Contents
.......................................................5ESET Endpoint Antivirus1.
....................................................................................................5What's new in version 61.1
....................................................................................................5System requirements1.2
.......................................................6
Users connecting via ESET Remote
Administrator
2.
....................................................................................................6ESET Remote Administrator Server2.1
....................................................................................................7Web Console2.2
....................................................................................................7Proxy2.3
....................................................................................................8Agent2.4
....................................................................................................8RD Sensor2.5
.......................................................9Installation3.
....................................................................................................9Typical installation3.1
....................................................................................................10Custom installation3.2
....................................................................................................10Remote installation3.3
..............................................................................11Creating a remote installation package
3.3.1
..............................................................................11Remote installation on ta rget computers
3.3.2
..............................................................................12Remote uninstalla tion
3.3.3
..............................................................................12Remote upgrade
3.3.4
.......................................................13Product activation4.
.......................................................15Uninstallation5.
.......................................................16Basic overview6.
....................................................................................................16Keyboard shortcuts6.1
....................................................................................................17Checking operation of the system6.2
....................................................................................................17
What to do if the program does not
work properly
6.3
.......................................................18Computer protection7.
....................................................................................................18Antivirus and antispyware protection7.1
..............................................................................18General
7.1.1
..................................................................................18Exclusions
7.1.1.1
..............................................................................19Sta rtup protection
7.1.2
..............................................................................19Real-time file system protection
7.1.3
..................................................................................19Advanced options
7.1.3.1
..................................................................................20When to modify Real-time protection configuration
7.1.3.2
..................................................................................20Checking Real-time protection
7.1.3.3
..................................................................................20What to do if Real-time protection does not work
7.1.3.4
..............................................................................21On-demand computer scan
7.1.4
..................................................................................21Type of scan
7.1.4.1
........................................................................21Smart scan
7.1.4.1.1
........................................................................22Custom scan
7.1.4.1.2
..................................................................................22Scan targets
7.1.4.2
..................................................................................22Scan profiles
7.1.4.3
..............................................................................23ThreatSense engine pa rameters setup
7.1.5
..................................................................................23Objects
7.1.5.1
..................................................................................24Options
7.1.5.2
..................................................................................24Cleaning
7.1.5.3
..................................................................................24Exclusions
7.1.5.4
..................................................................................25Limits
7.1.5.5
..................................................................................25Others
7.1.5.6
..............................................................................25An infiltration is detected
7.1.6
....................................................................................................26Web and email protection7.2
..............................................................................26Web access protection
7.2.1
..................................................................................26Ports
7.2.1.1
..................................................................................26URL lists
7.2.1.2
..............................................................................27Email protection
7.2.2
..................................................................................27POP3 protocol checking
7.2.2.1
..................................................................................27IMAP protocol checking
7.2.2.2
....................................................................................................28Anti-Phishing7.3
.......................................................29Device control8.
....................................................................................................29Rules editor8.1
.......................................................31Tools9.
....................................................................................................31Log files9.1
..............................................................................31Log maintenance
9.1.1
..............................................................................32Log filtering
9.1.2
....................................................................................................32Scheduler9.2
..............................................................................33Creating new tas ks
9.2.1
..............................................................................33Creating a user-defined ta sk
9.2.2
....................................................................................................34Live Grid9.3
..............................................................................34Suspicious files
9.3.1
....................................................................................................35Quarantine9.4
..............................................................................35Quarantining files
9.4.1
..............................................................................35Restoring a quarantined file
9.4.2
..............................................................................35Submitting a file from Quarantine
9.4.3
....................................................................................................35Privileges9.5
....................................................................................................36Presentation mode9.6
....................................................................................................36Running processes9.7
.......................................................37User interface10.
....................................................................................................37Alerts and notifications10.1
..............................................................................37Displa y alerts
10.1.1
..............................................................................37Protection statuses
10.1.2
....................................................................................................38Context menu10.2
.......................................................39Update11.
....................................................................................................39Update setup11.1
..............................................................................40Advanced options
11.1.1
....................................................................................................41How to create update tasks11.2
....................................................................................................41Upgrading to a new build11.3
....................................................................................................41System updates11.4
.......................................................43Miscellaneous12.
....................................................................................................43Import and export settings12.1
....................................................................................................43Proxy server setup12.2
....................................................................................................44Shared Local Cache12.3