Spis treści
...........................................................................................................................4
Wstęp1.
..........................................................................................................................................................................................................4Nowe funkcje w wersji 3,51.1
..........................................................................................................................................................................................................4Minimalne wymagania systemowe1.2
...........................................................................................................................5
Instalacja2.
..........................................................................................................................................................................................................5Pobieranie ze sklepu Google Play2.1
..........................................................................................................................................................................................................5Pobieranie ze strony internetowej firmy ESET2.2
..........................................................................................................................................................................................................6Kreator uruchamiania2.3
...........................................................................................................................9
Odinstalowanie3.
...........................................................................................................................9
Aktywacja produktu4.
...........................................................................................................................10
Antywirus5.
..........................................................................................................................................................................................................12Skanowania automatyczne5.1
..........................................................................................................................................................................................................13Dzienniki skanowania5.2
..........................................................................................................................................................................................................14Ustawienia zaawansowane5.3
...........................................................................................................................15
Anti-Theft6.
..........................................................................................................................................................................................................16Portal internetowy6.1
...............................................................................................................................................................................................17Optymalizacja
6.1.1
...............................................................................................................................................................................................17Ochrona proaktywna
6.1.2
..........................................................................................................................................................................................................17Ochrona SIM6.2
...............................................................................................................................................................................................18Zaufane karty SIM
6.2.1
...............................................................................................................................................................................................18Zaufani odbiorcy
6.2.2
..........................................................................................................................................................................................................19Polecenia SMS6.3
..........................................................................................................................................................................................................20Ustawienia6.4
...............................................................................................................................................................................................20Hasło zabezpieczeń
6.4.1
...............................................................................................................................................................................................20Szczegóły kontaktu
6.4.2
...........................................................................................................................21
Ochrona przed atakami typu „phishing”7.
...........................................................................................................................22
Filtr SMS-ów i połączeń8.
..........................................................................................................................................................................................................22Reguły8.1
...............................................................................................................................................................................................23Dodawanie nowej reguły
8.1.1
..........................................................................................................................................................................................................23Historia8.2
...........................................................................................................................23
Audyt zabezpieczeń9.
..........................................................................................................................................................................................................24Monitorowanie urządzenia9.1
..........................................................................................................................................................................................................25Audyt aplikacji9.2
...........................................................................................................................26
Raport zabezpieczeń10.
...........................................................................................................................27
Ustawienia11.
...........................................................................................................................28
Dział obsługi klienta12.