05.08.2013 Views

1. ESET NOD32 Antivirus

1. ESET NOD32 Antivirus

1. ESET NOD32 Antivirus

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Innehåll<br />

<strong>1.</strong> <strong>ESET</strong> <strong>NOD32</strong> .............................................................4<br />

<strong>Antivirus</strong><br />

<strong>1.</strong>1<br />

Systemkrav<br />

..............................................................................4<br />

2. Installation .............................................................5<br />

2.1<br />

2.2<br />

2.3<br />

2.4<br />

2.5<br />

Typisk installation ..............................................................................5<br />

Anpassad installation ..............................................................................5<br />

Fjärrinstallation ..............................................................................6<br />

2.3.1 Skapa .............................................................................6<br />

ett fjärrinstallationspaket<br />

2.3.2 Fjärrinstallation .............................................................................7<br />

på måldatorer<br />

2.3.3 Fjärravinstallation<br />

.............................................................................7<br />

2.3.4 Fjärruppgradering<br />

.............................................................................7<br />

Ange användarnamn ..............................................................................7<br />

och lösenord<br />

Genomsökning ..............................................................................7<br />

av datorn på begäran<br />

3. Nybörjarhandbok .............................................................8<br />

3.1 Användargränssnitt ..............................................................................8<br />

3.<strong>1.</strong>1 Kontrollera .............................................................................8<br />

systemets funktion<br />

3.<strong>1.</strong>2 Vad gör .............................................................................8<br />

jag om programmet inte fungerar?<br />

4. Arbeta .............................................................10<br />

med <strong>ESET</strong> <strong>NOD32</strong> <strong>Antivirus</strong><br />

4.1 Skydd mot virus ..............................................................................10<br />

och spionprogram<br />

4.<strong>1.</strong>1 Skydd .............................................................................10<br />

av filsystemet i realtid<br />

4.<strong>1.</strong><strong>1.</strong>1 Ställ ............................................................................10<br />

in realtidsskydd<br />

4.<strong>1.</strong><strong>1.</strong><strong>1.</strong>1 Genomsök ..............................................................................10<br />

vid (händelseutlöst genomsökning)<br />

4.<strong>1.</strong><strong>1.</strong><strong>1.</strong>2 Avancerade ..............................................................................10<br />

genomsökningsalternativ<br />

4.<strong>1.</strong><strong>1.</strong><strong>1.</strong>3 Undantag ..............................................................................10<br />

från genomsökning<br />

4.<strong>1.</strong><strong>1.</strong>2 När konfigurationen ............................................................................10<br />

för realtidsskydd bör ändras<br />

4.<strong>1.</strong><strong>1.</strong>3 Kontrollera ............................................................................11<br />

realtidsskyddet<br />

4.<strong>1.</strong><strong>1.</strong>4 Vad gör ............................................................................11<br />

jag om realtidsskyddet inte fungerar?<br />

4.<strong>1.</strong>2 Genomsökning .............................................................................11<br />

av datorn på begäran<br />

4.<strong>1.</strong>2.1 Typ av ............................................................................11<br />

genomsökning<br />

4.<strong>1.</strong>2.<strong>1.</strong>1 Smart ..............................................................................11<br />

genomsökning<br />

4.<strong>1.</strong>2.<strong>1.</strong>2 Anpassad ..............................................................................11<br />

genomsökning<br />

4.<strong>1.</strong>2.2 Genomsökningsobjekt<br />

............................................................................12<br />

4.<strong>1.</strong>2.3 Genomsökningsprofiler<br />

............................................................................12<br />

4.<strong>1.</strong>3 Parameterinställningar .............................................................................12<br />

för ThreatSense-motorn<br />

4.<strong>1.</strong>3.1 Objekt ............................................................................13<br />

4.<strong>1.</strong>3.2 Alternativ ............................................................................13<br />

4.<strong>1.</strong>3.3 Rensning ............................................................................13<br />

4.<strong>1.</strong>3.4 Tillägg ............................................................................13<br />

4.<strong>1.</strong>3.5 Begränsningar ............................................................................13<br />

4.<strong>1.</strong>3.6 Övrigt ............................................................................14<br />

4.<strong>1.</strong>4 En infiltration .............................................................................14<br />

identifieras<br />

4.2 Uppdatera programmet<br />

..............................................................................14<br />

4.2.1 Uppgradering .............................................................................15<br />

till en ny version<br />

4.2.2 Inställning .............................................................................15<br />

av uppdateringar<br />

4.2.3 Skapa .............................................................................15<br />

uppdateringsaktiviteter<br />

4.3 Schemaläggaren ..............................................................................16<br />

4.3.1 Syftet .............................................................................16<br />

med att schemalägga aktiviteter<br />

4.3.2 Skapa .............................................................................16<br />

nya aktiviteter<br />

4.4 Karantän ..............................................................................17<br />

4.4.1 Sätta .............................................................................17<br />

filer i karantän<br />

4.4.2 Återställa .............................................................................17<br />

från karantän<br />

4.4.3 Skicka .............................................................................17<br />

en fil från karantän<br />

4.5 Loggfiler ..............................................................................17<br />

4.5.1 Loggunderhåll .............................................................................17<br />

4.6<br />

4.7<br />

4.5.2 Loggfiltrering .............................................................................18<br />

Användargränssnitt ..............................................................................18<br />

4.6.1 Varningar .............................................................................18<br />

och meddelanden<br />

4.6.<strong>1.</strong>1 Avancerade inställningar för varningar och<br />

meddelanden ............................................................................18<br />

4.6.2 Behörigheter .............................................................................18<br />

4.6.3 Kontextmeny .............................................................................19<br />

ThreatSense.Net ..............................................................................19<br />

4.7.1 Misstänkta .............................................................................19<br />

filer<br />

5. Avancerade .............................................................21<br />

användare<br />

5.1 Importera och ..............................................................................21<br />

exportera inställningar<br />

5.<strong>1.</strong>1 Importera .............................................................................21<br />

inställningar<br />

5.<strong>1.</strong>2 Exportera .............................................................................21<br />

inställningar<br />

5.2 Inställning av ..............................................................................21<br />

proxyserver<br />

5.3 Blockering av ..............................................................................21<br />

flyttbara media<br />

5.4 Fjärradministration ..............................................................................21<br />

6. Ordlista.............................................................23<br />

6.1 Typer av infiltreringar ..............................................................................23<br />

6.<strong>1.</strong>1 Virus .............................................................................23<br />

6.<strong>1.</strong>2 Maskar .............................................................................23<br />

6.<strong>1.</strong>3 Trojanska .............................................................................23<br />

hästar<br />

6.<strong>1.</strong>4 Reklamprogram<br />

.............................................................................23<br />

6.<strong>1.</strong>5 Spionprogram .............................................................................24<br />

6.<strong>1.</strong>6 Potentiellt .............................................................................24<br />

farliga program<br />

6.<strong>1.</strong>7<br />

Potentiellt .............................................................................24<br />

oönskade program

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!