Contents
.......................................................5ESET Endpoint Security1.
....................................................................................................5What's new in version 61.1
....................................................................................................5System requirements1.2
.......................................................6
Users connecting via ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Web Console2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installation3.
....................................................................................................9Typical installation3.1
....................................................................................................10Custom installation3.2
....................................................................................................11Remote installation3.3
..............................................................................11Creating a remote installation package
3.3.1
..............................................................................12Remote installation on ta rget computers
3.3.2
..............................................................................12Remote uninstalla tion
3.3.3
..............................................................................12Remote upgrade
3.3.4
.......................................................13Product activation4.
.......................................................15Uninstallation5.
.......................................................16Basic overview6.
....................................................................................................16Keyboard shortcuts6.1
....................................................................................................17Checking operation of the system6.2
....................................................................................................17
What to do if the program does not
work properly
6.3
.......................................................18Computer protection7.
....................................................................................................18Antivirus and antispyware protection7.1
..............................................................................18General
7.1.1
..................................................................................18Exclusions
7.1.1.1
..............................................................................19Sta rtup protection
7.1.2
..............................................................................19Real-time file system protection
7.1.3
..................................................................................19Advanced options
7.1.3.1
..................................................................................20When to modify Real-time protection configuration
7.1.3.2
..................................................................................20Checking Real-time protection
7.1.3.3
..................................................................................20What to do if Real-time protection does not work
7.1.3.4
..............................................................................21On-demand computer scan
7.1.4
..................................................................................21Type of scan
7.1.4.1
........................................................................21Smart scan
7.1.4.1.1
........................................................................22Custom scan
7.1.4.1.2
..................................................................................22Scan targets
7.1.4.2
..................................................................................22Scan profiles
7.1.4.3
..............................................................................23ThreatSense engine pa rameters setup
7.1.5
..................................................................................23Objects
7.1.5.1
..................................................................................24Options
7.1.5.2
..................................................................................24Cleaning
7.1.5.3
..................................................................................24Exclusions
7.1.5.4
..................................................................................25Limits
7.1.5.5
..................................................................................25Others
7.1.5.6
..............................................................................25An infiltration is detected
7.1.6
....................................................................................................26Web and email protection7.2
..............................................................................26Web access protection
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL lists
7.2.1.2
..............................................................................27Email protection
7.2.2
..................................................................................27POP3 protocol checking
7.2.2.1
..................................................................................27IMAP protocol checking
7.2.2.2
....................................................................................................28Anti-Phishing7.3
.......................................................29Firewall8.
....................................................................................................29Filtering modes8.1
....................................................................................................30Firewall rules8.2
..............................................................................30Creating new rules
8.2.1
....................................................................................................30Firewall zones8.3
....................................................................................................30Firewall profiles8.4
....................................................................................................31Firewall logs8.5
.......................................................32Device control9.
....................................................................................................32Rules editor9.1
.......................................................34Web control10.
.......................................................35Tools11.
....................................................................................................35Log files11.1
..............................................................................35Log maintenance
11.1.1
..............................................................................36Log filtering
11.1.2
....................................................................................................36Scheduler11.2
..............................................................................37Creating new tas ks
11.2.1
..............................................................................37Creating a user-defined ta sk
11.2.2
....................................................................................................38Live Grid11.3
..............................................................................38Suspicious files
11.3.1
....................................................................................................39Quarantine11.4
..............................................................................39Quarantining files
11.4.1
..............................................................................39Restoring a quarantined file
11.4.2
..............................................................................39Submitting a file from Quarantine
11.4.3
....................................................................................................40Privileges11.5
....................................................................................................40Presentation mode11.6
....................................................................................................41Running processes11.7
.......................................................42User interface12.
....................................................................................................42Alerts and notifications12.1
..............................................................................42Displa y alerts
12.1.1
..............................................................................42Protection statuses
12.1.2
....................................................................................................43Context menu12.2
.......................................................44Update13.
....................................................................................................44Update setup13.1