05.08.2013 Views

Gebruikershandleiding - Eset

Gebruikershandleiding - Eset

Gebruikershandleiding - Eset

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.1.5.1.1 Vertrouwde certificaten ........................................19<br />

4.1.5.1.2 Uitgesloten certificaten ........................................19<br />

4.1.6 Parameters voor ThreatSense‑engine instellen .......19<br />

4.1.6.1 Objecten instellen .................................................19<br />

4.1.6.2 Opties ..................................................................19<br />

4.1.6.3 Opschonen ..........................................................20<br />

4.1.6.4 Extensies .............................................................20<br />

4.1.6.5 Limiet .................................................................20<br />

4.1.6.6 Andere .................................................................21<br />

4.1.7 Er is een infiltratie gedetecteerd .............................21<br />

4.2 ESET Persoonlijke firewall ............................................. 21<br />

4.2.1 Filtermodi ........................................................... 22<br />

4.2.2 Profielen .............................................................. 22<br />

4.2.2.1 Profielbeheer ....................................................... 22<br />

4.2.3 Alle netwerkverkeer blokkeren: verbinding met<br />

netwerk verbreken ............................................... 22<br />

4.2.4 Filteren uitschakelen: alle verkeer toestaan ........... 23<br />

4.2.5 Regels configureren en gebruiken ......................... 23<br />

4.2.5.1 Nieuwe regels maken ........................................... 23<br />

4.2.5.2 Regels bewerken ................................................. 24<br />

4.2.6 Zones configureren .............................................. 24<br />

4.2.6.1 Netwerkverificatie ............................................... 24<br />

4.2.6.1.1 Verificatie zone ‑ Clientconfiguratie ...................... 24<br />

4.2.6.1.2 Verificatie zone ‑ Serverconfiguratie ...................... 25<br />

4.2.7 Verbinding tot stand brengen ‑ detectie ................ 25<br />

4.2.8 Logboekregistratie ............................................... 26<br />

4.3 Antispambeveiliging.................................................... 26<br />

4.3.1 Zelflerende antispam ........................................... 26<br />

4.3.1.1 Adressen toevoegen aan witte lijst ........................ 27<br />

4.3.1.2 Berichten markeren als spam ............................... 27<br />

4.4 Het programma bijwerken ............................................27<br />

4.4.1 Update‑instellingen ............................................. 27<br />

4.4.1.1 Updateprofielen .................................................. 28<br />

4.4.1.2 Instellingen voor geavanceerde update ................. 28<br />

4.4.1.2.1 Updatemodus ..................................................... 28<br />

4.4.1.2.2 Proxyserver .......................................................... 28<br />

4.4.1.2.3 Verbinding maken met LAN .................................. 29<br />

4.4.1.2.4 Updatekopieën maken ‑ Mirror ............................. 29<br />

4.4.1.2.4.1 Bijwerken vanaf de mirror ....................................30<br />

4.4.1.2.4.2 Updateproblemen met mirrors oplossen ....................31<br />

4.4.2 Updatetaken maken .............................................31<br />

4.5 Planner ....................................................................... 31<br />

4.5.1 Doel van geplande taken .......................................31<br />

4.5.2 Nieuwe taken maken ............................................31<br />

4.6 Quarantaine................................................................32<br />

4.6.1 Bestanden in quarantaine plaatsen ....................... 32<br />

4.6.2 Terugzetten vanuit quarantaine ........................... 32<br />

4.6.3 Bestand verzenden vanuit quarantaine ................. 32<br />

4.7 Logbestanden..............................................................33<br />

4.7.1 Logbestanden onderhouden ................................. 33<br />

4.8 Gebruikersinterface......................................................33<br />

4.8.1 Waarschuwingen en meldingen ............................ 34<br />

4.9 ThreatSense.Net ..........................................................35<br />

4.9.1 Verdachte bestanden ........................................... 35<br />

4.9.2 Statistieken ......................................................... 36<br />

4.9.3 Verzending .......................................................... 36<br />

4.10 Extern beheer ..............................................................36<br />

4.11 Licentie ....................................................................... 37<br />

5. Geavanceerde gebruiker ....................... 38<br />

5.1 Proxyserver instellen ....................................................38<br />

5.2 Instellingen importeren/exporteren...............................38<br />

5.2.1 Instellingen exporteren ........................................ 38<br />

5.2.2 Instellingen importeren........................................ 38<br />

5.3 Opdrachtregel .............................................................38<br />

5.4 ESET SysInspector ........................................................39<br />

5.4.1 Gebruikersinterface en gebruik van de toepassing ... 39<br />

5.4.1.1 Besturingselementen in programma .....................40<br />

5.4.1.2 Navigeren in ESET SysInspector ............................40<br />

5.4.1.3 Vergelijken ...........................................................41<br />

5.4.1.4 SysInspector als onderdeel<br />

van ESET Smart Security 4 .....................................41<br />

5.4.1.5 SysInspector als onderdeel<br />

van ESET Smart Security 4 .................................... 42<br />

5.4.1.5.1 SysInspector als onderdeel<br />

van ESET Smart Security 4 .................................... 42<br />

5.4.1.5.2 De structuur van het servicescript ......................... 42<br />

5.4.1.5.3 Servicescripts uitvoeren ....................................... 43<br />

5.5 ESET SysRescue ...........................................................43<br />

5.5.1 Minimale vereisten .............................................. 43<br />

5.5.2 Een herstel‑cd maken ........................................... 43<br />

5.5.2.1 Mappen ..............................................................44<br />

5.5.2.2 ESET Antivirus......................................................44<br />

5.5.2.3 Geavanceerd ........................................................44<br />

5.5.2.4 Opstartbaar USB‑apparaat ..................................44<br />

5.5.2.5 Branden ..............................................................44<br />

5.5.3 Werken met ESET SysRescue ................................44<br />

5.5.3.1 ESET SysRescue in de praktijk ...............................44<br />

6.1 Typen bedreigingen ..................................................... 45<br />

6.1.1 Virussen .............................................................. 45<br />

6.1.2 Wormen .............................................................. 45<br />

6.1.3 Trojaanse paarden ............................................... 45<br />

6.1.4 Rootkits .............................................................. 45<br />

6.1.5 Adware ...............................................................46<br />

6.1.6 Spyware ..............................................................46<br />

6.1.7 Potentieel onveilige toepassingen .........................46<br />

6.1.8 Potentieel ongewenste toepassingen ....................46<br />

6.2 Typen externe aanvallen .............................................. 46<br />

6.2.1 DoS‑aanvallen .....................................................46<br />

6.2.2 DNS Poisoning .....................................................46<br />

6.2.3 Wormaanvallen ...................................................46<br />

6.2.4 Port Scanning ...................................................... 47<br />

6.2.5 TCP‑desynchronisatie ........................................... 47<br />

6.2.6 SMB Relay ........................................................... 47<br />

6.2.7 ICMP‑aanvallen ................................................... 47<br />

6.3 E-mail .........................................................................47<br />

6.3.1 Advertenties ........................................................ 47<br />

6.3.2 Nepmeldingen .....................................................48<br />

6.3.3 Phishing ..............................................................48<br />

6.3.4 Spam herkennen ..................................................48<br />

6.3.4.1 Regels .................................................................48<br />

6.3.4.2 Bayesiaans filter ..................................................48<br />

6.3.4.3 Witte lijst ............................................................49<br />

6.3.4.4 Zwarte lijst ..........................................................49<br />

6.3.4.5 Controle vanaf de server .......................................49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!