EasyManua.ls Logo

ESET SMART SECURITY - Page 3

ESET SMART SECURITY
38 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4.3 Antispam protection ..................................................... 21
4.3.1 Self‑learning Antispam ......................................... 22
4.3.1.1 Adding addresses to whitelist ............................... 22
4.3.1.2 Marking messages as spam .................................. 22
4.4 Updating the program
..................................................22
4.4.1 Update setup ....................................................... 22
4.4.1.1 Update profiles .................................................... 23
4.4.1.2 Advanced update setup ........................................ 23
4.4.1.2.1 Update mode ...................................................... 23
4.4.1.2.2 Proxy server ......................................................... 24
4.4.1.2.3 Connecting to LAN ............................................... 24
4.4.1.2.4 Creating update copies – Mirror ............................ 24
4.4.1.2.4.1 Updating from the Mirror ..................................... 25
4.4.1.2.4.2 Troubleshooting Mirror update problems .............. 26
4.4.2 How to create update tasks ..................................26
4.5 Scheduler
................................................................... 26
4.5.1 Purpose of scheduling tasks .................................. 26
4.5.2 Creating new tasks .............................................. 27
4.6 Quarantine
..................................................................27
4.6.1 Quarantining files ................................................ 27
4.6.2 Restoring from Quarantine .................................. 27
4.6.3 Submitting file from Quarantine ........................... 27
4.7 Log files
...................................................................... 28
4.7.1 Log maintenance .................................................28
4.8 User interface
............................................................. 28
4.8.1 Alerts and notifications ........................................ 29
4.9 ThreatSense.Net
......................................................... 29
4.9.1 Suspicious files ....................................................30
4.9.2 Statistics .............................................................30
4.9.3 Submission ...........................................................31
4.10 Remote administration
................................................ 31
4.11 License
.......................................................................32
5. Advanced user ..................................... 33
5.1 Proxy server setup ........................................................33
5.2 Export / import settings
................................................33
5.2.1 Export settings .................................................... 33
5.2.2 Import settings .................................................... 33
5.3 Command Line
.............................................................33
6. Glossary .............................................. 35
6.1 Types of infiltrations .....................................................35
6.1.1 Viruses ................................................................ 35
6.1.2 Worms ................................................................ 35
6.1.3 Trojan horses ....................................................... 35
6.1.4 Rootkits .............................................................. 35
6.1.5 Adware ............................................................... 35
6.1.6 Spyware .............................................................. 36
6.1.7 Potentially unsafe applications ............................. 36
6.1.8 Potentially unwanted applications ....................... 36
6.2 Types of remote attacks
................................................36
6.2.1 DoS attacks ......................................................... 36
6.2.2 DNS Poisoning ..................................................... 36
6.2.3 Worm attacks ...................................................... 36
6.2.4 Port scanning ...................................................... 36
6.2.5 TCP desynchronization ......................................... 36
6.2.6 SMB Relay ........................................................... 37
6.2.7 ICMP attacks ....................................................... 37
6.3 E‑mail
.........................................................................37
6.3.1 Advertisements ................................................... 37
6.3.2 Hoaxes ................................................................ 37
6.3.3 Phishing .............................................................. 37
6.3.4 Recognizing spam scams .....................................38
6.3.4.1 Rules ................................................................... 38
6.3.4.1 Bayesian filter ...................................................... 38
6.3.4.2 Whitelist ............................................................. 38
6.3.4.3 Blacklist .............................................................. 38
6.3.4.5 The server‑side control ......................................... 38

Table of Contents

Other manuals for ESET SMART SECURITY

Related product manuals