................................................................................................................
6.1.4.1.2 Prispôsobená kontrola 11 .........................................................................................................................
6.1.4.2 Ciele kontroly 11 .......................................................................................................................................
6.1.4.3 Profily kontroly 11 .....................................................................................................................................
6.1.5 Nastavenie parametrov jadra ThreatSense 12 .....................................................................................................
6.1.5.1 Objekty 12 ..............................................................................................................................................
6.1.5.2 Metódy 13 ...............................................................................................................................................
6.1.5.3 Liečenie 13 .............................................................................................................................................
6.1.5.4 Vylúčenia 13 ............................................................................................................................................
6.1.5.5 Obmedzenia 14 ........................................................................................................................................
6.1.5.6 Ostatné 14 ..............................................................................................................................................
6.1.6 Našla sa infiltrácia 14 ...................................................................................................................................
6.2 Kontrola a blokovanie vymeniteľných médií 15 .....................................................................................
7 Anti-Phishing 16 ..............................................................................................................................................
8 Firewall 16 ..........................................................................................................................................................
8.1 Režimy filtrovania 17 ..................................................................................................................................
8.2 Pravidlá firewallu 17 ...................................................................................................................................
8.2.1 Vytvorenie nového pravidla 18 ........................................................................................................................
8.3 Zóny firewallu 18 .........................................................................................................................................
8.4 Profily firewallu 18 ......................................................................................................................................
8.5 Protokoly firewallu 18 ................................................................................................................................
9 Webová a e-mailová ochrana 19 ...........................................................................................................
9.1 Ochrana prístupu na web 19 .....................................................................................................................
9.1.1 Porty 19 ....................................................................................................................................................
9.1.2 Zoznam URL adries 19 ..................................................................................................................................
9.2 E-mailová ochrana 19 .................................................................................................................................