Obsah
...........................................................................................................................4
Úvod1.
..........................................................................................................................................................................................................4Co je nového ve verzi 3.5?1.1
..........................................................................................................................................................................................................4Systémové požadavky1.2
...........................................................................................................................5
Instalace2.
..........................................................................................................................................................................................................5Instalace z Google Play2.1
..........................................................................................................................................................................................................5Instalace z webových stránek společnosti ESET2.2
..........................................................................................................................................................................................................6Průvodce prvotním spuštěním2.3
...........................................................................................................................8
Odinstalace3.
...........................................................................................................................9
Aktivace produktu4.
...........................................................................................................................10
Antivirus5.
..........................................................................................................................................................................................................11Automatické kontroly5.1
..........................................................................................................................................................................................................12Protokoly kontrol5.2
..........................................................................................................................................................................................................13Rozšířená nastavení5.3
...........................................................................................................................14
Anti-Theft6.
..........................................................................................................................................................................................................15Webový portál6.1
...............................................................................................................................................................................................16Optimalizace
6.1.1
...............................................................................................................................................................................................16Proaktivní ochrana
6.1.2
..........................................................................................................................................................................................................16Ochrana SIM karty6.2
...............................................................................................................................................................................................17Důvěryhodné SIM karty
6.2.1
...............................................................................................................................................................................................17Důvěryhodné kontakty
6.2.2
..........................................................................................................................................................................................................18SMS příkazy6.3
..........................................................................................................................................................................................................19Nastavení6.4
...............................................................................................................................................................................................19Bezpečnostní heslo
6.4.1
...............................................................................................................................................................................................19Kontaktní informace
6.4.2
...........................................................................................................................20
Anti-Phishing7.
...........................................................................................................................21
Filtr hovorů a zpráv8.
..........................................................................................................................................................................................................21Pravidla8.1
...............................................................................................................................................................................................22Přidání nového pravidla
8.1.1
..........................................................................................................................................................................................................22Historie8.2
...........................................................................................................................22
Bezpečnostní audit9.
..........................................................................................................................................................................................................23Monitorování zařízení9.1
..........................................................................................................................................................................................................24Audit aplikací9.2
...........................................................................................................................25
Bezpečnostní přehled10.
...........................................................................................................................26
Nastavení11.
...........................................................................................................................27
Technická podpora12.