1 ESET Endpoint Security for macOS 1 .................................................................................................
1.1 Čo je nové vo verzii 6 1 ..............................................................................................................................
1.2 Systémové požiadavky 1 ...........................................................................................................................
2 Predstavenie ESET PROTECT 2 ..............................................................................................................
3 Predstavenie ESET PROTECT Cloud 3 ................................................................................................
4 Vzdialená inštalácia 3 .................................................................................................................................
4.1 Vytvorenie balíka na vzdialenú inštaláciu 6 ...........................................................................................
5 Lokálna inštalácia 8 ......................................................................................................................................
5.1 Typická inštalácia 9 ....................................................................................................................................
5.2 Pokročilá inštalácia 10 ...............................................................................................................................
5.3 Lokálne povolenie rozšírení systému 11 .................................................................................................
5.4 Lokálne povolenie úplného prístupu k disku 12 ....................................................................................
6 Aktivácia produktu 12 ..................................................................................................................................
7 Odinštalovanie 14 ..........................................................................................................................................
8 Stručný prehľad 14 ........................................................................................................................................
8.1 Klávesové skratky 14 .................................................................................................................................
8.2 Kontrola funkčnosti programu 15 ............................................................................................................
8.3 Čo robiť, ak program nepracuje správne 15 ...........................................................................................
9 Ochrana počítača 15 .....................................................................................................................................
9.1 Antivírusová a antispyvérová ochrana 16 ...............................................................................................
9.1.1 Všeobecné 16 ............................................................................................................................................
9.1.1.1 Vylúčenia 16 ............................................................................................................................................
9.1.2 Ochrana pri štarte počítača 17 ........................................................................................................................
9.1.3 Rezidentná ochrana súborového systému 17 ......................................................................................................
9.1.3.1 Rozšírené nastavenia 17 .............................................................................................................................
9.1.3.2 Kedy je vhodné upraviť nastavenia rezidentnej ochrany 18 ..................................................................................
9.1.3.3 Overenie funkčnosti rezidentnej ochrany 18 .....................................................................................................
9.1.3.4 Čo robiť, ak rezidentná ochrana nefunguje 18 ...................................................................................................
9.1.4 Manuálna kontrola počítača 19 .......................................................................................................................
9.1.4.1 Typy kontroly 19 .......................................................................................................................................
9.1.4.1.1 Smart kontrola 20 ...................................................................................................................................
9.1.4.1.2 Prispôsobená kontrola 20 .........................................................................................................................
9.1.4.2 Ciele kontroly 20 .......................................................................................................................................
9.1.4.3 Profily kontroly 20 .....................................................................................................................................
9.1.5 Nastavenie parametrov jadra ThreatSense 21 .....................................................................................................
9.1.5.1 Objekty 22 ..............................................................................................................................................
9.1.5.2 Metódy 22 ...............................................................................................................................................
9.1.5.3 Liečenie 23 .............................................................................................................................................
9.1.5.4 Vylúčenia 23 ............................................................................................................................................
9.1.5.5 Obmedzenia 23 ........................................................................................................................................
9.1.5.6 Ostatné 24 ..............................................................................................................................................
9.1.6 Našla sa infiltrácia 24 ...................................................................................................................................
9.2 Webová a e-mailová ochrana 25 ...............................................................................................................
9.2.1 Ochrana prístupu na web 25 ..........................................................................................................................
9.2.1.1 Porty 25 .................................................................................................................................................
9.2.1.2 Zoznam URL adries 25 ...............................................................................................................................
9.2.2 E-mailová ochrana 25 ...................................................................................................................................
9.2.2.1 Kontrola protokolu POP3 26 .........................................................................................................................
9.2.2.2 Kontrola protokolu IMAP 27 ..........................................................................................................................
9.3 Anti-Phishing 27 ..........................................................................................................................................
10 Firewall 27 .......................................................................................................................................................
10.1 Režimy filtrovania 27 ................................................................................................................................