05.08.2013 Views

Ghid de utilizare - Eset

Ghid de utilizare - Eset

Ghid de utilizare - Eset

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.1.3.1 HTTP, HTTPS .........................................................15<br />

4.1.3.1.1 Gestionarea adreselor ...........................................15<br />

4.1.3.1.2 Browsere Web.......................................................15<br />

4.1.4 Scanarea computerului .........................................16<br />

4.1.4.1 Tipurile <strong>de</strong> scanare ................................................16<br />

4.1.4.1.1 Scanarea standard ................................................16<br />

4.1.4.1.2 Scanarea personalizată .........................................16<br />

4.1.4.2 Ţinte <strong>de</strong> scanare ....................................................16<br />

4.1.4.3 Profilurile <strong>de</strong> scanare ............................................. 17<br />

4.1.5 Filtrarea protocoalelor .......................................... 17<br />

4.1.5.1 SSL ....................................................................... 17<br />

4.1.5.1.1 Certificate <strong>de</strong> încre<strong>de</strong>re .........................................18<br />

4.1.5.1.2 Certificate excluse ................................................18<br />

4.1.6 Setarea parametrilor pentru motorul ThreatSense ..18<br />

4.1.6.1 Setarea obiectelor .................................................18<br />

4.1.6.2 Opţiuni: ...............................................................18<br />

4.1.6.3 Curăţarea .............................................................19<br />

4.1.6.4 Extensii ................................................................19<br />

4.1.6.5 Limite ..................................................................19<br />

4.1.6.6 Altele ...................................................................19<br />

4.1.7 Se <strong>de</strong>tectează o infiltrare ......................................20<br />

4.2 Actualizarea programului ............................................ 20<br />

4.2.1 Setarea actualizării ...............................................21<br />

4.2.1.1 Profilurile <strong>de</strong> actualizare ........................................21<br />

4.2.1.2 Setarea actualizării avansate .................................21<br />

4.2.1.2.1 Modul <strong>de</strong> actualizare .............................................21<br />

4.2.1.2.2 Serverul proxy ...................................................... 22<br />

4.2.1.2.3 Conectarea la LAN ............................................... 22<br />

4.2.1.2.4 Crearea copiilor <strong>de</strong> actualizare – oglindă ............... 23<br />

4.2.1.2.4.1 Actualizarea din oglindă ....................................... 23<br />

4.2.1.2.4.2 Depanarea problemelor la actualizarea din oglindă 24<br />

4.2.2 Cum se creează sarcini <strong>de</strong> actualizare .................... 24<br />

4.3 Planificatorul ...............................................................25<br />

4.3.1 Scopul programării sarcinilor ................................ 25<br />

4.3.2 Creare sarcini noi ................................................. 25<br />

4.4 Carantina ................................................................... 26<br />

4.4.1 Plasarea fişierelor în carantină .............................. 26<br />

4.4.2 Restaurarea din Carantină ................................... 26<br />

4.4.3 Trimiterea fişierului din Carantină ......................... 26<br />

4.5 Fişiere log ................................................................... 26<br />

4.5.1 Mentenanţa fişierelor log ..................................... 27<br />

4.6 Interfaţa pentru utilizator .............................................27<br />

4.6.1 Alerte şi notificări ................................................ 28<br />

4.7 ThreatSense.Net ......................................................... 28<br />

4.7.1 Fişierele suspecte ................................................. 29<br />

4.7.2 Statistica ............................................................. 29<br />

4.7.3 Trimiterea ...........................................................30<br />

4.8 Administrarea la distanţă ............................................ 30<br />

4.9 Licenţa ....................................................................... 30<br />

5. Utilizatorii avansaţi ...............................31<br />

5.1 Setarea serverului proxy ............................................... 31<br />

5.2 Importul/Exportul setărilor ........................................... 31<br />

5.2.1 Exportul setărilor ..................................................31<br />

5.2.2 Importul setărilor .................................................31<br />

5.3 Linie <strong>de</strong> comandă ......................................................... 31<br />

5.4 ESET SysInspector ........................................................32<br />

5.4.1 Interfaţa pentru utilizator şi folosirea aplicaţiei ..... 32<br />

5.4.1.1 Comenzile <strong>de</strong> program ......................................... 33<br />

5.4.1.2 Navigarea în ESET SysInspector............................. 33<br />

5.4.1.3 Compararea ........................................................ 34<br />

5.4.1.4 SysInspector ca parte din ESET NOD32 Antivirus 4 .. 34<br />

5.4.1.5 Script <strong>de</strong> serviciu .................................................. 34<br />

5.4.1.5.1 Generarea scripturilor <strong>de</strong> serviciu .......................... 35<br />

5.4.1.5.2 Structure of the Service script ............................... 35<br />

5.4.1.5.3 How to execute Service scripts ............................. 36<br />

5.5 ESET SysRescue ...........................................................36<br />

5.5.1 Cerinţe minime .................................................... 36<br />

5.5.2 Cum se creează un CD <strong>de</strong> salvare .......................... 36<br />

5.5.2.1 Directoare ........................................................... 37<br />

5.5.2.2 ESET Antivirus...................................................... 37<br />

5.5.2.3 Avansat ............................................................... 37<br />

5.5.2.4 Dispozitiv USB <strong>de</strong> încărcare .................................. 37<br />

5.5.2.5 Inscripţionare ...................................................... 37<br />

5.5.3 Lucrul cu ESET SysRescue ..................................... 37<br />

5.5.3.1 Utilizarea ESET SysRescue .................................... 37<br />

6. Glosar ................................................. 38<br />

6.1 Tipuri <strong>de</strong> infiltrări .........................................................38<br />

6.1.1 Viruşi .................................................................. 38<br />

6.1.2 Viermi ................................................................. 38<br />

6.1.3 Troieni ................................................................. 38<br />

6.1.4 Rootkit-uri .......................................................... 38<br />

6.1.5 Adware ............................................................... 39<br />

6.1.6 Spyware .............................................................. 39<br />

6.1.7 Aplicaţii potenţial periculoase .............................. 39<br />

6.1.8 Aplicaţii potenţial nedorite ................................... 39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!